View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/qemu
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-10-17 18:48:49 UTC 15 hours ago
DSC file for 1:2.12+dfsg-3ubuntu8

Author: Ubuntu Git Importer
Author Date: 2018-10-17 18:48:49 UTC

DSC file for 1:2.12+dfsg-3ubuntu8

ubuntu/cosmic 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: a53501ae64b5a12ce72b97832091161d15e2af91

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

applied/ubuntu/cosmic-proposed 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-...

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: cb289973b6df96aed8d1c73874987394ba5b552d
Unapplied parent: 5251f540a45419b9da879c1a81ec29330e05d5c8

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

applied/ubuntu/cosmic-devel 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-...

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: cb289973b6df96aed8d1c73874987394ba5b552d
Unapplied parent: 5251f540a45419b9da879c1a81ec29330e05d5c8

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

applied/ubuntu/cosmic 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-...

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: cb289973b6df96aed8d1c73874987394ba5b552d
Unapplied parent: 5251f540a45419b9da879c1a81ec29330e05d5c8

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

applied/ubuntu/devel 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-...

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-applied version 1:2.12+dfsg-3ubuntu8 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: cb289973b6df96aed8d1c73874987394ba5b552d
Unapplied parent: 5251f540a45419b9da879c1a81ec29330e05d5c8

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

ubuntu/devel 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: a53501ae64b5a12ce72b97832091161d15e2af91

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

ubuntu/cosmic-devel 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: a53501ae64b5a12ce72b97832091161d15e2af91

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

ubuntu/cosmic-proposed 2018-10-17 18:38:17 UTC 15 hours ago
Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Author:  Christian Ehrhardt 
Author Date: 2018-10-17 08:50:27 UTC

Import patches-unapplied version 1:2.12+dfsg-3ubuntu8 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: a53501ae64b5a12ce72b97832091161d15e2af91

New changelog entries:
  * d/control-in: our addition of a qemu-system-s390x package needs to follow
    the split of qemu-system-data by adding a dependency to it (LP: #1798084)

ubuntu/xenial-proposed 2018-10-03 13:48:19 UTC 2018-10-03
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.32 to ubuntu/xenial-pro...

Author:  Christian Ehrhardt 
Author Date: 2018-09-11 13:00:19 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.32 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 21be13e0ec9667be97cb5037eb1b0e6f9b198be5

New changelog entries:
  * fix migration of new guests on ppc64el (LP: #1783140)
    Fixed by backporting two patches from the 2.6.x stable branch
    - d/p/ubuntu/lp-1783140-virtio-set-low-features-early-on-load.patch
    - d/p/ubuntu/lp-1783140-Revert-virtio-net-unbreak-self-announcement.patch

ubuntu/xenial-updates 2018-10-03 13:48:19 UTC 2018-10-03
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.32 to ubuntu/xenial-pro...

Author:  Christian Ehrhardt 
Author Date: 2018-09-11 13:00:19 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.32 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 21be13e0ec9667be97cb5037eb1b0e6f9b198be5

New changelog entries:
  * fix migration of new guests on ppc64el (LP: #1783140)
    Fixed by backporting two patches from the 2.6.x stable branch
    - d/p/ubuntu/lp-1783140-virtio-set-low-features-early-on-load.patch
    - d/p/ubuntu/lp-1783140-Revert-virtio-net-unbreak-self-announcement.patch

applied/ubuntu/xenial-proposed 2018-10-03 13:48:19 UTC 2018-10-03
Import patches-applied version 1:2.5+dfsg-5ubuntu10.32 to applied/ubuntu/xeni...

Author:  Christian Ehrhardt 
Author Date: 2018-09-11 13:00:19 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.32 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 03d74bc418b7e3447114f84ede0c591e1d5887b1
Unapplied parent: 8ede59670822a3f3193b29e15bf95abc3099805d

New changelog entries:
  * fix migration of new guests on ppc64el (LP: #1783140)
    Fixed by backporting two patches from the 2.6.x stable branch
    - d/p/ubuntu/lp-1783140-virtio-set-low-features-early-on-load.patch
    - d/p/ubuntu/lp-1783140-Revert-virtio-net-unbreak-self-announcement.patch

applied/ubuntu/xenial-devel 2018-10-03 13:48:19 UTC 2018-10-03
Import patches-applied version 1:2.5+dfsg-5ubuntu10.32 to applied/ubuntu/xeni...

Author:  Christian Ehrhardt 
Author Date: 2018-09-11 13:00:19 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.32 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 03d74bc418b7e3447114f84ede0c591e1d5887b1
Unapplied parent: 8ede59670822a3f3193b29e15bf95abc3099805d

New changelog entries:
  * fix migration of new guests on ppc64el (LP: #1783140)
    Fixed by backporting two patches from the 2.6.x stable branch
    - d/p/ubuntu/lp-1783140-virtio-set-low-features-early-on-load.patch
    - d/p/ubuntu/lp-1783140-Revert-virtio-net-unbreak-self-announcement.patch

applied/ubuntu/xenial-updates 2018-10-03 13:48:19 UTC 2018-10-03
Import patches-applied version 1:2.5+dfsg-5ubuntu10.32 to applied/ubuntu/xeni...

Author:  Christian Ehrhardt 
Author Date: 2018-09-11 13:00:19 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.32 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 03d74bc418b7e3447114f84ede0c591e1d5887b1
Unapplied parent: 8ede59670822a3f3193b29e15bf95abc3099805d

New changelog entries:
  * fix migration of new guests on ppc64el (LP: #1783140)
    Fixed by backporting two patches from the 2.6.x stable branch
    - d/p/ubuntu/lp-1783140-virtio-set-low-features-early-on-load.patch
    - d/p/ubuntu/lp-1783140-Revert-virtio-net-unbreak-self-announcement.patch

ubuntu/xenial-devel 2018-10-03 13:48:19 UTC 2018-10-03
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.32 to ubuntu/xenial-pro...

Author:  Christian Ehrhardt 
Author Date: 2018-09-11 13:00:19 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.32 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 21be13e0ec9667be97cb5037eb1b0e6f9b198be5

New changelog entries:
  * fix migration of new guests on ppc64el (LP: #1783140)
    Fixed by backporting two patches from the 2.6.x stable branch
    - d/p/ubuntu/lp-1783140-virtio-set-low-features-early-on-load.patch
    - d/p/ubuntu/lp-1783140-Revert-virtio-net-unbreak-self-announcement.patch

ubuntu/bionic-updates 2018-09-27 12:43:20 UTC 2018-09-27
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.6 to ubuntu/bionic-prop...

Author:  Christian Ehrhardt 
Author Date: 2018-08-29 09:46:37 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.6 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 2c48f92db7eb9bf537738d6651994f2fa4a3dfa3

New changelog entries:
  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

applied/ubuntu/bionic-updates 2018-09-27 12:43:20 UTC 2018-09-27
Import patches-applied version 1:2.11+dfsg-1ubuntu7.6 to applied/ubuntu/bioni...

Author:  Christian Ehrhardt 
Author Date: 2018-08-29 09:46:37 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.6 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 929c5144badaa14d3843409a86708b240c9a8c09
Unapplied parent: 8024dfaa56268370aa4c8c38786093e99fac5e72

New changelog entries:
  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

ubuntu/bionic-devel 2018-09-27 12:43:20 UTC 2018-09-27
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.6 to ubuntu/bionic-prop...

Author:  Christian Ehrhardt 
Author Date: 2018-08-29 09:46:37 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.6 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 2c48f92db7eb9bf537738d6651994f2fa4a3dfa3

New changelog entries:
  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

applied/ubuntu/bionic-proposed 2018-09-27 12:43:20 UTC 2018-09-27
Import patches-applied version 1:2.11+dfsg-1ubuntu7.6 to applied/ubuntu/bioni...

Author:  Christian Ehrhardt 
Author Date: 2018-08-29 09:46:37 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.6 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 929c5144badaa14d3843409a86708b240c9a8c09
Unapplied parent: 8024dfaa56268370aa4c8c38786093e99fac5e72

New changelog entries:
  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

applied/ubuntu/bionic-devel 2018-09-27 12:43:20 UTC 2018-09-27
Import patches-applied version 1:2.11+dfsg-1ubuntu7.6 to applied/ubuntu/bioni...

Author:  Christian Ehrhardt 
Author Date: 2018-08-29 09:46:37 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.6 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 929c5144badaa14d3843409a86708b240c9a8c09
Unapplied parent: 8024dfaa56268370aa4c8c38786093e99fac5e72

New changelog entries:
  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

ubuntu/bionic-proposed 2018-09-27 12:43:20 UTC 2018-09-27
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.6 to ubuntu/bionic-prop...

Author:  Christian Ehrhardt 
Author Date: 2018-08-29 09:46:37 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.6 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 2c48f92db7eb9bf537738d6651994f2fa4a3dfa3

New changelog entries:
  [ Christian Ehrhardt ]
  * Add cpu model for z14 ZR1 (LP: #1780773)
  * d/p/ubuntu/lp-1789551-seccomp-set-the-seccomp-filter-to-all-threads.patch:
    ensure that the seccomp blacklist is applied to all threads (LP: #1789551)
    - CVE-2018-15746
  * improve s390x spectre mitigation with etoken facility (LP: #1790457)
    - debian/patches/ubuntu/lp-1790457-s390x-kvm-add-etoken-facility.patch
    - debian/patches/ubuntu/lp-1790457-partial-s390x-linux-headers-update.patch
  [ Phillip Susi ]
  * d/p/ubuntu/lp-1787267-fix-en_us-vnc-pipe.patch: Fix pipe, greater than and
    less than keys over vnc when using en_us kemaps (LP: #1787267).

importer/debian/dsc 2018-07-14 11:41:23 UTC 2018-07-14
DSC file for 1:2.8+dfsg-6+deb9u4

Author: Ubuntu Git Importer
Author Date: 2018-07-14 11:41:23 UTC

DSC file for 1:2.8+dfsg-6+deb9u4

debian/stretch 2018-07-14 11:07:48 UTC 2018-07-14
Import patches-unapplied version 1:2.8+dfsg-6+deb9u4 to debian/stretch

Author: Michael Tokarev
Author Date: 2018-05-26 10:06:04 UTC

Import patches-unapplied version 1:2.8+dfsg-6+deb9u4 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: bc94506a22d9698173913c78c346c6100c999f85

New changelog entries:
  * CVE-2017-5715 (spectre/meltdown) fixes for i386 and s390x:
    CVE-2017-5715/i386-increase-X86CPUDefinition-model_id-to-49.patch
    CVE-2017-5715/i386-add-support-for-SPEC_CTRL-MSR.patch
    CVE-2017-5715/i386-add-spec-ctrl-CPUID-bit.patch
    CVE-2017-5715/i386-add-FEAT_8000_0008_EBX-CPUID-feature-word.patch
    CVE-2017-5715/i386-add-new-IBRS-versions-of-Intel-CPU-models.patch
    CVE-2017-5715/s390x-kvm-introduce-branch-prediction-blocking-contr.patch
    CVE-2017-5715/s390x-kvm-handle-bpb-feature.patch
    Closes: #886532, CVE-2017-5715
  * multiboot-bss_end_addr-can-be-zero-CVE-2018-7550.patch
    Closes: #892041, CVE-2018-7550
  * vga-check-the-validation-of-memory-addr-when-draw-text-CVE-2018-5683.patch
    Closes: #887392, CVE-2018-5683
  * osdep-fix-ROUND_UP-64-bit-32-bit-CVE-2017-18043.patch
    Closes: CVE-2017-18043
  * virtio-check-VirtQueue-Vring-object-is-set-CVE-2017-17381.patch
    Closes: #883625, CVE-2017-17381
  * ps2-check-PS2Queue-pointers-in-post_load-routine-CVE-2017-16845.patch
    Closes: #882136, CVE-2017-16845
  * cirrus-fix-oob-access-in-mode4and5-write-functions-CVE-2017-15289.patch
    Closes: #880832, CVE-2017-15289
  * io-monitor-encoutput-buffer-size-from-websocket-GSource-CVE-2017-15268.patch
    Closes: #880836, CVE-2017-15268
  * nbd-server-CVE-2017-15119-Reject-options-larger-than-32M.patch
    Closes: #883399, CVE-2017-15119
  * 9pfs-use-g_malloc0-to-allocate-space-for-xattr-CVE-2017-15038.patch
    Closes: #877890, CVE-2017-15038
  * CVE-2017-15124 (VNC server unbounded memory usage) fixes:
    CVE-2017-15124/01-ui-remove-sync-parameter-from-vnc_update_client.patch
    CVE-2017-15124/02-ui-remove-unreachable-code-in-vnc_update_client.patch
    CVE-2017-15124/03-ui-remove-redundant-indentation-in-vnc_client_update.patch
    CVE-2017-15124/04-ui-avoid-pointless-VNC-updates-if-framebuffer-isn-t-.patch
    CVE-2017-15124/05-ui-track-how-much-decoded-data-we-consumed-when-doin.patch
    CVE-2017-15124/06-ui-introduce-enum-to-track-VNC-client-framebuffer-up.patch
    CVE-2017-15124/07-ui-correctly-reset-framebuffer-update-state-after-pr.patch
    CVE-2017-15124/08-ui-refactor-code-for-determining-if-an-update-should.patch
    CVE-2017-15124/09-ui-fix-VNC-client-throttling-when-audio-capture-is-a.patch
    CVE-2017-15124/10-ui-fix-VNC-client-throttling-when-forced-update-is-r.patch
    CVE-2017-15124/11-ui-place-a-hard-cap-on-VNC-server-output-buffer-size.patch
    CVE-2017-15124/12-ui-add-trace-events-related-to-VNC-client-throttling.patch
    CVE-2017-15124/13-ui-mix-misleading-comments-return-types-of-VNC-I-O-h.patch
    Closes: #884806, CVE-2017-15124

applied/ubuntu/bionic-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.11+dfsg-1ubuntu7.3 to applied/ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:57:07 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7.3 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 164086f66be7d39d5e53d1e844f2435535c5b221
Unapplied parent: 14af716f14d7a1849d9730784392626d88e500d2

