Change log for qemu-kvm package in Ubuntu

175 of 245 results
Published in precise-updates
Published in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.31) precise-security; urgency=medium

  * SECURITY UPDATE: DoS via unbounded memory allocation
    - debian/patches/CVE-2016-5403.patch: re-enable original patch.
    - debian/patches/CVE-2016-5403-2.patch: recalculate vq->inuse after
      migration in hw/virtio.c.
    - debian/patches/CVE-2016-5403-3.patch: decrement vq->inuse in
      virtqueue_discard() in hw/virtio.c.
    - debian/patches/CVE-2016-5403-4.patch: zero vq->inuse in
      virtio_reset() in hw/virtio.c.
    - CVE-2016-5403
  * SECURITY UPDATE: directory traversal flaw in 9p virtio backend
    - debian/patches/CVE-2016-7116-1.patch: forbid illegal path names in
      hw/9pfs/virtio-9p.c.
    - debian/patches/CVE-2016-7116-2.patch: forbid . and .. in file names
      in hw/9pfs/virtio-9p.c.
    - debian/patches/CVE-2016-7116-3.patch: handle walk of ".." in the root
      directory in hw/9pfs/virtio-9p.*.
    - debian/patches/CVE-2016-7116-4.patch: fix potential segfault during
      walk in hw/9pfs/virtio-9p.c.
    - CVE-2016-7116
  * SECURITY UPDATE: buffer overflow in xlnx.xps-ethernetlite
    - debian/patches/CVE-2016-7161.patch: fix a heap overflow in
      hw/xilinx_ethlite.c.
    - CVE-2016-7161
  * SECURITY UPDATE: OOB stack memory access in vmware_vga
    - debian/patches/CVE-2016-7170.patch: correct bitmap and pixmap size
      checks in hw/vmware_vga.c.
    - CVE-2016-7170
  * SECURITY UPDATE: denial of service in mcf via invalid count
    - debian/patches/CVE-2016-7908.patch: limit buffer descriptor count in
      hw/mcf_fec.c.
    - CVE-2016-7908
  * SECURITY UPDATE: denial of service in pcnet via invalid length
    - debian/patches/CVE-2016-7909.patch: check rx/tx descriptor ring
      length in hw/pcnet.c.
    - CVE-2016-7909
  * SECURITY UPDATE: infinite loop in Intel HDA controller
    - debian/patches/CVE-2016-8909.patch: check stream entry count during
      transfer in hw/intel-hda.c.
    - CVE-2016-8909
  * SECURITY UPDATE: infinite loop in RTL8139 ethernet controller
    - debian/patches/CVE-2016-8910.patch: limit processing of ring
      descriptors in hw/rtl8139.c.
    - CVE-2016-8910
  * SECURITY UPDATE: memory leakage at device unplug in eepro100
    - debian/patches/CVE-2016-9101.patch: fix memory leak in device uninit
      in hw/eepro100.c.
    - CVE-2016-9101
  * SECURITY UPDATE: denial of service via memory leak in 9pfs
    - debian/patches/CVE-2016-9102.patch: fix memory leak in
      v9fs_xattrcreate in hw/9pfs/virtio-9p.c.
    - CVE-2016-9102
  * SECURITY UPDATE: information leakage via xattribute in 9pfs
    - debian/patches/CVE-2016-9103.patch: fix information leak in xattr
      read in hw/9pfs/virtio-9p.c.
    - CVE-2016-9103
  * SECURITY UPDATE: integer overflow leading to OOB access in 9pfs
    - debian/patches/CVE-2016-9104.patch: fix integer overflow issue in
      xattr read/write in hw/9pfs/virtio-9p.c.
    - CVE-2016-9104
  * SECURITY UPDATE: denial of service via memory leakage in 9pfs
    - debian/patches/CVE-2016-9105.patch: fix memory leak in v9fs_link in
      hw/9pfs/virtio-9p.c.
    - CVE-2016-9105

 -- Marc Deslauriers <email address hidden>  Tue, 08 Nov 2016 08:16:37 -0500
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.30) precise-security; urgency=medium

  * SECURITY REGRESSION: crash on migration with memory stats enabled
    (LP: #1612089)
    - debian/patches/CVE-2016-5403.patch: disable for now pending
      investigation.

 -- Marc Deslauriers <email address hidden>  Fri, 12 Aug 2016 08:49:38 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.29) precise-security; urgency=medium

  * SECURITY UPDATE: infinite loop in vmware_vga
    - debian/patches/CVE-2016-4453.patch: limit fifo commands in
      hw/vmware_vga.c.
    - CVE-2016-4453
  * SECURITY UPDATE: DoS or host memory leakage in vmware_vga
    - debian/patches/CVE-2016-4454.patch: fix sanity checks in
      hw/vmware_vga.c.
    - CVE-2016-4454
  * SECURITY UPDATE: DoS via unbounded memory allocation
    - debian/patches/CVE-2016-5403.patch: check size in hw/virtio.c.
    - CVE-2016-5403

 -- Marc Deslauriers <email address hidden>  Thu, 04 Aug 2016 07:50:42 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.28) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via multiple eof_timers in ohci
    - debian/patches/CVE-2016-2391.patch: allocate timer only once in
      hw/usb-ohci.c.
    - CVE-2016-2391
  * SECURITY UPDATE: denial of service in in remote NDIS control message
    handling
    - debian/patches/CVE-2016-2392.patch: check USB configuration
      descriptor object in hw/usb-net.c.
    - CVE-2016-2392
  * SECURITY UPDATE: denial of service or host information leak in USB Net
    device emulation support
    - debian/patches/CVE-2016-2538.patch: check RNDIS buffer offsets and
      length in hw/usb-net.c.
    - CVE-2016-2538
  * SECURITY UPDATE: denial of service via infinite loop in ne2000
    - debian/patches/CVE-2016-2841.patch: heck ring buffer control
      registers in hw/ne2000.c.
    - CVE-2016-2841
  * SECURITY UPDATE: denial of service via payload length in crafted packet
    - debian/patches/CVE-2016-2857.patch: check packet payload length in
      net/checksum.c.
    - CVE-2016-2857
  * SECURITY UPDATE: arbitrary host code execution via VGA module
    - debian/patches/CVE-2016-3710.patch: fix banked access bounds checking
      in hw/vga.c.
    - CVE-2016-3710
  * SECURITY UPDATE: denial of service via VGA module
    - debian/patches/CVE-2016-3712.patch: make sure vga register setup for
      vbe stays intact in hw/vga.c.
    - CVE-2016-3712
  * SECURITY UPDATE: denial of service in Luminary Micro Stellaris Ethernet
    - debian/patches/CVE-2016-4001.patch: check packet length against
      receive buffer in hw/stellaris_enet.c.
    - CVE-2016-4001
  * SECURITY UPDATE: denial of sevice and possible code execution in
    MIPSnet
    - debian/patches/CVE-2016-4002.patch: check size in hw/mipsnet.c.
    - CVE-2016-4002
  * SECURITY UPDATE: denial of service via infinite loop in in usb_ehci
    - debian/patches/CVE-2016-4037.patch: apply limit to iTD/sidt
      descriptors in hw/usb-ehci.c.
    - CVE-2016-4037

 -- Marc Deslauriers <email address hidden>  Wed, 11 May 2016 08:24:36 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.27) precise-security; urgency=medium

  * SECURITY UPDATE: vnc floating point exception
    - debian/patches/CVE-2015-8504.patch: handle zero values in ui/vnc.c.
    - CVE-2015-8504
  * SECURITY UPDATE: paravirtualized drivers incautious about shared memory
    contents
    - debian/patches/CVE-2015-8550-1.patch: avoid double access in
      hw/xen_blkif.h.
    - debian/patches/CVE-2015-8550-2.patch: avoid reading twice in
      hw/xenfb.c.
    - CVE-2015-8550
  * SECURITY UPDATE: infinite loop in ehci_advance_state
    - debian/patches/CVE-2015-8558.patch: make idt processing more robust
      in hw/usb-ehci.c.
    - CVE-2015-8558
  * SECURITY UPDATE: ne2000 OOB r/w in ioport operations
    - debian/patches/CVE-2015-8743.patch: fix bounds check in ioport
      operations in hw/ne2000.c.
    - CVE-2015-8743
  * SECURITY UPDATE: ahci use-after-free vulnerability in aio port commands
    - debian/patches/CVE-2016-1568.patch: reset ncq object to unused on
      error in hw/ide/ahci.c.
    - CVE-2016-1568
  * SECURITY UPDATE: firmware configuration device OOB rw access
    - debian/patches/CVE-2016-1714.patch: avoid calculating invalid current
      entry pointer in hw/fw_cfg.c.
    - CVE-2016-1714
  * SECURITY UPDATE: e1000 infinite loop
    - debian/patches/CVE-2016-1981.patch: eliminate infinite loops on
      out-of-bounds transfer start in hw/e1000.c.
    - CVE-2016-1981

 -- Marc Deslauriers <email address hidden>  Tue, 02 Feb 2016 08:33:07 -0500
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.26) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via jumbo frame flood in virtio
    - debian/patches/CVE-2015-7295.patch: drop truncated packets in
      hw/virtio-net.c, hw/virtio.c, hw/virtio.h.
    - CVE-2015-7295
  * SECURITY UPDATE: loopback mode heap overflow vulnerability in pcnet
    - debian/patches/CVE-2015-7504.patch: leave room for CRC code in
      hw/pcnet.c.
    - CVE-2015-7504
  * SECURITY UPDATE: non-loopback mode buffer overflow in pcnet
    - debian/patches/CVE-2015-7512.patch: check packet length in
      hw/pcnet.c.
    - CVE-2015-7512
  * SECURITY UPDATE: infinite loop in eepro100
    - debian/patches/CVE-2015-8345.patch: prevent endless loop in
      hw/eepro100.c.
    - CVE-2015-8345

 -- Marc Deslauriers <email address hidden>  Tue, 01 Dec 2015 16:30:23 -0500
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.25) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via vnc infinite loop
    - debian/patches/CVE-2015-5239.patch: limit client_cut_text msg payload
      size in ui/vnc.c.
    - CVE-2015-5239
  * SECURITY UPDATE: denial of service via NE2000 driver
    - debian/patches/CVE-2015-5278.patch: fix infinite loop in
      hw/ne2000.c.
    - CVE-2015-5278
  * SECURITY UPDATE: denial of service and possible code execution via
    heap overflow in NE2000 driver
    - debian/patches/CVE-2015-5279.patch: validate ring buffer pointers in
      hw/ne2000.c.
    - CVE-2015-5279
  * SECURITY UPDATE: denial of service via e1000 infinite loop
    - debian/patches/CVE-2015-6815.patch: check bytes in hw/e1000.c.
    - CVE-2015-6815
  * SECURITY UPDATE: denial of service via illegal ATAPI commands
    - debian/patches/CVE-2015-6855.patch: fix ATAPI command permissions in
      hw/ide/core.c.
    - CVE-2015-6855

 -- Marc Deslauriers <email address hidden>  Wed, 23 Sep 2015 15:28:32 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.24) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via PRDT with zero complete sectors
    - debian/patches/CVE-2014-9718.patch: refactor return codes in
      hw/ide/ahci.c, hw/ide/core.c, hw/ide/internal.h, hw/ide/pci.c.
    - CVE-2014-9718
  * SECURITY UPDATE: process heap memory disclosure
    - debian/patches/CVE-2015-5165.patch: check sizes in hw/rtl8139.c.
    - CVE-2015-5165

 -- Marc Deslauriers <email address hidden>  Tue, 25 Aug 2015 08:58:16 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.23) precise-security; urgency=medium

  * SECURITY UPDATE: heap overflow in PCNET controller
    - debian/patches/CVE-2015-3209-pre.patch: fix negative array index read
      in hw/pcnet.c.
    - debian/patches/CVE-2015-3209.patch: check bounds in hw/pcnet.c.
    - CVE-2015-3209
  * SECURITY UPDATE: unsafe /tmp filename use by slirp
    - debian/patches/CVE-2015-4037.patch: use mkdtemp in net/slirp.c.
    - CVE-2015-4037

 -- Marc Deslauriers <email address hidden>  Tue, 09 Jun 2015 10:21:44 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.22) precise-security; urgency=medium

  * SECURITY UPDATE: host code execution via floppy device (VEMON)
    - debian/patches/CVE-2015-3456.patch: force the fifo access to be in
      bounds of the allocated buffer in hw/block/fdc.c.
    - CVE-2015-3456

 -- Marc Deslauriers <email address hidden>  Wed, 13 May 2015 08:19:08 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.21) precise-security; urgency=medium

  * SECURITY UPDATE: code execution via savevm data
    - debian/patches/CVE-2014-7840.patch: validate parameters in
      arch_init.c.
    - CVE-2014-7840
  * SECURITY UPDATE: code execution via cirrus vga blit regions
    (LP: #1400775)
    - debian/patches/CVE-2014-8106.patch: properly validate blit regions in
      hw/cirrus_vga.c.
    - CVE-2014-8106
 -- Marc Deslauriers <email address hidden>   Wed, 10 Dec 2014 16:11:32 -0500
Obsolete in lucid-updates
Obsolete in lucid-security
qemu-kvm (0.12.3+noroms-0ubuntu9.26) lucid-security; urgency=medium

  * SECURITY UPDATE: code execution via cirrus vga blit regions
    (LP: #1400775)
    - debian/patches/CVE-2014-8106.patch: properly validate blit regions in
      hw/cirrus_vga.c.
    - CVE-2014-8106
 -- Marc Deslauriers <email address hidden>   Wed, 10 Dec 2014 16:18:02 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.20) precise-proposed; urgency=medium

  * Fix segfault on qemu-img convert with nonexistent source file (LP: #1388036)
 -- Serge Hallyn <email address hidden>   Thu, 20 Nov 2014 10:11:21 -0600
Superseded in lucid-updates
Superseded in lucid-security
qemu-kvm (0.12.3+noroms-0ubuntu9.25) lucid-security; urgency=medium

  * SECURITY UPDATE: denial of service via slirp NULL pointer deref
    - debian/patches/CVE-2014-3640.patch: make sure socket is not just a
      stub in slirp/udp.c.
    - CVE-2014-3640
  * SECURITY UPDATE: possible privilege escalation via vmware-vga driver
    - debian/patches/CVE-2014-3689.patch: verify rectangles in
      hw/vmware_vga.c.
    - CVE-2014-3689
  * SECURITY UPDATE: denial of service via VNC console
    - debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in vnc.c.
    - CVE-2014-7815
 -- Marc Deslauriers <email address hidden>   Tue, 11 Nov 2014 15:40:19 -0500
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.19) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via slirp NULL pointer deref
    - debian/patches/CVE-2014-3640.patch: make sure socket is not just a
      stub in slirp/udp.c.
    - CVE-2014-3640
  * SECURITY UPDATE: possible privilege escalation via vmware-vga driver
    - debian/patches/CVE-2014-3689.patch: verify rectangles in
      hw/vmware_vga.c.
    - CVE-2014-3689
  * SECURITY UPDATE: denial of service via VNC console
    - debian/patches/CVE-2014-7815.patch: validate bits_per_pixel in
      ui/vnc.c.
    - CVE-2014-7815
 -- Marc Deslauriers <email address hidden>   Tue, 11 Nov 2014 15:28:11 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.18) precise-proposed; urgency=medium

  * debian/patches/define-qemu-kvm-mt: define a new (default) machine
    type "pc-1.0-precise" which allows incoming migration in newer qemu to
    distinguish qemu-kvm-created machines from qemu-created machines.
    (LP: #1374612)
 -- Serge Hallyn <email address hidden>   Mon, 22 Sep 2014 13:39:03 -0500
Superseded in lucid-updates
Superseded in lucid-security
Deleted in lucid-proposed (Reason: moved to -updates)
qemu-kvm (0.12.3+noroms-0ubuntu9.24) lucid-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0142.patch: validate extent_size header field
      in block/bochs.c, validate s->tracks in block/parallels.c, validate
      block size in block/vpc.c, backport function to qemu-common.h,
      backport DIV_ROUND_UP to osdep.h.
    - CVE-2014-0142
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0143.patch: validate nb_sectors in
      block.c, validate catalog_size header field in block/bochs.c,
      prevent offsets_size integer overflow in block/cloop.c, fix catalog
      size integer overflow in block/parallels.c, validate new_l1_size in
      block/qcow2-cluster.c, use proper size in block/qcow2-refcount.c,
      check L1 snapshot table size in block/qcow2-snapshot.c, check active
      L1 table size in block/qcow2.c, define max size in block/qcow2.h.
    - CVE-2014-0143
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0144.patch: validate block sizes and offsets
      in block/cloop.c, check offset in block/curl.c, validate size in
      block/qcow2-refcount.c, check number of snapshots in
      block/qcow2-snapshot.c, check sizes and offsets in block/qcow2.c,
      move structs to block/qcow2.h, check sizes in block/vdi.c,
      prevent overflows in block/vpc.c.
    - CVE-2014-0144
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0145.patch: check chunk sizes in block/dmg.c,
      use correct size in block/qcow2-snapshot.c.
    - CVE-2014-0145
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0146.patch: calculate offsets properly in
      block/qcow2.c.
    - CVE-2014-0146
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0147.patch: use proper sizes in block/bochs.c.
    - CVE-2014-0147
  * SECURITY UPDATE: multiple buffer overflows on invalid state load
    - debian/patches: added large number of upstream patches pulled from
      git tree.
    - CVE-2013-4148
    - CVE-2013-4151
    - CVE-2013-4530
    - CVE-2013-4531
    - CVE-2013-4533
    - CVE-2013-4534
    - CVE-2013-4537
    - CVE-2013-4538
    - CVE-2013-4539
    - CVE-2013-4540
    - CVE-2013-6399
    - CVE-2014-0182
    - CVE-2014-0222
    - CVE-2014-0223
 -- Marc Deslauriers <email address hidden>   Tue, 12 Aug 2014 14:35:45 -0400
Superseded in precise-updates
Superseded in precise-security
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.17) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0142.patch: validate extent_size header field
      in block/bochs.c, validate s->tracks in block/parallels.c, validate
      block size in block/vpc.c, backport function to qemu-common.h.
    - CVE-2014-0142
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0143.patch: validate nb_sectors in
      block.c, validate catalog_size header field in block/bochs.c,
      prevent offsets_size integer overflow in block/cloop.c, fix catalog
      size integer overflow in block/parallels.c, validate new_l1_size in
      block/qcow2-cluster.c, use proper size in block/qcow2-refcount.c,
      check L1 snapshot table size in block/qcow2-snapshot.c, check active
      L1 table size in block/qcow2.c, define max size in block/qcow2.h.
    - CVE-2014-0143
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0144.patch: validate block sizes and offsets
      in block/cloop.c, check offset in block/curl.c, validate size in
      block/qcow2-refcount.c, check number of snapshots in
      block/qcow2-snapshot.c, check sizes and offsets in block/qcow2.c,
      move structs to block/qcow2.h, check sizes in block/vdi.c,
      prevent overflows in block/vpc.c.
    - CVE-2014-0144
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0145.patch: check chunk sizes in block/dmg.c,
      use correct size in block/qcow2-snapshot.c.
    - CVE-2014-0145
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0146.patch: calculate offsets properly in
      block/qcow2.c.
    - CVE-2014-0146
  * SECURITY UPDATE: denial of service and possible code exection via
    incorrect image format validation (LP: #1322204)
    - debian/patches/CVE-2014-0147.patch: use proper sizes in block/bochs.c,
      properly calculate refcounts in block/qcow2-refcount.c, block/qcow2.c.
    - CVE-2014-0147
  * SECURITY UPDATE: multiple buffer overflows on invalid state load
    - debian/patches: added large number of upstream patches pulled from
      git tree.
    - CVE-2013-4148
    - CVE-2013-4151
    - CVE-2013-4527
    - CVE-2013-4529
    - CVE-2013-4530
    - CVE-2013-4531
    - CVE-2013-4532
    - CVE-2013-4533
    - CVE-2013-4534
    - CVE-2013-4535
    - CVE-2013-4536
    - CVE-2013-4537
    - CVE-2013-4538
    - CVE-2013-4539
    - CVE-2013-4540
    - CVE-2013-4541
    - CVE-2013-6399
    - CVE-2014-0182
    - CVE-2014-0222
    - CVE-2014-0223
    - CVE-2014-3461
 -- Marc Deslauriers <email address hidden>   Tue, 12 Aug 2014 13:30:27 -0400
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.15) precise-proposed; urgency=low

  * qemu-kvm.upstart: ignore modprobe errors (LP: #1316812)
 -- Serge Hallyn <email address hidden>   Wed, 07 May 2014 14:06:43 +0000
Superseded in lucid-updates
Superseded in lucid-security
qemu-kvm (0.12.3+noroms-0ubuntu9.22) lucid-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via MAC address table update
    - debian/patches/CVE-2014-0150.patch: fix overflow in hw/virtio-net.c.
    - CVE-2014-0150
  * SECURITY UPDATE: denial of service and possible code execution via
    smart self test counter
    - debian/patches/CVE-2014-2894.patch: correct self-test count in
      hw/ide/core.c.
    - CVE-2014-2894
 -- Marc Deslauriers <email address hidden>   Fri, 25 Apr 2014 17:41:36 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.14) precise-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via MAC address table update
    - debian/patches/CVE-2014-0150.patch: fix overflow in hw/virtio-net.c.
    - CVE-2014-0150
  * SECURITY UPDATE: denial of service and possible code execution via
    smart self test counter
    - debian/patches/CVE-2014-2894.patch: correct self-test count in
      hw/ide/core.c.
    - CVE-2014-2894
 -- Marc Deslauriers <email address hidden>   Fri, 25 Apr 2014 17:37:13 -0400
Obsolete in quantal-updates
Obsolete in quantal-security
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.7) quantal-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via MAC address table update
    - debian/patches/CVE-2014-0150.patch: fix overflow in hw/virtio-net.c.
    - CVE-2014-0150
  * SECURITY UPDATE: denial of service and possible code execution via
    smart self test counter
    - debian/patches/CVE-2014-2894.patch: correct self-test count in
      hw/ide/core.c.
    - CVE-2014-2894
 -- Marc Deslauriers <email address hidden>   Fri, 25 Apr 2014 16:36:17 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.13) precise-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via REPORT LUNS
    - debian/patches/CVE-2013-4344.patch: support more than 256 LUNS in
      hw/scsi-bus.c, hw/scsi.h.
    - CVE-2013-4344
 -- Marc Deslauriers <email address hidden>   Tue, 28 Jan 2014 09:08:09 -0500
Superseded in quantal-updates
Superseded in quantal-security
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.6) quantal-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via REPORT LUNS
    - debian/patches/CVE-2013-4344.patch: support more than 256 LUNS in
      hw/scsi-bus.c, hw/scsi.h.
    - CVE-2013-4344
  * SECURITY UPDATE: denial of service in qdisk PV disk backend
    - debian/patches/CVE-2013-4375.patch: mark ioreq as mapped before
      unmapping in error case in hw/xen_disk.c.
    - CVE-2013-4375
 -- Marc Deslauriers <email address hidden>   Tue, 28 Jan 2014 08:31:54 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.12) precise-proposed; urgency=low

  * migration-do-not-overwrite-zero-pages.patch,
    call-madv-hugepage-for-guest-ram-allocations.patch:
    Fix performance degradation after migrations, and savevm/loadvm.
    (LP: #1100843)
 -- Chris J Arges <email address hidden>   Wed, 02 Oct 2013 16:26:27 -0500
Superseded in quantal-updates
Deleted in quantal-proposed (Reason: moved to -updates)
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.5) quantal-proposed; urgency=low

  * debian/control and qemu-kvm.postinst: remove any g:--- acl on /dev/kvm
    (left over from udev-acl).  (LP: #1057024)
 -- Serge Hallyn <email address hidden>   Wed, 17 Jul 2013 10:23:13 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.11) precise-proposed; urgency=low

  * debian/control and qemu-kvm.postinst: remove any g:--- acl on /dev/kvm
    (left over from udev-acl).  (LP: #1057024)
 -- Serge Hallyn <email address hidden>   Wed, 17 Jul 2013 10:14:46 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.10) precise-proposed; urgency=low

  * remove 9004-qcow2-Simplify-count_cow_clusters.patch, which may or may
    not have actually fixed bug 1189926.  Replace ith with:
    9004-qcow2-start-at-0-when-counting-cow-clusters.patch: Fixes corruption
    issues with qcow2. (LP: #1189926)

Superseded in precise-proposed
qemu-kvm (1.0+noroms-0ubuntu14.9) precise-proposed; urgency=low

  * 9004-qcow2-Simplify-count_cow_clusters.patch: fixes corruption
    with qcow2. (LP: #1189926)
 -- Chris J Arges <email address hidden>   Wed, 12 Jun 2013 13:19:46 -0500
Superseded in quantal-updates
Deleted in quantal-proposed (Reason: moved to -updates)
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.4) quantal-proposed; urgency=low

  * qemu-kvm.preinst: add kvm group if not present.  (LP: #1103022)
 -- Serge Hallyn <email address hidden>   Fri, 22 Mar 2013 10:14:18 -0500
Superseded in quantal-updates
Deleted in quantal-proposed (Reason: moved to -updates)
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.3) quantal-proposed; urgency=low

  [ Nikolaus Rath ]
  * fix-usb-passthrough.patch: fix problems with accessing some host
    USB devices (Closes: 683983) (LP: #1033727)
 -- Serge Hallyn <email address hidden>   Tue, 29 Jan 2013 22:26:54 -0600
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.8) precise-proposed; urgency=low

  * qemu-utils.links: fix kvm-nbd.8.gz and kvm-img.1.gz symlinks. (LP: #1089402)
  * take 9pfs-remove-noatime-flag-from-ro-open-calls.patch from upstream git
    to make readonly+nonroot 9p mounts succeed.  (LP: #1091430)
 -- Serge Hallyn <email address hidden>   Tue, 29 Jan 2013 22:41:42 -0600
Deleted in raring-proposed (Reason: Replaced by qemu)
qemu-kvm (1.2.0+noroms-0ubuntu8) raring; urgency=low

  * SECURITY UPDATE: guest denial of service and possible code execution
    via e1000 large packets
    - debian/patches/ubuntu/CVE-2012-6075.patch: properly discard oversize
      packets in hw/e1000.c.
    - CVE-2012-6075
 -- Marc Deslauriers <email address hidden>   Wed, 16 Jan 2013 07:48:59 -0500
Superseded in lucid-updates
Superseded in lucid-security
qemu-kvm (0.12.3+noroms-0ubuntu9.21) lucid-security; urgency=low

  * SECURITY UPDATE: guest denial of service and possible code execution
    via e1000 large packets
    - debian/patches/CVE-2012-6075.patch: properly discard oversize packets
      in hw/e1000.c.
    - CVE-2012-6075
 -- Marc Deslauriers <email address hidden>   Tue, 15 Jan 2013 09:38:06 -0500
Obsolete in oneiric-updates
Obsolete in oneiric-security
qemu-kvm (0.14.1+noroms-0ubuntu6.6) oneiric-security; urgency=low

  * SECURITY UPDATE: guest denial of service and possible code execution
    via e1000 large packets
    - debian/patches/CVE-2012-6075.patch: properly discard oversize packets
      in hw/e1000.c.
    - CVE-2012-6075
 -- Marc Deslauriers <email address hidden>   Tue, 15 Jan 2013 09:28:46 -0500
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.7) precise-security; urgency=low

  * SECURITY UPDATE: guest denial of service and possible code execution
    via e1000 large packets
    - debian/patches/CVE-2012-6075.patch: properly discard oversize packets
      in hw/e1000.c.
    - CVE-2012-6075
 -- Marc Deslauriers <email address hidden>   Tue, 15 Jan 2013 09:27:30 -0500
Superseded in quantal-updates
Superseded in quantal-security
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.2) quantal-security; urgency=low

  * SECURITY UPDATE: guest denial of service and possible code execution
    via e1000 large packets
    - debian/patches/CVE-2012-6075.patch: properly discard oversize packets
      in hw/e1000.c.
    - CVE-2012-6075
 -- Marc Deslauriers <email address hidden>   Tue, 15 Jan 2013 09:22:12 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.6) precise-proposed; urgency=low

  * Fix qemu-kvm.upstart: just don't run in a container.  Otherwise we'll
    still try to load/unload kernel modules.  Also undo the || true after
    sysfs writes.  Since setting those is a part of configuring qemu-kvm
    on the host, failing when they fail makes sense.

Deleted in raring-release (Reason: Obsoleted by the qemu source package)
Deleted in raring-proposed (Reason: moved to release)
qemu-kvm (1.2.0+noroms-0ubuntu7) raring; urgency=low

  * Add a sample /etc/sysctl.d/30-qemu-kvm.conf to aid users in setting
    aside hugepages to back qemu instances.
 -- Serge Hallyn <email address hidden>   Tue, 11 Dec 2012 17:11:47 -0600
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
qemu-kvm (1.2.0+noroms-0ubuntu6) raring; urgency=low

  * qemu-kvm.{upstart,default}: support optional mounting of hugetlbfs under
    /run/hugepages/kvm.
 -- Serge Hallyn <email address hidden>   Fri, 30 Nov 2012 09:02:46 -0600
Superseded in precise-proposed
qemu-kvm (1.0+noroms-0ubuntu14.5) precise-proposed; urgency=low

  * add udev to qemu-kvm Depends to ensure that postinst succeeds.
    (LP: #1080912)

Superseded in quantal-updates
Deleted in quantal-proposed (Reason: moved to -updates)
qemu-kvm (1.2.0+noroms-0ubuntu2.12.10.1) quantal-proposed; urgency=low

  [ Serge Hallyn ]
  * debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
    recommended by Steve Langasek (LP: #1057024)
  * apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
    make read-write mount after read-only mount work.  (LP: #1077838)
  * make qemu-kvm depend on udev (LP: #1080912)

  [ Robert Collins ]
  * Fix upstart job to succeed if ksm settings can't be altered in the same way
    other settings are handled. (LP: #1078530)
 -- Serge Hallyn <email address hidden>   Mon, 19 Nov 2012 09:15:42 -0600
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
qemu-kvm (1.2.0+noroms-0ubuntu5) raring; urgency=low

  * add udev to qemu-kvm Depends to ensure that postinst succeeds.
    (LP: #1080912)
 -- Serge Hallyn <email address hidden>   Tue, 20 Nov 2012 09:51:40 -0600
Superseded in precise-proposed
qemu-kvm (1.0+noroms-0ubuntu14.4) precise-proposed; urgency=low

  [ Serge Hallyn ]
  * debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
    recommended by Steve Langasek (LP: #1057024)
  * apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
    make read-write mount after read-only mount work.  (LP: #1077838)

  [ Robert Collins ]
  * Fix upstart job to succeed if ksm settings can't be altered in the same way
    other settings are handled. (LP: #1078530)
 -- Serge Hallyn <email address hidden>   Thu, 15 Nov 2012 10:42:37 -0600
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
qemu-kvm (1.2.0+noroms-0ubuntu4) raring; urgency=low

  [ Serge Hallyn ]
  * debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
    recommended by Steve Langasek (LP: #1057024)
  * apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
    make read-write mount after read-only mount work.  (LP: #1077838)

  [ Robert Collins ]
  * Fix upstart job to succeed if ksm settings can't be altered in the same way
    other settings are handled. (LP: #1078530)
 -- Serge Hallyn <email address hidden>   Wed, 14 Nov 2012 11:30:14 -0600
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
qemu-kvm (1.2.0+noroms-0ubuntu3) raring; urgency=low

  * debian/qemu-kvm.postinst: remove the g::--- acl which udev may have
    inserted. (LP: #1057024)
 -- Serge Hallyn <email address hidden>   Thu, 01 Nov 2012 20:46:57 +0100
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14.3) precise-proposed; urgency=low

  * Fix race condition in virtio code on multicore systems. (LP: #997978)
    - 9001-virtio-add-missing-mb-on-notification.patch
    - 9002-virtio-add-missing-mb-on-enable-notification.patch
    - 9003-virtio-order-index-descriptor-reads.patch
 -- Soren Hansen <email address hidden>   Mon, 03 Sep 2012 10:15:54 +0200
Superseded in lucid-updates
Superseded in lucid-security
qemu-kvm (0.12.3+noroms-0ubuntu9.20) lucid-security; urgency=low

  * SECURITY UPDATE: privilege escalation via VT100 sequences
    - debian/patches/CVE-2012-3515.patch: check bounds in console.c.
    - CVE-2012-3515
 -- Marc Deslauriers <email address hidden>   Tue, 25 Sep 2012 10:13:40 -0400
Obsolete in natty-updates
Obsolete in natty-security
qemu-kvm (0.14.0+noroms-0ubuntu4.7) natty-security; urgency=low

  * SECURITY UPDATE: privilege escalation via VT100 sequences
    - debian/patches/CVE-2012-3515.patch: check bounds in console.c.
    - CVE-2012-3515
 -- Marc Deslauriers <email address hidden>   Tue, 25 Sep 2012 10:12:33 -0400
Superseded in oneiric-updates
Superseded in oneiric-security
qemu-kvm (0.14.1+noroms-0ubuntu6.5) oneiric-security; urgency=low

  * SECURITY UPDATE: privilege escalation via VT100 sequences
    - debian/patches/CVE-2012-3515.patch: check bounds in console.c.
    - CVE-2012-3515
 -- Marc Deslauriers <email address hidden>   Tue, 25 Sep 2012 10:11:19 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.2) precise-security; urgency=low

  * SECURITY UPDATE: privilege escalation via VT100 sequences
    - debian/patches/CVE-2012-3515.patch: check bounds in console.c.
    - CVE-2012-3515
 -- Marc Deslauriers <email address hidden>   Tue, 25 Sep 2012 10:05:23 -0400
Superseded in raring-release
Obsolete in quantal-release
Deleted in quantal-proposed (Reason: moved to release)
qemu-kvm (1.2.0+noroms-0ubuntu2) quantal-proposed; urgency=low

  * debian/rules: drop building of mpc8544ds from pc-bios (as it's no longer
    there) on powerpc to fix FTBFS.
 -- Serge Hallyn <email address hidden>   Mon, 24 Sep 2012 14:14:27 -0500
Superseded in quantal-release
qemu-kvm (1.2.0+noroms-0ubuntu1) quantal; urgency=low

  * merge upstream v1.2.0  (LP: #1052932) (LP: #1040033)
    - debian/rules: remove --enable-kvm-device-assignment - configure switch
      no longer supported
    - remaining patches:
      . 02_use_usr_share_kvm_fixed.patch
      . 04_use_etc_kvm_kvm-ifup.patch
      . disable-hpet-for-tcg.patch
      . use-libexecdir.patch
      . ubuntu/larger_default_ram_size.patch
      . ubuntu/fallback-to-tcg.patch - ported to new code
      . ubuntu/dont-try-to-hotplug-cpu.patch
      . ubuntu/expose_vmx_qemu64cpu.patch
      . ubuntu/fix-vmware-vga-negative-vals
      . ubuntu/99-allow-loading-u-boot-initrd-images.patch
 -- Serge Hallyn <email address hidden>   Wed, 12 Sep 2012 10:46:28 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu12) quantal; urgency=low

  * cherrpyick kvm-expose-tsc-deadline-timer-feature-to-guest from upstream
    (LP: #1013060)
 -- Serge Hallyn <email address hidden>   Wed, 12 Sep 2012 09:43:23 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu11) quantal; urgency=low

  * Cherrypick three patches from upstream
    - kvm-i8254-fix-conversion-of-in-kernel-to-userspace-state
    - kvm-i8254-cache-kernel-clock-offset-in-KVMPITState
    - kvm-i8254-finish-time-conversion-fix
    to fix time passing too quickly in some guests.  (LP: #1046771)
 -- Serge Hallyn <email address hidden>   Thu, 06 Sep 2012 10:06:41 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu10) quantal; urgency=low

  * debian/qemu-kvm.modprobe: set nested=1 at module load.  (LP: #1040230)
  * remove patch ubuntu/define_AT_EMPTY_PATH, the real fix is now in eglibc.
 -- Serge Hallyn <email address hidden>   Thu, 23 Aug 2012 11:10:53 -0500
Superseded in oneiric-updates
Superseded in oneiric-security
qemu-kvm (0.14.1+noroms-0ubuntu6.4) oneiric-security; urgency=low

  * SECURITY UPDATE: file overwrite via incorrect temp file checking
    - debian/patches/CVE-2012-2652.patch: properly check length and
      failures in block.c, block_int.h, block/vvfat.c.
    - CVE-2012-2652
  * This update not _not_ contain the changes from 0.14.1+noroms-0ubuntu6.3
    that was in oneiric-proposed.
 -- Marc Deslauriers <email address hidden>   Tue, 31 Jul 2012 10:27:20 -0400
Superseded in lucid-updates
Superseded in lucid-security
qemu-kvm (0.12.3+noroms-0ubuntu9.19) lucid-security; urgency=low

  * SECURITY UPDATE: file overwrite via incorrect temp file checking
    - debian/patches/CVE-2012-2652.patch: properly check length and
      failures in block.c, block_int.h, block/vvfat.c.
    - CVE-2012-2652
 -- Marc Deslauriers <email address hidden>   Tue, 31 Jul 2012 10:39:26 -0400
Superseded in natty-updates
Superseded in natty-security
qemu-kvm (0.14.0+noroms-0ubuntu4.6) natty-security; urgency=low

  * SECURITY UPDATE: file overwrite via incorrect temp file checking
    - debian/patches/CVE-2012-2652.patch: properly check length and
      failures in block.c, block_int.h, block/vvfat.c.
    - CVE-2012-2652
 -- Marc Deslauriers <email address hidden>   Tue, 31 Jul 2012 10:31:50 -0400
Superseded in precise-updates
Superseded in precise-security
qemu-kvm (1.0+noroms-0ubuntu14.1) precise-security; urgency=low

  * SECURITY UPDATE: file overwrite via incorrect temp file checking
    - debian/patches/CVE-2012-2652.patch: properly check length and
      failures in block.c, block_int.h, block/vvfat.c.
    - CVE-2012-2652
 -- Marc Deslauriers <email address hidden>   Tue, 31 Jul 2012 10:11:19 -0400
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu9) quantal; urgency=low

  [ Michael Tokarev ]
  * added two patches from upstream qemu-kvm/stable-1.1 branch:
    qemu-kvm-Add-missing-default-machine-options.patch
    qemu-kvm-virtio-Do-not-register-mask-notifiers-witho.patch
    (Closes: #679788) (LP: #1029201)

  [ Serge Hallyn ]
  * remove ubuntu/CVE-2011-2212-virtqueue-indirect-overflow.patch
    patch, which was actually fixed in qemu 0.15 by
    "virtio: fix indirect descriptor buffer overflow"  (Thanks to
    Michael Tokarev for pointing that out)
 -- Serge Hallyn <email address hidden>   Thu, 26 Jul 2012 10:31:53 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu8) quantal; urgency=low

  * debian/qemu-kvm.upstart: don't fail if the kernel modules are not
    found.
 -- Serge Hallyn <email address hidden>   Wed, 11 Jul 2012 17:18:06 -0500
Superseded in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
qemu-kvm (1.0+noroms-0ubuntu14) precise-proposed; urgency=low

  * debian/patches/keep-pid-file-locked.patch: keep pidfile locked for the
    lifetime of the process (LP: #1023159)
 -- Serge Hallyn <email address hidden>   Wed, 11 Jul 2012 16:41:05 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu7) quantal; urgency=low

  * ubuntu/99-ppc-increase-usability-of-ppce500-pci.patch: Allows more than
    2 PCI devices on e500 type systems.
  * Enable ppc64-softmmu target on PowerPC as well
 -- Ben Collins <email address hidden>   Thu, 28 Jun 2012 21:50:30 -0400
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu6) quantal; urgency=low

  * Add libfdt-dev [powerpc] to build-deps
  * Force --enable-fdt for powerpc builds
  * 99-allow-loading-u-boot-initrd-images.patch: Add capability to load
    initrd's in U-Image format.
  * 99-increase-u-boot-gunzip-size.patch: By default, qemu only loads
    U-Images less than or equal to 8 Megs, so increase it to 16 Megs.
 -- Ben Collins <email address hidden>   Thu, 28 Jun 2012 01:09:19 -0400
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu5) quantal; urgency=low

  * Because PPC is a true KVM target, we should be building for it, rather
    than i386/x86-64 on that architecture. However, this package is still
    trying to build the x86 targets on other non-x86 architectures. I did
    not fix this for aything other than ppc because I don't know if those
    other archs are actually KVM enabled, nor can I properly test the build
    and execution on those archs.
  * Fixup for a proper PPC build:
    - debian/control: Make description less x86-centric
    - debian/rules: Use ppc-softmmu as the target on powerpc
    - debian/rules: Enable blobs for some device tree files to be installed
    - debian/*.links: Move some x86-centric links to rules file and create
      proper links for qemu-system-ppc.
 -- Ben Collins <email address hidden>   Fri, 22 Jun 2012 22:42:15 -0400
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu4) quantal; urgency=low

