Back to qemu PTS page

Accepted qemu 1:2.4+dfsg-2 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 11 Sep 2015 19:54:07 +0300
Source: qemu
Binary: qemu qemu-system qemu-block-extra qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm libcacard0 libcacard-dev libcacard-tools
Architecture: source
Version: 1:2.4+dfsg-2
Distribution: unstable
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
 libcacard-dev - Virtual Common Access Card (CAC) Emulator (development files)
 libcacard-tools - Virtual Common Access Card (CAC) Emulator (tools)
 libcacard0 - Virtual Common Access Card (CAC) Emulator (runtime library)
 qemu       - fast processor emulator
 qemu-block-extra - extra block backend modules for qemu-system and qemu-utils
 qemu-guest-agent - Guest-side qemu-system agent
 qemu-kvm   - QEMU Full virtualization on x86 hardware
 qemu-system - QEMU full system emulation binaries
 qemu-system-arm - QEMU full system emulation binaries (arm)
 qemu-system-common - QEMU full system emulation binaries (common files)
 qemu-system-mips - QEMU full system emulation binaries (mips)
 qemu-system-misc - QEMU full system emulation binaries (miscelaneous)
 qemu-system-ppc - QEMU full system emulation binaries (ppc)
 qemu-system-sparc - QEMU full system emulation binaries (sparc)
 qemu-system-x86 - QEMU full system emulation binaries (x86)
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 798101
Changes:
 qemu (1:2.4+dfsg-2) unstable; urgency=high
 .
   * Add e1000-avoid-infinite-loop-in-transmit-CVE-2015-6815.patch.
     CVE-2015-6815: net: e1000 infinite loop issue in processing transmit
     descriptor.  (Closes: #798101 CVE-2015-6815)
   * Add ide-fix-ATAPI-command-permissions-CVE-2015-6855.patch.
     CVE-2015-6855: ide: qemu allows arbitrary commands to be sent to an ATAPI
     device from guest, while illegal comands might have security impact,
     f.e. WIN_READ_NATIVE_MAX results in divide by zero error.
     (Closes: CVE-2015-6855)
Checksums-Sha1:
 212f9a2e788e38ff1960d2f22f31435da5053adb 6038 qemu_2.4+dfsg-2.dsc
 c341787fb498cb69b5ffeb83a9f9ea7383ae312d 64272 qemu_2.4+dfsg-2.debian.tar.xz
Checksums-Sha256:
 5793dce2c0b247042e2355135f820a981f55ff4a07ea228528187db57961549f 6038 qemu_2.4+dfsg-2.dsc
 5773a126dcb6bbfdcb785058ae8acd26e2b4a53be14f20d5c05be045b4017f57 64272 qemu_2.4+dfsg-2.debian.tar.xz
Files:
 fcba6939e144a71ae03c9aa485473fff 6038 otherosfs optional qemu_2.4+dfsg-2.dsc
 cb12f2603f5a206b529851b7984a4904 64272 otherosfs optional qemu_2.4+dfsg-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJV8weoAAoJEL7lnXSkw9fbaKcH/jmDNlt975Pu3FAGEj31SrWy
LaCZ9ieOPGU5WAo9GAEIV6ZH19s8aFZmjzO3NiWRzcUKLAP73iQWiWXat851C8jO
6uyJaZRxcK/KLxDG2xMJuQ0vJxCO5aUE7cQ2LSP3pV6h0VSuZ+wYtMs7+GytGkoZ
tJ8bx8h8FDCrvIvcGC5Jsy6Bw//fiFJWT74tj77GCTnu1dwfrcrxNubgvQvA4A84
U/EClIfb9XLCG09kO5yRvvZAnPwRN+uVSYwPCB0uMY8mj712qT8XwiFR0Z7Q17Qc
Ht9+CzU7qzj8b0pETvMCnmk2rt5/jfPzYy92Dzl68Ol3M/+RN7QE/APS8T0vYCU=
=74OA
-----END PGP SIGNATURE-----