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/ubuntu/CVE-2018-3639-2.patch: define the AMD
      'virt-ssbd' CPUID feature bit in target/i386/cpu.c.
    - debian/patches/ubuntu/CVE-2018-3639-3.patch: define the Virt SSBD MSR
      and handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/artful-updates 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artfu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 174f498d2f04e80fa5b8054f1ff11603ff85da32
Unapplied parent: b5f2da9f7da9ecb48fe5ac394a04e960a854da94

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/xenial-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.30 to ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:01:27 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10.30 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: fb8b61fe36af38d478ac6cfc57a29793c8003ee0

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/trusty-updates 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.43 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:03:09 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.43 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 5d7e0e562e52513030ffe0db45b63c25434069ee

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/trusty-devel 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.43 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:03:09 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.43 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 5d7e0e562e52513030ffe0db45b63c25434069ee

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/artful-devel 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artfu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 174f498d2f04e80fa5b8054f1ff11603ff85da32
Unapplied parent: b5f2da9f7da9ecb48fe5ac394a04e960a854da94

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/bionic-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.3 to ubuntu/bionic-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:57:07 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7.3 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 161664f311ac864a0f5d63fa3c674f1aa11726ae

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/ubuntu/CVE-2018-3639-2.patch: define the AMD
      'virt-ssbd' CPUID feature bit in target/i386/cpu.c.
    - debian/patches/ubuntu/CVE-2018-3639-3.patch: define the Virt SSBD MSR
      and handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/trusty-devel 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 2.0.0+dfsg-2ubuntu1.43 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:03:09 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.43 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7832df70bc66c55c4a264f0f2d524406d0050ac9
Unapplied parent: 8c8f0a880a4d57b4baf9d4d254ea242afebb60ab

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/trusty-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 2.0.0+dfsg-2ubuntu1.43 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:03:09 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.43 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7832df70bc66c55c4a264f0f2d524406d0050ac9
Unapplied parent: 8c8f0a880a4d57b4baf9d4d254ea242afebb60ab

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/trusty-updates 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 2.0.0+dfsg-2ubuntu1.43 to applied/ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:03:09 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.43 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7832df70bc66c55c4a264f0f2d524406d0050ac9
Unapplied parent: 8c8f0a880a4d57b4baf9d4d254ea242afebb60ab

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/artful-updates 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8afa45fcebceda42d434e00218d3efe12c7de048

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/artful-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8afa45fcebceda42d434e00218d3efe12c7de048

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/trusty-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.43 to ubuntu/trusty-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:03:09 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.43 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 5d7e0e562e52513030ffe0db45b63c25434069ee

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

ubuntu/artful-devel 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-secu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.8 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 8afa45fcebceda42d434e00218d3efe12c7de048

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/artful-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artfu...

Author: Marc Deslauriers
Author Date: 2018-05-23 11:59:37 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.8 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 174f498d2f04e80fa5b8054f1ff11603ff85da32
Unapplied parent: b5f2da9f7da9ecb48fe5ac394a04e960a854da94

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

applied/ubuntu/xenial-security 2018-06-12 11:28:26 UTC 2018-06-12
Import patches-applied version 1:2.5+dfsg-5ubuntu10.30 to applied/ubuntu/xeni...

Author: Marc Deslauriers
Author Date: 2018-05-23 12:01:27 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10.30 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 31d6ea71272ccacdcc3919e66a7d98a1fdecb1bc
Unapplied parent: 5ac9637a373a46682f0c2fb03c5dd436ba0767d1

New changelog entries:
  * SECURITY UPDATE: Speculative Store Bypass
    - debian/patches/CVE-2018-3639-2.patch: define the AMD 'virt-ssbd'
      CPUID feature bit in target/i386/cpu.c.
    - debian/patches/CVE-2018-3639-3.patch: define the Virt SSBD MSR and
      handling of it in target/i386/cpu.h, target/i386/kvm.c,
      target/i386/machine.c.
    - CVE-2018-3639

debian/sid 2018-06-02 04:37:16 UTC 2018-06-02
Import patches-unapplied version 1:2.12+dfsg-3 to debian/sid

Author: Michael Tokarev
Author Date: 2018-06-01 18:42:29 UTC

Import patches-unapplied version 1:2.12+dfsg-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 092c0eb4ee7d0645db2c09230dacd538775a2456

New changelog entries:
  * make qemu-system-foo depending
    on qemu-system-data >>ver~, not >>ver
    (Closes: #900585)
  * do not build qemu-system-gui on hppa
  * use dh_lintian for lintian overrides
  * update VCS fields to point to salsa.debian.org

debian/buster 2018-06-02 04:37:16 UTC 2018-06-02
Import patches-unapplied version 1:2.12+dfsg-3 to debian/sid

Author: Michael Tokarev
Author Date: 2018-06-01 18:42:29 UTC

Import patches-unapplied version 1:2.12+dfsg-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 092c0eb4ee7d0645db2c09230dacd538775a2456

New changelog entries:
  * make qemu-system-foo depending
    on qemu-system-data >>ver~, not >>ver
    (Closes: #900585)
  * do not build qemu-system-gui on hppa
  * use dh_lintian for lintian overrides
  * update VCS fields to point to salsa.debian.org

applied/ubuntu/bionic 2018-04-18 15:05:04 UTC 2018-04-18
Import patches-applied version 1:2.11+dfsg-1ubuntu7 to applied/ubuntu/bionic-...

Author:  Christian Ehrhardt 
Author Date: 2018-04-11 05:46:18 UTC

Import patches-applied version 1:2.11+dfsg-1ubuntu7 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 00c0e1e1760ec5a8b95914064a31745be38db84a
Unapplied parent: 06ab4363dbfee7d66513c6ff2febf4c8788997f7

New changelog entries:
  * d/p/ubuntu/lp-1762854-*: fix issue with SCSI-2 devices denying Protection
    information (LP: #1762854).
  * d/p/ubuntu/lp-1763468-*: fix VSMT handling to fix ppc64el P8/P9 migration
    (LP: #1763468).

ubuntu/bionic 2018-04-18 15:05:04 UTC 2018-04-18
Import patches-unapplied version 1:2.11+dfsg-1ubuntu7 to ubuntu/bionic-proposed

Author:  Christian Ehrhardt 
Author Date: 2018-04-11 05:46:18 UTC

Import patches-unapplied version 1:2.11+dfsg-1ubuntu7 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: f3e429320ae650987f0e1a74eea68e78af38e483

New changelog entries:
  * d/p/ubuntu/lp-1762854-*: fix issue with SCSI-2 devices denying Protection
    information (LP: #1762854).
  * d/p/ubuntu/lp-1763468-*: fix VSMT handling to fix ppc64el P8/P9 migration
    (LP: #1763468).

importer/ubuntu/pristine-tar 2018-03-09 12:00:10 UTC 2018-03-09
pristine-tar data for qemu_2.10+dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-09 12:00:10 UTC

pristine-tar data for qemu_2.10+dfsg.orig.tar.xz

importer/debian/pristine-tar 2018-03-08 13:59:22 UTC 2018-03-08
pristine-tar data for qemu_2.10.0+dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-03-08 13:59:22 UTC

pristine-tar data for qemu_2.10.0+dfsg.orig.tar.xz

ubuntu/artful-proposed 2017-11-16 23:33:31 UTC 2017-11-16
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.1 to ubuntu/artful-prop...

Author:  Christian Ehrhardt 
Author Date: 2017-11-15 06:49:33 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3.1 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: a9acb42522590940627515e51bab699216f9de33

New changelog entries:
  * d/p/detect-ITS-and-skip-usage-on-older-kernel.patch to avoid crashes
    on arm64 when doing suspend/resume and reboots due to older kernels not
    supporting ITS (LP: #1731051).

applied/ubuntu/artful-proposed 2017-11-16 23:33:31 UTC 2017-11-16
Import patches-applied version 1:2.10+dfsg-0ubuntu3.1 to applied/ubuntu/artfu...

Author:  Christian Ehrhardt 
Author Date: 2017-11-15 06:49:33 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3.1 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: c76814aa8170a417440e86ae37716a3696fc6445
Unapplied parent: b83241f70315d00720cd51a668fa2a5c436bd257

New changelog entries:
  * d/p/detect-ITS-and-skip-usage-on-older-kernel.patch to avoid crashes
    on arm64 when doing suspend/resume and reboots due to older kernels not
    supporting ITS (LP: #1731051).

applied/ubuntu/zesty-proposed 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-...

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 05a016ae7d572a91a18515f921e1f35fa4652773
Unapplied parent: 45e1f750b37b989c54e121e34b7883c77303a126

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

ubuntu/zesty-proposed 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7ebc0b24670164f3e5528728beb5d32651b302ce

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

ubuntu/zesty-devel 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.8 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7ebc0b24670164f3e5528728beb5d32651b302ce

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

applied/ubuntu/zesty-devel 2017-11-16 20:58:29 UTC 2017-11-16
Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-...

Author: dann frazier
Author Date: 2017-11-14 15:27:31 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.8 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 05a016ae7d572a91a18515f921e1f35fa4652773
Unapplied parent: 45e1f750b37b989c54e121e34b7883c77303a126

New changelog entries:
  * Backport support for GICv3/vITS save/restore (LP: #1710019).

ubuntu/zesty-updates 2017-10-26 20:15:40 UTC 2017-10-26
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.7 to ubuntu/zesty-proposed

Author:  Christian Ehrhardt 
Author Date: 2017-10-18 14:17:34 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.7 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 25408e7560939491216d36f5e5aa9025d1fee489

New changelog entries:
  * d/p/ubuntu/virtio-Fix-no-interrupt-when-not-creating-msi-contro.patch:
    on Arm fix no interrupt when not creating msi controller. That fixes
    broken networking if running with virtio-mmio only (LP: #1719196).

applied/ubuntu/zesty-updates 2017-10-26 20:15:40 UTC 2017-10-26
Import patches-applied version 1:2.8+dfsg-3ubuntu2.7 to applied/ubuntu/zesty-...

Author:  Christian Ehrhardt 
Author Date: 2017-10-18 14:17:34 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.7 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 43f84c94f73b65ad614d536ba51fdd50a2b1c18c
Unapplied parent: fa87c8cb99a8a9655098405b0a9379edbb595103

New changelog entries:
  * d/p/ubuntu/virtio-Fix-no-interrupt-when-not-creating-msi-contro.patch:
    on Arm fix no interrupt when not creating msi controller. That fixes
    broken networking if running with virtio-mmio only (LP: #1719196).

applied/ubuntu/artful 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-applied version 1:2.10+dfsg-0ubuntu3 to applied/ubuntu/artful-...

Author:  Christian Ehrhardt 
Author Date: 2017-10-16 09:28:39 UTC

Import patches-applied version 1:2.10+dfsg-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 9d7d830dcce3f714c51295331015d937ef52acce
Unapplied parent: 56dae978854b5c6568cd921f300866727edf9d96

New changelog entries:
  * fix enablement of qemu-kvm service (LP: #1720397)
    - rename d/qemu-kvm.service to d/qemu-system-common.qemu-kvm.service
    - d/rules: add proper enablement debhelper calls
    - d/qemu-system-common.install: install covered by dh_installinit

ubuntu/artful 2017-10-16 21:18:17 UTC 2017-10-16
Import patches-unapplied version 1:2.10+dfsg-0ubuntu3 to ubuntu/artful-proposed

Author:  Christian Ehrhardt 
Author Date: 2017-10-16 09:28:39 UTC

Import patches-unapplied version 1:2.10+dfsg-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: fb5d22e94d2416235f8d15c1af22dadb07a946ab

New changelog entries:
  * fix enablement of qemu-kvm service (LP: #1720397)
    - rename d/qemu-kvm.service to d/qemu-system-common.qemu-kvm.service
    - d/rules: add proper enablement debhelper calls
    - d/qemu-system-common.install: install covered by dh_installinit

applied/ubuntu/zesty-security 2017-09-20 18:38:45 UTC 2017-09-20
Import patches-applied version 1:2.8+dfsg-3ubuntu2.5 to applied/ubuntu/zesty-...

Author: Marc Deslauriers
Author Date: 2017-09-20 11:22:48 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2.5 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 72604cec8b06daae91146f2fa3d878a51fbc6cb0
Unapplied parent: be172316a987f230a98e44c603e44fba132152b8

New changelog entries:
  * SECURITY REGRESSION: regression in in USB xHCI emulation (LP: #1718222)
    - debian/patches/CVE-2017-9375-regression.patch: don't kick in
      xhci_submit and xhci_fire_ctl_transfer in hw/usb/hcd-xhci.c.

ubuntu/zesty-security 2017-09-20 18:38:45 UTC 2017-09-20
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.5 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-09-20 11:22:48 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2.5 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 8dd70ef4fc37e45736ca4783cc4c8f3a848421b0

New changelog entries:
  * SECURITY REGRESSION: regression in in USB xHCI emulation (LP: #1718222)
    - debian/patches/CVE-2017-9375-regression.patch: don't kick in
      xhci_submit and xhci_fire_ctl_transfer in hw/usb/hcd-xhci.c.

applied/ubuntu/yakkety-updates 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakk...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 750d5317cd878a8d9c18250da946f033b0b86cab
Unapplied parent: 4e6fdad20d2038cbf416f6a358d2aaa4b89fdbcc

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

ubuntu/yakkety-security 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: b309c5b16858283ada4cc8e10b4f7a18a79acb17

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

ubuntu/yakkety-updates 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: b309c5b16858283ada4cc8e10b4f7a18a79acb17

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

applied/ubuntu/yakkety-devel 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakk...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 750d5317cd878a8d9c18250da946f033b0b86cab
Unapplied parent: 4e6fdad20d2038cbf416f6a358d2aaa4b89fdbcc

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

applied/ubuntu/yakkety-security 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakk...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.5 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 750d5317cd878a8d9c18250da946f033b0b86cab
Unapplied parent: 4e6fdad20d2038cbf416f6a358d2aaa4b89fdbcc

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

ubuntu/yakkety-devel 2017-05-16 15:33:17 UTC 2017-05-16
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-05-10 13:32:19 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.5 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: b309c5b16858283ada4cc8e10b4f7a18a79acb17

New changelog entries:
  * SECURITY UPDATE: denial of service via leak in virtFS
    - debian/patches/CVE-2017-7377.patch: fix file descriptor leak in
      hw/9pfs/9p.c.
    - CVE-2017-7377
  * SECURITY UPDATE: denial of service in cirrus_vga
    - debian/patches/CVE-2017-7718.patch: check parameters in
      hw/display/cirrus_vga_rop.h.
    - CVE-2017-7718
  * SECURITY UPDATE: code execution via cirrus_vga OOB r/w
    - debian/patches/CVE-2017-7980-1.patch: handle negative pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-2.patch: allow zero source pitch in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-3.patch: fix blit address mask handling
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-4.patch: fix patterncopy checks in
      hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-5.patch: revert allow zero source pitch
      in hw/display/cirrus_vga.c.
    - debian/patches/CVE-2017-7980-6.patch: stop passing around dst
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-7.patch: stop passing around src
      pointers in hw/display/cirrus_vga.c, hw/display/cirrus_vga_rop.h,
      hw/display/cirrus_vga_rop2.h.
    - debian/patches/CVE-2017-7980-8.patch: fix off-by-one in
      hw/display/cirrus_vga_rop.h.
    - debian/patches/CVE-2017-7980-9.patch: fix cirrus_invalidate_region in
      hw/display/cirrus_vga.c.
    - CVE-2017-7980
  * SECURITY UPDATE: denial of service via memory leak in virtFS
    - debian/patches/CVE-2017-8086.patch: fix leak in hw/9pfs/9p-xattr.c.
    - CVE-2017-8086
  * SECURITY UPDATE: denial of service via leak in audio
    - debian/patches/CVE-2017-8309.patch: release capture buffers in
      audio/audio.c.
    - CVE-2017-8309
  * SECURITY UPDATE: denial of service via leak in keyboard
    - debian/patches/CVE-2017-8379-1.patch: limit kbd queue depth in
      ui/input.c.
    - debian/patches/CVE-2017-8379-2.patch: don't queue delay if paused in
      ui/input.c.
    - CVE-2017-8379

applied/ubuntu/zesty 2017-03-08 16:53:15 UTC 2017-03-08
Import patches-applied version 1:2.8+dfsg-3ubuntu2 to applied/ubuntu/zesty-pr...

Author:  Christian Ehrhardt 
Author Date: 2017-03-07 08:23:08 UTC

Import patches-applied version 1:2.8+dfsg-3ubuntu2 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 7d9d190cf204025a9ce82a7e760f92bbf7f99895
Unapplied parent: 192a20354d3773623910db748cecc06a5ba5d9c1

New changelog entries:
  * d/p/ubuntu/spapr-pci-populate-PCI-DT-in-reverse-order.patch: backport
    "spapr/pci: populate PCI DT in reverse order" (LP: #1670481).

ubuntu/zesty 2017-03-08 16:53:15 UTC 2017-03-08
Import patches-unapplied version 1:2.8+dfsg-3ubuntu2 to ubuntu/zesty-proposed

Author:  Christian Ehrhardt 
Author Date: 2017-03-07 08:23:08 UTC

Import patches-unapplied version 1:2.8+dfsg-3ubuntu2 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 38694fd8b90f2f3643de571cbe8a2ade6bc01945

New changelog entries:
  * d/p/ubuntu/spapr-pci-populate-PCI-DT-in-reverse-order.patch: backport
    "spapr/pci: populate PCI DT in reverse order" (LP: #1670481).

ubuntu/yakkety-proposed 2017-02-15 14:49:24 UTC 2017-02-15
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.3 to ubuntu/yakkety-pr...

Author:  Christian Ehrhardt 
Author Date: 2017-01-30 07:07:06 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5.3 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: f4b5b6c84bd590694bf2700081fd68353f1312e1

New changelog entries:
  * fix ambiguous machine trusty and utopic machine types (LP: #1641532)
    - d/p/ubuntu/define-ubuntu-machine-types.patch update type definitions
    - d/qemu-system-x86.NEWS to describe the issue

applied/ubuntu/yakkety-proposed 2017-02-15 14:49:24 UTC 2017-02-15
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.3 to applied/ubuntu/yakk...

Author:  Christian Ehrhardt 
Author Date: 2017-01-30 07:07:06 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5.3 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 3ac79fe36e8701000c3de0000221d95d326b674e
Unapplied parent: 229070b783b250118529692f25af21a1cd5174ea

New changelog entries:
  * fix ambiguous machine trusty and utopic machine types (LP: #1641532)
    - d/p/ubuntu/define-ubuntu-machine-types.patch update type definitions
    - d/qemu-system-x86.NEWS to describe the issue

applied/ubuntu/trusty-proposed 2017-02-08 13:18:27 UTC 2017-02-08
Import patches-applied version 2.0.0+dfsg-2ubuntu1.32 to applied/ubuntu/trust...

