Accepted qemu 1.1.2+dfsg-6a+deb7u7~bpo60+1 (source all i386) into squeeze-backports->backports-policy, squeeze-backports
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Thu, 14 May 2015 15:16:37 +0300
Source: qemu
Binary: qemu qemu-keymaps qemu-system qemu-user qemu-user-static qemu-utils
Architecture: source all i386
Version: 1.1.2+dfsg-6a+deb7u7~bpo60+1
Distribution: squeeze-backports
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
qemu - fast processor emulator
qemu-keymaps - QEMU keyboard maps
qemu-system - QEMU full system emulation binaries
qemu-user - QEMU user mode emulation binaries
qemu-user-static - QEMU user mode emulation binaries (static version)
qemu-utils - QEMU utilities
Closes: 597524 668658 677654 683983 686776 688964 691343 691569 695905 696050 696051 696052 696057 696061 696063 701926 719633 725944 741873 742730 744221 745157 762532 765496 772025
Changes:
qemu (1.1.2+dfsg-6a+deb7u7~bpo60+1) squeeze-backports; urgency=low
.
* Rebuild for squeeze-backports:
disable fdt and usbredir support for squeeze
.
qemu (1.1.2+dfsg-6a+deb7u7) wheezy-security; urgency=high
.
* fdc-force-the-fifo-access-to-be-in-bounds-CVE-2015-3456.patch
backported from upstream 2.3 (Closes: CVE-2015-3456)
* rename CVE-2014-8106 patches to match upstream, add bug#
(no actual code changed)
.
qemu (1.1.2+dfsg-6a+deb7u6) wheezy-security; urgency=high
.
* apply upstream patches for CVE-2014-8106
(cirrus: insufficient blit region checks)
(Closes: #772025 CVE-2014-8106)
.
qemu (1.1.2+dfsg-6a+deb7u5) wheezy-security; urgency=medium
.
* apply 5 patches backported from upstream to fix a security issue in
vmware-vga (Closes: #765496 CVE-2014-3689)
* vnc-sanitize-bits_per_pixel-from-the-client-CVE-2014-7815.patch
from upstream (Closes: CVE-2014-7815)
.
qemu (1.1.2+dfsg-6a+deb7u4) wheezy-security; urgency=medium
.
* image-format-validation patch series backported from 2.0, closing
CVE-2014-0142, CVE-2014-0143, CVE-2014-0144, CVE-2014-0145,
CVE-2014-0146, CVE-2014-0147, CVE-2014-0222, CVE-2014-0223
(Closes: #742730)
* slirp-udp-fix-NULL-pointer-deref-uninit-socket-CVE-2014-3640.patch
closing CVE-2014-3640 (Closes: #762532)
* spice-make-sure-we-don-t-overflow-ssd-buf-CVE-2014-3615.patch and
vbe-rework-sanity-checks-CVE-2014-3615.patch closing CVE-2014-3615
.
qemu (1.1.2+dfsg-6a+deb7u3) wheezy-security; urgency=high
.
* ide-correct-improper-smart-self-test-counter-reset-CVE-2014-2894.patch
(Closes: #745157 CVE-2014-2894)
* scsi-allocate-SCSITargetReq-r-buf-dynamically-CVE-2013-4344.patch
(Closes: #725944 CVE-2013-4344)
.
qemu (1.1.2+dfsg-6a+deb7u2) stable; urgency=medium
.
[ Gabriele Giacone ]
* Fix crash booting GNU/Hurd on both hwaccel systems without --enable-kvm
option and on non-hwaccel ones (Closes: #719633).
* Fix crash booting GNU/Hurd with QEMU multiboot options (Closes: #741873).
.
qemu (1.1.2+dfsg-6a+deb7u1) wheezy-security; urgency=high
.
* fix guest-triggerable buffer overrun in virtio-net device
(Closes: #744221 CVE-2014-0150)
.
qemu (1.1.2+dfsg-6a) unstable; urgency=low
.
