View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/spice
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-10-01 10:41:17 UTC 2019-10-01
DSC file for 0.14.2-4

Author: Ubuntu Git Importer
Author Date: 2019-10-01 10:41:17 UTC

DSC file for 0.14.2-4

debian/sid 2019-10-01 10:37:28 UTC 2019-10-01
Import patches-unapplied version 0.14.2-4 to debian/sid

Author: Michael Tokarev
Author Date: 2019-10-01 05:52:16 UTC

Import patches-unapplied version 0.14.2-4 to debian/sid

Imported using git-ubuntu import.

Changelog parent: c351472c75e0e1c083706f66e9407e08f6cc1f9b

New changelog entries:
  * disable failing test-listen (Closes: #941006)
  * add fix-test-qxl-parsing-on-ppc64el-and-armhf.patch
  * stop using dh_autoreconf as we do not patch autoconf/automake anymore

applied/debian/sid 2019-10-01 10:37:28 UTC 2019-10-01
Import patches-applied version 0.14.2-4 to applied/debian/sid

Author: Michael Tokarev
Author Date: 2019-10-01 05:52:16 UTC

Import patches-applied version 0.14.2-4 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 47de59538dbf7ed4dc5112f329e9c787ee432b0a
Unapplied parent: 0cca22dfbffa0e0eb7ddffe2aae69268e28b42e3

New changelog entries:
  * disable failing test-listen (Closes: #941006)
  * add fix-test-qxl-parsing-on-ppc64el-and-armhf.patch
  * stop using dh_autoreconf as we do not patch autoconf/automake anymore

importer/ubuntu/dsc 2019-06-26 07:15:38 UTC 2019-06-26
DSC file for 0.14.2-0ubuntu2

Author: Ubuntu Git Importer
Author Date: 2019-06-26 07:15:38 UTC

DSC file for 0.14.2-0ubuntu2

ubuntu/focal-devel 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Upload parent: 250736498dc7700daef76923076489209a871caf

ubuntu/focal 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Upload parent: 250736498dc7700daef76923076489209a871caf

ubuntu/eoan-proposed 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Upload parent: 250736498dc7700daef76923076489209a871caf

ubuntu/eoan-devel 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Upload parent: 250736498dc7700daef76923076489209a871caf

ubuntu/eoan 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Upload parent: 250736498dc7700daef76923076489209a871caf

applied/ubuntu/eoan-devel 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 3a2346ee8fd7b73ae2d77745c616c5316e6b86ac
Unapplied parent: f6d45252c472983cce9fde9a91f034d6f664915d

New changelog entries:
  * Fixup autpkgtest (LP: #1834286)
    These changes will make the test able to run again, but not output mismatch
    errors (this matches the behavior before 0.14.2). Upstream discussion
    started on how to resolve that as a next step, more details at the LP bug.
    - d/t/automated-tests: spice-common moved into dir subprojects
    - d/t/automated-tests: option --enable-automated-tests now is always on"
    - d/t/automated-tests, d/t/control: make tests more debuggable by allowing
      stderr
    - d/t/control: install new test dependency python-pil
    - d/t/base_test.ppm, d/t/regression-test.py: provide test resources from
      upstream git not part of the released tarball anymore
    - d/source/include-binaries: allow binary base_test.ppm in package

applied/ubuntu/eoan-proposed 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 3a2346ee8fd7b73ae2d77745c616c5316e6b86ac
Unapplied parent: f6d45252c472983cce9fde9a91f034d6f664915d

New changelog entries:
  * Fixup autpkgtest (LP: #1834286)
    These changes will make the test able to run again, but not output mismatch
    errors (this matches the behavior before 0.14.2). Upstream discussion
    started on how to resolve that as a next step, more details at the LP bug.
    - d/t/automated-tests: spice-common moved into dir subprojects
    - d/t/automated-tests: option --enable-automated-tests now is always on"
    - d/t/automated-tests, d/t/control: make tests more debuggable by allowing
      stderr
    - d/t/control: install new test dependency python-pil
    - d/t/base_test.ppm, d/t/regression-test.py: provide test resources from
      upstream git not part of the released tarball anymore
    - d/source/include-binaries: allow binary base_test.ppm in package

applied/ubuntu/focal 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 3a2346ee8fd7b73ae2d77745c616c5316e6b86ac
Unapplied parent: f6d45252c472983cce9fde9a91f034d6f664915d

New changelog entries:
  * Fixup autpkgtest (LP: #1834286)
    These changes will make the test able to run again, but not output mismatch
    errors (this matches the behavior before 0.14.2). Upstream discussion
    started on how to resolve that as a next step, more details at the LP bug.
    - d/t/automated-tests: spice-common moved into dir subprojects
    - d/t/automated-tests: option --enable-automated-tests now is always on"
    - d/t/automated-tests, d/t/control: make tests more debuggable by allowing
      stderr
    - d/t/control: install new test dependency python-pil
    - d/t/base_test.ppm, d/t/regression-test.py: provide test resources from
      upstream git not part of the released tarball anymore
    - d/source/include-binaries: allow binary base_test.ppm in package

applied/ubuntu/focal-devel 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 3a2346ee8fd7b73ae2d77745c616c5316e6b86ac
Unapplied parent: f6d45252c472983cce9fde9a91f034d6f664915d

New changelog entries:
  * Fixup autpkgtest (LP: #1834286)
    These changes will make the test able to run again, but not output mismatch
    errors (this matches the behavior before 0.14.2). Upstream discussion
    started on how to resolve that as a next step, more details at the LP bug.
    - d/t/automated-tests: spice-common moved into dir subprojects
    - d/t/automated-tests: option --enable-automated-tests now is always on"
    - d/t/automated-tests, d/t/control: make tests more debuggable by allowing
      stderr
    - d/t/control: install new test dependency python-pil
    - d/t/base_test.ppm, d/t/regression-test.py: provide test resources from
      upstream git not part of the released tarball anymore
    - d/source/include-binaries: allow binary base_test.ppm in package

ubuntu/devel 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-unapplied version 0.14.2-0ubuntu2 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Upload parent: 250736498dc7700daef76923076489209a871caf

applied/ubuntu/devel 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 3a2346ee8fd7b73ae2d77745c616c5316e6b86ac
Unapplied parent: f6d45252c472983cce9fde9a91f034d6f664915d

New changelog entries:
  * Fixup autpkgtest (LP: #1834286)
    These changes will make the test able to run again, but not output mismatch
    errors (this matches the behavior before 0.14.2). Upstream discussion
    started on how to resolve that as a next step, more details at the LP bug.
    - d/t/automated-tests: spice-common moved into dir subprojects
    - d/t/automated-tests: option --enable-automated-tests now is always on"
    - d/t/automated-tests, d/t/control: make tests more debuggable by allowing
      stderr
    - d/t/control: install new test dependency python-pil
    - d/t/base_test.ppm, d/t/regression-test.py: provide test resources from
      upstream git not part of the released tarball anymore
    - d/source/include-binaries: allow binary base_test.ppm in package

applied/ubuntu/eoan 2019-06-26 07:13:13 UTC 2019-06-26
Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Author: Christian Ehrhardt 
Author Date: 2019-06-25 10:59:01 UTC

Import patches-applied version 0.14.2-0ubuntu2 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 3a2346ee8fd7b73ae2d77745c616c5316e6b86ac
Unapplied parent: f6d45252c472983cce9fde9a91f034d6f664915d

New changelog entries:
  * Fixup autpkgtest (LP: #1834286)
    These changes will make the test able to run again, but not output mismatch
    errors (this matches the behavior before 0.14.2). Upstream discussion
    started on how to resolve that as a next step, more details at the LP bug.
    - d/t/automated-tests: spice-common moved into dir subprojects
    - d/t/automated-tests: option --enable-automated-tests now is always on"
    - d/t/automated-tests, d/t/control: make tests more debuggable by allowing
      stderr
    - d/t/control: install new test dependency python-pil
    - d/t/base_test.ppm, d/t/regression-test.py: provide test resources from
      upstream git not part of the released tarball anymore
    - d/source/include-binaries: allow binary base_test.ppm in package

applied/debian/stretch 2019-02-16 17:19:10 UTC 2019-02-16
Import patches-applied version 0.12.8-2.1+deb9u3 to applied/debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-01-27 16:28:58 UTC

Import patches-applied version 0.12.8-2.1+deb9u3 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 35fb6e748506b54053746ac437743441ec22a1b1
Unapplied parent: 02713680ada4591458e8ba7a4f292b68013f0f57

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * memslot: Fix off-by-one error in group/slot boundary check (CVE-2019-3813)

debian/stretch 2019-02-16 17:19:10 UTC 2019-02-16
Import patches-unapplied version 0.12.8-2.1+deb9u3 to debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-01-27 16:28:58 UTC

Import patches-unapplied version 0.12.8-2.1+deb9u3 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 09dcd37a1abd1276c5b93bb5e2dec4a0a26b594b

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * memslot: Fix off-by-one error in group/slot boundary check (CVE-2019-3813)

debian/buster 2019-01-31 04:39:00 UTC 2019-01-31
Import patches-unapplied version 0.14.0-1.3 to debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-01-28 12:04:44 UTC

Import patches-unapplied version 0.14.0-1.3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 08fa9112b17f4367d15d114375bcf6592e8a4a2e

New changelog entries:
  * Non-maintainer upload.
  * memslot: Fix off-by-one error in group/slot boundary check (CVE-2019-3813)
    (Closes: #920762)

applied/debian/buster 2019-01-31 04:39:00 UTC 2019-01-31
Import patches-applied version 0.14.0-1.3 to applied/debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-01-28 12:04:44 UTC

Import patches-applied version 0.14.0-1.3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 89f518ff469ef6eba45598e4d38a78f5593a75e3
Unapplied parent: 493d060b71ee27148ab9ed17a020bc92117e9435

New changelog entries:
  * Non-maintainer upload.
  * memslot: Fix off-by-one error in group/slot boundary check (CVE-2019-3813)
    (Closes: #920762)

ubuntu/disco 2019-01-28 20:53:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu5 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu5 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: e2d7c69506d38aa2355aff11854fddf358a9ba4c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

ubuntu/disco-proposed 2019-01-28 20:53:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu5 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu5 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: e2d7c69506d38aa2355aff11854fddf358a9ba4c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

ubuntu/disco-devel 2019-01-28 20:53:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu5 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu5 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: e2d7c69506d38aa2355aff11854fddf358a9ba4c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/disco-devel 2019-01-28 20:53:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu5 to applied/ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-applied version 0.14.0-1ubuntu5 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 4c22c38b5d1a7f3c47681c94e29bbd36adab003d
Unapplied parent: 203dc2931b3b158bf9a7c53e34275d73cbfbef56

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/disco-proposed 2019-01-28 20:53:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu5 to applied/ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-applied version 0.14.0-1ubuntu5 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 4c22c38b5d1a7f3c47681c94e29bbd36adab003d
Unapplied parent: 203dc2931b3b158bf9a7c53e34275d73cbfbef56

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/disco 2019-01-28 20:53:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu5 to applied/ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-applied version 0.14.0-1ubuntu5 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 4c22c38b5d1a7f3c47681c94e29bbd36adab003d
Unapplied parent: 203dc2931b3b158bf9a7c53e34275d73cbfbef56

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/trusty-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.12.4-0nocelt2ubuntu1.8 to applied/ubuntu/tru...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:46:04 UTC

Import patches-applied version 0.12.4-0nocelt2ubuntu1.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 38b9260d1c909e71b9653a7975c0a78b5f18140e
Unapplied parent: ddc7201dbfd25c0863c7e9eca32c395d24684895

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

applied/ubuntu/xenial-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.12.6-4ubuntu0.4 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:45:07 UTC

Import patches-applied version 0.12.6-4ubuntu0.4 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3a58fc9d175d920c2dd6491e8dde122134f4af25
Unapplied parent: f04d0f6a926297303fcbe41a2dd0eff3fae788a6

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/xenial-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.12.6-4ubuntu0.4 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-01-24 14:45:07 UTC

Import patches-unapplied version 0.12.6-4ubuntu0.4 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f0845884b9bf86d324847e9f4b23182b91bb50fb

