Back to qemu PTS page

Accepted qemu 1:2.1+dfsg-12+deb8u3 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 07 Sep 2015 16:54:32 +0300
Source: qemu
Binary: qemu qemu-system qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm
Architecture: source
Version: 1:2.1+dfsg-12+deb8u3
Distribution: jessie-security
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
 qemu       - fast processor emulator
 qemu-guest-agent - Guest-side qemu-system agent
 qemu-kvm   - QEMU Full virtualization on x86 hardware
 qemu-system - QEMU full system emulation binaries
 qemu-system-arm - QEMU full system emulation binaries (arm)
 qemu-system-common - QEMU full system emulation binaries (common files)
 qemu-system-mips - QEMU full system emulation binaries (mips)
 qemu-system-misc - QEMU full system emulation binaries (miscelaneous)
 qemu-system-ppc - QEMU full system emulation binaries (ppc)
 qemu-system-sparc - QEMU full system emulation binaries (sparc)
 qemu-system-x86 - QEMU full system emulation binaries (x86)
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 798101
Changes:
 qemu (1:2.1+dfsg-12+deb8u3) jessie-security; urgency=high
 .
   * Acknowlege the previous update.  Thank you Salvatore for the hard
     work you did fixing so many security issues.
   * rename last patches removing numeric prefixes, so that different series
     wont intermix with each other, add Bug-Debian: headers.
   * Add e1000-avoid-infinite-loop-in-transmit-CVE-2015-6815.patch.
     CVE-2015-6815: net: e1000 infinite loop issue in processing transmit
     descriptor.  (Closes: #798101 CVE-2015-6815)
   * Add ide-fix-ATAPI-command-permissions-CVE-2015-6855.patch.
     CVE-2015-6855: ide: qemu allows arbitrary commands to be sent to an ATAPI
     device from guest, while illegal comands might have security impact,
     f.e. WIN_READ_NATIVE_MAX results in divide by zero error.
     (Closes: CVE-2015-6855)
Checksums-Sha1:
 12f136a532dd661f69ea5507a15d21157925e1bd 5174 qemu_2.1+dfsg-12+deb8u3.dsc
 161963b8a07b5ebdee3c952d88556f626aaf21e9 114600 qemu_2.1+dfsg-12+deb8u3.debian.tar.xz
Checksums-Sha256:
 f8a84d05f9e5355da1a1fdedb2e4c73e28765e22ab85c1b17c5ddd89877a2f96 5174 qemu_2.1+dfsg-12+deb8u3.dsc
 b21806211af1568fe1caea6f8d8e0825de953548bcb581218440f6350da4aad8 114600 qemu_2.1+dfsg-12+deb8u3.debian.tar.xz
Files:
 9cd48301a7fd4f6d2864668d0a305c8c 5174 otherosfs optional qemu_2.1+dfsg-12+deb8u3.dsc
 f449d1801402737756dcb73db1db4e6f 114600 otherosfs optional qemu_2.1+dfsg-12+deb8u3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJV8+hJAAoJEL7lnXSkw9fb/d8H/AxvQgpNvn67Ovbf5UUFoLUO
DvMq9dIzMU3NwqJsc2kI73sUktHGRthc+gg+NkVspsN8XrYVF0UeydrOoHVKmhZk
GGz1kNlNIIEqV70Ajmo8cqvc/r189GYIJ39lRrNsdUY8K4COqwMy4c2YzJIkQMmh
hvof2H/wYDwN17CZ6JdppEV+kpcaXfYFXRepdo32ziET/UeBKR5optB+HYFl+e4Z
kdYN8JGHblcVgkTxd5hlajENO9g8RDxcvukQSC1pmpu8BGblAwDSXyl8/Bfj/gek
UyKst58oCXgRgNDECJM8pgris3QxP67a3DXNePSOcYc7lmnJpOhTW28AvkFWIMk=
=FUMV
-----END PGP SIGNATURE-----