Your message dated Wed, 10 Feb 2016 22:20:21 +0000
with message-id <e1atd7v-0000te...@franck.debian.org>
and subject line Bug#808130: fixed in qemu-kvm 1.1.2+dfsg-6+deb7u12
has caused the Debian Bug report #808130,
regarding CVE-2015-8504: vnc floating point exception
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
808130: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: qemu
Version: 1:2.1+dfsg-12
Severity: important
Tags: security upstream patch fixed-upstream
There's a floating point exception in qemu-system vnc server,
being tracked as CVE-2015-8504. Upstream commit:
http://git.qemu.org/?p=qemu.git;a=commit;h=4c65fed8bdf96780735dbdb92a8bd0d6b6526cc3
--- End Message ---
--- Begin Message ---
Source: qemu-kvm
Source-Version: 1.1.2+dfsg-6+deb7u12
We believe that the bug you reported is fixed in the latest version of
qemu-kvm, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 808...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Tokarev <m...@tls.msk.ru> (supplier of updated qemu-kvm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Mon, 01 Feb 2016 23:53:18 +0300
Source: qemu-kvm
Binary: qemu-kvm qemu-kvm-dbg kvm
Architecture: source amd64
Version: 1.1.2+dfsg-6+deb7u12
Distribution: wheezy-security
Urgency: high
Maintainer: Michael Tokarev <m...@tls.msk.ru>
Changed-By: Michael Tokarev <m...@tls.msk.ru>
Description:
kvm - dummy transitional package from kvm to qemu-kvm
qemu-kvm - Full virtualization on x86 hardware
qemu-kvm-dbg - Debugging info for qemu-kvm
Closes: 799452 806373 806741 806742 808130 808144 810519 810527 811201
Changes:
qemu-kvm (1.1.2+dfsg-6+deb7u12) wheezy-security; urgency=high
.
* applied 3 patches from upstream to fix virtio-net
possible remote DoS (Closes: #799452 CVE-2015-7295)
* pcnet-add-check-to-validate-receive-data-size-CVE-2015-7504.patch
(Closes: #806742, CVE-2015-7504)
* pcnet-fix-rx-buffer-overflow-CVE-2015-7512.patch
(Closes: #806741, CVE-2015-7512)
* eepro100-prevent-two-endless-loops-CVE-2015-8345.patch
(Closes: #806373, CVE-2015-8345)
* vnc-avoid-floating-point-exception-CVE-2015-8504.patch
(Closes: #808130, CVE-2015-8504)
* ehci-make-idt-processing-more-robust-CVE-2015-8558.patch
(Closes: #808144, CVE-2015-8558)
* net-ne2000-fix-bounds-check-in-ioport-operations-CVE-2015-8743.patch
(Closes: #810519, CVE-2015-8743)
* ide-ahci-reset-ncq-object-to-unused-on-error-CVE-2016-1568.patch
(Closes: #810527, CVE-2016-1568)
* fw_cfg-add-check-to-validate-current-entry-value-CVE-2016-1714.patch
(Closes: CVE-2016-1714)
* i386-avoid-null-pointer-dereference-CVE-2016-1922.patch
(Closes: #811201, CVE-2016-1922)
Checksums-Sha1:
d4538c4f85783793c947cdc432f1dea179d8f46e 2141 qemu-kvm_1.1.2+dfsg-6+deb7u12.dsc
62b0ec7f261463d5ccd18f1b3cf9c6acdb4f2097 116561
qemu-kvm_1.1.2+dfsg-6+deb7u12.debian.tar.gz
f6e8e1247549bc51e47dff0dc4f48b24d8e4d95c 1681396
qemu-kvm_1.1.2+dfsg-6+deb7u12_amd64.deb
9d9fcea3292a044e64953d9de999308524cfc7b5 5274642
qemu-kvm-dbg_1.1.2+dfsg-6+deb7u12_amd64.deb
48bab6462ebb9831dc04692d5b1146fb535843ff 25186
kvm_1.1.2+dfsg-6+deb7u12_amd64.deb
Checksums-Sha256:
64beb4e6f29513979b48deb3932d826b457c25358011048b3c090d5682152bd8 2141
qemu-kvm_1.1.2+dfsg-6+deb7u12.dsc
c10c5304d6e227f8e6090c3f77d2cc4368bde3c6710ee4f0cdd1963193dadaaa 116561
qemu-kvm_1.1.2+dfsg-6+deb7u12.debian.tar.gz
bf8c0218e27ac52cca0d69be470a422caa49b27007c09b71ae4fe532e9ab5791 1681396
qemu-kvm_1.1.2+dfsg-6+deb7u12_amd64.deb
105d76435eb2cbc242c24c0cf9b0379699f56b0766c087f690e14e2919d0dcb3 5274642
qemu-kvm-dbg_1.1.2+dfsg-6+deb7u12_amd64.deb
2a7871dd81cd3ffe4d826c06e8df503ce5993137fdbbe7d9d03efa44aa719dac 25186
kvm_1.1.2+dfsg-6+deb7u12_amd64.deb
Files:
144ef48116fcaf60b920412a1658994b 2141 misc optional
qemu-kvm_1.1.2+dfsg-6+deb7u12.dsc
6c1789caffb3fad07ae93d02dd7415dc 116561 misc optional
qemu-kvm_1.1.2+dfsg-6+deb7u12.debian.tar.gz
34cce6c5bed1c1658e71e2618a42547b 1681396 misc optional
qemu-kvm_1.1.2+dfsg-6+deb7u12_amd64.deb
4392245f14166fdae50dbfbaa5fb02ce 5274642 debug extra
qemu-kvm-dbg_1.1.2+dfsg-6+deb7u12_amd64.deb
221a8847104fb9f9cea071330a79fbae 25186 oldlibs extra
kvm_1.1.2+dfsg-6+deb7u12_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJWr8h6AAoJEL7lnXSkw9fbLt0H/2vgCcpm3suUaUsdZJZhifl/
fbgzYO25aFZ9yEdnz+/MLpXmXS4IvrD8gy4D+7a6HvoN6B8TLOgdGdpdvmlMXcDB
+/buijAtLHWQVl7F/lugVXUHMpPB8Yas7NTvH33Q1j/YNeznc1U70fTZKCz6oLYd
YfaRI0tEaPpnK9gG4LJfQotpzoKhYNtJrrcif3svKlOhGYHwrYVHdM1N64f1taph
IkK4bpwwp5P3AWLeDzJF9ifpb635gwUr5G+yojnZggj/IZuIJS4Ibw/nMUrGbMT5
mgn24j1d7SMv/jbVpXCdtljtDfjU25zJBFY9Lna6D31yqzRHe7yd5ukoEct6u9A=
=56BX
-----END PGP SIGNATURE-----
--- End Message ---