Skip to content

Instantly share code, notes, and snippets.

@cronnelly
Created March 11, 2014 11:43
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save cronnelly/9484112 to your computer and use it in GitHub Desktop.
Save cronnelly/9484112 to your computer and use it in GitHub Desktop.
qemu-kvm (1.0+noroms-0ubuntu14.13) precise-security; urgency=medium
* SECURITY UPDATE: privilege escalation via REPORT LUNS
- debian/patches/CVE-2013-4344.patch: support more than 256 LUNS in
hw/scsi-bus.c, hw/scsi.h.
- CVE-2013-4344
-- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 28 Jan 2014 09:08:09 -0500
qemu-kvm (1.0+noroms-0ubuntu14.12) precise-proposed; urgency=low
* migration-do-not-overwrite-zero-pages.patch,
call-madv-hugepage-for-guest-ram-allocations.patch:
Fix performance degradation after migrations, and savevm/loadvm.
(LP: #1100843)
-- Chris J Arges <chris.j.arges@ubuntu.com> Wed, 02 Oct 2013 16:26:27 -0500
qemu-kvm (1.0+noroms-0ubuntu14.11) precise-proposed; urgency=low
* debian/control and qemu-kvm.postinst: remove any g:--- acl on /dev/kvm
(left over from udev-acl). (LP: #1057024)
-- Serge Hallyn <serge.hallyn@ubuntu.com> Wed, 17 Jul 2013 10:14:46 -0500
qemu-kvm (1.0+noroms-0ubuntu14.10) precise-proposed; urgency=low
* remove 9004-qcow2-Simplify-count_cow_clusters.patch, which may or may
not have actually fixed bug 1189926. Replace ith with:
9004-qcow2-start-at-0-when-counting-cow-clusters.patch: Fixes corruption
issues with qcow2. (LP: #1189926)
-- Chris J Arges <chris.j.arges@ubuntu.com> Mon, 17 Jun 2013 10:11:38 -0500
qemu-kvm (1.0+noroms-0ubuntu14.9) precise-proposed; urgency=low
* 9004-qcow2-Simplify-count_cow_clusters.patch: fixes corruption
with qcow2. (LP: #1189926)
-- Chris J Arges <chris.j.arges@ubuntu.com> Wed, 12 Jun 2013 13:19:46 -0500
qemu-kvm (1.0+noroms-0ubuntu14.8) precise-proposed; urgency=low
* qemu-utils.links: fix kvm-nbd.8.gz and kvm-img.1.gz symlinks. (LP: #1089402)
* take 9pfs-remove-noatime-flag-from-ro-open-calls.patch from upstream git
to make readonly+nonroot 9p mounts succeed. (LP: #1091430)
-- Serge Hallyn <serge.hallyn@ubuntu.com> Tue, 29 Jan 2013 22:41:42 -0600
qemu-kvm (1.0+noroms-0ubuntu14.7) precise-security; urgency=low
* SECURITY UPDATE: guest denial of service and possible code execution
via e1000 large packets
- debian/patches/CVE-2012-6075.patch: properly discard oversize packets
in hw/e1000.c.
- CVE-2012-6075
-- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 15 Jan 2013 09:27:30 -0500
qemu-kvm (1.0+noroms-0ubuntu14.6) precise-proposed; urgency=low
* Fix qemu-kvm.upstart: just don't run in a container. Otherwise we'll
still try to load/unload kernel modules. Also undo the || true after
sysfs writes. Since setting those is a part of configuring qemu-kvm
on the host, failing when they fail makes sense.
-- Serge Hallyn <serge.hallyn@ubuntu.com> Thu, 20 Dec 2012 12:34:52 -0600
qemu-kvm (1.0+noroms-0ubuntu14.5) precise-proposed; urgency=low
* add udev to qemu-kvm Depends to ensure that postinst succeeds.
(LP: #1080912)
-- Serge Hallyn <serge.hallyn@ubuntu.com> Tue, 20 Nov 2012 10:58:05 -0600
qemu-kvm (1.0+noroms-0ubuntu14.4) precise-proposed; urgency=low
[ Serge Hallyn ]
* debian/qemu-kvm.postinst: use udevadm trigger to change /dev/kvm perms as
recommended by Steve Langasek (LP: #1057024)
* apply debian/patches/nbd-fixes-to-read-only-handling.patch from upstream to
make read-write mount after read-only mount work. (LP: #1077838)
[ Robert Collins ]
* Fix upstart job to succeed if ksm settings can't be altered in the same way
other settings are handled. (LP: #1078530)
-- Serge Hallyn <serge.hallyn@ubuntu.com> Thu, 15 Nov 2012 10:42:37 -0600
qemu-kvm (1.0+noroms-0ubuntu14.3) precise-proposed; urgency=low
* Fix race condition in virtio code on multicore systems. (LP: #997978)
- 9001-virtio-add-missing-mb-on-notification.patch
- 9002-virtio-add-missing-mb-on-enable-notification.patch
- 9003-virtio-order-index-descriptor-reads.patch
-- Soren Hansen <soren@ubuntu.com> Mon, 03 Sep 2012 10:15:54 +0200
qemu-kvm (1.0+noroms-0ubuntu14.2) precise-security; urgency=low
* SECURITY UPDATE: privilege escalation via VT100 sequences
- debian/patches/CVE-2012-3515.patch: check bounds in console.c.
- CVE-2012-3515
-- Marc Deslauriers <marc.deslauriers@ubuntu.com> Tue, 25 Sep 2012 10:05:23 -0400
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment