UbuntuUpdates.org

Package "qemu-user-binfmt"

Name: qemu-user-binfmt

Description:

QEMU user mode binfmt registration for qemu-user

Latest version: 1:6.2+dfsg-2ubuntu6.26
Release: jammy (22.04)
Level: updates
Repository: universe
Head package: qemu
Homepage: http://www.qemu.org/

Links


Download "qemu-user-binfmt"


Other versions of "qemu-user-binfmt" in Jammy

Repository Area Version
base universe 1:6.2+dfsg-2ubuntu6
security universe 1:6.2+dfsg-2ubuntu6.24

Changelog

Version: 1:6.2+dfsg-2ubuntu6.26 2025-04-08 18:07:34 UTC

  qemu (1:6.2+dfsg-2ubuntu6.26) jammy; urgency=medium

  [ Christian Ehrhardt ]
  * d/p/u/lp-2098896-hw-nvme-fix-narrowing-conversion.patch:
    Fix nvme devices >= 1 TiB in size (LP: #2098896)
    Thanks to Ryan Harper for the report, bisect and preparation!
  * d/p/u/lp-2019967-*: Add Rome types with updated cache info (LP: #2019967)

 -- Lukas Märdian <email address hidden> Wed, 05 Mar 2025 11:48:26 +0100

Source diff to previous version
2098896 nvme disks 1TiB or greater show incorrect size
2019967 Add EPYC-Rome-v3 and EPYC-v4 model

Version: 1:6.2+dfsg-2ubuntu6.25 2025-02-26 23:06:59 UTC

  qemu (1:6.2+dfsg-2ubuntu6.25) jammy; urgency=medium

  * d/p/u/lp-2019968-add-missing-feature-bits-epyc-milan-*.patch: Add
    missing feature bits to EPYC-Milan CPU model. (LP: #2019968)

  [ Louis Bouchard ]
  * d/p/monitor-only-run-coroutine-commands-in-qemu_aio_cont.patch:
    Backport upstream fix for qmp timeouts.
    Upstream commit effd60c878176bcaf97fa7ce2b12d04bb8ead6f7
    (LP: #2091013)

 -- Sergio Durigan Junior <email address hidden> Wed, 29 Jan 2025 13:30:23 -0500

Source diff to previous version
2091013 Please backport upstream fix to qmp timeouts

Version: 1:6.2+dfsg-2ubuntu6.24 2024-11-11 01:06:59 UTC

  qemu (1:6.2+dfsg-2ubuntu6.24) jammy-security; urgency=medium

  * SECURITY UPDATE: denial of service
    - debian/patches/CVE-2023-3019-pre1.patch: Add definition for
      MemReentrancyGuard struct and add to DeviceState struct
    - debian/patches/CVE-2023-3019-1.patch: Provide MemReentrancyGuard *
      to qemu_new_nic()
    - debian/patches/CVE-2023-3019-2.patch: Update MemReentrancyGuard for
      NIC
    - CVE-2023-3019

 -- Bruce Cable <email address hidden> Tue, 22 Oct 2024 16:33:28 +1100

Source diff to previous version
CVE-2023-3019 A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged gues

Version: 1:6.2+dfsg-2ubuntu6.23 2024-10-24 22:07:05 UTC

  qemu (1:6.2+dfsg-2ubuntu6.23) jammy; urgency=medium

  * Implement support for secure execution guest dump encryption with
    customer keys on s390x. (LP: #1959966)
    - d/p/u/lp1959966-kvm-secure-guest-exec-*.patch: Backport upstream
      patches to implement feature.

 -- Sergio Durigan Junior <email address hidden> Tue, 20 Aug 2024 14:35:13 -0400

Source diff to previous version
1959966 [23.04 FEAT] KVM: Secure Execution guest dump encryption with customer keys - qemu part

Version: 1:6.2+dfsg-2ubuntu6.22 2024-08-13 08:07:13 UTC

  qemu (1:6.2+dfsg-2ubuntu6.22) jammy-security; urgency=medium

  * SECURITY UPDATE: null dereference
    - debian/patches/CVE-2023-6683-1.patch: Check size before
      populating info->types data
    - debian/patches/CVE-2023-6683-2.patch: Check clipboard types
      for if a callback needs to be set
    - CVE-2023-6683
  * SECURITY UPDATE: stack based buffer overflow
    - debian/patches/CVE-2023-6693.patch: Correctly copy vnet header
      when flushing TX
    - CVE-2023-6693
  * SECURITY UPDATE: integer underflow
    - debian/patches/CVE-2024-24474.patch: Restrict non-DMA transfer
      length to that of available data
    - CVE-2024-24474

 -- Bruce Cable <email address hidden> Thu, 01 Aug 2024 13:08:05 +1000

CVE-2023-6683 A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before
CVE-2023-6693 A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if g
CVE-2024-24474 QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the



About   -   Send Feedback to @ubuntu_updates