qemu-system-x86_2.1+dfsg-12+deb8u6_amd64.deb


Advertisement

Description

qemu-system-x86 - QEMU full system emulation binaries (x86)

Property Value
Distribution Debian 8 (Jessie)
Repository Debian Main amd64
Package filename qemu-system-x86_2.1+dfsg-12+deb8u6_amd64.deb
Package name qemu-system-x86
Package version 2.1+dfsg
Package release 12+deb8u6
Package architecture amd64
Package type deb
Category otherosfs uitoolkit::ncurses uitoolkit::sdl
Homepage http://www.qemu.org/
License -
Maintainer Debian QEMU Team <pkg-qemu-devel@lists.alioth.debian.org>
Download size 1.95 MB
Installed size 11.46 MB
QEMU is a fast processor emulator: currently the package supports
i386 and x86-64 emulation. By using dynamic translation it achieves
reasonable speed while being easy to port on new host CPUs.
This package provides the full system emulation binaries to emulate
the following x86 hardware: i386 x86_64.
In system emulation mode QEMU emulates a full system, including a processor
and various peripherals.  It enables easier testing and debugging of system
code.  It can also be used to provide virtual hosting of several virtual
machines on a single server.
On x86 host hardware this package also enables KVM kernel virtual machine
usage on systems which supports it.

Alternatives

Package Version Architecture Repository
qemu-system-x86_2.1+dfsg-12+deb8u6_i386.deb 2.1+dfsg i386 Debian Main
qemu-system-x86 - - -

Requires

Name Value
ipxe-qemu >= 1.0.0+git-20131111.c3d1e78-1~
libaio1 >= 0.3.93
libasound2 >= 1.0.16
libbluetooth3 >= 4.91
libbrlapi0.6 -
libc6 >= 2.15
libcurl3-gnutls >= 7.16.3
libfdt1 -
libgcc1 >= 1:4.1.1
libglib2.0-0 >= 2.24.0
libgnutls-deb0-28 >= 3.3.0
libiscsi2 >= 1.10.0
libjpeg62-turbo >= 1.3.1
libncurses5 >= 5.5-5~
libpixman-1-0 >= 0.19.6
libpng12-0 >= 1.2.13-4
libpulse0 >= 0.99.1
librados2 >= 0.72.2
librbd1 >= 0.72.2
libsasl2-2 -
libsdl1.2debian >= 1.2.11
libseccomp2 >= 0.0.0~20120605
libspice-server1 >= 0.12.5
libssh2-1 >= 1.2.8
libtinfo5 -
libusb-1.0-0 >= 2:1.0.19
libusbredirparser1 >= 0.6
libuuid1 >= 2.16
libvdeplug2 -
libx11-6 -
libxen-4.4 >= 4.4.1
libxenstore3.0 >= 4.1.0~rc6
qemu-system-common >> 2.0.0+dfsg-7~
seabios >= 1.7.5~
zlib1g >= 1:1.2.0

Provides

Name Value
qemu-system-i386 -
qemu-system-x86-64 -

Replaces

Name Value
qemu-system << 1.3.0+dfsg-5

Download

Type URL
Mirror ftp.br.debian.org
Binary Package qemu-system-x86_2.1+dfsg-12+deb8u6_amd64.deb
Source Package qemu

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install qemu-system-x86 deb package:
    # sudo apt-get install qemu-system-x86

Files

Path
/etc/init.d/qemu-system-x86
/etc/qemu/target-x86_64.conf
/usr/bin/qemu-system-i386
/usr/bin/qemu-system-x86_64
/usr/share/doc/qemu-system-x86/NEWS.Debian.gz
/usr/share/doc/qemu-system-x86/changelog.Debian.gz
/usr/share/doc/qemu-system-x86/changelog.gz
/usr/share/doc/qemu-system-x86/common
/usr/share/doc/qemu-system-x86/copyright
/usr/share/man/man1/qemu-system-i386.1.gz
/usr/share/man/man1/qemu-system-x86_64.1.gz

Changelog

2016-05-08 - Salvatore Bonaccorso <carnil@debian.org>
qemu (1:2.1+dfsg-12+deb8u6) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* CVE-2016-3710: Banked access to VGA memory (VBE) uses inconsistent
bounds checks
* CVE-2016-3712: potential integer overflow or OOB read access issues
2016-02-08 - Michael Tokarev <mjt@tls.msk.ru>
qemu (1:2.1+dfsg-12+deb8u5a) jessie-security; urgency=high
* applied 3 patches from upstream to fix virtio-net
possible remote DoS (Closes: #799452 CVE-2015-7295)
* pcnet-add-check-to-validate-receive-data-size-CVE-2015-7504.patch
(Closes: #806742, CVE-2015-7504)
* pcnet-fix-rx-buffer-overflow-CVE-2015-7512.patch
(Closes: #806741, CVE-2015-7512)
* msix-implement-pba-write-but-read-only-CVE-2015-7549.patch
(Closes: #808131, CVE-2015-7549)
* eepro100-prevent-two-endless-loops-CVE-2015-8345.patch
(Closes: #806373, CVE-2015-8345)
* vnc-avoid-floating-point-exception-CVE-2015-8504.patch
(Closes: #808130, CVE-2015-8504)
* ehci-make-idt-processing-more-robust-CVE-2015-8558.patch
(Closes: #808144, CVE-2015-8558)
* two upstream patches from xsa-155 fixing unsafe shared memory access in xen
(Closes: #809229, CVE-2015-8550)
* net-ne2000-fix-bounds-check-in-ioport-operations-CVE-2015-8743.patch
(Closes: #810519, CVE-2015-8743)
* net-vmxnet3-avoid-memory-leakage-in-activate_device-[...].patch
(Closes: #808145, CVE-2015-8567, CVE-2015-8568)
* scsi-initialise-info-object-with-appropriate-size-CVE-2015-8613.patch
(Closes: #809232, CVE-2015-8613)
* vmxnet3-refine-l2-header-validation-CVE-2015-8744.patch
(Closes: CVE-2015-8744)
* vmxnet3-support-reading-IMR-registers-on-bar0-CVE-2015-8745.patch
(Closes: CVE-2015-8745)
* ide-ahci-reset-ncq-object-to-unused-on-error-CVE-2016-1568.patch
(Closes: #810527, CVE-2016-1568)
* fw_cfg-add-check-to-validate-current-entry-value-CVE-2016-1714.patch
(Closes: CVE-2016-1714)
* i386-avoid-null-pointer-dereference-CVE-2016-1922.patch
(Closes: #811201, CVE-2016-1922)
* e1000-eliminate-infinite-loops-on-out-of-bounds-start-CVE-2016-1981.patch
(Closes: #812307, CVE-2016-1981)
* hmp-fix-sendkey-out-of-bounds-write-CVE-2015-8619.patch
(Closes: #809237, CVE-2015-8619)
2015-09-15 - Michael Tokarev <mjt@tls.msk.ru>
qemu (1:2.1+dfsg-12+deb8u4) jessie-security; urgency=high
* ne2000-add-checks-to-validate-ring-buffer-pointers-CVE-2015-5279.patch
fix for Heap overflow vulnerability in ne2000_receive() function
(Closes: #799074 CVE-2015-5279)
* ne2000-avoid-infinite-loop-when-receiving-packets-CVE-2015-5278.patch
(Closes: #799073 CVE-2015-5278) 
2015-09-07 - Michael Tokarev <mjt@tls.msk.ru>
qemu (1:2.1+dfsg-12+deb8u3) jessie-security; urgency=high
* Acknowlege the previous update.  Thank you Salvatore for the hard
work you did fixing so many security issues.
* rename last patches removing numeric prefixes, so that different series
wont intermix with each other, add Bug-Debian: headers.
* Add e1000-avoid-infinite-loop-in-transmit-CVE-2015-6815.patch.
CVE-2015-6815: net: e1000 infinite loop issue in processing transmit
descriptor.  (Closes: #798101 CVE-2015-6815)
* Add ide-fix-ATAPI-command-permissions-CVE-2015-6855.patch.
CVE-2015-6855: ide: qemu allows arbitrary commands to be sent to an ATAPI
device from guest, while illegal comands might have security impact,
f.e. WIN_READ_NATIVE_MAX results in divide by zero error.
(Closes: CVE-2015-6855)

See Also

Package Description
qemu-system_2.1+dfsg-12+deb8u6_amd64.deb QEMU full system emulation binaries
qemu-user-binfmt_2.1+dfsg-12+deb8u6_amd64.deb QEMU user mode binfmt registration for qemu-user
qemu-user-static_2.1+dfsg-12+deb8u6_amd64.deb QEMU user mode emulation binaries (static version)
qemu-user_2.1+dfsg-12+deb8u6_amd64.deb QEMU user mode emulation binaries
qemu-utils_2.1+dfsg-12+deb8u6_amd64.deb QEMU utilities
qemu_2.1+dfsg-12+deb8u6_amd64.deb fast processor emulator
qemubuilder_0.73_amd64.deb pbuilder using QEMU as backend
qemuctl_0.3.1-2_amd64.deb controlling GUI for qemu
qemulator_0.6.352-1_all.deb transitional dummy package to virtualbriks
qfits-tools_6.2.0-8_amd64.deb FITS manipulation tools
qgis-api-doc_2.4.0-1_all.deb QGIS API documentation
qgis-common_2.4.0-1_all.deb QGIS - architecture-independent data
qgis-mapserver_2.4.0-1+b1_amd64.deb Web Map Server for QGIS
qgis-plugin-globe-common_2.4.0-1_all.deb OSG globe plugin for QGIS - architecture-independent data
qgis-plugin-globe_2.4.0-1+b1_amd64.deb OSG globe plugin for QGIS
Advertisement
Advertisement