QEMU upstream commit  was supposed to fix CVE-2020-17380 and
CVE-2020-25085, both involving a heap buffer overflow in the SDHCI
controller emulation code. In fact, commit  turned out to be
incomplete, in that it was still possible to reproduce the same
issue(s) with specially crafted input, inducing a bogus transfer and
subsequent out-of-bounds read/write access in sdhci_do_adma() or
New patch series:
A flaw was found in the virtio-fs shared file system daemon
(virtiofsd) of QEMU. Virtio-fs is meant to share a host file system
directory with a guest virtual machine. The new 'xattrmap' option may
cause the 'security.capability' xattr in the guest to not drop on file
write, potentially leading to a modified, privileged executable in the
guest. In rare circumstances, this flaw could be used by a malicious
user to elevate their privileges within the guest.
Both patchsets seem to be unmerged.
Second patch is applied, first patch series not yet in upstream main git branch.
Package list is empty or all packages have requested keywords.
Everything seems to be in 6.0.0
GLSA request filed
The bug has been referenced in the following commit(s):
Author: GLSAMaker <email@example.com>
AuthorDate: 2022-08-14 16:09:07 +0000
Commit: Sam James <firstname.lastname@example.org>
CommitDate: 2022-08-14 16:09:43 +0000
[ GLSA 202208-27 ] QEMU: Multiple Vulnerabilities
Signed-off-by: GLSAMaker <email@example.com>
Signed-off-by: Sam James <firstname.lastname@example.org>
glsa-202208-27.xml | 85 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 85 insertions(+)
GLSA done, all done.