View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/qemu
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-03-26 18:26:57 UTC 4 hours ago
DSC file for 1:2.11+dfsg-1ubuntu7.11

Author: Ubuntu Git Importer
Author Date: 2019-03-26 18:26:57 UTC

DSC file for 1:2.11+dfsg-1ubuntu7.11

ubuntu/bionic-proposed 2019-03-26 18:08:21 UTC 5 hours ago
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.11 to ubuntu/bionic-pro...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:49:03 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.11 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 4f01ec452483d37706b1dc717fcdcb5d283eb61d

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

applied/ubuntu/bionic-devel 2019-03-26 18:08:21 UTC 5 hours ago
Import patches-applied version 1:2.11+dfsg-1ubuntu7.11 to applied/ubuntu/bion...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:49:03 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.11 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: ee34e9afedd0fa1adddf272af9aa4d1405f9ba7c
Unapplied parent: f733884a0c075c3427f22657f082760ff7b13848

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

applied/ubuntu/bionic-proposed 2019-03-26 18:08:21 UTC 5 hours ago
Import patches-applied version 1:2.11+dfsg-1ubuntu7.11 to applied/ubuntu/bion...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:49:03 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.11 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: ee34e9afedd0fa1adddf272af9aa4d1405f9ba7c
Unapplied parent: f733884a0c075c3427f22657f082760ff7b13848

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

ubuntu/bionic-devel 2019-03-26 18:08:21 UTC 5 hours ago
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.11 to ubuntu/bionic-pro...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:49:03 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.11 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 4f01ec452483d37706b1dc717fcdcb5d283eb61d

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

ubuntu/disco-proposed 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 994adb63a9522a7c30da2f0568193bd51ce9fa9d

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

ubuntu/disco-devel 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 994adb63a9522a7c30da2f0568193bd51ce9fa9d

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

ubuntu/disco 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 994adb63a9522a7c30da2f0568193bd51ce9fa9d

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

applied/ubuntu/disco-proposed 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-pr...

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: fd1cb94e1603f4e621e6993d0d69fca2b99de993
Unapplied parent: fb9c17d68dbe4b490035570d5a93084df056229e

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

applied/ubuntu/disco-devel 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-pr...

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: fd1cb94e1603f4e621e6993d0d69fca2b99de993
Unapplied parent: fb9c17d68dbe4b490035570d5a93084df056229e

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

applied/ubuntu/disco 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-pr...

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: fd1cb94e1603f4e621e6993d0d69fca2b99de993
Unapplied parent: fb9c17d68dbe4b490035570d5a93084df056229e

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

applied/ubuntu/devel 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-pr...

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-applied version 1:3.1+dfsg-2ubuntu3 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: fd1cb94e1603f4e621e6993d0d69fca2b99de993
Unapplied parent: fb9c17d68dbe4b490035570d5a93084df056229e

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

ubuntu/devel 2019-03-22 07:38:12 UTC 2019-03-22
Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Author: Christian Ehrhardt 
Author Date: 2019-03-18 08:20:07 UTC

Import patches-unapplied version 1:3.1+dfsg-2ubuntu3 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 994adb63a9522a7c30da2f0568193bd51ce9fa9d

New changelog entries:
  * qemu-guest-agent: fix path of fsfreeze-hook (LP: #1820291)
    - d/qemu-guest-agent.install: use correct path for fsfreeze-hook
    - d/qemu-guest-agent.pre{rm|inst}/.postrm: special handling for
      mv_conffile since the new path is a directory in the old package
      version which can not be handled by mv_conffile.
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635 (Thanks to Gerd Hoffmann and Michael Tokarev)
    CVE-2019-3812

importer/debian/dsc 2019-03-18 16:58:31 UTC 2019-03-18
DSC file for 1:3.1+dfsg-6

Author: Ubuntu Git Importer
Author Date: 2019-03-18 16:58:31 UTC

DSC file for 1:3.1+dfsg-6

debian/sid 2019-03-18 16:44:17 UTC 2019-03-18
Import patches-unapplied version 1:3.1+dfsg-6 to debian/sid

Author: Michael Tokarev
Author Date: 2019-03-18 11:41:51 UTC

Import patches-unapplied version 1:3.1+dfsg-6 to debian/sid

Imported using git-ubuntu import.

Changelog parent: a307cb3033f078d320557b90942056a58dd5ef27

New changelog entries:
  * slirp-check-sscanf-result-when-emulating-ident-CVE-2019-9824.patch
    fix information leakage in slirp code (Closes: CVE-2019-9824)

ubuntu/xenial-updates 2019-03-11 18:58:24 UTC 2019-03-11
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.35 to ubuntu/xenial-pro...

Author: Heitor R. Alves de Siqueira
Author Date: 2019-03-01 18:59:01 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.35 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 0558dd708d794b4f937290680afa54b6dedbc2c4

New changelog entries:
  * Fix deadlock when detaching network interface (LP: #1818880)
    Fixed by upstream patch:
    - d/p/lp-1818880-rcu-disable-atfork.patch: rcu: completely disable
      pthread_atfork callbacks as soon as possible

ubuntu/xenial-proposed 2019-03-11 18:58:24 UTC 2019-03-11
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.35 to ubuntu/xenial-pro...

Author: Heitor R. Alves de Siqueira
Author Date: 2019-03-01 18:59:01 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.35 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 0558dd708d794b4f937290680afa54b6dedbc2c4

New changelog entries:
  * Fix deadlock when detaching network interface (LP: #1818880)
    Fixed by upstream patch:
    - d/p/lp-1818880-rcu-disable-atfork.patch: rcu: completely disable
      pthread_atfork callbacks as soon as possible

ubuntu/xenial-devel 2019-03-11 18:58:24 UTC 2019-03-11
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.35 to ubuntu/xenial-pro...

Author: Heitor R. Alves de Siqueira
Author Date: 2019-03-01 18:59:01 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.35 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 0558dd708d794b4f937290680afa54b6dedbc2c4

New changelog entries:
  * Fix deadlock when detaching network interface (LP: #1818880)
    Fixed by upstream patch:
    - d/p/lp-1818880-rcu-disable-atfork.patch: rcu: completely disable
      pthread_atfork callbacks as soon as possible

applied/ubuntu/xenial-updates 2019-03-11 18:58:24 UTC 2019-03-11
Import patches-applied version 1:2.5+dfsg-5ubuntu10.35 to applied/ubuntu/xeni...

Author: Heitor R. Alves de Siqueira
Author Date: 2019-03-01 18:59:01 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.35 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: e4670ece32312ea6692ecaa89e58d1486dc8bf14
Unapplied parent: b0dd2d54a5506857731792011e187e10fa16eba6

New changelog entries:
  * Fix deadlock when detaching network interface (LP: #1818880)
    Fixed by upstream patch:
    - d/p/lp-1818880-rcu-disable-atfork.patch: rcu: completely disable
      pthread_atfork callbacks as soon as possible

applied/ubuntu/xenial-proposed 2019-03-11 18:58:24 UTC 2019-03-11
Import patches-applied version 1:2.5+dfsg-5ubuntu10.35 to applied/ubuntu/xeni...

Author: Heitor R. Alves de Siqueira
Author Date: 2019-03-01 18:59:01 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.35 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: e4670ece32312ea6692ecaa89e58d1486dc8bf14
Unapplied parent: b0dd2d54a5506857731792011e187e10fa16eba6

New changelog entries:
  * Fix deadlock when detaching network interface (LP: #1818880)
    Fixed by upstream patch:
    - d/p/lp-1818880-rcu-disable-atfork.patch: rcu: completely disable
      pthread_atfork callbacks as soon as possible

applied/ubuntu/xenial-devel 2019-03-11 18:58:24 UTC 2019-03-11
Import patches-applied version 1:2.5+dfsg-5ubuntu10.35 to applied/ubuntu/xeni...

Author: Heitor R. Alves de Siqueira
Author Date: 2019-03-01 18:59:01 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.35 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: e4670ece32312ea6692ecaa89e58d1486dc8bf14
Unapplied parent: b0dd2d54a5506857731792011e187e10fa16eba6

New changelog entries:
  * Fix deadlock when detaching network interface (LP: #1818880)
    Fixed by upstream patch:
    - d/p/lp-1818880-rcu-disable-atfork.patch: rcu: completely disable
      pthread_atfork callbacks as soon as possible

debian/buster 2019-03-11 16:41:23 UTC 2019-03-11
Import patches-unapplied version 1:3.1+dfsg-5 to debian/sid

Author: Michael Tokarev
Author Date: 2019-03-11 11:30:44 UTC

Import patches-unapplied version 1:3.1+dfsg-5 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f1df6b1436f8974351946a89e1261dbb0852a37b

New changelog entries:
  * i2c-ddc-fix-oob-read-CVE-2019-3812.patch fixes
    OOB read in hw/i2c/i2c-ddc.c which allows for memory disclosure.
    Closes: #922635, CVE-2019-3812

ubuntu/cosmic-devel 2019-03-08 09:58:20 UTC 2019-03-08
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.4 to ubuntu/cosmic-prop...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:56:51 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.4 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: ce57cd863fa6d6b415ad9efbf483563e0c7336de

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

applied/ubuntu/cosmic-updates 2019-03-08 09:58:20 UTC 2019-03-08
Import patches-applied version 1:2.12+dfsg-3ubuntu8.4 to applied/ubuntu/cosmi...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:56:51 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8.4 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 4498c9361410252d209e899493805d2997c2e9a6
Unapplied parent: c5b04f540d96f151abdabf61a964be61312fdafb

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

applied/ubuntu/cosmic-proposed 2019-03-08 09:58:20 UTC 2019-03-08
Import patches-applied version 1:2.12+dfsg-3ubuntu8.4 to applied/ubuntu/cosmi...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:56:51 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8.4 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 4498c9361410252d209e899493805d2997c2e9a6
Unapplied parent: c5b04f540d96f151abdabf61a964be61312fdafb

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

ubuntu/cosmic-proposed 2019-03-08 09:58:20 UTC 2019-03-08
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.4 to ubuntu/cosmic-prop...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:56:51 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.4 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: ce57cd863fa6d6b415ad9efbf483563e0c7336de

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

applied/ubuntu/cosmic-devel 2019-03-08 09:58:20 UTC 2019-03-08
Import patches-applied version 1:2.12+dfsg-3ubuntu8.4 to applied/ubuntu/cosmi...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:56:51 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8.4 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 4498c9361410252d209e899493805d2997c2e9a6
Unapplied parent: c5b04f540d96f151abdabf61a964be61312fdafb

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

ubuntu/cosmic-updates 2019-03-08 09:58:20 UTC 2019-03-08
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.4 to ubuntu/cosmic-prop...

Author: Christian Ehrhardt 
Author Date: 2019-03-05 15:56:51 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.4 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: ce57cd863fa6d6b415ad9efbf483563e0c7336de

New changelog entries:
  * fix crash when performing block pull on partial cluster (LP: #1818264)
    - d/p/ubuntu/lp-1818264-block-Fix-copy-on-read-crash-with-partial.patch

applied/ubuntu/bionic-updates 2019-02-25 12:13:14 UTC 2019-02-25
Import patches-applied version 1:2.11+dfsg-1ubuntu7.10 to applied/ubuntu/bion...

Author: Christian Ehrhardt 
Author Date: 2019-01-31 13:07:51 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.10 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 87b1bba0dff1f4766e17d3a2e52a9a40c7ddc84b
Unapplied parent: 3cfba9e25cd9b432243ed3332225699da12ab350

New changelog entries:
  * d/p/ubuntu/lp-1806104-spapr_pci-Remove-unhelpful-pagesize-warning.patch:
    remove misleading page size warning on qemu-system-ppc64 (LP: #1806104)
  * d/p/ubuntu/lp-1812384-s390x-Return-specification-exception.patch: ensure
    a proper exception on unknown diag 308 subcodes
    (LP: #1812384)
  * d/p/ubuntu/lp-1809083-*: fix backward migration on ppc64el (LP: #1809083)

ubuntu/bionic-updates 2019-02-25 12:13:14 UTC 2019-02-25
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.10 to ubuntu/bionic-pro...

Author: Christian Ehrhardt 
Author Date: 2019-01-31 13:07:51 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.10 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 83afeb127eb388ba6f314bc66072a71848a760e0

New changelog entries:
  * d/p/ubuntu/lp-1806104-spapr_pci-Remove-unhelpful-pagesize-warning.patch:
    remove misleading page size warning on qemu-system-ppc64 (LP: #1806104)
  * d/p/ubuntu/lp-1812384-s390x-Return-specification-exception.patch: ensure
    a proper exception on unknown diag 308 subcodes
    (LP: #1812384)
  * d/p/ubuntu/lp-1809083-*: fix backward migration on ppc64el (LP: #1809083)

debian/stretch 2019-02-16 17:17:29 UTC 2019-02-16
Import patches-unapplied version 1:2.8+dfsg-6+deb9u5 to debian/stretch

Author: Moritz Mühlenhoff
Author Date: 2018-11-08 15:41:45 UTC

Import patches-unapplied version 1:2.8+dfsg-6+deb9u5 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 994ebb98d756353d20c93ff076d35aa1e3352de7

New changelog entries:
  * Backport SSBD support (Closes: #908682)
  * CVE-2018-10839 (Closes: #910431)
  * CVE-2018-17962 (Closes: #911468)
  * CVE-2018-17963 (Closes: #911469)

ubuntu/bionic-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.8 to ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2018-11-21 19:17:51 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.8 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 28d5083a64da5a48e6719c674eb90fc5e81e31c0

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: OOB heap buffer r/w access in NVM Express Controller
    - debian/patches/CVE-2018-16847.patch: check size in hw/block/nvme.c.
    - CVE-2018-16847
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: Out-of-bounds r/w stack access in ppc64
    - debian/patches/CVE-2018-18954.patch: check size before data buffer
      access in hw/ppc/pnv_lpc.c.
    - CVE-2018-18954
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/9p.c.
    - CVE-2018-19364

applied/ubuntu/bionic-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-applied version 1:2.11+dfsg-1ubuntu7.8 to applied/ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2018-11-21 19:17:51 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.8 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: fe0f3e3a779b7c1e241664db7670a3e5609f2b4e
Unapplied parent: 5eb669bf567592637cd899319bd8138abee78995

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: OOB heap buffer r/w access in NVM Express Controller
    - debian/patches/CVE-2018-16847.patch: check size in hw/block/nvme.c.
    - CVE-2018-16847
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: Out-of-bounds r/w stack access in ppc64
    - debian/patches/CVE-2018-18954.patch: check size before data buffer
      access in hw/ppc/pnv_lpc.c.
    - CVE-2018-18954
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/9p.c.
    - CVE-2018-19364

applied/ubuntu/cosmic-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-applied version 1:2.12+dfsg-3ubuntu8.1 to applied/ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2018-11-21 18:17:01 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8.1 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 2db6419c660d2d1accd8ca729b9f91e40c365920
Unapplied parent: c76a800c84b8393c4f6831962b7ed0d47f67f1e6

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: OOB heap buffer r/w access in NVM Express Controller
    - debian/patches/CVE-2018-16847.patch: check size in hw/block/nvme.c.
    - CVE-2018-16847
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: Out-of-bounds r/w stack access in ppc64
    - debian/patches/CVE-2018-18954.patch: check size before data buffer
      access in hw/ppc/pnv_lpc.c.
    - CVE-2018-18954
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/9p.c.
    - CVE-2018-19364

ubuntu/xenial-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.33 to ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-11-21 19:53:19 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.33 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: c5496372f5bdc3b21949299405606a7afe7f9244

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

ubuntu/trusty-updates 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.44 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2018-11-21 20:10:13 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.44 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 291c72bf6ec6efbe778824f36aaafea14511a0c8

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

ubuntu/trusty-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.44 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2018-11-21 20:10:13 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.44 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 291c72bf6ec6efbe778824f36aaafea14511a0c8

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

ubuntu/trusty-devel 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.44 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2018-11-21 20:10:13 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.44 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 291c72bf6ec6efbe778824f36aaafea14511a0c8

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

ubuntu/cosmic-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.1 to ubuntu/cosmic-secu...

Author: Marc Deslauriers
Author Date: 2018-11-21 18:17:01 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8.1 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 314c9f8bb417fa0591e6b314e92fe35e8ee4bed2

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: OOB heap buffer r/w access in NVM Express Controller
    - debian/patches/CVE-2018-16847.patch: check size in hw/block/nvme.c.
    - CVE-2018-16847
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: Out-of-bounds r/w stack access in ppc64
    - debian/patches/CVE-2018-18954.patch: check size before data buffer
      access in hw/ppc/pnv_lpc.c.
    - CVE-2018-18954
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/9p.c.
    - CVE-2018-19364

applied/ubuntu/trusty-devel 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-applied version 2.0.0+dfsg-2ubuntu1.44 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-11-21 20:10:13 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.44 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 845604c2bcf1869b9e3f4c6de8f55e24e44380cb
Unapplied parent: 4d6bb511eaa958a53e032b1b0f5f94a6ae4c8f43

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

applied/ubuntu/trusty-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-applied version 2.0.0+dfsg-2ubuntu1.44 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-11-21 20:10:13 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.44 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 845604c2bcf1869b9e3f4c6de8f55e24e44380cb
Unapplied parent: 4d6bb511eaa958a53e032b1b0f5f94a6ae4c8f43

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

applied/ubuntu/trusty-updates 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-applied version 2.0.0+dfsg-2ubuntu1.44 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-11-21 20:10:13 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.44 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 845604c2bcf1869b9e3f4c6de8f55e24e44380cb
Unapplied parent: 4d6bb511eaa958a53e032b1b0f5f94a6ae4c8f43

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

applied/ubuntu/xenial-security 2018-11-26 14:13:17 UTC 2018-11-26
Import patches-applied version 1:2.5+dfsg-5ubuntu10.33 to applied/ubuntu/xeni...

Author: Marc Deslauriers
Author Date: 2018-11-21 19:53:19 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.33 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 8ee120c957f064dbda670055407b596809da2c9e
Unapplied parent: 6273cbc39b62486c92011b5cba6ad7960997959d

New changelog entries:
  * SECURITY UPDATE: integer overflow in NE2000 NIC emulation
    - debian/patches/CVE-2018-10839.patch: use proper type in
      hw/net/ne2000.c.
    - CVE-2018-10839
  * SECURITY UPDATE: buffer overflow via incoming fragmented datagrams
    - debian/patches/CVE-2018-11806.patch: correct size computation in
      slirp/mbuf.c, slirp/mbuf.h.
    - CVE-2018-11806
  * SECURITY UPDATE: integer overflow via crafted QMP command
    - debian/patches/CVE-2018-12617.patch: check bytes count read by
      guest-file-read in qga/commands-posix.c.
    - CVE-2018-12617
  * SECURITY UPDATE: buffer overflow in rtl8139
    - debian/patches/CVE-2018-17958.patch: use proper type in
      hw/net/rtl8139.c.
    - CVE-2018-17958
  * SECURITY UPDATE: buffer overflow in pcnet
    - debian/patches/CVE-2018-17962.patch: use proper type in
      hw/net/pcnet.c.
    - CVE-2018-17962
  * SECURITY UPDATE: DoS via large packet sizes
    - debian/patches/CVE-2018-17963.patch: check size in net/net.c.
    - CVE-2018-17963
  * SECURITY UPDATE: DoS in lsi53c895a
    - debian/patches/CVE-2018-18849.patch: check message length value is
      valid in hw/scsi/lsi53c895a.c.
    - CVE-2018-18849
  * SECURITY UPDATE: race condition in 9p
    - debian/patches/CVE-2018-19364-1.patch: use write lock in
      hw/9pfs/cofile.c.
    - debian/patches/CVE-2018-19364-2.patch: use write lock in
      hw/9pfs/virtio-9p.c.
    - CVE-2018-19364

applied/ubuntu/cosmic 2018-10-17 18:38:17 UTC 2018-10-17
Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-...

Author: Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: cb289973b6df96aed8d1c73874987394ba5b552d
Unapplied parent: 5251f540a45419b9da879c1a81ec29330e05d5c8

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

ubuntu/cosmic 2018-10-17 18:38:17 UTC 2018-10-17
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Author: Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: a53501ae64b5a12ce72b97832091161d15e2af91

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

applied/ubuntu/artful-updates 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artfu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 174f498d2f04e80fa5b8054f1ff11603ff85da32
Unapplied parent: b5f2da9f7da9ecb48fe5ac394a04e960a854da94

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/artful-devel 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8afa45fcebceda42d434e00218d3efe12c7de048

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/artful-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artfu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 174f498d2f04e80fa5b8054f1ff11603ff85da32
Unapplied parent: b5f2da9f7da9ecb48fe5ac394a04e960a854da94

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/artful-updates 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8afa45fcebceda42d434e00218d3efe12c7de048

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/artful-devel 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artfu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 174f498d2f04e80fa5b8054f1ff11603ff85da32
Unapplied parent: b5f2da9f7da9ecb48fe5ac394a04e960a854da94

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/artful-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8afa45fcebceda42d434e00218d3efe12c7de048

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/bionic 2018-04-18 15:05:04 UTC 2018-04-18
Import patches-applied version 1:2.11+dfsg-1ubuntu7 to applied/ubuntu/bionic-...

Author: Christian Ehrhardt 
Author Date: 2018-04-11 05:46:18 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 00c0e1e1760ec5a8b95914064a31745be38db84a
Unapplied parent: 06ab4363dbfee7d66513c6ff2febf4c8788997f7

New changelog entries:
  * d/p/ubuntu/lp-1762854-*: fix issue with SCSI-2 devices denying Protection
    information (LP: #1762854).
  * d/p/ubuntu/lp-1763468-*: fix VSMT handling to fix ppc64el P8/P9 migration
    (LP: #1763468).

ubuntu/bionic 2018-04-18 15:05:04 UTC 2018-04-18
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7 to ubuntu/bionic-proposed

Author: Christian Ehrhardt 
Author Date: 2018-04-11 05:46:18 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: f3e429320ae650987f0e1a74eea68e78af38e483

New changelog entries:
  * d/p/ubuntu/lp-1762854-*: fix issue with SCSI-2 devices denying Protection
    information (LP: #1762854).
  * d/p/ubuntu/lp-1763468-*: fix VSMT handling to fix ppc64el P8/P9 migration
    (LP: #1763468).

importer/ubuntu/pristine-tar 2018-03-09 12:00:10 UTC 2018-03-09
pristine-tar data for qemu_2.10+dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-09 12:00:10 UTC

pristine-tar data for qemu_2.10+dfsg.orig.tar.xz

importer/debian/pristine-tar 2018-03-08 13:59:22 UTC 2018-03-08
pristine-tar data for qemu_2.10.0+dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-08 13:59:22 UTC

pristine-tar data for qemu_2.10.0+dfsg.orig.tar.xz

applied/ubuntu/artful-proposed 2017-11-16 23:33:31 UTC 2017-11-16
Import patches-applied version 1:2.10+dfsg-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Christian Ehrhardt 
Author Date: 2017-11-15 06:49:33 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: c76814aa8170a417440e86ae37716a3696fc6445
Unapplied parent: b83241f70315d00720cd51a668fa2a5c436bd257

New changelog entries:
  * d/p/detect-ITS-and-skip-usage-on-older-kernel.patch to avoid crashes
    on arm64 when doing suspend/resume and reboots due to older kernels not
    supporting ITS (LP: #1731051).

ubuntu/artful-proposed 2017-11-16 23:33:31 UTC 2017-11-16
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.1 to ubuntu/artful-prop...

Author: Christian Ehrhardt 
Author Date: 2017-11-15 06:49:33 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: a9acb42522590940627515e51bab699216f9de33

New changelog entries:
  * d/p/detect-ITS-and-skip-usage-on-older-kernel.patch to avoid crashes
    on arm64 when doing suspend/resume and reboots due to older kernels not
    supporting ITS (LP: #1731051).

ubuntu/zesty-devel 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7ebc0b24670164f3e5528728beb5d32651b302ce

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

applied/ubuntu/zesty-proposed 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-...

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 05a016ae7d572a91a18515f921e1f35fa4652773
Unapplied parent: 45e1f750b37b989c54e121e34b7883c77303a126

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

ubuntu/zesty-proposed 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7ebc0b24670164f3e5528728beb5d32651b302ce

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

applied/ubuntu/zesty-devel 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-...

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 05a016ae7d572a91a18515f921e1f35fa4652773
Unapplied parent: 45e1f750b37b989c54e121e34b7883c77303a126

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

applied/ubuntu/zesty-updates 2017-10-26 20:15:40 UTC 2017-10-26
Import patches-applied version 1:2.8+dfsg-3ubuntu2.7 to applied/ubuntu/zesty-...

Author: Christian Ehrhardt 
Author Date: 2017-10-18 14:17:34 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.7 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 43f84c94f73b65ad614d536ba51fdd50a2b1c18c
Unapplied parent: fa87c8cb99a8a9655098405b0a9379edbb595103

New changelog entries:
  * d/p/ubuntu/virtio-Fix-no-interrupt-when-not-creating-msi-contro.patch:
    on Arm fix no interrupt when not creating msi controller. That fixes
    broken networking if running with virtio-mmio only (LP: #1719196).

ubuntu/zesty-updates 2017-10-26 20:15:40 UTC 2017-10-26
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.7 to ubuntu/zesty-proposed

Author: Christian Ehrhardt 
Author Date: 2017-10-18 14:17:34 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.7 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 25408e7560939491216d36f5e5aa9025d1fee489

New changelog entries:
  * d/p/ubuntu/virtio-Fix-no-interrupt-when-not-creating-msi-contro.patch:
    on Arm fix no interrupt when not creating msi controller. That fixes
    broken networking if running with virtio-mmio only (LP: #1719196).

applied/ubuntu/artful 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-applied version 1:2.10+dfsg-0ubuntu3 to applied/ubuntu/artful-...

Author: Christian Ehrhardt 
Author Date: 2017-10-16 09:28:39 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 9d7d830dcce3f714c51295331015d937ef52acce
Unapplied parent: 56dae978854b5c6568cd921f300866727edf9d96

New changelog entries:
  * fix enablement of qemu-kvm service (LP: #1720397)
    - rename d/qemu-kvm.service to d/qemu-system-common.qemu-kvm.service
    - d/rules: add proper enablement debhelper calls
    - d/qemu-system-common.install: install covered by dh_installinit

ubuntu/artful 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3 to ubuntu/artful-proposed

Author: Christian Ehrhardt 
Author Date: 2017-10-16 09:28:39 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: fb5d22e94d2416235f8d15c1af22dadb07a946ab

New changelog entries:
  * fix enablement of qemu-kvm service (LP: #1720397)
    - rename d/qemu-kvm.service to d/qemu-system-common.qemu-kvm.service
    - d/rules: add proper enablement debhelper calls
    - d/qemu-system-common.install: install covered by dh_installinit

applied/ubuntu/zesty-security 2017-09-20 18:38:45 UTC 2017-09-20
Import patches-applied version 1:2.8+dfsg-3ubuntu2.5 to applied/ubuntu/zesty-...

Author: Marc Deslauriers
Author Date: 2017-09-20 11:22:48 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.5 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 72604cec8b06daae91146f2fa3d878a51fbc6cb0
Unapplied parent: be172316a987f230a98e44c603e44fba132152b8

New changelog entries:
  * SECURITY REGRESSION: regression in in USB xHCI emulation (LP: #1718222)
    - debian/patches/CVE-2017-9375-regression.patch: don't kick in
      xhci_submit and xhci_fire_ctl_transfer in hw/usb/hcd-xhci.c.

ubuntu/zesty-security 2017-09-20 18:38:45 UTC 2017-09-20
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.5 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-09-20 11:22:48 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.5 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 8dd70ef4fc37e45736ca4783cc4c8f3a848421b0

New changelog entries:
  * SECURITY REGRESSION: regression in in USB xHCI emulation (LP: #1718222)
    - debian/patches/CVE-2017-9375-regression.patch: don't kick in
      xhci_submit and xhci_fire_ctl_transfer in hw/usb/hcd-xhci.c.

applied/ubuntu/yakkety-security 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakk...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 750d5317cd878a8d9c18250da946f033b0b86cab
Unapplied parent: 4e6fdad20d2038cbf416f6a358d2aaa4b89fdbcc

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

ubuntu/yakkety-devel 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: b309c5b16858283ada4cc8e10b4f7a18a79acb17

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

ubuntu/yakkety-security 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: b309c5b16858283ada4cc8e10b4f7a18a79acb17

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

ubuntu/yakkety-updates 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: b309c5b16858283ada4cc8e10b4f7a18a79acb17

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

applied/ubuntu/yakkety-devel 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakk...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 750d5317cd878a8d9c18250da946f033b0b86cab
Unapplied parent: 4e6fdad20d2038cbf416f6a358d2aaa4b89fdbcc

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

applied/ubuntu/yakkety-updates 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakk...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 750d5317cd878a8d9c18250da946f033b0b86cab
Unapplied parent: 4e6fdad20d2038cbf416f6a358d2aaa4b89fdbcc

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

applied/ubuntu/zesty 2017-03-08 16:53:15 UTC 2017-03-08
Import patches-applied version 1:2.8+dfsg-3ubuntu2 to applied/ubuntu/zesty-pr...

Author: Christian Ehrhardt 
Author Date: 2017-03-07 08:23:08 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7d9d190cf204025a9ce82a7e760f92bbf7f99895
Unapplied parent: 192a20354d3773623910db748cecc06a5ba5d9c1

New changelog entries:
  * d/p/ubuntu/spapr-pci-populate-PCI-DT-in-reverse-order.patch: backport
    "spapr/pci: populate PCI DT in reverse order" (LP: #1670481).

ubuntu/zesty 2017-03-08 16:53:15 UTC 2017-03-08
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2 to ubuntu/zesty-proposed

Author: Christian Ehrhardt 
Author Date: 2017-03-07 08:23:08 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 38694fd8b90f2f3643de571cbe8a2ade6bc01945

New changelog entries:
  * d/p/ubuntu/spapr-pci-populate-PCI-DT-in-reverse-order.patch: backport
    "spapr/pci: populate PCI DT in reverse order" (LP: #1670481).

applied/ubuntu/yakkety-proposed 2017-02-15 14:49:24 UTC 2017-02-15
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.3 to applied/ubuntu/yakk...

Author: Christian Ehrhardt 
Author Date: 2017-01-30 07:07:06 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.3 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 3ac79fe36e8701000c3de0000221d95d326b674e
Unapplied parent: 229070b783b250118529692f25af21a1cd5174ea

New changelog entries:
  * fix ambiguous machine trusty and utopic machine types (LP: #1641532)
    - d/p/ubuntu/define-ubuntu-machine-types.patch update type definitions
    - d/qemu-system-x86.NEWS to describe the issue

ubuntu/yakkety-proposed 2017-02-15 14:49:24 UTC 2017-02-15
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.3 to ubuntu/yakkety-pr...

