Re: Request for testing: qemu

2019-05-09 Thread Emilio Pozuelo Monfort
On 25/04/2019 03:54, Emilio Pozuelo Monfort wrote: > Hi, > > I prepared an update for qemu, with the following fixes: > > * CVE-2018-20815: information disclosure in tcp_emu(). > * CVE-2019-9824: heap buffer overflow in load_device_tree(). > * CVE-2018-11806: heap-based buffer overflow via

[SECURITY] [DLA 1781-1] qemu security update

2019-05-09 Thread Emilio Pozuelo Monfort
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Package: qemu Version: 1:2.1+dfsg-12+deb8u11 CVE ID : CVE-2018-11806 CVE-2018-18849 CVE-2018-20815 CVE-2019-9824 Debian Bug : 901017 912535 Several vulnerabilities were found in QEMU, a fast processor emulator:

Accepted qemu 1:2.1+dfsg-12+deb8u11 (source amd64) into oldstable

2019-05-09 Thread Emilio Pozuelo Monfort
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Tue, 02 Apr 2019 11:03:28 +0200 Source: qemu Binary: qemu qemu-system qemu-system-common qemu-system-misc qemu-system-arm qemu-system-mips qemu-system-ppc qemu-system-sparc qemu-system-x86 qemu-user qemu-user-static

Accepted postgresql-9.4 9.4.22-0+deb8u1 (source amd64 all) into oldstable

2019-05-09 Thread Christoph Berg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Format: 1.8 Date: Thu, 09 May 2019 10:04:31 +0200 Source: postgresql-9.4 Binary: libpq-dev libpq5 libecpg6 libecpg-dev libecpg-compat3 libpgtypes3 postgresql-9.4 postgresql-9.4-dbg postgresql-client-9.4 postgresql-server-dev-9.4 postgresql-doc-9.4