Change log for qemu-kvm package in Ubuntu
| 1 → 75 of 245 results | First • Previous • Next • Last |
qemu-kvm (1.0+noroms-0ubuntu14.31) precise-security; urgency=medium
* SECURITY UPDATE: DoS via unbounded memory allocation
- debian/patches/CVE-2016-5403.patch: re-enable original patch.
- debian/patches/CVE-2016-5403-2.patch: recalculate vq->inuse after
migration in hw/virtio.c.
- debian/patches/CVE-2016-5403-3.patch: decrement vq->inuse in
virtqueue_discard() in hw/virtio.c.
- debian/patches/CVE-2016-5403-4.patch: zero vq->inuse in
virtio_reset() in hw/virtio.c.
- CVE-2016-5403
* SECURITY UPDATE: directory traversal flaw in 9p virtio backend
- debian/patches/CVE-2016-7116-1.patch: forbid illegal path names in
hw/9pfs/virtio-9p.c.
- debian/patches/CVE-2016-7116-2.patch: forbid . and .. in file names
in hw/9pfs/virtio-9p.c.
- debian/patches/CVE-2016-7116-3.patch: handle walk of ".." in the root
directory in hw/9pfs/virtio-9p.*.
- debian/patches/CVE-2016-7116-4.patch: fix potential segfault during
walk in hw/9pfs/virtio-9p.c.
- CVE-2016-7116
* SECURITY UPDATE: buffer overflow in xlnx.xps-ethernetlite
- debian/patches/CVE-2016-7161.patch: fix a heap overflow in
hw/xilinx_ethlite.c.
- CVE-2016-7161
* SECURITY UPDATE: OOB stack memory access in vmware_vga
- debian/patches/CVE-2016-7170.patch: correct bitmap and pixmap size
checks in hw/vmware_vga.c.
- CVE-2016-7170
* SECURITY UPDATE: denial of service in mcf via invalid count
- debian/patches/CVE-2016-7908.patch: limit buffer descriptor count in
hw/mcf_fec.c.
- CVE-2016-7908
* SECURITY UPDATE: denial of service in pcnet via invalid length
- debian/patches/CVE-2016-7909.patch: check rx/tx descriptor ring
length in hw/pcnet.c.
- CVE-2016-7909
* SECURITY UPDATE: infinite loop in Intel HDA controller
- debian/patches/CVE-2016-8909.patch: check stream entry count during
transfer in hw/intel-hda.c.
- CVE-2016-8909
* SECURITY UPDATE: infinite loop in RTL8139 ethernet controller
- debian/patches/CVE-2016-8910.patch: limit processing of ring
descriptors in hw/rtl8139.c.
- CVE-2016-8910
* SECURITY UPDATE: memory leakage at device unplug in eepro100
- debian/patches/CVE-2016-9101.patch: fix memory leak in device uninit
in hw/eepro100.c.
- CVE-2016-9101
* SECURITY UPDATE: denial of service via memory leak in 9pfs
- debian/patches/CVE-2016-9102.patch: fix memory leak in
v9fs_xattrcreate in hw/9pfs/virtio-9p.c.
- CVE-2016-9102
* SECURITY UPDATE: information leakage via xattribute in 9pfs
- debian/patches/CVE-2016-9103.patch: fix information leak in xattr
read in hw/9pfs/virtio-9p.c.
- CVE-2016-9103
* SECURITY UPDATE: integer overflow leading to OOB access in 9pfs
- debian/patches/CVE-2016-9104.patch: fix integer overflow issue in
xattr read/write in hw/9pfs/virtio-9p.c.
- CVE-2016-9104
* SECURITY UPDATE: denial of service via memory leakage in 9pfs
- debian/patches/CVE-2016-9105.patch: fix memory leak in v9fs_link in
hw/9pfs/virtio-9p.c.
- CVE-2016-9105
-- Marc Deslauriers <email address hidden> Tue, 08 Nov 2016 08:16:37 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.30) precise-security; urgency=medium
* SECURITY REGRESSION: crash on migration with memory stats enabled
(LP: #1612089)
- debian/patches/CVE-2016-5403.patch: disable for now pending
investigation.
-- Marc Deslauriers <email address hidden> Fri, 12 Aug 2016 08:49:38 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.29) precise-security; urgency=medium
* SECURITY UPDATE: infinite loop in vmware_vga
- debian/patches/CVE-2016-4453.patch: limit fifo commands in
hw/vmware_vga.c.
- CVE-2016-4453
* SECURITY UPDATE: DoS or host memory leakage in vmware_vga
- debian/patches/CVE-2016-4454.patch: fix sanity checks in
hw/vmware_vga.c.
- CVE-2016-4454
* SECURITY UPDATE: DoS via unbounded memory allocation
- debian/patches/CVE-2016-5403.patch: check size in hw/virtio.c.
- CVE-2016-5403
-- Marc Deslauriers <email address hidden> Thu, 04 Aug 2016 07:50:42 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.28) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via multiple eof_timers in ohci
- debian/patches/CVE-2016-2391.patch: allocate timer only once in
hw/usb-ohci.c.
- CVE-2016-2391
* SECURITY UPDATE: denial of service in in remote NDIS control message
handling
- debian/patches/CVE-2016-2392.patch: check USB configuration
descriptor object in hw/usb-net.c.
- CVE-2016-2392
* SECURITY UPDATE: denial of service or host information leak in USB Net
device emulation support
- debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
length in hw/usb-net.c.
- CVE-2016-2538
* SECURITY UPDATE: denial of service via infinite loop in ne2000
- debian/patches/CVE-2016-2841.patch: heck ring buffer control
registers in hw/ne2000.c.