Author:  Christian Ehrhardt 
Author Date: 2017-01-31 10:26:19 UTC

Import patches-applied version 2.0.0+dfsg-2ubuntu1.32 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 63294d7561741c5dbfab4a4959ed8edc45527b2f
Unapplied parent: 8a95cdc982730c08229c72df0f0fd0ba62e74917

New changelog entries:
  [ Dave Chiluk ]
  * Qemu VM crash with error
    "bdrv_error_action: Assertion `error >= 0' failed"
    (LP: #1655225)

ubuntu/trusty-proposed 2017-02-08 13:18:27 UTC 2017-02-08
Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.32 to ubuntu/trusty-prop...

Author:  Christian Ehrhardt 
Author Date: 2017-01-31 10:26:19 UTC

Import patches-unapplied version 2.0.0+dfsg-2ubuntu1.32 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 10f3ca25f00268b91325748c615cef098535c6cd

New changelog entries:
  [ Dave Chiluk ]
  * Qemu VM crash with error
    "bdrv_error_action: Assertion `error >= 0' failed"
    (LP: #1655225)

ubuntu/yakkety 2016-09-30 15:59:09 UTC 2016-09-30
Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5 to ubuntu/yakkety-prop...

Author: Stefan Bader
Author Date: 2016-09-30 12:24:37 UTC

Import patches-unapplied version 1:2.6.1+dfsg-0ubuntu5 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 2660569f29e1ea57439a9bcaae2ddb0706d3f4a3

New changelog entries:
  * No-change rebuild to compile against new libxen version.

applied/ubuntu/yakkety 2016-09-30 15:59:09 UTC 2016-09-30
Import patches-applied version 1:2.6.1+dfsg-0ubuntu5 to applied/ubuntu/yakket...

Author: Stefan Bader
Author Date: 2016-09-30 12:24:37 UTC

Import patches-applied version 1:2.6.1+dfsg-0ubuntu5 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 5f551eddd0bf18f9d2f22e04dc81345b3a84258f
Unapplied parent: a183513cb12c9e3c399cead592c6a1d98258e239

New changelog entries:
  * No-change rebuild to compile against new libxen version.

debian/jessie 2016-06-05 04:58:03 UTC 2016-06-05
Import patches-unapplied version 1:2.1+dfsg-12+deb8u6 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2016-05-08 13:33:50 UTC

Import patches-unapplied version 1:2.1+dfsg-12+deb8u6 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 7c8959d788b269aa736480e64c952c1a31290457

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2016-3710: Banked access to VGA memory (VBE) uses inconsistent
    bounds checks
  * CVE-2016-3712: potential integer overflow or OOB read access issues

applied/ubuntu/wily-devel 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-s...

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 550dc8f7a3f4b1b09e9ebb37bc97cc27effac64c

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

applied/ubuntu/wily-security 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-s...

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 550dc8f7a3f4b1b09e9ebb37bc97cc27effac64c

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

applied/ubuntu/wily-updates 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-s...

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.4 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 550dc8f7a3f4b1b09e9ebb37bc97cc27effac64c

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/wily-updates 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/wily-security 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/wily-devel 2016-05-12 14:14:02 UTC 2016-05-12
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-05-10 18:23:28 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.4 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb/hcd-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb/dev-network.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb/dev-network.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/net/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: denial of service in PRNG support
    - debian/patches/CVE-2016-2858.patch: add request queue support to
      rng-random in backends/rng-egd.c, backends/rng-random.c,
      backends/rng.c, include/sysemu/rng.h.
    - CVE-2016-2858
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/display/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/display/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/net/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/net/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: host information leak via TPR access
    - debian/patches/CVE-2016-4020.patch: initialize variable in
      hw/i386/kvmvapic.c.
    - CVE-2016-4020
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb/hcd-ehci.c.
    - CVE-2016-4037
  * This package does _not_ contain the changes from 1:2.3+dfsg-5ubuntu9.3
    in wily-proposed.

ubuntu/xenial 2016-04-19 21:03:52 UTC 2016-04-19
Import patches-unapplied version 1:2.5+dfsg-5ubuntu10 to ubuntu/xenial-proposed

Author: Steve Langasek
Author Date: 2016-04-19 20:41:37 UTC

Import patches-unapplied version 1:2.5+dfsg-5ubuntu10 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 800c374cc4463bd96a21263a3da526712dad8679

New changelog entries:
  * qemu-system-s390x only available on s390x, so qemu-system should only
    depend on it on this arch.
  * have qemu-system-aarch64 Suggest: qemu-efi; this should be a stronger
    relationship, but qemu-efi is still in universe right now.

applied/ubuntu/xenial 2016-04-19 21:03:52 UTC 2016-04-19
Import patches-applied version 1:2.5+dfsg-5ubuntu10 to applied/ubuntu/xenial-...

Author: Steve Langasek
Author Date: 2016-04-19 20:41:37 UTC

Import patches-applied version 1:2.5+dfsg-5ubuntu10 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 13742d3a5ba090535755bead13cc182efd362238
Unapplied parent: a2fa8063f3d8b2df5ed001cc48558cacd0acbfae

New changelog entries:
  * qemu-system-s390x only available on s390x, so qemu-system should only
    depend on it on this arch.
  * have qemu-system-aarch64 Suggest: qemu-efi; this should be a stronger
    relationship, but qemu-efi is still in universe right now.

debian/wheezy 2016-04-02 23:41:44 UTC 2016-04-02
Import patches-unapplied version 1.1.2+dfsg-6a+deb7u12 to debian/wheezy

Author: Michael Tokarev
Author Date: 2016-02-01 20:53:18 UTC

Import patches-unapplied version 1.1.2+dfsg-6a+deb7u12 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 24bcdaebd219ecc02c6e2441473240448b3735bd

New changelog entries:
  * applied 3 patches from upstream to fix virtio-net
    possible remote DoS (Closes: #799452 CVE-2015-7295)
  * pcnet-add-check-to-validate-receive-data-size-CVE-2015-7504.patch
    (Closes: #806742, CVE-2015-7504)
  * pcnet-fix-rx-buffer-overflow-CVE-2015-7512.patch
    (Closes: #806741, CVE-2015-7512)
  * eepro100-prevent-two-endless-loops-CVE-2015-8345.patch
    (Closes: #806373, CVE-2015-8345)
  * vnc-avoid-floating-point-exception-CVE-2015-8504.patch
    (Closes: #808130, CVE-2015-8504)
  * ehci-make-idt-processing-more-robust-CVE-2015-8558.patch
    (Closes: #808144, CVE-2015-8558)
  * net-ne2000-fix-bounds-check-in-ioport-operations-CVE-2015-8743.patch
    (Closes: #810519, CVE-2015-8743)
  * ide-ahci-reset-ncq-object-to-unused-on-error-CVE-2016-1568.patch
    (Closes: #810527, CVE-2016-1568)
  * fw_cfg-add-check-to-validate-current-entry-value-CVE-2016-1714.patch
    (Closes: CVE-2016-1714)
  * i386-avoid-null-pointer-dereference-CVE-2016-1922.patch
    (Closes: #811201, CVE-2016-1922)
  * ne2000-add-checks-to-validate-ring-buffer-pointers-CVE-2015-5279.patch
    fix for Heap overflow vulnerability in ne2000_receive() function
    (Closes: #799074 CVE-2015-5279)
  * ne2000-avoid-infinite-loop-when-receiving-packets-CVE-2015-5278.patch
    (Closes: #799073 CVE-2015-5278)
  * Acknowlege the previous update. Thank you Salvatore for the hard
    work you did fixing so many security issues.
  * rename last patches removing numeric prefixes, so that different series
    wont intermix with each other, add Bug-Debian: headers.
  * Add e1000-avoid-infinite-loop-in-transmit-CVE-2015-6815.patch.
    CVE-2015-6815: net: e1000 infinite loop issue in processing transmit
    descriptor. (Closes: #798101 CVE-2015-6815)
  * Add ide-fix-ATAPI-command-permissions-CVE-2015-6855.patch.
    CVE-2015-6855: ide: qemu allows arbitrary commands to be sent to an ATAPI
    device from guest, while illegal comands might have security impact,
    f.e. WIN_READ_NATIVE_MAX results in divide by zero error.
    (Closes: CVE-2015-6855)
  * Non-maintainer upload by the Security Team.
  * Add patches for CVE-2015-5165.
    CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to
    guest. (Closes: #794610)
  * Add 0001-virtio-serial-fix-ANY_LAYOUT.patch patch.
    CVE-2015-5745: buffer overflow in virtio-serial. (Closes: #795087)

ubuntu/wily-proposed 2016-03-31 19:28:49 UTC 2016-03-31
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.3 to ubuntu/wily-proposed

Author: Serge Hallyn
Author Date: 2016-03-29 23:07:12 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9.3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 162d18f4782998159499b81a4b4bd3d9272f7dc6

New changelog entries:
  * vhost-user-interrupt-management-fixes.patch: upstream fix for qemu
    hanging under high traffic load (LP: #1556306)

applied/ubuntu/wily-proposed 2016-03-31 19:28:49 UTC 2016-03-31
Import patches-applied version 1:2.3+dfsg-5ubuntu9.3 to applied/ubuntu/wily-p...

Author: Serge Hallyn
Author Date: 2016-03-29 23:07:12 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9.3 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 659dd49b93a2428b5aeba5d212f50b7b5ef29d9f
Unapplied parent: 33f82de1fae0dd7c99a6314072777b3670023575

New changelog entries:
  * vhost-user-interrupt-management-fixes.patch: upstream fix for qemu
    hanging under high traffic load (LP: #1556306)

applied/ubuntu/vivid-updates 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: c1fc0b86bd36aeaa1732a5b7d44a9b21c883bada
Unapplied parent: 4edd533fa7abedd191664733a5690bc4030cf3e4

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

ubuntu/vivid-updates 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a8d2f553f125ef5033e4fec8cb3c2bc9c46159cb

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

ubuntu/vivid-security 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a8d2f553f125ef5033e4fec8cb3c2bc9c46159cb

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

applied/ubuntu/vivid-devel 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: c1fc0b86bd36aeaa1732a5b7d44a9b21c883bada
Unapplied parent: 4edd533fa7abedd191664733a5690bc4030cf3e4

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

applied/ubuntu/vivid-security 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/viv...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.7 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: c1fc0b86bd36aeaa1732a5b7d44a9b21c883bada
Unapplied parent: 4edd533fa7abedd191664733a5690bc4030cf3e4

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

ubuntu/vivid-devel 2015-12-03 12:50:00 UTC 2015-12-03
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-sec...

Author: Marc Deslauriers
Author Date: 2015-12-01 21:00:18 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.7 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: a8d2f553f125ef5033e4fec8cb3c2bc9c46159cb

New changelog entries:
  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/net/virtio-net.c, hw/virtio/virtio.c, include/hw/virtio/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/net/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/net/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/net/eepro100.c.
    - CVE-2015-8345

ubuntu/vivid-proposed 2015-10-14 14:19:59 UTC 2015-10-14
Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.6 to ubuntu/vivid-pro...

Author: Stefan Bader
Author Date: 2015-10-09 15:04:26 UTC

Import patches-unapplied version 1:2.2+dfsg-5expubuntu9.6 to ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: e64de333726d622fc4b0511204d3849733291138

New changelog entries:
  * debian/patches/upstream-fix-irq-route-entries.patch
    Fix "kvm_irqchip_commit_routes: Assertion 'ret == 0' failed"
    (LP: #1465935)

applied/ubuntu/vivid-proposed 2015-10-14 14:19:59 UTC 2015-10-14
Import patches-applied version 1:2.2+dfsg-5expubuntu9.6 to applied/ubuntu/viv...

Author: Stefan Bader
Author Date: 2015-10-09 15:04:26 UTC

Import patches-applied version 1:2.2+dfsg-5expubuntu9.6 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 55c7261998d9e4931663e0486c20d56df36c3753
Unapplied parent: 52ba8e72832c11ab8576c8536770597b215bc1c0

New changelog entries:
  * debian/patches/upstream-fix-irq-route-entries.patch
    Fix "kvm_irqchip_commit_routes: Assertion 'ret == 0' failed"
    (LP: #1465935)

ubuntu/wily 2015-10-09 23:43:39 UTC 2015-10-09
Import patches-unapplied version 1:2.3+dfsg-5ubuntu9 to ubuntu/wily-proposed

Author: Stefan Bader
Author Date: 2015-10-09 13:38:53 UTC

Import patches-unapplied version 1:2.3+dfsg-5ubuntu9 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 75298729de8d9b052a2af2ccc040218f94f1631f

New changelog entries:
  * debian/patches/upstream-fix-irq-route-entries.patch
    Fix "kvm_irqchip_commit_routes: Assertion 'ret == 0' failed"
    (LP: #1465935)

applied/ubuntu/wily 2015-10-09 23:43:39 UTC 2015-10-09
Import patches-applied version 1:2.3+dfsg-5ubuntu9 to applied/ubuntu/wily-pro...

Author: Stefan Bader
Author Date: 2015-10-09 13:38:53 UTC

Import patches-applied version 1:2.3+dfsg-5ubuntu9 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: ee74e6bc5c7c3b77dd57fdbafbd23153a869873f
Unapplied parent: 7052ac4690e8d0145887d1a16882dc4427fbc507

New changelog entries:
  * debian/patches/upstream-fix-irq-route-entries.patch
    Fix "kvm_irqchip_commit_routes: Assertion 'ret == 0' failed"
    (LP: #1465935)

ubuntu/utopic-security 2015-06-10 14:23:33 UTC 2015-06-10
Import patches-unapplied version 2.1+dfsg-4ubuntu6.7 to ubuntu/utopic-security

Author: Marc Deslauriers
Author Date: 2015-06-09 12:18:10 UTC

Import patches-unapplied version 2.1+dfsg-4ubuntu6.7 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: a584482b8987bf678d1d4604e17435ebf2c4efb1

New changelog entries:
  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106

applied/ubuntu/utopic-updates 2015-06-10 14:23:33 UTC 2015-06-10
Import patches-applied version 2.1+dfsg-4ubuntu6.7 to applied/ubuntu/utopic-s...

Author: Marc Deslauriers
Author Date: 2015-06-09 12:18:10 UTC

Import patches-applied version 2.1+dfsg-4ubuntu6.7 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 1cc1d94b68eb9e27422c32ae5882b575f1767704
Unapplied parent: c96bc30faa64d2933143418ee7d68e1890cab0f1

New changelog entries:
  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106

applied/ubuntu/utopic-security 2015-06-10 14:23:33 UTC 2015-06-10
Import patches-applied version 2.1+dfsg-4ubuntu6.7 to applied/ubuntu/utopic-s...

Author: Marc Deslauriers
Author Date: 2015-06-09 12:18:10 UTC

Import patches-applied version 2.1+dfsg-4ubuntu6.7 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 1cc1d94b68eb9e27422c32ae5882b575f1767704
Unapplied parent: c96bc30faa64d2933143418ee7d68e1890cab0f1

New changelog entries:
  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106

applied/ubuntu/utopic-devel 2015-06-10 14:23:33 UTC 2015-06-10
Import patches-applied version 2.1+dfsg-4ubuntu6.7 to applied/ubuntu/utopic-s...

Author: Marc Deslauriers
Author Date: 2015-06-09 12:18:10 UTC

Import patches-applied version 2.1+dfsg-4ubuntu6.7 to applied/ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: 1cc1d94b68eb9e27422c32ae5882b575f1767704
Unapplied parent: c96bc30faa64d2933143418ee7d68e1890cab0f1

New changelog entries:
  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106

ubuntu/utopic-devel 2015-06-10 14:23:33 UTC 2015-06-10
Import patches-unapplied version 2.1+dfsg-4ubuntu6.7 to ubuntu/utopic-security

Author: Marc Deslauriers
Author Date: 2015-06-09 12:18:10 UTC

Import patches-unapplied version 2.1+dfsg-4ubuntu6.7 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: a584482b8987bf678d1d4604e17435ebf2c4efb1

New changelog entries:
  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106

ubuntu/utopic-updates 2015-06-10 14:23:33 UTC 2015-06-10
Import patches-unapplied version 2.1+dfsg-4ubuntu6.7 to ubuntu/utopic-security

Author: Marc Deslauriers
Author Date: 2015-06-09 12:18:10 UTC

Import patches-unapplied version 2.1+dfsg-4ubuntu6.7 to ubuntu/utopic-security

Imported using git-ubuntu import.

Changelog parent: a584482b8987bf678d1d4604e17435ebf2c4efb1

New changelog entries:
  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/net/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/net/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037
  * SECURITY UPDATE: denial of service via MSI message data field write
    - debian/patches/CVE-2015-4103.patch: properly gate writes in
      hw/xen/xen_pt.c, hw/xen/xen_pt.h, hw/xen/xen_pt_config_init.c.
    - CVE-2015-4103
  * SECURITY UPDATE: denial of service via MSI mask bits access
    - debian/patches/CVE-2015-4104.patch: don't allow guest access in
      hw/pci/msi.c, hw/xen/xen_pt_config_init.c, include/hw/pci/pci_regs.h.
    - CVE-2015-4104
  * SECURITY UPDATE: denial of service via PCI MSI-X pass-through error
    message logging
    - debian/patches/CVE-2015-4105.patch: limit messages in
      hw/xen/xen_pt.h, hw/xen/xen_pt_msi.c.
    - CVE-2015-4105
  * SECURITY UPDATE: denial of service or possible privilege escalation via
    write access to PCI config space
    - debian/patches/CVE-2015-4106-*.patch: multiple upstream commits to
      restrict passthough in hw/xen/xen_pt_config_init.c, hw/xen/xen_pt.h,
      hw/xen/xen_pt.c.
    - CVE-2015-4106

debian/experimental 2015-05-15 16:10:37 UTC 2015-05-15
Import patches-unapplied version 1:2.2+dfsg-6exp to debian/experimental

Author: Michael Tokarev
Author Date: 2015-04-17 18:54:53 UTC

Import patches-unapplied version 1:2.2+dfsg-6exp to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 5c3cbf8aa104deca70e06fe5ea251899b6987911

New changelog entries:
  * qemu 2.2.1 stable/bugfix release (remove included upstream
    exec-change-default-exception_index-value-for-migration-to--1.patch)
  * added mips64(el) to list of architectures where qemu-utils is built
    (Closes: #780200)
  * added kvm-on-x32.patch from Adam Borowski (Closes: #778737)
  * create qemu-block-extra package
  * rules.mak-fix-module-build.patch from upstream to fix module build
  * pass --enable-modules to configure
  * pass multiarch --libdir to configure
  * mjt-set-oem-in-rsdt-like-slic.diff: update FACP table too,
    not only RSDT. FACP is needed for win7 booting in UEFI mode.
  * enable libcacard (closes: #764971)
   - build-depend on libnss3-dev & libtool-bin
   - --enable-smartcard-nss
   - run dh_makeshlibs
   - rm libcacard.la
   - add libcacard0, libcacard-dev and libcacard-tools packages
   - add libcacard*.install and libcacard0.symbols

1100 of 174 results

Other repositories

Name Last Modified
lp:ubuntu/+source/qemu 11 hours ago
lp:~paelzer/ubuntu/+source/qemu 2018-10-10
lp:~ubuntu-virt/ubuntu/+source/qemu 2018-06-06
lp:~racb/ubuntu/+source/qemu 2016-08-05
lp:~nacc/ubuntu/+source/qemu 2016-07-14
lp:~ubuntu-cloud-archive/ubuntu/+source/qemu 2016-05-26
lp:~cisco-vpp/ubuntu/+source/qemu 2015-10-02
17 of 7 results
You can't create new repositories for qemu in Ubuntu.