Back to qemu PTS page

Accepted qemu 1:2.6+dfsg-3 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 15 Jun 2016 08:54:12 +0300
Source: qemu
Binary: qemu qemu-system qemu-block-extra qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm
Architecture: source
Version: 1:2.6+dfsg-3
Distribution: unstable
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
 qemu       - fast processor emulator
 qemu-block-extra - extra block backend modules for qemu-system and qemu-utils
 qemu-guest-agent - Guest-side qemu-system agent
 qemu-kvm   - QEMU Full virtualization on x86 hardware
 qemu-system - QEMU full system emulation binaries
 qemu-system-arm - QEMU full system emulation binaries (arm)
 qemu-system-common - QEMU full system emulation binaries (common files)
 qemu-system-mips - QEMU full system emulation binaries (mips)
 qemu-system-misc - QEMU full system emulation binaries (miscellaneous)
 qemu-system-ppc - QEMU full system emulation binaries (ppc)
 qemu-system-sparc - QEMU full system emulation binaries (sparc)
 qemu-system-x86 - QEMU full system emulation binaries (x86)
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 826152
Changes:
 qemu (1:2.6+dfsg-3) unstable; urgency=high
 .
   * more security fixes picked from upstream:
    - CVE-2016-4454 fix (vmsvga) (Closes: CVE-2016-4454)
     vmsvga-add-more-fifo-checks-CVE-2016-4454.patch
     vmsvga-move-fifo-sanity-checks-to-vmsvga_fifo_length-CVE-2016-4454.patch
     vmsvga-shadow-fifo-registers-CVE-2016-4454.patch
    - vmsvga-don-t-process-more-than-1024-fifo-commands-at-once-CVE-2016-4453.patch
     (Closes: CVE-2016-4453)
    - scsi-check-buffer-length-before-reading-scsi-command-CVE-2016-5238.patch
     (Closes: #826152, CVE-2016-5238)
   * set urgency to high due to the amount of
     security fixes accumulated so far
Checksums-Sha1:
 caa32fef771a245a56fe084e030bc3ad498adc1a 5374 qemu_2.6+dfsg-3.dsc
 670546a1b1c8009e3a3eae029a9ee6e93be76e20 81396 qemu_2.6+dfsg-3.debian.tar.xz
Checksums-Sha256:
 05f44bd0b3cf993cdff6611140a00405baa39f23588a79a841d2db3233fc92df 5374 qemu_2.6+dfsg-3.dsc
 cdfa3eef7a354b856b7e9edbcc444a01a222c34317b4e208ded4c9297befe1a7 81396 qemu_2.6+dfsg-3.debian.tar.xz
Files:
 f1092c125121e44ccc3089072f1e01be 5374 otherosfs optional qemu_2.6+dfsg-3.dsc
 642c56b603748b29fa962014dcb91827 81396 otherosfs optional qemu_2.6+dfsg-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJXYO4xAAoJEL7lnXSkw9fbLOQIAMFcdwuXsbuTY51KL89Jujos
mXqTexXNKMhs7+7fjR/AtGA50LF0fl44fGMdHyYLnUdHyZTVXCETdKrzNVePsP4g
OcIAaJLSIAW3RPpFe375wQQFtwk0OTfMZ1YYIV/bdWFOFonm3wHwlimaMJxcgpSU
Fw73ZE01xlZJiPdlifkJuEQ+zkgVvE+q7knQyV/0VoQZqg9F24uVTNuZdWij7N7P
uyK5CuxEvdXaY9bzNQgWBv4piSWX6lRcJwak0YWuHbgoE02NpB/kDLYAN6fNBDJ9
WJnbhu8dNtBoidXLLhS2j+aOjfW+5IYJX1n4mGHm3INhAAe9jphh6S+0QPpZRCU=
=2NDy
-----END PGP SIGNATURE-----