* reupload to remove two unrelated files slipped in debian/
.
qemu (1.1.2+dfsg-6) unstable; urgency=low
.
* another bugfix for USB, upstream from early days of past-1.1.
usb-split-endpoint-init-and-reset.patch. With certain redirected
to guest USB devices, qemu process may crash:
.
usb_packet_complete: Assertion `((&ep->queue)->tqh_first) == p' failed.
.
The patch fixes this by de-coupling reset and complete paths.
Big thanks goes to Joseph Price who found the fix by doing a
reverse git bisection.
(Closes: #701926)
.
qemu (1.1.2+dfsg-5) unstable; urgency=low
.
* fix USB regression introduced in 1.1 (Closes: #683983)
uhci-don-t-queue-up-packets-after-one-with-the-SPD-flag-set.patch
Big thanks to Peter Schaefer (https://bugs.launchpad.net/bugs/1033727)
for the help identifying the fix.
.
qemu (1.1.2+dfsg-4) unstable; urgency=medium
.
* linux-user-fix-mips-32-on-64-prealloc-case.patch (Closes: #668658)
* e1000-discard-oversized-packets-based-on-SBP_LPE.patch: the second
half of the fix for CVE-2012-6075. (Finally Closes: #696051)
.
qemu (1.1.2+dfsg-3) unstable; urgency=low
.
* add build-dependency on libcap-dev [linux-any] to enable virtfs support
which has been dropped in 1.1. (Closes: #677654)
* intel_hda-do-not-call-msi_reset-when-only-device-state-needs-resetting.patch
patch to fix Fixing reset of MSI function in intel-hda virtual device.
The fix (applied to stable-1.1.1) was partially wrong, as it actually
added the msi_reset() call to two code paths instead of one as planned.
Fix this by splitting the function in question into two parts.
(Closes: #688964)
* blockdev-preserve-readonly-and-snapshot-states-across-media-changes.patch:
allow opening of read-only cdrom images/devices (Closes: #686776)
* ahci-properly-reset-PxCMD-on-HBA-reset.patch: fix windows install on ahci
(Closes: #696052)
* e1000-discard-packets-that-are-too-long-if-not-SBP-and-not-LPE.patch:
discard too long rx packets which may overflow guest buffer
(Closes: #696051)
* eepro100-fix-network-hang-when-rx-buffers-run-out.patch:
fix e100 stall (Closes: #696061)
* fix possible network stalls/slowness in e1000 device emulation:
net-notify-iothread-after-flushing-queue.patch
e1000-flush-queue-whenever-can_receive-can-go-from-false-to-true.patch
(Closes: #696063)
* fixes-related-to-processing-of-qemu-s-numa-option.patch:
fixes numa handling (Closes: #691343)
* qcow2-fix-avail_sectors-in-cluster-allocation-code.patch:
fixes data corruption in stacked qcow2 (Closes: #695905)
* qcow2-fix-refcount-table-size-calculation.patch: another possible
corruption or crash in qcow2 (Closes: #691569)
* tap-reset-vnet-header-size-on-open.patch: always ensure tap device is
in known state initially (Closes: #696057)
* vmdk-fix-data-corruption-bug-in-WRITE-and-READ-handling.patch:
possible data corruption bug in vmdk image format (Closes: #696050)
.
qemu (1.1.2+dfsg-2) unstable; urgency=low
.
* remove debian/patches/fix-armhf-prctl.patch, it is included
upstream in 1.1.0 version and is misapplied since 1.1.0~rc3+dfsg-1.
* drop -jN passing to downstream makes, as it breaks dpkg-buildpackage -j
and actually breaks build (Closes: #597524 - said to be fixed in 0.14.1
but was still present)
* add revert-serial-fix-retry-logic.patch that restores
old (semi-)working behavour of a virtual serial port.
Checksums-Sha1:
f881fa9a96273c0f1d3921771c337fd299c29ebc 2405 qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1.dsc
62e4a1e522d208dc8826dd1983f829efa7d4d6fa 108623 qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1.debian.tar.gz
10ce302e1b86a21d4e08d18e394b0a636119b167 49736 qemu-keymaps_1.1.2+dfsg-6a+deb7u7~bpo60+1_all.deb
7f6e0b8435895dbf244e8b7b3f24fea8cca247ab 114920 qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
a447d4d604441c396fa7b7c5f70bd2579fbcf9f5 26105268 qemu-system_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
71ad1da4ca9b4c4adf632a6c03984faf4a36b173 7149034 qemu-user_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
8f89a9c90bdfbfd425bf8d6b7c0912d8f2e84178 14067618 qemu-user-static_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
fffea3a1e59f61d2c7a48bfb7296e09aaaa80f96 658452 qemu-utils_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
Checksums-Sha256:
d9dbaaf66470ed1204de8b5682361b1e3ec2cf34d3338725c55021d6d47db1da 2405 qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1.dsc
1f143372553688782206b74056abef695bb778b98e3c31c9cfd1aec2bba795cc 108623 qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1.debian.tar.gz
e8d6f2d5de7587b80767c83aadcf39d421da5dbb39eb462c23f838b972677ad4 49736 qemu-keymaps_1.1.2+dfsg-6a+deb7u7~bpo60+1_all.deb
6a2c3b0f387a9096fca98a26292209ef0662865173f5b4b9057c66c505cf83a2 114920 qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
1979b65ebd78b63f4b4017212e581c5b1ec3c667901f7d72ca437abddf1e54e5 26105268 qemu-system_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
1f2e9f05faea7057ee3d31feaacd1176fbf03cf27353153a8725c6b8a7129d32 7149034 qemu-user_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
8203c5a9ba36ff61fac846f1f85836009dd62a20a98fc40f0f30c331b3eb80e2 14067618 qemu-user-static_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
9d1801fd3e7fe17bbb3c4ad4be16dd85a376c8028f64bae5da352c5023c4dffb 658452 qemu-utils_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
Files:
778dbd8e54c65bfd6df0fef83de1e6af 2405 misc optional qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1.dsc
04609bc30175ed5f3e9e4d0e8de30e15 108623 misc optional qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1.debian.tar.gz
feebc344f3dd9272ebe4b42552da11f3 49736 misc optional qemu-keymaps_1.1.2+dfsg-6a+deb7u7~bpo60+1_all.deb
663821b18c6501dfaedd61d9c2247ed4 114920 misc optional qemu_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
1aecd2aac61b23359c08608ee737b571 26105268 misc optional qemu-system_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
115d72fc4bba9561e1160d42fd02e1ec 7149034 misc optional qemu-user_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
3dda45732483a4dd730912f1f3502075 14067618 misc optional qemu-user-static_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
a1d92cda06825fef0ec2f3dfbbe12584 658452 misc optional qemu-utils_1.1.2+dfsg-6a+deb7u7~bpo60+1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJVVJwhAAoJEL7lnXSkw9fbq/0IAIMBZkTztE58BbD2h7jOF8ak
cT51DDHww6IdqAzwSDmNlbuD+eWmoqsvHw/MyXg1KRp4prebMEUjJIeaFTMdmSy1
clB+n97fZP6ru9/FmIBdVwWLheUNPSdHti9CDvGIOA6r7CH9rr7n0mOKMe1ixjcv
meJOav3S44vfgLSIirVJX6+QNlXtn2+GTeQ+F+1J6nzPteq2a/3otB6220Vazf/I
03PpONdJJ8eBrFt9F08uWd+/3HYh6JVJYDB03gx7RmrtpDgz1Ljb5JaJufi31blo
N3RxzHPKjdKD/UASGDKTfnI9H2VE78QCX7zTrNjVNx0tmp8eRA1qtfmmaNk+SFg=
=feCI
-----END PGP SIGNATURE-----
Reply to: