[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#768007: marked as done (unblock: qemu/2.1+dfsg-7)



Your message dated Fri, 07 Nov 2014 15:41:03 +0000
with message-id <12fbc32711f2f7f640b7c7c19e0ee55c@hogwarts.powdarrmonkey.net>
and subject line Re: Bug#768007: unblock: qemu/2.1+dfsg-7
has caused the Debian Bug report #768007,
regarding unblock: qemu/2.1+dfsg-7
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
768007: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768007
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock

Please consider unblocking package qemu.  Current version has 2 security
fixes (CVE-2014-3689 and CVE-2014-7815) and a fix for possible data
corrupter which has biten several people already (this one does not have
a bug# in debian, but ofc. I can file one too, original discussion was at
https://bugs.launchpad.net/qemu/+bug/1368815 ).

Besides that, it has several other bugfixes - #747636, #755740, #760949,
#765075 - these are easy changes not touching critical paths in the package.

All code changes are from upstream.

And besides that, there are a few tweaks in build system, which has been
tested extensively to ensure nothing breaks, which will help us to maintain
this package together with ubuntu guys without a need for forking - this
is something I really wanted to get into debian before freeze, because it
will be the common ground for quite some time.

Complete list of changes (from 2 releases combined):

   * urgency is high due to 2 security fixes
     and because of possible data corruption bugfix
   * vnc-sanitize-bits_per_pixel-from-the-client-CVE-2014-7815.patch
     from upstream (Closes: CVE-2014-7815)
   * add two patches from upstream for block/raw-posix.c to work around
     probs in FS_IOC_FIEMAP ioctl and to prefer seek_hole over fiemap.
     This should fix a long-standing ghost data corruption observed
     in various places.
   * mention closing of CVE-2014-3615 by 2.1.2 (2.1+dfsg-5)
   * 9p-use-little-endian-format-for-xattr-values.patch (Closes: #755740)
   * mention closing of #760386
   * mention closing of more CVEs by 2.1+dfsg-1
   * recognize ppc64el in qemu-debootstrap (Luca Falavigna) (Closes: #760949)
   * use dpkg-vendor to let derived distros to use our d/rules
   * use /usr/share/dpkg/architecture.mk to get DEB_HOST_* and DEB_BUILD_*
     variables.  This restores cross building support.
   * use /usr/share/dpkg/buildflags.mk for CFLAGS LDFLAGS &Co
   * pass -DVENDOR_{DEBIAN,UBUNTU} to compiler
   * do not treat ppc* and ppc*le as compatible for binfmt registrations
   * mention ACPI SLIC to RSDT id copying if slic table is supplied,
     thank you Tim Small for the patch (Closes: #765075)
   * apply 5 patches from upstream to fix a security issue in
     vmware-vga (Closes: #765496 CVE-2014-3689)
   * apply two patches from upstream to make qemu to work with samba4
     (Closes: #747636)

unblock qemu/2.1+dfsg-7

-- System Information:
Debian Release: 7.7
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'oldstable'), (199, 'testing'), (50, 'unstable'), (40, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
powerpc

Kernel: Linux 3.10-amd64 (SMP w/8 CPU cores)
Locale: LANG=ru_RU.utf8, LC_CTYPE=ru_RU.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

--- End Message ---
--- Begin Message ---
On 2014-11-04 04:35, Michael Tokarev wrote:
Please consider unblocking package qemu. Current version has 2 security
fixes (CVE-2014-3689 and CVE-2014-7815) and a fix for possible data
corrupter which has biten several people already (this one does not have a bug# in debian, but ofc. I can file one too, original discussion was at
https://bugs.launchpad.net/qemu/+bug/1368815 ).

Unblocked, thanks.

--
Jonathan Wiltshire                                      jmw@debian.org
Debian Developer                         http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

<directhex> i have six years of solaris sysadmin experience, from
            8->10. i am well qualified to say it is made from bonghits
			layered on top of bonghits

--- End Message ---

Reply to: