qemu: CVE-2015-3209: heap overflow in QEMU PCNET controller (allowing guest->host escape)

Related Vulnerabilities: CVE-2015-3209   CVE-2015-4037   CVE-2015-4103   CVE-2015-4104   CVE-2015-4105   CVE-2015-4106  

Debian Bug report logs - #788460
qemu: CVE-2015-3209: heap overflow in QEMU PCNET controller (allowing guest->host escape)

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Thu, 11 Jun 2015 16:09:02 UTC

Severity: grave

Tags: fixed-upstream, patch, security, upstream

Found in version qemu/1.1.2+dfsg-1

Fixed in versions qemu/1:2.3+dfsg-6, qemu/1:2.1+dfsg-12+deb8u1, qemu/1.1.2+dfsg-6a+deb7u8, qemu-kvm/1.1.2+dfsg-6+deb7u8

Done: Michael Tokarev <mjt@tls.msk.ru>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>:
Bug#788460; Package src:qemu. (Thu, 11 Jun 2015 16:09:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>. (Thu, 11 Jun 2015 16:09:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: qemu: CVE-2015-3209: heap overflow in QEMU PCNET controller (allowing guest->host escape)
Date: Thu, 11 Jun 2015 18:06:56 +0200
Source: qemu
Version: 1.1.2+dfsg-1
Severity: grave
Tags: security upstream patch fixed-upstream

Hi Michael,

Filling a but to have a reference to the BTS.

the following vulnerability was published for qemu.

CVE-2015-3209[0]:
heap overflow in qemu pcnet controller allowing guest to host escape

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-3209
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1225882

Regards,
Salvatore



Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Thu, 11 Jun 2015 17:21:21 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Thu, 11 Jun 2015 17:21:21 GMT) (full text, mbox, link).


Message #10 received at 788460-close@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 788460-close@bugs.debian.org
Subject: Bug#788460: fixed in qemu 1:2.3+dfsg-6
Date: Thu, 11 Jun 2015 17:19:56 +0000
Source: qemu
Source-Version: 1:2.3+dfsg-6

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 788460@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <mjt@tls.msk.ru> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 11 Jun 2015 20:03:40 +0300
Source: qemu
Binary: qemu qemu-system qemu-block-extra qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm libcacard0 libcacard-dev libcacard-tools
Architecture: source
Version: 1:2.3+dfsg-6
Distribution: unstable
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
 libcacard-dev - Virtual Common Access Card (CAC) Emulator (development files)
 libcacard-tools - Virtual Common Access Card (CAC) Emulator (tools)
 libcacard0 - Virtual Common Access Card (CAC) Emulator (runtime library)
 qemu       - fast processor emulator
 qemu-block-extra - extra block backend modules for qemu-system and qemu-utils
 qemu-guest-agent - Guest-side qemu-system agent
 qemu-kvm   - QEMU Full virtualization on x86 hardware
 qemu-system - QEMU full system emulation binaries
 qemu-system-arm - QEMU full system emulation binaries (arm)
 qemu-system-common - QEMU full system emulation binaries (common files)
 qemu-system-mips - QEMU full system emulation binaries (mips)
 qemu-system-misc - QEMU full system emulation binaries (miscelaneous)
 qemu-system-ppc - QEMU full system emulation binaries (ppc)
 qemu-system-sparc - QEMU full system emulation binaries (sparc)
 qemu-system-x86 - QEMU full system emulation binaries (x86)
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 788460
Changes:
 qemu (1:2.3+dfsg-6) unstable; urgency=high
 .
   * pcnet-force-buffer-access-to-be-in-bounds-CVE-2015-3209.patch
     from upstream (Closes: #788460 CVE-2015-3209)
Checksums-Sha1:
 b8d25346f471f980831c2836ab7c8fb2b3f2d049 6040 qemu_2.3+dfsg-6.dsc
 9594c116692a516f2a691e55f952e9883ab99ec5 82508 qemu_2.3+dfsg-6.debian.tar.xz
Checksums-Sha256:
 fd410eee7137bcbb3239416975a45e302aded6c45dd403b45582420b9917284f 6040 qemu_2.3+dfsg-6.dsc
 b42ad180d5f8b070a662f4c6649f9e3c97694f628ed92a50fa61cea9ea873b12 82508 qemu_2.3+dfsg-6.debian.tar.xz
Files:
 4a45e72df248bf0166eee833f6e6e4c6 6040 otherosfs optional qemu_2.3+dfsg-6.dsc
 863ad20112e617b16b1d55e91c087561 82508 otherosfs optional qemu_2.3+dfsg-6.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJVeb+CAAoJEL7lnXSkw9fbSZoH/1pyFGDXqjdma6IXmN7xI2b9
Tq93SkaVZExUwSE+76hQFVDNWnoQm6PAcEbYVzy20lmJnMRXBZDngNRfqDd8XP+u
HtfWOWqE5H8WYJECAc9efUbGSe3sTTqzqU3fGK12huCKCwEtt4U1j2k2kzlLvVcQ
85/gaSnlTGNse+thrvH/T6kuprgrfkLchB+0TlMMIjlNBIh+QWOsw0zObSn3E7g0
q2sVJwfgOYBr6dPm5Ie8odIS3A+aFGs32tKVqe2+HNHXSSbqPnMTLOQkuX6WIPJS
2Djy8F6owvTgrU4EEbzXFDXdrbpQR6nega+PtmI9YS5UETz3MA5EwHbDU0yWPKU=
=y1WG
-----END PGP SIGNATURE-----




Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Sun, 14 Jun 2015 16:06:07 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 14 Jun 2015 16:06:07 GMT) (full text, mbox, link).


Message #15 received at 788460-close@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 788460-close@bugs.debian.org
Subject: Bug#788460: fixed in qemu 1:2.1+dfsg-12+deb8u1
Date: Sun, 14 Jun 2015 16:02:58 +0000
Source: qemu
Source-Version: 1:2.1+dfsg-12+deb8u1

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 788460@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <mjt@tls.msk.ru> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 11 Jun 2015 20:17:04 +0300
Source: qemu
Binary: qemu qemu-system qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static qemu-user-binfmt qemu-utils qemu-guest-agent qemu-kvm
Architecture: source
Version: 1:2.1+dfsg-12+deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description:
 qemu       - fast processor emulator
 qemu-guest-agent - Guest-side qemu-system agent
 qemu-kvm   - QEMU Full virtualization on x86 hardware
 qemu-system - QEMU full system emulation binaries
 qemu-system-arm - QEMU full system emulation binaries (arm)
 qemu-system-common - QEMU full system emulation binaries (common files)
 qemu-system-mips - QEMU full system emulation binaries (mips)
 qemu-system-misc - QEMU full system emulation binaries (miscelaneous)
 qemu-system-ppc - QEMU full system emulation binaries (ppc)
 qemu-system-sparc - QEMU full system emulation binaries (sparc)
 qemu-system-x86 - QEMU full system emulation binaries (x86)
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-binfmt - QEMU user mode binfmt registration for qemu-user
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 787547 788460
Changes:
 qemu (1:2.1+dfsg-12+deb8u1) jessie-security; urgency=high
 .
   * slirp-use-less-predictable-directory-name-in-tmp-CVE-2015-4037.patch
     (Closes: CVE-2015-4037)
   * 11 patches for XEN PCI pass-through issues
     (Closes: #787547 CVE-2015-4103 CVE-2015-4104 CVE-2015-4105 CVE-2015-4106)
   * pcnet-force-buffer-access-to-be-in-bounds-CVE-2015-3209.patch
     with preparation bugfix pcnet-fix-negative-array-index-read.patch
     from upstream (Closes: #788460 CVE-2015-3209)
Checksums-Sha1:
 32e306497bc8b6f65c8713e383b5968dcf29d1d3 5174 qemu_2.1+dfsg-12+deb8u1.dsc
 79252b7eb6054390584b67b2e9e6b5764ef48054 105752 qemu_2.1+dfsg-12+deb8u1.debian.tar.xz
Checksums-Sha256:
 72243a617919f14a0343a171ddd9e678ffdce5fc78c7f951b4264b72b625e6f9 5174 qemu_2.1+dfsg-12+deb8u1.dsc
 4a6b8761167a8b2cdc553c90cab1e67474ce4be7996d3bb1c4eb188ff4208331 105752 qemu_2.1+dfsg-12+deb8u1.debian.tar.xz
Files:
 6ab66f0e18fea39c4857351eced6f672 5174 otherosfs optional qemu_2.1+dfsg-12+deb8u1.dsc
 813744f5b619eb2b23c1b8692b589c12 105752 otherosfs optional qemu_2.1+dfsg-12+deb8u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJVefxUAAoJEL7lnXSkw9fbvmEH/0U6/Xi+n/WY+rvhIVMU9ik9
fpOVZYDWGWZXOtXfvEIFUkRO6rv5ZHDbbonsg/9mDwTcZo8Qz44akdPqd9jS0xGA
olkuYL9/NO7lFlif+5If+Fa6ZRfz38VpEWkEgibGJm0KBtnqAwsaCj07DOSRhA2j
R2M7R6Ssn/NaBl2BX5KqGFu3/TlePPVFBDfhKi06QyWRXvhGx2DASqXUeETceYmK
1vA/SAx5qOvQcnha5Ml/OobuHLEJNlESEw0T6pWBS94HKcjDdUk8RzohF9ed+Eby
+A+860Te+H8iQ72eB+vs1RvdRA2tA3j2MDg091c0u76/fiAflHfBj/xtWf111/c=
=woCP
-----END PGP SIGNATURE-----




Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Sun, 14 Jun 2015 16:09:08 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 14 Jun 2015 16:09:08 GMT) (full text, mbox, link).


Message #20 received at 788460-close@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 788460-close@bugs.debian.org
Subject: Bug#788460: fixed in qemu 1.1.2+dfsg-6a+deb7u8
Date: Sun, 14 Jun 2015 16:04:46 +0000
Source: qemu
Source-Version: 1.1.2+dfsg-6a+deb7u8

We believe that the bug you reported is fixed in the latest version of
qemu, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 788460@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <mjt@tls.msk.ru> (supplier of updated qemu package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 12 Jun 2015 09:51:17 +0300
Source: qemu
Binary: qemu qemu-keymaps qemu-system qemu-user qemu-user-static qemu-utils
Architecture: source all amd64
Version: 1.1.2+dfsg-6a+deb7u8
Distribution: wheezy-security
Urgency: high
Maintainer: Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description: 
 qemu       - fast processor emulator
 qemu-keymaps - QEMU keyboard maps
 qemu-system - QEMU full system emulation binaries
 qemu-user  - QEMU user mode emulation binaries
 qemu-user-static - QEMU user mode emulation binaries (static version)
 qemu-utils - QEMU utilities
Closes: 788460
Changes: 
 qemu (1.1.2+dfsg-6a+deb7u8) wheezy-security; urgency=high
 .
   * slirp-use-less-predictable-directory-name-in-tmp-CVE-2015-4037.patch
     (Closes: CVE-2015-4037)
   * pcnet-force-buffer-access-to-be-in-bounds-CVE-2015-3209.patch
     with preparation bugfix pcnet-fix-negative-array-index-read.patch
     from upstream (Closes: #788460 CVE-2015-3209)
Checksums-Sha1: 
 a2012aa32a00dbad08f32fc0b369e2d09bb23db1 2617 qemu_1.1.2+dfsg-6a+deb7u8.dsc
 f443b8471ef83a30a37e2e0706b166adc930b9dc 108618 qemu_1.1.2+dfsg-6a+deb7u8.debian.tar.gz
 162b1da4fa7f6076d418f9904a288852d5642590 49748 qemu-keymaps_1.1.2+dfsg-6a+deb7u8_all.deb
 f54dd94ff53dbf5854710cf18e5c4e8911ab4adf 114922 qemu_1.1.2+dfsg-6a+deb7u8_amd64.deb
 8a286ad4dfc9c9354ee78397ebe348595c3e1f1b 27895620 qemu-system_1.1.2+dfsg-6a+deb7u8_amd64.deb
 7225a3acadee9434d4e4491c22b9538c55a11430 7722504 qemu-user_1.1.2+dfsg-6a+deb7u8_amd64.deb
 e4cf5a486310f6f91ef5daacaa79ce89be4f51be 16568620 qemu-user-static_1.1.2+dfsg-6a+deb7u8_amd64.deb
 ac7df09875f18c282ddd5839883ec58181f67e0e 664134 qemu-utils_1.1.2+dfsg-6a+deb7u8_amd64.deb
Checksums-Sha256: 
 61df2f29049c88321e3bb158d4ef8e6ad011f3f14978b63f4a5bf516bd2fb9df 2617 qemu_1.1.2+dfsg-6a+deb7u8.dsc
 64c651723920a5c8049dc9fd8fa3f2e4968357d0a27ed5f2036d2b1321db736b 108618 qemu_1.1.2+dfsg-6a+deb7u8.debian.tar.gz
 3cfea08206944dbfaf89cd8d22e6bec5b0aa4f96275874432e222710e72541df 49748 qemu-keymaps_1.1.2+dfsg-6a+deb7u8_all.deb
 7062669b92c8b8d44ad5d36e8550a524f8a3373f254d83ae10d2473e84d830d0 114922 qemu_1.1.2+dfsg-6a+deb7u8_amd64.deb
 d9cee00affc451520fdbde36969b3e6c8c3c23e6cce81dbd7c1e8ee905b9c0ba 27895620 qemu-system_1.1.2+dfsg-6a+deb7u8_amd64.deb
 5a038483a223e94172588de81b8aae420a1ef5450d35ed1018e3ed1dfa12f82f 7722504 qemu-user_1.1.2+dfsg-6a+deb7u8_amd64.deb
 2054d486f8d2ffbfaaf452811e7d5980dd9d71d8b4f6db43f506ce1e611bd6cf 16568620 qemu-user-static_1.1.2+dfsg-6a+deb7u8_amd64.deb
 0123e06345c495725c0a90f66b268048621e4253208098f7fac647289b781330 664134 qemu-utils_1.1.2+dfsg-6a+deb7u8_amd64.deb
Files: 
 7f44b295177319e21791c5d658180e77 2617 misc optional qemu_1.1.2+dfsg-6a+deb7u8.dsc
 d8b8752cafc1b8abe093b10792ebd93d 108618 misc optional qemu_1.1.2+dfsg-6a+deb7u8.debian.tar.gz
 347340cf034dc1e09eef476c885b12c4 49748 misc optional qemu-keymaps_1.1.2+dfsg-6a+deb7u8_all.deb
 f19d377bbec0ad48779f4ba8394550f1 114922 misc optional qemu_1.1.2+dfsg-6a+deb7u8_amd64.deb
 eabbf83a8705afbfab21bad06efce04b 27895620 misc optional qemu-system_1.1.2+dfsg-6a+deb7u8_amd64.deb
 bd12fa369e94c99c1f8b2d8895236929 7722504 misc optional qemu-user_1.1.2+dfsg-6a+deb7u8_amd64.deb
 7687652899d09dbaf5fc64964715ab32 16568620 misc optional qemu-user-static_1.1.2+dfsg-6a+deb7u8_amd64.deb
 42062b913212103ce087acc87bee7ba5 664134 misc optional qemu-utils_1.1.2+dfsg-6a+deb7u8_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJVepjUAAoJEL7lnXSkw9fb9GMIAJyK/K/2KbUf/c6j4V77xmFd
UybtzyHrqeQkvMzciAdgsm8O6+jmVOzNMrJXrMBzwz6DMnT6g8Ho2x2PIRIe0mxZ
DKgmASzmIDz0TDgcZApSfIEPOPK1Ri9VyhjKpINbmo4uwadIYIV+aNU+syAx80tY
7y0NRdaARNO2l75X1sfMneQ1O5fGZFWOkLojkWK9RWVdXRsP9XDkwZOjKsqX4Omc
dVasBCr4bZgi33+6aQI4iwwCGm5pEgQW3oUVDApaXAuca2aMy2DYzMKDInfYJr/a
m1kmnWgXD4QopGzJkRjSONiijw346ydjOCi+oJfDI9DmYbJcHoNcNFX2DVq+9go=
=8Lo7
-----END PGP SIGNATURE-----




Reply sent to Michael Tokarev <mjt@tls.msk.ru>:
You have taken responsibility. (Sun, 14 Jun 2015 16:09:11 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 14 Jun 2015 16:09:11 GMT) (full text, mbox, link).


Message #25 received at 788460-close@bugs.debian.org (full text, mbox, reply):

From: Michael Tokarev <mjt@tls.msk.ru>
To: 788460-close@bugs.debian.org
Subject: Bug#788460: fixed in qemu-kvm 1.1.2+dfsg-6+deb7u8
Date: Sun, 14 Jun 2015 16:05:39 +0000
Source: qemu-kvm
Source-Version: 1.1.2+dfsg-6+deb7u8

We believe that the bug you reported is fixed in the latest version of
qemu-kvm, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 788460@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Tokarev <mjt@tls.msk.ru> (supplier of updated qemu-kvm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 12 Jun 2015 09:51:17 +0300
Source: qemu-kvm
Binary: qemu-kvm qemu-kvm-dbg kvm
Architecture: source amd64
Version: 1.1.2+dfsg-6+deb7u8
Distribution: wheezy-security
Urgency: high
Maintainer: Michael Tokarev <mjt@tls.msk.ru>
Changed-By: Michael Tokarev <mjt@tls.msk.ru>
Description: 
 kvm        - dummy transitional package from kvm to qemu-kvm
 qemu-kvm   - Full virtualization on x86 hardware
 qemu-kvm-dbg - Debugging info for qemu-kvm
Closes: 788460
Changes: 
 qemu-kvm (1.1.2+dfsg-6+deb7u8) wheezy-security; urgency=high
 .
   * slirp-use-less-predictable-directory-name-in-tmp-CVE-2015-4037.patch
     (Closes: CVE-2015-4037)
   * pcnet-force-buffer-access-to-be-in-bounds-CVE-2015-3209.patch
     with preparation bugfix pcnet-fix-negative-array-index-read.patch
     from upstream (Closes: #788460 CVE-2015-3209)
Checksums-Sha1: 
 cfb684ef0a888072a04e4630f9cbc210431f4bf9 2134 qemu-kvm_1.1.2+dfsg-6+deb7u8.dsc
 db7674ccaafa94b02a2a57e77872c579ec0c3f26 96551 qemu-kvm_1.1.2+dfsg-6+deb7u8.debian.tar.gz
 1f3413e22754f7aa434426540ab935f17a697bbd 1679640 qemu-kvm_1.1.2+dfsg-6+deb7u8_amd64.deb
 a2c058623eade27b8312a6cf8b813213c632871b 5273348 qemu-kvm-dbg_1.1.2+dfsg-6+deb7u8_amd64.deb
 1038f813e7ef01b8bcec23777e74de0c8bc4b9dd 24252 kvm_1.1.2+dfsg-6+deb7u8_amd64.deb
Checksums-Sha256: 
 83bb1d743e86d257e33442a3f57f5a08a68c65c7e36d677cee7f8d7edbda54f7 2134 qemu-kvm_1.1.2+dfsg-6+deb7u8.dsc
 35b258aadc2f37ca0b00b57c563231bf6d76dbb35efea31455a572bdb5321df9 96551 qemu-kvm_1.1.2+dfsg-6+deb7u8.debian.tar.gz
 4d5ef8596bd101cb8b99abecd015b5ad8cd9402a99e1593661048fef7e2f29f9 1679640 qemu-kvm_1.1.2+dfsg-6+deb7u8_amd64.deb
 9c3997b072731e53ad6d9366e1bfa5e3943dc572fd1aeadc5c3c07d331a90291 5273348 qemu-kvm-dbg_1.1.2+dfsg-6+deb7u8_amd64.deb
 6f637703836de11e82d084099fec44e86b9723522575128b993cdc07cb769745 24252 kvm_1.1.2+dfsg-6+deb7u8_amd64.deb
Files: 
 34a4b12a94cc1a8988e55ccd3e16da43 2134 misc optional qemu-kvm_1.1.2+dfsg-6+deb7u8.dsc
 c7f6be3bb5620a24d0647bec08dd7b59 96551 misc optional qemu-kvm_1.1.2+dfsg-6+deb7u8.debian.tar.gz
 41feae5c2ad684d334e95d49d8f802f4 1679640 misc optional qemu-kvm_1.1.2+dfsg-6+deb7u8_amd64.deb
 18f6fadc342beca2d096240dae370beb 5273348 debug extra qemu-kvm-dbg_1.1.2+dfsg-6+deb7u8_amd64.deb
 541887c8b890ca31f455e07af74a41a8 24252 oldlibs extra kvm_1.1.2+dfsg-6+deb7u8_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJVepjTAAoJEL7lnXSkw9fblecH/RW+dh4tEVqqA3NdQs+1OTUQ
0/RyzN7kCim8eUhmu9B+zLSvBScp8u1bMGty0tGAv5w7aey5r/TSQJq3X4gUoSnY
5GMjsYfL6EeK5HFoNJfzdJoGwILst1B6CNlRJuFhv8WemVmXv5IQ4MGRKjNRoY4Y
svtIcoPJCDVtPtcT1LiPETK4jbEyX3bvLvd6hhQ0ceYJrk+JR0a6tceV/fFROiQ6
diQ3oztHb4rz3a33hQnMZPl2OGbiWxv/5s5i+/1kUkz/mgsJO3BHg66Mhlnmy7YU
Uvm7WEqcUuC+EmlWKKKCamB7Ta806F/MxIaSwS0KhjJalxB0QbFej3l//TJ/Ips=
=Z0pe
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 04 Oct 2015 08:02:52 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 18:47:31 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.