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/xenial-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.12.6-4ubuntu0.4 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-01-24 14:45:07 UTC

Import patches-unapplied version 0.12.6-4ubuntu0.4 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f0845884b9bf86d324847e9f4b23182b91bb50fb

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/xenial-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.12.6-4ubuntu0.4 to ubuntu/xenial-security

Author: Marc Deslauriers
Author Date: 2019-01-24 14:45:07 UTC

Import patches-unapplied version 0.12.6-4ubuntu0.4 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f0845884b9bf86d324847e9f4b23182b91bb50fb

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/trusty-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.12.4-0nocelt2ubuntu1.8 to ubuntu/trusty-se...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:46:04 UTC

Import patches-unapplied version 0.12.4-0nocelt2ubuntu1.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 41a3353809a5bc930ce9aad78dc2fa6ce2823d9e

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

applied/ubuntu/bionic-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu2.4 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:00:10 UTC

Import patches-applied version 0.14.0-1ubuntu2.4 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 3e48d9f47b34cacbf27110faa41b421c2a32a3c1
Unapplied parent: f41610acea05cffb6466c3e7be472ebb0e117c49

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/bionic-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu2.4 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:00:10 UTC

Import patches-applied version 0.14.0-1ubuntu2.4 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 3e48d9f47b34cacbf27110faa41b421c2a32a3c1
Unapplied parent: f41610acea05cffb6466c3e7be472ebb0e117c49

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/bionic-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu2.4 to applied/ubuntu/bionic-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:00:10 UTC

Import patches-applied version 0.14.0-1ubuntu2.4 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 3e48d9f47b34cacbf27110faa41b421c2a32a3c1
Unapplied parent: f41610acea05cffb6466c3e7be472ebb0e117c49

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/cosmic-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu4.2 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-applied version 0.14.0-1ubuntu4.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 4c22c38b5d1a7f3c47681c94e29bbd36adab003d
Unapplied parent: 127c5f651e9132c46f12a823407b7db40c1a5328

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/cosmic-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu4.2 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-applied version 0.14.0-1ubuntu4.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 4c22c38b5d1a7f3c47681c94e29bbd36adab003d
Unapplied parent: 127c5f651e9132c46f12a823407b7db40c1a5328

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/cosmic-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.14.0-1ubuntu4.2 to applied/ubuntu/cosmic-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-applied version 0.14.0-1ubuntu4.2 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 4c22c38b5d1a7f3c47681c94e29bbd36adab003d
Unapplied parent: 127c5f651e9132c46f12a823407b7db40c1a5328

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

ubuntu/trusty-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.12.4-0nocelt2ubuntu1.8 to ubuntu/trusty-se...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:46:04 UTC

Import patches-unapplied version 0.12.4-0nocelt2ubuntu1.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 41a3353809a5bc930ce9aad78dc2fa6ce2823d9e

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/trusty-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.12.4-0nocelt2ubuntu1.8 to ubuntu/trusty-se...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:46:04 UTC

Import patches-unapplied version 0.12.4-0nocelt2ubuntu1.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 41a3353809a5bc930ce9aad78dc2fa6ce2823d9e

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/cosmic-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu4.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu4.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e2d7c69506d38aa2355aff11854fddf358a9ba4c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

ubuntu/cosmic-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu4.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu4.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e2d7c69506d38aa2355aff11854fddf358a9ba4c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

ubuntu/cosmic-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu4.2 to ubuntu/cosmic-security

Author: Marc Deslauriers
Author Date: 2019-01-24 13:58:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu4.2 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: e2d7c69506d38aa2355aff11854fddf358a9ba4c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

ubuntu/bionic-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu2.4 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-01-24 14:00:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu2.4 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: ebb33ccff72581e8d3fd7a77c19652a564830c6c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/trusty-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.12.4-0nocelt2ubuntu1.8 to applied/ubuntu/tru...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:46:04 UTC

Import patches-applied version 0.12.4-0nocelt2ubuntu1.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 38b9260d1c909e71b9653a7975c0a78b5f18140e
Unapplied parent: ddc7201dbfd25c0863c7e9eca32c395d24684895

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/bionic-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu2.4 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-01-24 14:00:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu2.4 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: ebb33ccff72581e8d3fd7a77c19652a564830c6c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/xenial-security 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.12.6-4ubuntu0.4 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:45:07 UTC

Import patches-applied version 0.12.6-4ubuntu0.4 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3a58fc9d175d920c2dd6491e8dde122134f4af25
Unapplied parent: f04d0f6a926297303fcbe41a2dd0eff3fae788a6

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

applied/ubuntu/trusty-updates 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.12.4-0nocelt2ubuntu1.8 to applied/ubuntu/tru...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:46:04 UTC

Import patches-applied version 0.12.4-0nocelt2ubuntu1.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 38b9260d1c909e71b9653a7975c0a78b5f18140e
Unapplied parent: ddc7201dbfd25c0863c7e9eca32c395d24684895

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

ubuntu/bionic-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-unapplied version 0.14.0-1ubuntu2.4 to ubuntu/bionic-security

Author: Marc Deslauriers
Author Date: 2019-01-24 14:00:10 UTC

Import patches-unapplied version 0.14.0-1ubuntu2.4 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: ebb33ccff72581e8d3fd7a77c19652a564830c6c

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in server/memslot.c,
      add tests to server/tests/test-qxl-parsing.c.
    - CVE-2019-3813
  * debian/tests/automated-tests: fix incorrect test name, don't fail on
    build writing to stderr.

applied/ubuntu/xenial-devel 2019-01-28 19:08:12 UTC 2019-01-28
Import patches-applied version 0.12.6-4ubuntu0.4 to applied/ubuntu/xenial-sec...

Author: Marc Deslauriers
Author Date: 2019-01-24 14:45:07 UTC

Import patches-applied version 0.12.6-4ubuntu0.4 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3a58fc9d175d920c2dd6491e8dde122134f4af25
Unapplied parent: f04d0f6a926297303fcbe41a2dd0eff3fae788a6

New changelog entries:
  * SECURITY UPDATE: off-by-one error in memslot_get_virt
    - debian/patches/CVE-2019-3813.patch: fix checks in
      server/red_memslots.c.
    - CVE-2019-3813

applied/ubuntu/cosmic 2018-09-10 14:48:22 UTC 2018-09-10
Import patches-applied version 0.14.0-1ubuntu4 to applied/ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-08-20 16:26:02 UTC

Import patches-applied version 0.14.0-1ubuntu4 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 346b8c7794861c7e082ff563c03f28e3bef8f649
Unapplied parent: 8b565b62f5a48acbd751f70ecf58ba4e6e1f86ab

New changelog entries:
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10873.patch: fix in
      spice-common/python_modules/demarshal.py,
   - CVE-2018-10873

applied/ubuntu/cosmic-proposed 2018-09-10 14:48:22 UTC 2018-09-10
Import patches-applied version 0.14.0-1ubuntu4 to applied/ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-08-20 16:26:02 UTC

Import patches-applied version 0.14.0-1ubuntu4 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 346b8c7794861c7e082ff563c03f28e3bef8f649
Unapplied parent: 8b565b62f5a48acbd751f70ecf58ba4e6e1f86ab

New changelog entries:
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10873.patch: fix in
      spice-common/python_modules/demarshal.py,
   - CVE-2018-10873

ubuntu/cosmic 2018-09-10 14:48:22 UTC 2018-09-10
Import patches-unapplied version 0.14.0-1ubuntu4 to ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-08-20 16:26:02 UTC

Import patches-unapplied version 0.14.0-1ubuntu4 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: ac47c0dd81f8c1d3f068af7eae615c3c090d7787

New changelog entries:
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10873.patch: fix in
      spice-common/python_modules/demarshal.py,
   - CVE-2018-10873

ubuntu/cosmic-proposed 2018-09-10 14:48:22 UTC 2018-09-10
Import patches-unapplied version 0.14.0-1ubuntu4 to ubuntu/cosmic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-08-20 16:26:02 UTC

Import patches-unapplied version 0.14.0-1ubuntu4 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: ac47c0dd81f8c1d3f068af7eae615c3c090d7787

New changelog entries:
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10873.patch: fix in
      spice-common/python_modules/demarshal.py,
   - CVE-2018-10873

ubuntu/artful-devel 2018-05-23 19:49:32 UTC 2018-05-23
Import patches-unapplied version 0.12.8-2.2ubuntu0.1 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-05-22 16:46:36 UTC

Import patches-unapplied version 0.12.8-2.2ubuntu0.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 4b629d66bc0d867f2004cc87b83a04090bbddc48

New changelog entries:
  * SECURITY UPDATE: Integer overflow and buffer overflow
    - debian/patches/CVE-2017-12194-1.patch: fix a integer overflow
      computing sizes in spice-common/python_modules/demarshal.py.
    - debian/patches/CVE-2017-12194-2.patch: avoid integer overflow
      in spice-common/python_modules/demarshal.py,
      spice-common/python_modules/marshal.py.
    - debian/patches/CVE-2017-12194-3.patch: add tests to verify fix.
    - CVE-2017-12194

applied/ubuntu/artful-security 2018-05-23 19:49:32 UTC 2018-05-23
Import patches-applied version 0.12.8-2.2ubuntu0.1 to applied/ubuntu/artful-s...

Author: Leonidas S. Barbosa
Author Date: 2018-05-22 16:46:36 UTC

Import patches-applied version 0.12.8-2.2ubuntu0.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 14283ce54a1fd9471d8b9215ccc327318fd32acd
Unapplied parent: 818f0be86b3123079b349e8c6af38f9b646cc901

New changelog entries:
  * SECURITY UPDATE: Integer overflow and buffer overflow
    - debian/patches/CVE-2017-12194-1.patch: fix a integer overflow
      computing sizes in spice-common/python_modules/demarshal.py.
    - debian/patches/CVE-2017-12194-2.patch: avoid integer overflow
      in spice-common/python_modules/demarshal.py,
      spice-common/python_modules/marshal.py.
    - debian/patches/CVE-2017-12194-3.patch: add tests to verify fix.
    - CVE-2017-12194

applied/ubuntu/artful-devel 2018-05-23 19:49:32 UTC 2018-05-23
Import patches-applied version 0.12.8-2.2ubuntu0.1 to applied/ubuntu/artful-s...

Author: Leonidas S. Barbosa
Author Date: 2018-05-22 16:46:36 UTC

Import patches-applied version 0.12.8-2.2ubuntu0.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 14283ce54a1fd9471d8b9215ccc327318fd32acd
Unapplied parent: 818f0be86b3123079b349e8c6af38f9b646cc901

New changelog entries:
  * SECURITY UPDATE: Integer overflow and buffer overflow
    - debian/patches/CVE-2017-12194-1.patch: fix a integer overflow
      computing sizes in spice-common/python_modules/demarshal.py.
    - debian/patches/CVE-2017-12194-2.patch: avoid integer overflow
      in spice-common/python_modules/demarshal.py,
      spice-common/python_modules/marshal.py.
    - debian/patches/CVE-2017-12194-3.patch: add tests to verify fix.
    - CVE-2017-12194

ubuntu/artful-updates 2018-05-23 19:49:32 UTC 2018-05-23
Import patches-unapplied version 0.12.8-2.2ubuntu0.1 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-05-22 16:46:36 UTC

Import patches-unapplied version 0.12.8-2.2ubuntu0.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 4b629d66bc0d867f2004cc87b83a04090bbddc48

New changelog entries:
  * SECURITY UPDATE: Integer overflow and buffer overflow
    - debian/patches/CVE-2017-12194-1.patch: fix a integer overflow
      computing sizes in spice-common/python_modules/demarshal.py.
    - debian/patches/CVE-2017-12194-2.patch: avoid integer overflow
      in spice-common/python_modules/demarshal.py,
      spice-common/python_modules/marshal.py.
    - debian/patches/CVE-2017-12194-3.patch: add tests to verify fix.
    - CVE-2017-12194

ubuntu/artful-security 2018-05-23 19:49:32 UTC 2018-05-23
Import patches-unapplied version 0.12.8-2.2ubuntu0.1 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-05-22 16:46:36 UTC

Import patches-unapplied version 0.12.8-2.2ubuntu0.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 4b629d66bc0d867f2004cc87b83a04090bbddc48

New changelog entries:
  * SECURITY UPDATE: Integer overflow and buffer overflow
    - debian/patches/CVE-2017-12194-1.patch: fix a integer overflow
      computing sizes in spice-common/python_modules/demarshal.py.
    - debian/patches/CVE-2017-12194-2.patch: avoid integer overflow
      in spice-common/python_modules/demarshal.py,
      spice-common/python_modules/marshal.py.
    - debian/patches/CVE-2017-12194-3.patch: add tests to verify fix.
    - CVE-2017-12194

applied/ubuntu/artful-updates 2018-05-23 19:49:32 UTC 2018-05-23
Import patches-applied version 0.12.8-2.2ubuntu0.1 to applied/ubuntu/artful-s...

Author: Leonidas S. Barbosa
Author Date: 2018-05-22 16:46:36 UTC

Import patches-applied version 0.12.8-2.2ubuntu0.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 14283ce54a1fd9471d8b9215ccc327318fd32acd
Unapplied parent: 818f0be86b3123079b349e8c6af38f9b646cc901

New changelog entries:
  * SECURITY UPDATE: Integer overflow and buffer overflow
    - debian/patches/CVE-2017-12194-1.patch: fix a integer overflow
      computing sizes in spice-common/python_modules/demarshal.py.
    - debian/patches/CVE-2017-12194-2.patch: avoid integer overflow
      in spice-common/python_modules/demarshal.py,
      spice-common/python_modules/marshal.py.
    - debian/patches/CVE-2017-12194-3.patch: add tests to verify fix.
    - CVE-2017-12194

importer/ubuntu/pristine-tar 2018-03-06 19:07:36 UTC 2018-03-06
pristine-tar data for spice_0.14.0.orig.tar.bz2

Author: Ubuntu Git Importer
Author Date: 2018-03-06 19:07:36 UTC

pristine-tar data for spice_0.14.0.orig.tar.bz2

importer/debian/pristine-tar 2018-03-06 18:53:07 UTC 2018-03-06
pristine-tar data for spice_0.14.0.orig.tar.bz2

Author: Ubuntu Git Importer
Author Date: 2018-03-06 18:53:07 UTC

pristine-tar data for spice_0.14.0.orig.tar.bz2

ubuntu/bionic 2018-02-06 18:28:55 UTC 2018-02-06
Import patches-unapplied version 0.14.0-1ubuntu2 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-06 17:55:31 UTC

Import patches-unapplied version 0.14.0-1ubuntu2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 051a73ee2014ae0010f4756928c7855ebcfa6f4a

New changelog entries:
  * No change rebuild against openssl1.1.

ubuntu/bionic-proposed 2018-02-06 18:28:55 UTC 2018-02-06
Import patches-unapplied version 0.14.0-1ubuntu2 to ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-06 17:55:31 UTC

Import patches-unapplied version 0.14.0-1ubuntu2 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 051a73ee2014ae0010f4756928c7855ebcfa6f4a

New changelog entries:
  * No change rebuild against openssl1.1.

applied/ubuntu/bionic-proposed 2018-02-06 18:28:55 UTC 2018-02-06
Import patches-applied version 0.14.0-1ubuntu2 to applied/ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-06 17:55:31 UTC

Import patches-applied version 0.14.0-1ubuntu2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 018cf2c6b5c9ebbeeec2c19d0143894d542673c4
Unapplied parent: 4fa4c1609e668c65b95aeca94d4c24bd96e90171

New changelog entries:
  * No change rebuild against openssl1.1.

applied/ubuntu/bionic 2018-02-06 18:28:55 UTC 2018-02-06
Import patches-applied version 0.14.0-1ubuntu2 to applied/ubuntu/bionic-proposed

Author: Dimitri John Ledkov
Author Date: 2018-02-06 17:55:31 UTC

Import patches-applied version 0.14.0-1ubuntu2 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 018cf2c6b5c9ebbeeec2c19d0143894d542673c4
Unapplied parent: 4fa4c1609e668c65b95aeca94d4c24bd96e90171

New changelog entries:
  * No change rebuild against openssl1.1.

debian/jessie 2017-07-22 17:29:21 UTC 2017-07-22
Import patches-unapplied version 0.12.5-1+deb8u5 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2017-07-04 19:22:06 UTC

Import patches-unapplied version 0.12.5-1+deb8u5 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: f7d61e5b2b4b1eb3b684b015585e992d6e6cdf0d

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2017-7506: Possible buffer overflow via invalid monitor configurations

applied/debian/jessie 2017-07-22 17:29:21 UTC 2017-07-22
Import patches-applied version 0.12.5-1+deb8u5 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2017-07-04 19:22:06 UTC

Import patches-applied version 0.12.5-1+deb8u5 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: 6c43d687a3c3b7a0f20efabdaedf9b798d6e9ee2
Unapplied parent: 3a3793c94ca60227165f82d433df535723be24f7

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * CVE-2017-7506: Possible buffer overflow via invalid monitor configurations

ubuntu/artful-proposed 2017-07-22 04:38:49 UTC 2017-07-22
Import patches-unapplied version 0.12.8-2.2 to debian/sid

Author: Markus Koschany
Author Date: 2017-07-21 21:34:38 UTC

Import patches-unapplied version 0.12.8-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f73787f6acc1029870aceeec244cc22b08e01748

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2017-7506: (Closes: #868083)
    Possible buffer overflow via invalid monitor configurations.

ubuntu/artful 2017-07-22 04:38:49 UTC 2017-07-22
Import patches-unapplied version 0.12.8-2.2 to debian/sid

Author: Markus Koschany
Author Date: 2017-07-21 21:34:38 UTC

Import patches-unapplied version 0.12.8-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f73787f6acc1029870aceeec244cc22b08e01748

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2017-7506: (Closes: #868083)
    Possible buffer overflow via invalid monitor configurations.

applied/ubuntu/artful 2017-07-22 04:38:49 UTC 2017-07-22
Import patches-applied version 0.12.8-2.2 to applied/debian/sid