- CVE-2016-2841
* SECURITY UPDATE: denial of service via payload length in crafted packet
- debian/patches/CVE-2016-2857.patch: check packet payload length in
net/checksum.c.
- CVE-2016-2857
* SECURITY UPDATE: arbitrary host code execution via VGA module
- debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
in hw/vga.c.
- CVE-2016-3710
* SECURITY UPDATE: denial of service via VGA module
- debian/patches/CVE-2016-3712.patch: make sure vga register setup for
vbe stays intact in hw/vga.c.
- CVE-2016-3712
* SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
- debian/patches/CVE-2016-4001.patch: check packet length against
receive buffer in hw/stellaris_enet.c.
- CVE-2016-4001
* SECURITY UPDATE: denial of sevice and possible code execution in
MIPSnet
- debian/patches/CVE-2016-4002.patch: check size in hw/mipsnet.c.
- CVE-2016-4002
* SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
- debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
descriptors in hw/usb-ehci.c.
- CVE-2016-4037
-- Marc Deslauriers <email address hidden> Wed, 11 May 2016 08:24:36 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.27) precise-security; urgency=medium
* SECURITY UPDATE: vnc floating point exception
- debian/patches/CVE-2015-8504.patch: handle zero values in ui/vnc.c.
- CVE-2015-8504
* SECURITY UPDATE: paravirtualized drivers incautious about shared memory
contents
- debian/patches/CVE-2015-8550-1.patch: avoid double access in
hw/xen_blkif.h.
- debian/patches/CVE-2015-8550-2.patch: avoid reading twice in
hw/xenfb.c.
- CVE-2015-8550
* SECURITY UPDATE: infinite loop in ehci_advance_state
- debian/patches/CVE-2015-8558.patch: make idt processing more robust
in hw/usb-ehci.c.
- CVE-2015-8558
* SECURITY UPDATE: ne2000 OOB r/w in ioport operations
- debian/patches/CVE-2015-8743.patch: fix bounds check in ioport
operations in hw/ne2000.c.
- CVE-2015-8743
* SECURITY UPDATE: ahci use-after-free vulnerability in aio port commands
- debian/patches/CVE-2016-1568.patch: reset ncq object to unused on
error in hw/ide/ahci.c.
- CVE-2016-1568
* SECURITY UPDATE: firmware configuration device OOB rw access
- debian/patches/CVE-2016-1714.patch: avoid calculating invalid current
entry pointer in hw/fw_cfg.c.
- CVE-2016-1714
* SECURITY UPDATE: e1000 infinite loop
- debian/patches/CVE-2016-1981.patch: eliminate infinite loops on
out-of-bounds transfer start in hw/e1000.c.
- CVE-2016-1981
-- Marc Deslauriers <email address hidden> Tue, 02 Feb 2016 08:33:07 -0500
qemu-kvm (1.0+noroms-0ubuntu14.26) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via jumbo frame flood in virtio
- debian/patches/CVE-2015-7295.patch: drop truncated packets in
hw/virtio-net.c, hw/virtio.c, hw/virtio.h.
- CVE-2015-7295
* SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
- debian/patches/CVE-2015-7504.patch: leave room for CRC code in
hw/pcnet.c.
- CVE-2015-7504
* SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
- debian/patches/CVE-2015-7512.patch: check packet length in
hw/pcnet.c.
- CVE-2015-7512
* SECURITY UPDATE: infinite loop in eepro100
- debian/patches/CVE-2015-8345.patch: prevent endless loop in
hw/eepro100.c.
- CVE-2015-8345
-- Marc Deslauriers <email address hidden> Tue, 01 Dec 2015 16:30:23 -0500
qemu-kvm (1.0+noroms-0ubuntu14.25) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via vnc infinite loop
- debian/patches/CVE-2015-5239.patch: limit client_cut_text msg payload
size in ui/vnc.c.
- CVE-2015-5239
* SECURITY UPDATE: denial of service via NE2000 driver
- debian/patches/CVE-2015-5278.patch: fix infinite loop in
hw/ne2000.c.
- CVE-2015-5278
* SECURITY UPDATE: denial of service and possible code execution via
heap overflow in NE2000 driver
- debian/patches/CVE-2015-5279.patch: validate ring buffer pointers in
hw/ne2000.c.
- CVE-2015-5279
* SECURITY UPDATE: denial of service via e1000 infinite loop
- debian/patches/CVE-2015-6815.patch: check bytes in hw/e1000.c.
- CVE-2015-6815
* SECURITY UPDATE: denial of service via illegal ATAPI commands
- debian/patches/CVE-2015-6855.patch: fix ATAPI command permissions in
hw/ide/core.c.
- CVE-2015-6855
-- Marc Deslauriers <email address hidden> Wed, 23 Sep 2015 15:28:32 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.24) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via PRDT with zero complete sectors
- debian/patches/CVE-2014-9718.patch: refactor return codes in
hw/ide/ahci.c, hw/ide/core.c, hw/ide/internal.h, hw/ide/pci.c.
- CVE-2014-9718
* SECURITY UPDATE: process heap memory disclosure
- debian/patches/CVE-2015-5165.patch: check sizes in hw/rtl8139.c.
- CVE-2015-5165
-- Marc Deslauriers <email address hidden> Tue, 25 Aug 2015 08:58:16 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.23) precise-security; urgency=medium
* SECURITY UPDATE: heap overflow in PCNET controller
- debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
in hw/pcnet.c.
- debian/patches/CVE-2015-3209.patch: check bounds in hw/pcnet.c.
- CVE-2015-3209
* SECURITY UPDATE: unsafe /tmp filename use by slirp
- debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
- CVE-2015-4037
-- Marc Deslauriers <email address hidden> Tue, 09 Jun 2015 10:21:44 -0400
qemu-kvm (1.0+noroms-0ubuntu14.22) precise-security; urgency=medium
* SECURITY UPDATE: host code execution via floppy device (VEMON)
- debian/patches/CVE-2015-3456.patch: force the fifo access to be in
bounds of the allocated buffer in hw/block/fdc.c.
- CVE-2015-3456
-- Marc Deslauriers <email address hidden> Wed, 13 May 2015 08:19:08 -0400
qemu-kvm (1.0+noroms-0ubuntu14.21) precise-security; urgency=medium
* SECURITY UPDATE: code execution via savevm data
- debian/patches/CVE-2014-7840.patch: validate parameters in
arch_init.c.
- CVE-2014-7840
* SECURITY UPDATE: code execution via cirrus vga blit regions
(LP: #1400775)
- debian/patches/CVE-2014-8106.patch: properly validate blit regions in
hw/cirrus_vga.c.
- CVE-2014-8106
-- Marc Deslauriers <email address hidden> Wed, 10 Dec 2014 16:11:32 -0500
Available diffs
qemu-kvm (0.12.3+noroms-0ubuntu9.26) lucid-security; urgency=medium
* SECURITY UPDATE: code execution via cirrus vga blit regions
(LP: #1400775)
- debian/patches/CVE-2014-8106.patch: properly validate blit regions in
hw/cirrus_vga.c.
- CVE-2014-8106
-- Marc Deslauriers <email address hidden> Wed, 10 Dec 2014 16:18:02 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.20) precise-proposed; urgency=medium * Fix segfault on qemu-img convert with nonexistent source file (LP: #1388036) -- Serge Hallyn <email address hidden> Thu, 20 Nov 2014 10:11:21 -0600
Available diffs
qemu-kvm (0.12.3+noroms-0ubuntu9.25) lucid-security; urgency=medium
* SECURITY UPDATE: denial of service via slirp NULL pointer deref
- debian/patches/CVE-2014-3640.patch: make sure socket is not just a
stub in slirp/udp.c.
- CVE-2014-3640
* SECURITY UPDATE: possible privilege escalation via vmware-vga driver
- debian/patches/CVE-2014-3689.patch: verify rectangles in
hw/vmware_vga.c.
- CVE-2014-3689
* SECURITY UPDATE: denial of service via VNC console
- debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in vnc.c.
- CVE-2014-7815
-- Marc Deslauriers <email address hidden> Tue, 11 Nov 2014 15:40:19 -0500
qemu-kvm (1.0+noroms-0ubuntu14.19) precise-security; urgency=medium
* SECURITY UPDATE: denial of service via slirp NULL pointer deref
- debian/patches/CVE-2014-3640.patch: make sure socket is not just a
stub in slirp/udp.c.
- CVE-2014-3640
* SECURITY UPDATE: possible privilege escalation via vmware-vga driver
- debian/patches/CVE-2014-3689.patch: verify rectangles in
hw/vmware_vga.c.
- CVE-2014-3689
* SECURITY UPDATE: denial of service via VNC console
- debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in
ui/vnc.c.
- CVE-2014-7815
-- Marc Deslauriers <email address hidden> Tue, 11 Nov 2014 15:28:11 -0500
qemu-kvm (1.0+noroms-0ubuntu14.18) precise-proposed; urgency=medium
* debian/patches/define-qemu-kvm-mt: define a new (default) machine
type "pc-1.0-precise" which allows incoming migration in newer qemu to
distinguish qemu-kvm-created machines from qemu-created machines.
(LP: #1374612)
-- Serge Hallyn <email address hidden> Mon, 22 Sep 2014 13:39:03 -0500
Available diffs
| Superseded in lucid-updates |
| Superseded in lucid-security |
| Deleted in lucid-proposed (Reason: moved to -updates) |
qemu-kvm (0.12.3+noroms-0ubuntu9.24) lucid-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0142.patch: validate extent_size header field
in block/bochs.c, validate s->tracks in block/parallels.c, validate
block size in block/vpc.c, backport function to qemu-common.h,
backport DIV_ROUND_UP to osdep.h.
- CVE-2014-0142
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0143.patch: validate nb_sectors in
block.c, validate catalog_size header field in block/bochs.c,
prevent offsets_size integer overflow in block/cloop.c, fix catalog
size integer overflow in block/parallels.c, validate new_l1_size in
block/qcow2-cluster.c, use proper size in block/qcow2-refcount.c,
check L1 snapshot table size in block/qcow2-snapshot.c, check active
L1 table size in block/qcow2.c, define max size in block/qcow2.h.
- CVE-2014-0143
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0144.patch: validate block sizes and offsets
in block/cloop.c, check offset in block/curl.c, validate size in
block/qcow2-refcount.c, check number of snapshots in
block/qcow2-snapshot.c, check sizes and offsets in block/qcow2.c,
move structs to block/qcow2.h, check sizes in block/vdi.c,
prevent overflows in block/vpc.c.
- CVE-2014-0144
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0145.patch: check chunk sizes in block/dmg.c,
use correct size in block/qcow2-snapshot.c.
- CVE-2014-0145
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0146.patch: calculate offsets properly in
block/qcow2.c.
- CVE-2014-0146
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0147.patch: use proper sizes in block/bochs.c.
- CVE-2014-0147
* SECURITY UPDATE: multiple buffer overflows on invalid state load
- debian/patches: added large number of upstream patches pulled from
git tree.
- CVE-2013-4148
- CVE-2013-4151
- CVE-2013-4530
- CVE-2013-4531
- CVE-2013-4533
- CVE-2013-4534
- CVE-2013-4537
- CVE-2013-4538
- CVE-2013-4539
- CVE-2013-4540
- CVE-2013-6399
- CVE-2014-0182
- CVE-2014-0222
- CVE-2014-0223
-- Marc Deslauriers <email address hidden> Tue, 12 Aug 2014 14:35:45 -0400
| Superseded in precise-updates |
| Superseded in precise-security |
| Deleted in precise-proposed (Reason: moved to -updates) |
qemu-kvm (1.0+noroms-0ubuntu14.17) precise-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0142.patch: validate extent_size header field
in block/bochs.c, validate s->tracks in block/parallels.c, validate
block size in block/vpc.c, backport function to qemu-common.h.
- CVE-2014-0142
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0143.patch: validate nb_sectors in
block.c, validate catalog_size header field in block/bochs.c,
prevent offsets_size integer overflow in block/cloop.c, fix catalog
size integer overflow in block/parallels.c, validate new_l1_size in
block/qcow2-cluster.c, use proper size in block/qcow2-refcount.c,
check L1 snapshot table size in block/qcow2-snapshot.c, check active
L1 table size in block/qcow2.c, define max size in block/qcow2.h.
- CVE-2014-0143
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0144.patch: validate block sizes and offsets
in block/cloop.c, check offset in block/curl.c, validate size in
block/qcow2-refcount.c, check number of snapshots in
block/qcow2-snapshot.c, check sizes and offsets in block/qcow2.c,
move structs to block/qcow2.h, check sizes in block/vdi.c,
prevent overflows in block/vpc.c.
- CVE-2014-0144
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0145.patch: check chunk sizes in block/dmg.c,
use correct size in block/qcow2-snapshot.c.
- CVE-2014-0145
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0146.patch: calculate offsets properly in
block/qcow2.c.
- CVE-2014-0146
* SECURITY UPDATE: denial of service and possible code exection via
incorrect image format validation (LP: #1322204)
- debian/patches/CVE-2014-0147.patch: use proper sizes in block/bochs.c,
properly calculate refcounts in block/qcow2-refcount.c, block/qcow2.c.
- CVE-2014-0147
* SECURITY UPDATE: multiple buffer overflows on invalid state load
- debian/patches: added large number of upstream patches pulled from
git tree.
- CVE-2013-4148
- CVE-2013-4151
- CVE-2013-4527
- CVE-2013-4529
- CVE-2013-4530
- CVE-2013-4531
- CVE-2013-4532
- CVE-2013-4533
- CVE-2013-4534
- CVE-2013-4535
- CVE-2013-4536
- CVE-2013-4537
- CVE-2013-4538
- CVE-2013-4539
- CVE-2013-4540
- CVE-2013-4541
- CVE-2013-6399
- CVE-2014-0182
- CVE-2014-0222
- CVE-2014-0223
- CVE-2014-3461
-- Marc Deslauriers <email address hidden> Tue, 12 Aug 2014 13:30:27 -0400
qemu-kvm (1.0+noroms-0ubuntu14.15) precise-proposed; urgency=low * qemu-kvm.upstart: ignore modprobe errors (LP: #1316812) -- Serge Hallyn <email address hidden> Wed, 07 May 2014 14:06:43 +0000
Available diffs
qemu-kvm (0.12.3+noroms-0ubuntu9.22) lucid-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via MAC address table update
- debian/patches/CVE-2014-0150.patch: fix overflow in hw/virtio-net.c.
- CVE-2014-0150
* SECURITY UPDATE: denial of service and possible code execution via
smart self test counter
- debian/patches/CVE-2014-2894.patch: correct self-test count in
hw/ide/core.c.
- CVE-2014-2894
-- Marc Deslauriers <email address hidden> Fri, 25 Apr 2014 17:41:36 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.14) precise-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via MAC address table update
- debian/patches/CVE-2014-0150.patch: fix overflow in hw/virtio-net.c.
- CVE-2014-0150
* SECURITY UPDATE: denial of service and possible code execution via
smart self test counter
- debian/patches/CVE-2014-2894.patch: correct self-test count in
hw/ide/core.c.
- CVE-2014-2894
-- Marc Deslauriers <email address hidden> Fri, 25 Apr 2014 17:37:13 -0400
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.7) quantal-security; urgency=medium
* SECURITY UPDATE: arbitrary code execution via MAC address table update
- debian/patches/CVE-2014-0150.patch: fix overflow in hw/virtio-net.c.
- CVE-2014-0150
* SECURITY UPDATE: denial of service and possible code execution via
smart self test counter
- debian/patches/CVE-2014-2894.patch: correct self-test count in
hw/ide/core.c.
- CVE-2014-2894
-- Marc Deslauriers <email address hidden> Fri, 25 Apr 2014 16:36:17 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.13) precise-security; urgency=medium
* SECURITY UPDATE: privilege escalation via REPORT LUNS
- debian/patches/CVE-2013-4344.patch: support more than 256 LUNS in
hw/scsi-bus.c, hw/scsi.h.
- CVE-2013-4344
-- Marc Deslauriers <email address hidden> Tue, 28 Jan 2014 09:08:09 -0500
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.6) quantal-security; urgency=medium
* SECURITY UPDATE: privilege escalation via REPORT LUNS
- debian/patches/CVE-2013-4344.patch: support more than 256 LUNS in
hw/scsi-bus.c, hw/scsi.h.
- CVE-2013-4344
* SECURITY UPDATE: denial of service in qdisk PV disk backend
- debian/patches/CVE-2013-4375.patch: mark ioreq as mapped before
unmapping in error case in hw/xen_disk.c.
- CVE-2013-4375
-- Marc Deslauriers <email address hidden> Tue, 28 Jan 2014 08:31:54 -0500
qemu-kvm (1.0+noroms-0ubuntu14.12) precise-proposed; urgency=low
* migration-do-not-overwrite-zero-pages.patch,
call-madv-hugepage-for-guest-ram-allocations.patch:
Fix performance degradation after migrations, and savevm/loadvm.
(LP: #1100843)
-- Chris J Arges <email address hidden> Wed, 02 Oct 2013 16:26:27 -0500
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.5) quantal-proposed; urgency=low
* debian/control and qemu-kvm.postinst: remove any g:--- acl on /dev/kvm
(left over from udev-acl). (LP: #1057024)
-- Serge Hallyn <email address hidden> Wed, 17 Jul 2013 10:23:13 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.11) precise-proposed; urgency=low
* debian/control and qemu-kvm.postinst: remove any g:--- acl on /dev/kvm
(left over from udev-acl). (LP: #1057024)
-- Serge Hallyn <email address hidden> Wed, 17 Jul 2013 10:14:46 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.10) precise-proposed; urgency=low
* remove 9004-qcow2-Simplify-count_cow_clusters.patch, which may or may
not have actually fixed bug 1189926. Replace ith with:
9004-qcow2-start-at-0-when-counting-cow-clusters.patch: Fixes corruption
issues with qcow2. (LP: #1189926)
Available diffs
| Superseded in precise-proposed |
qemu-kvm (1.0+noroms-0ubuntu14.9) precise-proposed; urgency=low
* 9004-qcow2-Simplify-count_cow_clusters.patch: fixes corruption
with qcow2. (LP: #1189926)
-- Chris J Arges <email address hidden> Wed, 12 Jun 2013 13:19:46 -0500
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.4) quantal-proposed; urgency=low * qemu-kvm.preinst: add kvm group if not present. (LP: #1103022) -- Serge Hallyn <email address hidden> Fri, 22 Mar 2013 10:14:18 -0500
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.3) quantal-proposed; urgency=low
[ Nikolaus Rath ]
* fix-usb-passthrough.patch: fix problems with accessing some host
USB devices (Closes: 683983) (LP: #1033727)
-- Serge Hallyn <email address hidden> Tue, 29 Jan 2013 22:26:54 -0600
qemu-kvm (1.0+noroms-0ubuntu14.8) precise-proposed; urgency=low * qemu-utils.links: fix kvm-nbd.8.gz and kvm-img.1.gz symlinks. (LP: #1089402) * take 9pfs-remove-noatime-flag-from-ro-open-calls.patch from upstream git to make readonly+nonroot 9p mounts succeed. (LP: #1091430) -- Serge Hallyn <email address hidden> Tue, 29 Jan 2013 22:41:42 -0600
| Deleted in raring-proposed (Reason: Replaced by qemu) |
qemu-kvm (1.2.0+noroms-0ubuntu8) raring; urgency=low
* SECURITY UPDATE: guest denial of service and possible code execution
via e1000 large packets
- debian/patches/ubuntu/CVE-2012-6075.patch: properly discard oversize
packets in hw/e1000.c.
- CVE-2012-6075
-- Marc Deslauriers <email address hidden> Wed, 16 Jan 2013 07:48:59 -0500
Available diffs
qemu-kvm (0.12.3+noroms-0ubuntu9.21) lucid-security; urgency=low
* SECURITY UPDATE: guest denial of service and possible code execution
via e1000 large packets
- debian/patches/CVE-2012-6075.patch: properly discard oversize packets
in hw/e1000.c.
- CVE-2012-6075
-- Marc Deslauriers <email address hidden> Tue, 15 Jan 2013 09:38:06 -0500
Available diffs
qemu-kvm (0.14.1+noroms-0ubuntu6.6) oneiric-security; urgency=low
* SECURITY UPDATE: guest denial of service and possible code execution
via e1000 large packets
- debian/patches/CVE-2012-6075.patch: properly discard oversize packets
in hw/e1000.c.
- CVE-2012-6075
-- Marc Deslauriers <email address hidden> Tue, 15 Jan 2013 09:28:46 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.7) precise-security; urgency=low
* SECURITY UPDATE: guest denial of service and possible code execution
via e1000 large packets
- debian/patches/CVE-2012-6075.patch: properly discard oversize packets
in hw/e1000.c.
- CVE-2012-6075
-- Marc Deslauriers <email address hidden> Tue, 15 Jan 2013 09:27:30 -0500
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.2) quantal-security; urgency=low
* SECURITY UPDATE: guest denial of service and possible code execution
via e1000 large packets
- debian/patches/CVE-2012-6075.patch: properly discard oversize packets
in hw/e1000.c.
- CVE-2012-6075
-- Marc Deslauriers <email address hidden> Tue, 15 Jan 2013 09:22:12 -0500
qemu-kvm (1.0+noroms-0ubuntu14.6) precise-proposed; urgency=low
* Fix qemu-kvm.upstart: just don't run in a container. Otherwise we'll
still try to load/unload kernel modules. Also undo the || true after
sysfs writes. Since setting those is a part of configuring qemu-kvm
on the host, failing when they fail makes sense.
Available diffs
| Deleted in raring-release (Reason: Obsoleted by the qemu source package) |
| Deleted in raring-proposed (Reason: moved to release) |
qemu-kvm (1.2.0+noroms-0ubuntu7) raring; urgency=low
* Add a sample /etc/sysctl.d/30-qemu-kvm.conf to aid users in setting
aside hugepages to back qemu instances.
-- Serge Hallyn <email address hidden> Tue, 11 Dec 2012 17:11:47 -0600
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu6) raring; urgency=low
* qemu-kvm.{upstart,default}: support optional mounting of hugetlbfs under
/run/hugepages/kvm.
-- Serge Hallyn <email address hidden> Fri, 30 Nov 2012 09:02:46 -0600
Available diffs
| Superseded in precise-proposed |
qemu-kvm (1.0+noroms-0ubuntu14.5) precise-proposed; urgency=low
* add udev to qemu-kvm Depends to ensure that postinst succeeds.
(LP: #1080912)
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.1) quantal-proposed; urgency=low
[ Serge Hallyn ]
* debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
recommended by Steve Langasek (LP: #1057024)
* apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
make read-write mount after read-only mount work. (LP: #1077838)
* make qemu-kvm depend on udev (LP: #1080912)
[ Robert Collins ]
* Fix upstart job to succeed if ksm settings can't be altered in the same way
other settings are handled. (LP: #1078530)
-- Serge Hallyn <email address hidden> Mon, 19 Nov 2012 09:15:42 -0600
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu5) raring; urgency=low
* add udev to qemu-kvm Depends to ensure that postinst succeeds.
(LP: #1080912)
-- Serge Hallyn <email address hidden> Tue, 20 Nov 2012 09:51:40 -0600
Available diffs
| Superseded in precise-proposed |
qemu-kvm (1.0+noroms-0ubuntu14.4) precise-proposed; urgency=low
[ Serge Hallyn ]
* debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
recommended by Steve Langasek (LP: #1057024)
* apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
make read-write mount after read-only mount work. (LP: #1077838)
[ Robert Collins ]
* Fix upstart job to succeed if ksm settings can't be altered in the same way
other settings are handled. (LP: #1078530)
-- Serge Hallyn <email address hidden> Thu, 15 Nov 2012 10:42:37 -0600
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu4) raring; urgency=low
[ Serge Hallyn ]
* debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
recommended by Steve Langasek (LP: #1057024)
* apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
make read-write mount after read-only mount work. (LP: #1077838)
[ Robert Collins ]
* Fix upstart job to succeed if ksm settings can't be altered in the same way
other settings are handled. (LP: #1078530)
-- Serge Hallyn <email address hidden> Wed, 14 Nov 2012 11:30:14 -0600
Available diffs
qemu-kvm (1.2.0+noroms-0ubuntu3) raring; urgency=low
* debian/qemu-kvm.postinst: remove the g::--- acl which udev may have
inserted. (LP: #1057024)
-- Serge Hallyn <email address hidden> Thu, 01 Nov 2012 20:46:57 +0100
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.3) precise-proposed; urgency=low * Fix race condition in virtio code on multicore systems. (LP: #997978) - 9001-virtio-add-missing-mb-on-notification.patch - 9002-virtio-add-missing-mb-on-enable-notification.patch - 9003-virtio-order-index-descriptor-reads.patch -- Soren Hansen <email address hidden> Mon, 03 Sep 2012 10:15:54 +0200
Available diffs
qemu-kvm (0.12.3+noroms-0ubuntu9.20) lucid-security; urgency=low
* SECURITY UPDATE: privilege escalation via VT100 sequences
- debian/patches/CVE-2012-3515.patch: check bounds in console.c.
- CVE-2012-3515
-- Marc Deslauriers <email address hidden> Tue, 25 Sep 2012 10:13:40 -0400
Available diffs
qemu-kvm (0.14.0+noroms-0ubuntu4.7) natty-security; urgency=low
* SECURITY UPDATE: privilege escalation via VT100 sequences
- debian/patches/CVE-2012-3515.patch: check bounds in console.c.
- CVE-2012-3515
-- Marc Deslauriers <email address hidden> Tue, 25 Sep 2012 10:12:33 -0400
Available diffs
qemu-kvm (0.14.1+noroms-0ubuntu6.5) oneiric-security; urgency=low
* SECURITY UPDATE: privilege escalation via VT100 sequences
- debian/patches/CVE-2012-3515.patch: check bounds in console.c.
- CVE-2012-3515
-- Marc Deslauriers <email address hidden> Tue, 25 Sep 2012 10:11:19 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.2) precise-security; urgency=low
* SECURITY UPDATE: privilege escalation via VT100 sequences
- debian/patches/CVE-2012-3515.patch: check bounds in console.c.
- CVE-2012-3515
-- Marc Deslauriers <email address hidden> Tue, 25 Sep 2012 10:05:23 -0400
Available diffs
| Superseded in raring-release |
| Obsolete in quantal-release |
| Deleted in quantal-proposed (Reason: moved to release) |
qemu-kvm (1.2.0+noroms-0ubuntu2) quantal-proposed; urgency=low
* debian/rules: drop building of mpc8544ds from pc-bios (as it's no longer
there) on powerpc to fix FTBFS.
-- Serge Hallyn <email address hidden> Mon, 24 Sep 2012 14:14:27 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.2.0+noroms-0ubuntu1) quantal; urgency=low * merge upstream v1.2.0 (LP: #1052932) (LP: #1040033) - debian/rules: remove --enable-kvm-device-assignment - configure switch no longer supported - remaining patches: . 02_use_usr_share_kvm_fixed.patch . 04_use_etc_kvm_kvm-ifup.patch . disable-hpet-for-tcg.patch . use-libexecdir.patch . ubuntu/larger_default_ram_size.patch . ubuntu/fallback-to-tcg.patch - ported to new code . ubuntu/dont-try-to-hotplug-cpu.patch . ubuntu/expose_vmx_qemu64cpu.patch . ubuntu/fix-vmware-vga-negative-vals . ubuntu/99-allow-loading-u-boot-initrd-images.patch -- Serge Hallyn <email address hidden> Wed, 12 Sep 2012 10:46:28 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu12) quantal; urgency=low
* cherrpyick kvm-expose-tsc-deadline-timer-feature-to-guest from upstream
(LP: #1013060)
-- Serge Hallyn <email address hidden> Wed, 12 Sep 2012 09:43:23 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu11) quantal; urgency=low
* Cherrypick three patches from upstream
- kvm-i8254-fix-conversion-of-in-kernel-to-userspace-state
- kvm-i8254-cache-kernel-clock-offset-in-KVMPITState
- kvm-i8254-finish-time-conversion-fix
to fix time passing too quickly in some guests. (LP: #1046771)
-- Serge Hallyn <email address hidden> Thu, 06 Sep 2012 10:06:41 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu10) quantal; urgency=low * debian/qemu-kvm.modprobe: set nested=1 at module load. (LP: #1040230) * remove patch ubuntu/define_AT_EMPTY_PATH, the real fix is now in eglibc. -- Serge Hallyn <email address hidden> Thu, 23 Aug 2012 11:10:53 -0500
Available diffs
qemu-kvm (0.14.1+noroms-0ubuntu6.4) oneiric-security; urgency=low
* SECURITY UPDATE: file overwrite via incorrect temp file checking
- debian/patches/CVE-2012-2652.patch: properly check length and
failures in block.c, block_int.h, block/vvfat.c.