Author: Christian Ehrhardt 
Author Date: 2017-01-30 07:07:06 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.3 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: f4b5b6c84bd590694bf2700081fd68353f1312e1

New changelog entries:
  * fix ambiguous machine trusty and utopic machine types (LP: #1641532)
    - d/p/ubuntu/define-ubuntu-machine-types.patch update type definitions
    - d/qemu-system-x86.NEWS to describe the issue

applied/ubuntu/trusty-proposed 2017-02-08 13:18:27 UTC 2017-02-08
Import patches-applied version 2.0.0+dfsg-2ubuntu1.32 to applied/ubuntu/trust...

Author: Christian Ehrhardt 
Author Date: 2017-01-31 10:26:19 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.32 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 63294d7561741c5dbfab4a4959ed8edc45527b2f
Unapplied parent: 8a95cdc982730c08229c72df0f0fd0ba62e74917

New changelog entries:
  [ Dave Chiluk ]
  * Qemu VM crash with error
    "bdrv_error_action: Assertion `error >= 0' failed"
    (LP: #1655225)

ubuntu/trusty-proposed 2017-02-08 13:18:27 UTC 2017-02-08
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.32 to ubuntu/trusty-prop...

Author: Christian Ehrhardt 
Author Date: 2017-01-31 10:26:19 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.32 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 10f3ca25f00268b91325748c615cef098535c6cd

New changelog entries:
  [ Dave Chiluk ]
  * Qemu VM crash with error
    "bdrv_error_action: Assertion `error >= 0' failed"
    (LP: #1655225)

ubuntu/yakkety 2016-09-30 15:59:09 UTC 2016-09-30
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5 to ubuntu/yakkety-prop...

Author: Stefan Bader
Author Date: 2016-09-30 12:24:37 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 2660569f29e1ea57439a9bcaae2ddb0706d3f4a3

New changelog entries:
  * No-change rebuild to compile against new libxen version.

applied/ubuntu/yakkety 2016-09-30 15:59:09 UTC 2016-09-30
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5 to applied/ubuntu/yakket...

Author: Stefan Bader
Author Date: 2016-09-30 12:24:37 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 5f551eddd0bf18f9d2f22e04dc81345b3a84258f
Unapplied parent: a183513cb12c9e3c399cead592c6a1d98258e239

New changelog entries:
  * No-change rebuild to compile against new libxen version.

debian/jessie 2016-06-05 04:58:03 UTC 2016-06-05
Import patches-unapplied version 1:2.1+dfsg-12+deb8u6 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2016-05-08 13:33:50 UTC

Import patches-unapplied version 1:2.1+dfsg-12+deb8u6 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 7c8959d788b269aa736480e64c952c1a31290457

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2016-3710: Banked access to VGA memory (VBE) uses inconsistent
    bounds checks
  * CVE-2016-3712: potential integer overflow or OOB read access issues

applied/ubuntu/wily-security 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-s...

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 550dc8f7a3f4b1b09e9ebb37bc97cc27effac64c

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

applied/ubuntu/wily-devel 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-s...

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 550dc8f7a3f4b1b09e9ebb37bc97cc27effac64c

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/wily-updates 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/wily-security 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/wily-devel 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

applied/ubuntu/wily-updates 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-s...

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 550dc8f7a3f4b1b09e9ebb37bc97cc27effac64c

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

applied/ubuntu/xenial 2016-04-19 21:03:52 UTC 2016-04-19
Import patches-applied version 1:2.5+dfsg-5ubuntu10 to applied/ubuntu/xenial-...

Author: Steve Langasek
Author Date: 2016-04-19 20:41:37 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 13742d3a5ba090535755bead13cc182efd362238
Unapplied parent: a2fa8063f3d8b2df5ed001cc48558cacd0acbfae

New changelog entries:
  * qemu-system-s390x only available on s390x, so qemu-system should only
    depend on it on this arch.
  * have qemu-system-aarch64 Suggest: qemu-efi; this should be a stronger
    relationship, but qemu-efi is still in universe right now.

ubuntu/xenial 2016-04-19 21:03:52 UTC 2016-04-19
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10 to ubuntu/xenial-proposed

Author: Steve Langasek
Author Date: 2016-04-19 20:41:37 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 800c374cc4463bd96a21263a3da526712dad8679

New changelog entries:
  * qemu-system-s390x only available on s390x, so qemu-system should only
    depend on it on this arch.
  * have qemu-system-aarch64 Suggest: qemu-efi; this should be a stronger
    relationship, but qemu-efi is still in universe right now.

debian/wheezy 2016-04-02 23:41:44 UTC 2016-04-02
Import patches-unapplied version 1.1.2+dfsg-6a+deb7u12 to debian/wheezy

Author: Michael Tokarev
Author Date: 2016-02-01 20:53:18 UTC

Import patches-unapplied version 1.1.2+dfsg-6a+deb7u12 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 24bcdaebd219ecc02c6e2441473240448b3735bd

New changelog entries:
  * applied 3 patches from upstream to fix virtio-net
    possible remote DoS (Closes: #799452 CVE-2015-7295)
  * pcnet-add-check-to-validate-receive-data-size-CVE-2015-7504.patch
    (Closes: #806742, CVE-2015-7504)
  * pcnet-fix-rx-buffer-overflow-CVE-2015-7512.patch
    (Closes: #806741, CVE-2015-7512)
  * eepro100-prevent-two-endless-loops-CVE-2015-8345.patch
    (Closes: #806373, CVE-2015-8345)
  * vnc-avoid-floating-point-exception-CVE-2015-8504.patch
    (Closes: #808130, CVE-2015-8504)
  * ehci-make-idt-processing-more-robust-CVE-2015-8558.patch
    (Closes: #808144, CVE-2015-8558)
  * net-ne2000-fix-bounds-check-in-ioport-operations-CVE-2015-8743.patch
    (Closes: #810519, CVE-2015-8743)
  * ide-ahci-reset-ncq-object-to-unused-on-error-CVE-2016-1568.patch
    (Closes: #810527, CVE-2016-1568)
  * fw_cfg-add-check-to-validate-current-entry-value-CVE-2016-1714.patch
    (Closes: CVE-2016-1714)
  * i386-avoid-null-pointer-dereference-CVE-2016-1922.patch
    (Closes: #811201, CVE-2016-1922)
  * ne2000-add-checks-to-validate-ring-buffer-pointers-CVE-2015-5279.patch
    fix for Heap overflow vulnerability in ne2000_receive() function
    (Closes: #799074 CVE-2015-5279)
  * ne2000-avoid-infinite-loop-when-receiving-packets-CVE-2015-5278.patch
    (Closes: #799073 CVE-2015-5278)
  * Acknowlege the previous update. Thank you Salvatore for the hard
    work you did fixing so many security issues.
  * rename last patches removing numeric prefixes, so that different series
    wont intermix with each other, add Bug-Debian: headers.
  * Add e1000-avoid-infinite-loop-in-transmit-CVE-2015-6815.patch.
    CVE-2015-6815: net: e1000 infinite loop issue in processing transmit
    descriptor. (Closes: #798101 CVE-2015-6815)
  * Add ide-fix-ATAPI-command-permissions-CVE-2015-6855.patch.
    CVE-2015-6855: ide: qemu allows arbitrary commands to be sent to an ATAPI
    device from guest, while illegal comands might have security impact,
    f.e. WIN_READ_NATIVE_MAX results in divide by zero error.
    (Closes: CVE-2015-6855)
  * Non-maintainer upload by the Security Team.
  * Add patches for CVE-2015-5165.
    CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to
    guest. (Closes: #794610)
  * Add 0001-virtio-serial-fix-ANY_LAYOUT.patch patch.
    CVE-2015-5745: buffer overflow in virtio-serial. (Closes: #795087)

applied/ubuntu/wily-proposed 2016-03-31 19:28:49 UTC 2016-03-31
Import patches-applied version 1:2.3+dfsg-5ubuntu9.3 to applied/ubuntu/wily-p...

Author: Serge Hallyn
Author Date: 2016-03-29 23:07:12 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.3 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 33f82de1fae0dd7c99a6314072777b3670023575

New changelog entries:
  * vhost-user-interrupt-management-fixes.patch: upstream fix for qemu
    hanging under high traffic load (LP: #1556306)

ubuntu/wily-proposed 2016-03-31 19:28:49 UTC 2016-03-31
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.3 to ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2016-03-29 23:07:12 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * vhost-user-interrupt-management-fixes.patch: upstream fix for qemu
    hanging under high traffic load (LP: #1556306)

ubuntu/vivid-security 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a8d2f553f125ef5033e4fec8cb3c2bc9c46159cb

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

applied/ubuntu/vivid-devel 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: c1fc0b86bd36aeaa1732a5b7d44a9b21c883bada
Unapplied parent: 4edd533fa7abedd191664733a5690bc4030cf3e4

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

applied/ubuntu/vivid-security 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: c1fc0b86bd36aeaa1732a5b7d44a9b21c883bada
Unapplied parent: 4edd533fa7abedd191664733a5690bc4030cf3e4

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

applied/ubuntu/vivid-updates 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: c1fc0b86bd36aeaa1732a5b7d44a9b21c883bada
Unapplied parent: 4edd533fa7abedd191664733a5690bc4030cf3e4

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

ubuntu/vivid-devel 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a8d2f553f125ef5033e4fec8cb3c2bc9c46159cb

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

ubuntu/vivid-updates 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a8d2f553f125ef5033e4fec8cb3c2bc9c46159cb

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

applied/ubuntu/vivid-proposed 2015-10-14 14:19:59 UTC 2015-10-14
Import patches-applied version 1:2.2+dfsg-5expubuntu9.6 to applied/ubuntu/viv...

Author: Stefan Bader
Author Date: 2015-10-09 15:04:26 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.6 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 55c7261998d9e4931663e0486c20d56df36c3753
Unapplied parent: 52ba8e72832c11ab8576c8536770597b215bc1c0

New changelog entries:
  * debian/patches/upstream-fix-irq-route-entries.patch
    Fix "kvm_irqchip_commit_routes: Assertion 'ret == 0' failed"
    (LP: #1465935)

1100 of 184 results

Other repositories

Name Last Modified
lp:ubuntu/+source/qemu 4 hours ago
lp:~ubuntu-virt/ubuntu/+source/qemu 2019-03-25
lp:~paelzer/ubuntu/+source/qemu 2019-03-20
lp:~ddstreet/ubuntu/+source/qemu 2019-03-08
lp:~racb/ubuntu/+source/qemu 2016-08-05
lp:~nacc/ubuntu/+source/qemu 2016-07-14
lp:~ubuntu-cloud-archive/ubuntu/+source/qemu 2016-05-26
lp:~cisco-vpp/ubuntu/+source/qemu 2015-10-02
18 of 8 results
You can't create new repositories for qemu in Ubuntu.