Author: Markus Koschany
Author Date: 2017-07-21 21:34:38 UTC

Import patches-applied version 0.12.8-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 14a77ad26dc4e9e5d74d3e4b0a708363a7fb6a3b
Unapplied parent: 2bc13ba1a1b4783e80263f47fb50dc0a96365b73

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2017-7506: (Closes: #868083)
    Possible buffer overflow via invalid monitor configurations.

applied/ubuntu/artful-proposed 2017-07-22 04:38:49 UTC 2017-07-22
Import patches-applied version 0.12.8-2.2 to applied/debian/sid

Author: Markus Koschany
Author Date: 2017-07-21 21:34:38 UTC

Import patches-applied version 0.12.8-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 14a77ad26dc4e9e5d74d3e4b0a708363a7fb6a3b
Unapplied parent: 2bc13ba1a1b4783e80263f47fb50dc0a96365b73

New changelog entries:
  * Non-maintainer upload.
  * Fix CVE-2017-7506: (Closes: #868083)
    Possible buffer overflow via invalid monitor configurations.

ubuntu/zesty-devel 2017-07-19 16:58:44 UTC 2017-07-19
Import patches-unapplied version 0.12.8-2ubuntu1.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-07-18 17:33:41 UTC

Import patches-unapplied version 0.12.8-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9b766cfdd4dffc01a4bc018cf3bc58d678f763ac

New changelog entries:
  * SECURITY UPDATE: buffer overflow via invalid monitor configurations
    - debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
      overly big ClientMonitorsConfig in server/reds.c.
    - debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
      handling monitor configuration in server/reds.c.
    - debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
      monitor configuration in server/reds.c.
    - CVE-2017-7506

applied/ubuntu/zesty-devel 2017-07-19 16:58:44 UTC 2017-07-19
Import patches-applied version 0.12.8-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Marc Deslauriers
Author Date: 2017-07-18 17:33:41 UTC

Import patches-applied version 0.12.8-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: f955694bfa6cc6c18a0aeb35b60bffcd2b5537f3
Unapplied parent: dae819c05f04f7772669e6cde2632aebbb7c4d96

New changelog entries:
  * SECURITY UPDATE: buffer overflow via invalid monitor configurations
    - debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
      overly big ClientMonitorsConfig in server/reds.c.
    - debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
      handling monitor configuration in server/reds.c.
    - debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
      monitor configuration in server/reds.c.
    - CVE-2017-7506

applied/ubuntu/zesty-security 2017-07-19 16:58:44 UTC 2017-07-19
Import patches-applied version 0.12.8-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Marc Deslauriers
Author Date: 2017-07-18 17:33:41 UTC

Import patches-applied version 0.12.8-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: f955694bfa6cc6c18a0aeb35b60bffcd2b5537f3
Unapplied parent: dae819c05f04f7772669e6cde2632aebbb7c4d96

New changelog entries:
  * SECURITY UPDATE: buffer overflow via invalid monitor configurations
    - debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
      overly big ClientMonitorsConfig in server/reds.c.
    - debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
      handling monitor configuration in server/reds.c.
    - debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
      monitor configuration in server/reds.c.
    - CVE-2017-7506

applied/ubuntu/zesty-updates 2017-07-19 16:58:44 UTC 2017-07-19
Import patches-applied version 0.12.8-2ubuntu1.1 to applied/ubuntu/zesty-secu...

Author: Marc Deslauriers
Author Date: 2017-07-18 17:33:41 UTC

Import patches-applied version 0.12.8-2ubuntu1.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: f955694bfa6cc6c18a0aeb35b60bffcd2b5537f3
Unapplied parent: dae819c05f04f7772669e6cde2632aebbb7c4d96

New changelog entries:
  * SECURITY UPDATE: buffer overflow via invalid monitor configurations
    - debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
      overly big ClientMonitorsConfig in server/reds.c.
    - debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
      handling monitor configuration in server/reds.c.
    - debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
      monitor configuration in server/reds.c.
    - CVE-2017-7506

ubuntu/zesty-updates 2017-07-19 16:58:44 UTC 2017-07-19
Import patches-unapplied version 0.12.8-2ubuntu1.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-07-18 17:33:41 UTC

Import patches-unapplied version 0.12.8-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9b766cfdd4dffc01a4bc018cf3bc58d678f763ac

New changelog entries:
  * SECURITY UPDATE: buffer overflow via invalid monitor configurations
    - debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
      overly big ClientMonitorsConfig in server/reds.c.
    - debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
      handling monitor configuration in server/reds.c.
    - debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
      monitor configuration in server/reds.c.
    - CVE-2017-7506

ubuntu/zesty-security 2017-07-19 16:58:44 UTC 2017-07-19
Import patches-unapplied version 0.12.8-2ubuntu1.1 to ubuntu/zesty-security

Author: Marc Deslauriers
Author Date: 2017-07-18 17:33:41 UTC

Import patches-unapplied version 0.12.8-2ubuntu1.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 9b766cfdd4dffc01a4bc018cf3bc58d678f763ac

New changelog entries:
  * SECURITY UPDATE: buffer overflow via invalid monitor configurations
    - debian/patches/CVE-2017-7506-1.patch: disconnect when receiving
      overly big ClientMonitorsConfig in server/reds.c.
    - debian/patches/CVE-2017-7506-2.patch: avoid integer overflows
      handling monitor configuration in server/reds.c.
    - debian/patches/CVE-2017-7506-3.patch: avoid buffer overflows handling
      monitor configuration in server/reds.c.
    - CVE-2017-7506

applied/ubuntu/yakkety-security 2017-02-20 17:53:23 UTC 2017-02-20
Import patches-applied version 0.12.8-1ubuntu0.1 to applied/ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-02-15 19:01:44 UTC

Import patches-applied version 0.12.8-1ubuntu0.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 04d93315008c9af39127787c6a41a59300eb11d8
Unapplied parent: 96fcbf3358a9ae24145b9b93932a04cea03d67e6

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

applied/ubuntu/yakkety-updates 2017-02-20 17:53:23 UTC 2017-02-20
Import patches-applied version 0.12.8-1ubuntu0.1 to applied/ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-02-15 19:01:44 UTC

Import patches-applied version 0.12.8-1ubuntu0.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 04d93315008c9af39127787c6a41a59300eb11d8
Unapplied parent: 96fcbf3358a9ae24145b9b93932a04cea03d67e6

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

applied/ubuntu/yakkety-devel 2017-02-20 17:53:23 UTC 2017-02-20
Import patches-applied version 0.12.8-1ubuntu0.1 to applied/ubuntu/yakkety-se...

Author: Marc Deslauriers
Author Date: 2017-02-15 19:01:44 UTC

Import patches-applied version 0.12.8-1ubuntu0.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 04d93315008c9af39127787c6a41a59300eb11d8
Unapplied parent: 96fcbf3358a9ae24145b9b93932a04cea03d67e6

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

ubuntu/yakkety-security 2017-02-20 17:53:23 UTC 2017-02-20
Import patches-unapplied version 0.12.8-1ubuntu0.1 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-02-15 19:01:44 UTC

Import patches-unapplied version 0.12.8-1ubuntu0.1 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3e2a3a4314136b8701a64b4fc90cd0ccf196e65f

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

ubuntu/yakkety-devel 2017-02-20 17:53:23 UTC 2017-02-20
Import patches-unapplied version 0.12.8-1ubuntu0.1 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-02-15 19:01:44 UTC

Import patches-unapplied version 0.12.8-1ubuntu0.1 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3e2a3a4314136b8701a64b4fc90cd0ccf196e65f

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

ubuntu/yakkety-updates 2017-02-20 17:53:23 UTC 2017-02-20
Import patches-unapplied version 0.12.8-1ubuntu0.1 to ubuntu/yakkety-security

Author: Marc Deslauriers
Author Date: 2017-02-15 19:01:44 UTC

Import patches-unapplied version 0.12.8-1ubuntu0.1 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3e2a3a4314136b8701a64b4fc90cd0ccf196e65f

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

ubuntu/zesty-proposed 2017-02-15 19:58:42 UTC 2017-02-15
Import patches-unapplied version 0.12.8-2ubuntu1 to ubuntu/zesty-proposed

Author: Marc Deslauriers
Author Date: 2017-02-15 18:58:19 UTC

Import patches-unapplied version 0.12.8-2ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 1362f89bbb02065578430eba5fe0b18b33c2db0f

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

applied/ubuntu/zesty 2017-02-15 19:58:42 UTC 2017-02-15
Import patches-applied version 0.12.8-2ubuntu1 to applied/ubuntu/zesty-proposed

Author: Marc Deslauriers
Author Date: 2017-02-15 18:58:19 UTC

Import patches-applied version 0.12.8-2ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 1c308d447f0f410602b59b98286aff26c37490fb
Unapplied parent: c1067ec3e88f0a89105e0e54f8ead0463d0025e9

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

applied/ubuntu/zesty-proposed 2017-02-15 19:58:42 UTC 2017-02-15
Import patches-applied version 0.12.8-2ubuntu1 to applied/ubuntu/zesty-proposed

Author: Marc Deslauriers
Author Date: 2017-02-15 18:58:19 UTC

Import patches-applied version 0.12.8-2ubuntu1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 1c308d447f0f410602b59b98286aff26c37490fb
Unapplied parent: c1067ec3e88f0a89105e0e54f8ead0463d0025e9

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

ubuntu/zesty 2017-02-15 19:58:42 UTC 2017-02-15
Import patches-unapplied version 0.12.8-2ubuntu1 to ubuntu/zesty-proposed

Author: Marc Deslauriers
Author Date: 2017-02-15 18:58:19 UTC

Import patches-unapplied version 0.12.8-2ubuntu1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 1362f89bbb02065578430eba5fe0b18b33c2db0f

New changelog entries:
  * SECURITY UPDATE: overflow when reading large messages
    - debian/patches/CVE-2016-9577.patch: check size in
      server/main_channel.c.
    - CVE-2016-9577
  * SECURITY UPDATE: DoS via crafted message
    - debian/patches/CVE-2016-9578-1.patch: limit size in server/reds.c.
    - debian/patches/CVE-2016-9578-2.patch: limit caps in server/reds.c.
    - CVE-2016-9578

applied/ubuntu/yakkety-proposed 2016-07-26 16:19:07 UTC 2016-07-26
Import patches-applied version 0.12.8-1 to applied/debian/sid

Author: Liang Guo
Author Date: 2016-07-26 03:06:19 UTC

Import patches-applied version 0.12.8-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 34df78072d0fbaca51e376ebde45b4479045f536
Unapplied parent: 8008965cb34a79bc1daf7ba58c893f0a8dc79e4b

New changelog entries:
  * New upstream release
  * Remove debian/patches/{CVE-2016-0749,CVE-2016-2150}, applied
    Upstream

applied/ubuntu/yakkety 2016-07-26 16:19:07 UTC 2016-07-26
Import patches-applied version 0.12.8-1 to applied/debian/sid

Author: Liang Guo
Author Date: 2016-07-26 03:06:19 UTC

Import patches-applied version 0.12.8-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 34df78072d0fbaca51e376ebde45b4479045f536
Unapplied parent: 8008965cb34a79bc1daf7ba58c893f0a8dc79e4b

New changelog entries:
  * New upstream release
  * Remove debian/patches/{CVE-2016-0749,CVE-2016-2150}, applied
    Upstream

ubuntu/yakkety 2016-07-26 16:19:07 UTC 2016-07-26
Import patches-unapplied version 0.12.8-1 to debian/sid

Author: Liang Guo
Author Date: 2016-07-26 03:06:19 UTC

Import patches-unapplied version 0.12.8-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 7f3a70b54a215d84b2550682fecf374c125e579f

New changelog entries:
  * New upstream release
  * Remove debian/patches/{CVE-2016-0749,CVE-2016-2150}, applied
    Upstream

ubuntu/yakkety-proposed 2016-07-26 16:19:07 UTC 2016-07-26
Import patches-unapplied version 0.12.8-1 to debian/sid

Author: Liang Guo
Author Date: 2016-07-26 03:06:19 UTC

Import patches-unapplied version 0.12.8-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 7f3a70b54a215d84b2550682fecf374c125e579f

New changelog entries:
  * New upstream release
  * Remove debian/patches/{CVE-2016-0749,CVE-2016-2150}, applied
    Upstream

ubuntu/wily-security 2016-06-21 12:29:05 UTC 2016-06-21
Import patches-unapplied version 0.12.5-1.1ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-06-10 14:54:26 UTC

Import patches-unapplied version 0.12.5-1.1ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 84ec1b2d465e51e1ed206074ae92d7fa83231340

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150
  * Added two extra commits to previous security update:
    - 0001-worker-validate-correctly-surfaces.patch
    - 0002-worker-avoid-double-free-or-double-create-of-surface.patch

applied/ubuntu/wily-updates 2016-06-21 12:29:05 UTC 2016-06-21
Import patches-applied version 0.12.5-1.1ubuntu2.1 to applied/ubuntu/wily-sec...

Author: Marc Deslauriers
Author Date: 2016-06-10 14:54:26 UTC

Import patches-applied version 0.12.5-1.1ubuntu2.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 0682bd77f3e60bf3b61a0a0793c31c8cb32eada4
Unapplied parent: e0cc44dab9b62706bfeeffc77bbf4c82661dc3d9

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150
  * Added two extra commits to previous security update:
    - 0001-worker-validate-correctly-surfaces.patch
    - 0002-worker-avoid-double-free-or-double-create-of-surface.patch

applied/ubuntu/wily-security 2016-06-21 12:29:05 UTC 2016-06-21
Import patches-applied version 0.12.5-1.1ubuntu2.1 to applied/ubuntu/wily-sec...

Author: Marc Deslauriers
Author Date: 2016-06-10 14:54:26 UTC

Import patches-applied version 0.12.5-1.1ubuntu2.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 0682bd77f3e60bf3b61a0a0793c31c8cb32eada4
Unapplied parent: e0cc44dab9b62706bfeeffc77bbf4c82661dc3d9

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150
  * Added two extra commits to previous security update:
    - 0001-worker-validate-correctly-surfaces.patch
    - 0002-worker-avoid-double-free-or-double-create-of-surface.patch

applied/ubuntu/wily-devel 2016-06-21 12:29:05 UTC 2016-06-21
Import patches-applied version 0.12.5-1.1ubuntu2.1 to applied/ubuntu/wily-sec...

Author: Marc Deslauriers
Author Date: 2016-06-10 14:54:26 UTC

Import patches-applied version 0.12.5-1.1ubuntu2.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 0682bd77f3e60bf3b61a0a0793c31c8cb32eada4
Unapplied parent: e0cc44dab9b62706bfeeffc77bbf4c82661dc3d9

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150
  * Added two extra commits to previous security update:
    - 0001-worker-validate-correctly-surfaces.patch
    - 0002-worker-avoid-double-free-or-double-create-of-surface.patch

ubuntu/wily-updates 2016-06-21 12:29:05 UTC 2016-06-21
Import patches-unapplied version 0.12.5-1.1ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-06-10 14:54:26 UTC

Import patches-unapplied version 0.12.5-1.1ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 84ec1b2d465e51e1ed206074ae92d7fa83231340

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150
  * Added two extra commits to previous security update:
    - 0001-worker-validate-correctly-surfaces.patch
    - 0002-worker-avoid-double-free-or-double-create-of-surface.patch

ubuntu/wily-devel 2016-06-21 12:29:05 UTC 2016-06-21
Import patches-unapplied version 0.12.5-1.1ubuntu2.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-06-10 14:54:26 UTC

Import patches-unapplied version 0.12.5-1.1ubuntu2.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 84ec1b2d465e51e1ed206074ae92d7fa83231340

New changelog entries:
  * SECURITY UPDATE: denial of service and possible code execution via
    memory allocation flaw in smartcard interaction
    - debian/patches/CVE-2016-0749/*.patch: add a ref to item and allocate
      msg with the expected size in server/smartcard.c.
    - CVE-2016-0749
  * SECURITY UPDATE: host memory access from guest with invalid primary
    surface parameters
    - debian/patches/CVE-2016-2150/*.patch: create a function to validate
      surface parameters in server/red_parse_qxl.*, improve primary surface
      parameter checks in server/red_worker.c.
    - CVE-2016-2150
  * Added two extra commits to previous security update:
    - 0001-worker-validate-correctly-surfaces.patch
    - 0002-worker-avoid-double-free-or-double-create-of-surface.patch

applied/debian/wheezy 2016-04-02 23:43:18 UTC 2016-04-02
Import patches-applied version 0.11.0-1+deb7u2 to applied/debian/wheezy

Author: Salvatore Bonaccorso
Author Date: 2015-10-08 15:41:09 UTC

Import patches-applied version 0.11.0-1+deb7u2 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: deeac6f2f97aff89ce1b507bc327345b33019eab
Unapplied parent: 56fbc742f869b2dbaa24c7349a8b578dd813699c

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add series of patches for CVE-2015-5260 and CVE-2015-6261.
    CVE-2015-5260: insufficient validation of surface_id parameter can cause
    crash. (Closes: #801089)
    CVE-2015-5261: host memory access from guest using crafted images.
    (Closes: #801091)

debian/wheezy 2016-04-02 23:43:18 UTC 2016-04-02
Import patches-unapplied version 0.11.0-1+deb7u2 to debian/wheezy

Author: Salvatore Bonaccorso
Author Date: 2015-10-08 15:41:09 UTC

Import patches-unapplied version 0.11.0-1+deb7u2 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: d824da3d3c04b843c956ec36130c65b85ab1f1d3

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add series of patches for CVE-2015-5260 and CVE-2015-6261.
    CVE-2015-5260: insufficient validation of surface_id parameter can cause
    crash. (Closes: #801089)
    CVE-2015-5261: host memory access from guest using crafted images.
    (Closes: #801091)

1100 of 160 results

Other repositories

Name Last Modified
lp:ubuntu/+source/spice 2019-10-18
lp:~paelzer/ubuntu/+source/spice 2019-06-26
12 of 2 results
You can't create new repositories for spice in Ubuntu.