- CVE-2012-2652
* This update not _not_ contain the changes from 0.14.1+noroms-0ubuntu6.3
that was in oneiric-proposed.
-- Marc Deslauriers <email address hidden> Tue, 31 Jul 2012 10:27:20 -0400
Available diffs
qemu-kvm (0.12.3+noroms-0ubuntu9.19) lucid-security; urgency=low
* SECURITY UPDATE: file overwrite via incorrect temp file checking
- debian/patches/CVE-2012-2652.patch: properly check length and
failures in block.c, block_int.h, block/vvfat.c.
- CVE-2012-2652
-- Marc Deslauriers <email address hidden> Tue, 31 Jul 2012 10:39:26 -0400
Available diffs
qemu-kvm (0.14.0+noroms-0ubuntu4.6) natty-security; urgency=low
* SECURITY UPDATE: file overwrite via incorrect temp file checking
- debian/patches/CVE-2012-2652.patch: properly check length and
failures in block.c, block_int.h, block/vvfat.c.
- CVE-2012-2652
-- Marc Deslauriers <email address hidden> Tue, 31 Jul 2012 10:31:50 -0400
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14.1) precise-security; urgency=low
* SECURITY UPDATE: file overwrite via incorrect temp file checking
- debian/patches/CVE-2012-2652.patch: properly check length and
failures in block.c, block_int.h, block/vvfat.c.
- CVE-2012-2652
-- Marc Deslauriers <email address hidden> Tue, 31 Jul 2012 10:11:19 -0400
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu9) quantal; urgency=low
[ Michael Tokarev ]
* added two patches from upstream qemu-kvm/stable-1.1 branch:
qemu-kvm-Add-missing-default-machine-options.patch
qemu-kvm-virtio-Do-not-register-mask-notifiers-witho.patch
(Closes: #679788) (LP: #1029201)
[ Serge Hallyn ]
* remove ubuntu/CVE-2011-2212-virtqueue-indirect-overflow.patch
patch, which was actually fixed in qemu 0.15 by
"virtio: fix indirect descriptor buffer overflow" (Thanks to
Michael Tokarev for pointing that out)
-- Serge Hallyn <email address hidden> Thu, 26 Jul 2012 10:31:53 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu8) quantal; urgency=low
* debian/qemu-kvm.upstart: don't fail if the kernel modules are not
found.
-- Serge Hallyn <email address hidden> Wed, 11 Jul 2012 17:18:06 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu14) precise-proposed; urgency=low
* debian/patches/keep-pid-file-locked.patch: keep pidfile locked for the
lifetime of the process (LP: #1023159)
-- Serge Hallyn <email address hidden> Wed, 11 Jul 2012 16:41:05 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu7) quantal; urgency=low
* ubuntu/99-ppc-increase-usability-of-ppce500-pci.patch: Allows more than
2 PCI devices on e500 type systems.
* Enable ppc64-softmmu target on PowerPC as well
-- Ben Collins <email address hidden> Thu, 28 Jun 2012 21:50:30 -0400
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu6) quantal; urgency=low
* Add libfdt-dev [powerpc] to build-deps
* Force --enable-fdt for powerpc builds
* 99-allow-loading-u-boot-initrd-images.patch: Add capability to load
initrd's in U-Image format.
* 99-increase-u-boot-gunzip-size.patch: By default, qemu only loads
U-Images less than or equal to 8 Megs, so increase it to 16 Megs.
-- Ben Collins <email address hidden> Thu, 28 Jun 2012 01:09:19 -0400
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu5) quantal; urgency=low
* Because PPC is a true KVM target, we should be building for it, rather
than i386/x86-64 on that architecture. However, this package is still
trying to build the x86 targets on other non-x86 architectures. I did
not fix this for aything other than ppc because I don't know if those
other archs are actually KVM enabled, nor can I properly test the build
and execution on those archs.
* Fixup for a proper PPC build:
- debian/control: Make description less x86-centric
- debian/rules: Use ppc-softmmu as the target on powerpc
- debian/rules: Enable blobs for some device tree files to be installed
- debian/*.links: Move some x86-centric links to rules file and create
proper links for qemu-system-ppc.
-- Ben Collins <email address hidden> Fri, 22 Jun 2012 22:42:15 -0400
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu4) quantal; urgency=low
* qemu-kvm.post{inst,rm}: don't invoke-rc.d qemu-kvm
* debian/rules: remove --noscripts from dh_installinit
-- Serge Hallyn <email address hidden> Wed, 20 Jun 2012 19:18:24 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu3) quantal; urgency=low
* debian/rules:
- fix kvm version in dh_gencontrol line (ours is higher than debian's)
- define DEB_HOST_ARCH and DEB_HOST_ARCH_CPU
- fix specification of --disable-kvm for arm and powerpc
- set --{en,dis}able-kvm-device-assignment next to --{en,dis}able-kvm
- dont' build pc-bios on non-x86, don't build bamboo on ppc
- create the vgabios and seabios links (for x86 only)
* debian/qemu-common.links: don't create vgabios/seabios links here
(they're only for x86)
* debian/optional-features: comment out --enable-kvm-device-assignment
* ubuntu/kvm_Enable_use_of_kvm_irqchip_in_kernel_in_hwlib_code - fix
powerpc and arm (--disable-kvm) builds.
-- Serge Hallyn <email address hidden> Wed, 20 Jun 2012 10:26:40 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu2) quantal; urgency=low
* don't build against usbredir (not in main)
- debian/optional-features: use --disable-usb-redir
- debian/control: remove libusbredirhost-dev from build-deps
-- Serge Hallyn <email address hidden> Wed, 20 Jun 2012 07:38:11 -0500
Available diffs
| Superseded in quantal-release |
qemu-kvm (1.1~rc+dfsg-1ubuntu1) quantal; urgency=low
* Merge from debian. Remaining changes:
- update maintainer
- debian/optional-features: disable libiscsi, vde and spice
- debian/control:
* remove libiscsi-dev, spice and vde2 depends and build-deps (not in main)
* remove qemu-keymaps depends (offered by qemu-common, and conflicts with
binary package in universe from qemu-linaro)
* remove ipxe-qemu depends for qemu-kvm
* qemu-kvm: add qemu-common depends, tie qemu-utils depends to same version,
set architecture any, add Provides: qemu
* remove qemu-kvm-dbg: dbgsym will end up in ddebs anyway
* add qemu-utils package, which in debian comes from qemu source package
* add qemu-common package (doesn't exist in debian, provides shared bits
used by qemu-linaro)
* add qemu transitional package, qemu-common, and substitude our own kvm
transitional package (more architectures)
- debian/rules:
* change --audio-drv-list order to make pa the default (see lp #304649)
* add --enable-docs
* remove powerpc section (for now)
* add i386 and linux-user to QEMU_TARGET
* remove override_dh_strip
* set confsuffix to /qemu
* add -fno-var-tracking for arm
* set --disable-kvm for arches other than amd64, i386
* install roms, bios', and utils into right package
* build pc-bios/optionrom
* install kvm-if{up,down} as /etc/qemu-if*
* create directory links (/etc/kvm, /usr/share/kvm, /usr/share/qemu-kvm)
* install qemu-kvm apport hook
* set DEB_BUILD_HARDENING
* set options for handling DEB_BUILD_OPTIONS=parallel=N
* add --no-restart-on-upgrade to dh_installinit args
* do a make install in override_dh_auto_install
* remove manual install of kvm binary
- qemu-kvm.postinst and prerm: remove the /usr/share/kvm/keymaps logic
- add
* qemu-kvm.links
* qemu-utils.dirs, qemu-utils.links
* qemu-common.install, qemu-common.doc, qemu-common.links, qemu-common.dirs
* source_qemu-kvm.py (apport hook)
* qemu-kvm.upstart and qemu-kvm.default
- debian/kvm-ifup: source qemu-kvm.default and honor its $TAPBR
- debian/kvm-ifdown: keep old ubuntu version
- push (refreshed) ubuntu patches:
* ubuntu/CVE-2011-2212-virtqueue-indirect-overflow.patch
* ubuntu/define_AT_EMPTY_PATH.patch (until LP: 1010069 is fixed)
* ubuntu/dont-try-to-hotplug-cpu.patch
* ubuntu/expose_vmx_qemu64cpu.patch
* ubuntu/fallback-to-tcg.patch
* ubuntu/fix-vmware-vga-negative-vals
* ubuntu/larger_default_ram_size.patch
-- Serge Hallyn <email address hidden> Fri, 15 Jun 2012 08:06:23 -0500
Available diffs
qemu-kvm (1.0+noroms-0ubuntu13) precise; urgency=low * d/rules,d/control: Enable RADOS block device (RBD) (LP: #904834) -- Clint Byrum <email address hidden> Thu, 12 Apr 2012 08:58:11 -0700
Available diffs
| Superseded in precise-release |
qemu-kvm (1.0+noroms-0ubuntu12) precise; urgency=low
* debian/patches/rbd/: apply 3 patches (recommended by Dreamhost) for
snapshot and live migration.
-- Serge Hallyn <email address hidden> Mon, 09 Apr 2012 17:12:09 -0500
Available diffs
| Superseded in precise-release |
qemu-kvm (1.0+noroms-0ubuntu11) precise; urgency=low
* debian/patches/disable-hpet-for-tcg.patch: implicitly set -no-hpet
when using tcg (non-accelerated qemu). (LP: #975240)
-- Serge Hallyn <email address hidden> Mon, 09 Apr 2012 11:06:36 -0500
Available diffs
| Superseded in precise-release |
qemu-kvm (1.0+noroms-0ubuntu10) precise; urgency=low * debian/rules: set sysconfdir to /etc (LP: #960359) -- Serge Hallyn <email address hidden> Tue, 20 Mar 2012 22:31:21 -0500
Available diffs
| Superseded in precise-release |
qemu-kvm (1.0+noroms-0ubuntu9) precise; urgency=low
* debian/patches/multiboot-load-fix.diff: fix bug when loading
multiboot images such as grub via -kernel parameter (LP: #957622)
-- Scott Moser <email address hidden> Sun, 18 Mar 2012 19:34:28 -0400
Available diffs
| 1 → 75 of 245 results | First • Previous • Next • Last |