  * qemu-kvm.post{inst,rm}: don't invoke-rc.d qemu-kvm
  * debian/rules: remove --noscripts from dh_installinit
 -- Serge Hallyn <email address hidden>   Wed, 20 Jun 2012 19:18:24 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu3) quantal; urgency=low

  * debian/rules:
    - fix kvm version in dh_gencontrol line (ours is higher than debian's)
    - define DEB_HOST_ARCH and DEB_HOST_ARCH_CPU
    - fix specification of --disable-kvm for arm and powerpc
    - set --{en,dis}able-kvm-device-assignment next to --{en,dis}able-kvm
    - dont' build pc-bios on non-x86, don't build bamboo on ppc
    - create the vgabios and seabios links (for x86 only)
  * debian/qemu-common.links: don't create vgabios/seabios links here
    (they're only for x86)
  * debian/optional-features: comment out --enable-kvm-device-assignment
  * ubuntu/kvm_Enable_use_of_kvm_irqchip_in_kernel_in_hwlib_code - fix
    powerpc and arm (--disable-kvm) builds.
 -- Serge Hallyn <email address hidden>   Wed, 20 Jun 2012 10:26:40 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu2) quantal; urgency=low

  * don't build against usbredir (not in main)
    - debian/optional-features: use --disable-usb-redir
    - debian/control: remove libusbredirhost-dev from build-deps
 -- Serge Hallyn <email address hidden>   Wed, 20 Jun 2012 07:38:11 -0500
Superseded in quantal-release
qemu-kvm (1.1~rc+dfsg-1ubuntu1) quantal; urgency=low

  * Merge from debian.  Remaining changes:
    - update maintainer
    - debian/optional-features: disable libiscsi, vde and spice
    - debian/control:
      * remove libiscsi-dev, spice and vde2 depends and build-deps (not in main)
      * remove qemu-keymaps depends (offered by qemu-common, and conflicts with
        binary package in universe from qemu-linaro)
      * remove ipxe-qemu depends for qemu-kvm
      * qemu-kvm: add qemu-common depends, tie qemu-utils depends to same version,
        set architecture any, add Provides: qemu
      * remove qemu-kvm-dbg: dbgsym will end up in ddebs anyway
      * add qemu-utils package, which in debian comes from qemu source package
      * add qemu-common package (doesn't exist in debian, provides shared bits
        used by qemu-linaro)
      * add qemu transitional package, qemu-common, and substitude our own kvm
        transitional package (more architectures)
    - debian/rules:
      * change --audio-drv-list order to make pa the default (see lp #304649)
      * add --enable-docs
      * remove powerpc section (for now)
      * add i386 and linux-user to QEMU_TARGET
      * remove override_dh_strip
      * set confsuffix to /qemu
      * add -fno-var-tracking for arm
      * set --disable-kvm for arches other than amd64, i386
      * install roms, bios', and utils into right package
      * build pc-bios/optionrom
      * install kvm-if{up,down} as /etc/qemu-if*
      * create directory links (/etc/kvm, /usr/share/kvm, /usr/share/qemu-kvm)
      * install qemu-kvm apport hook
      * set DEB_BUILD_HARDENING
      * set options for handling DEB_BUILD_OPTIONS=parallel=N
      * add --no-restart-on-upgrade to dh_installinit args
      * do a make install in override_dh_auto_install
      * remove manual install of kvm binary
    - qemu-kvm.postinst and prerm: remove the /usr/share/kvm/keymaps logic
    - add
      * qemu-kvm.links
      * qemu-utils.dirs, qemu-utils.links
      * qemu-common.install, qemu-common.doc, qemu-common.links, qemu-common.dirs
      * source_qemu-kvm.py (apport hook)
      * qemu-kvm.upstart and qemu-kvm.default
    - debian/kvm-ifup: source qemu-kvm.default and honor its $TAPBR
    - debian/kvm-ifdown: keep old ubuntu version
    - push (refreshed) ubuntu patches:
      * ubuntu/CVE-2011-2212-virtqueue-indirect-overflow.patch
      * ubuntu/define_AT_EMPTY_PATH.patch (until LP: 1010069 is fixed)
      * ubuntu/dont-try-to-hotplug-cpu.patch
      * ubuntu/expose_vmx_qemu64cpu.patch
      * ubuntu/fallback-to-tcg.patch
      * ubuntu/fix-vmware-vga-negative-vals
      * ubuntu/larger_default_ram_size.patch
 -- Serge Hallyn <email address hidden>   Fri, 15 Jun 2012 08:06:23 -0500
Superseded in quantal-release
Published in precise-release
qemu-kvm (1.0+noroms-0ubuntu13) precise; urgency=low

  * d/rules,d/control: Enable RADOS block device (RBD) (LP: #904834)
 -- Clint Byrum <email address hidden>   Thu, 12 Apr 2012 08:58:11 -0700
Superseded in precise-release
qemu-kvm (1.0+noroms-0ubuntu12) precise; urgency=low

  * debian/patches/rbd/: apply 3 patches (recommended by Dreamhost) for
    snapshot and live migration.
 -- Serge Hallyn <email address hidden>   Mon, 09 Apr 2012 17:12:09 -0500
Superseded in precise-release
qemu-kvm (1.0+noroms-0ubuntu11) precise; urgency=low

  * debian/patches/disable-hpet-for-tcg.patch: implicitly set -no-hpet
    when using tcg (non-accelerated qemu).  (LP: #975240)
 -- Serge Hallyn <email address hidden>   Mon, 09 Apr 2012 11:06:36 -0500
Superseded in precise-release
qemu-kvm (1.0+noroms-0ubuntu10) precise; urgency=low

  * debian/rules: set sysconfdir to /etc (LP: #960359)
 -- Serge Hallyn <email address hidden>   Tue, 20 Mar 2012 22:31:21 -0500
Superseded in precise-release
qemu-kvm (1.0+noroms-0ubuntu9) precise; urgency=low

  * debian/patches/multiboot-load-fix.diff: fix bug when loading
    multiboot images such as grub via -kernel parameter (LP: #957622)
 -- Scott Moser <email address hidden>   Sun, 18 Mar 2012 19:34:28 -0400
175 of 245 results