From unknown Wed Jun 18 23:09:05 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#33715 <33715@debbugs.gnu.org> To: bug#33715 <33715@debbugs.gnu.org> Subject: Status: [PATCH] gnu: qemu: Update to 3.1.0. Reply-To: bug#33715 <33715@debbugs.gnu.org> Date: Thu, 19 Jun 2025 06:09:05 +0000 retitle 33715 [PATCH] gnu: qemu: Update to 3.1.0. reassign 33715 guix-patches submitter 33715 Rutger Helling severity 33715 normal tag 33715 patch thanks From debbugs-submit-bounces@debbugs.gnu.org Wed Dec 12 04:07:26 2018 Received: (at submit) by debbugs.gnu.org; 12 Dec 2018 09:07:26 +0000 Received: from localhost ([127.0.0.1]:44506 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gX0UB-0005PR-P6 for submit@debbugs.gnu.org; Wed, 12 Dec 2018 04:07:26 -0500 Received: from eggs.gnu.org ([208.118.235.92]:47667) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gX0U9-0005PB-4w for submit@debbugs.gnu.org; Wed, 12 Dec 2018 04:07:18 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1gX0U1-0007mN-VN for submit@debbugs.gnu.org; Wed, 12 Dec 2018 04:07:12 -0500 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org X-Spam-Level: X-Spam-Status: No, score=-0.5 required=5.0 tests=BAYES_05,FREEMAIL_FROM autolearn=disabled version=3.3.2 Received: from lists.gnu.org ([2001:4830:134:3::11]:34144) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1gX0U1-0007mF-QT for submit@debbugs.gnu.org; Wed, 12 Dec 2018 04:07:09 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:57267) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1gX0Ty-0005yG-Mj for guix-patches@gnu.org; Wed, 12 Dec 2018 04:07:09 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1gX0Tu-0007ik-MN for guix-patches@gnu.org; Wed, 12 Dec 2018 04:07:06 -0500 Received: from mx.kolabnow.com ([95.128.36.40]:6414) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1gX0Tu-0007Wq-1P for guix-patches@gnu.org; Wed, 12 Dec 2018 04:07:02 -0500 Received: from localhost (unknown [127.0.0.1]) by ext-mx-out001.mykolab.com (Postfix) with ESMTP id 7EF8E6E6 for ; Wed, 12 Dec 2018 10:06:57 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mykolab.com; h= content-type:content-type:mime-version:message-id:subject :subject:from:from:date:date:received:received:received; s= dkim20160331; t=1544605615; x=1546420016; bh=eBYHceaTkMic/CPJRXm xqmEV9ggihERpwUV65qsTFCQ=; b=tyli3ruKc/IwfNSk7b2uZhRM1yn4hMD0Ea1 SgiZfhU6fodI6mJwUz/0NgE+fTFQQ4RwRMTlwD6iWzIOy7T3A3dO7jCvDI4BP8f3 ynmQAMV5jPsvlmxj4FtmjuLzcfUYltTX2B57Q/gEyn3GvX07H5m7/m4WbhJxhumF BJRGrk7aKjxhCyhofXWARpTf2MKQ5cvQ40vNuh0aWBVcqi0LFpR0ACvjDvdj2tWm ll+lIfvlhKZ3potqI5DRf2psKnLgu/HdtHFB8XElLpyrJRK8a0naH+tIxTgh8+hG pk44EamrTq3Yw1aAPzTSpY6eJry7UeZUTydLmVJhoPXadQGvgww4ZjfDpZ6WwY85 FOl8I0gDoG/LS9WNF2KGdG0EEz9SdmwBbmlhCbEnF+aCDm8rtKowIiy0Zo+7RYCb KnIkmIu29I1w/v4VZwFQQVNHIoCkD7Z7Jvo4wWEY97MwtJhAoADbVBIoaeQIODRa ILWA4CNQBQg/3RljRwRGuwJT2wMZdRTD/r54GCQCfksvSorcXyP7d9lK57OnMBy6 q+9tprMONEWkErWGRRz0DH6Gm60neEn1DhsQArO35yHfooWmsFTAJvG+H2Ru4Wt8 Oqpj5VbagccFfko8nAB6UaQQ8qfr52xdIqdwTUtto+fVdVhGVLCrCBvTcRhx9Z9Z xovgJio0= X-Virus-Scanned: amavisd-new at mykolab.com Received: from mx.kolabnow.com ([127.0.0.1]) by localhost (ext-mx-out001.mykolab.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wF5JIGxqgA2c for ; Wed, 12 Dec 2018 10:06:55 +0100 (CET) Received: from int-mx001.mykolab.com (unknown [10.9.13.1]) by ext-mx-out001.mykolab.com (Postfix) with ESMTPS id A0EF7463 for ; Wed, 12 Dec 2018 10:06:55 +0100 (CET) Received: from ext-subm002.mykolab.com (unknown [10.9.6.2]) by int-mx001.mykolab.com (Postfix) with ESMTPS id 7D0FA1F3 for ; Wed, 12 Dec 2018 10:06:55 +0100 (CET) Date: Wed, 12 Dec 2018 10:06:38 +0100 From: Rutger Helling To: guix-patches@gnu.org Subject: [PATCH] gnu: qemu: Update to 3.1.0. Message-ID: <20181212100638.0252ee05@mykolab.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; boundary="Sig_/4p/OJ71D1DfzpVtnitc4POs"; protocol="application/pgp-signature" X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6.x X-Received-From: 2001:4830:134:3::11 X-Spam-Score: -4.1 (----) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -0.1 (/) --Sig_/4p/OJ71D1DfzpVtnitc4POs Content-Type: multipart/mixed; boundary="MP_/AMwB2m9cvsQEbj1C1cpx05g" --MP_/AMwB2m9cvsQEbj1C1cpx05g Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Hey Guix, here's the latest update for QEMU. --MP_/AMwB2m9cvsQEbj1C1cpx05g Content-Type: text/x-patch Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename=0001-gnu-qemu-Update-to-3.1.0.patch =46rom 0e0126079f0beef53ae78cdfb8a793bca95bf296 Mon Sep 17 00:00:00 2001 From: Rutger Helling Date: Wed, 12 Dec 2018 09:59:49 +0100 Subject: [PATCH] gnu: qemu: Update to 3.1.0. * gnu/packages/patches/qemu-CVE-2018-16847.patch: Remove file. * gnu/packages/patches/qemu-CVE-2018-16867.patch: Remove file. * gnu/packages/virtualization.scm (qemu): Update to 3.1.0. [source]: Remove removed patches. --- .../patches/qemu-CVE-2018-16847.patch | 158 ------------------ .../patches/qemu-CVE-2018-16867.patch | 49 ------ gnu/packages/virtualization.scm | 6 +- 3 files changed, 2 insertions(+), 211 deletions(-) delete mode 100644 gnu/packages/patches/qemu-CVE-2018-16847.patch delete mode 100644 gnu/packages/patches/qemu-CVE-2018-16867.patch diff --git a/gnu/packages/patches/qemu-CVE-2018-16847.patch b/gnu/packages/= patches/qemu-CVE-2018-16847.patch deleted file mode 100644 index c76bdf764..000000000 --- a/gnu/packages/patches/qemu-CVE-2018-16847.patch +++ /dev/null @@ -1,158 +0,0 @@ -Fix CVE-2018-16847: - -https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-16847 - -Patch copied from upstream source repository: - -https://git.qemu.org/?p=3Dqemu.git;a=3Dcommitdiff;h=3D87ad860c622cc8f8916b= 5232bd8728c08f938fce - -From 87ad860c622cc8f8916b5232bd8728c08f938fce Mon Sep 17 00:00:00 2001 -From: Paolo Bonzini -Date: Tue, 20 Nov 2018 19:41:48 +0100 -Subject: [PATCH] nvme: fix out-of-bounds access to the CMB -MIME-Version: 1.0 -Content-Type: text/plain; charset=3DUTF-8 -Content-Transfer-Encoding: 8bit - -Because the CMB BAR has a min_access_size of 2, if you read the last -byte it will try to memcpy *2* bytes from n->cmbuf, causing an off-by-one -error. This is CVE-2018-16847. - -Another way to fix this might be to register the CMB as a RAM memory -region, which would also be more efficient. However, that might be a -change for big-endian machines; I didn't think this through and I don't -know how real hardware works. Add a basic testcase for the CMB in case -somebody does this change later on. - -Cc: Keith Busch -Cc: qemu-block@nongnu.org -Reported-by: Li Qiang -Reviewed-by: Li Qiang -Tested-by: Li Qiang -Signed-off-by: Paolo Bonzini -Reviewed-by: Philippe Mathieu-Daud=C3=A9 -Tested-by: Philippe Mathieu-Daud=C3=A9 -Signed-off-by: Kevin Wolf ---- - hw/block/nvme.c | 2 +- - tests/Makefile.include | 2 +- - tests/nvme-test.c | 68 +++++++++++++++++++++++++++++++++++------- - 3 files changed, 60 insertions(+), 12 deletions(-) - -diff --git a/hw/block/nvme.c b/hw/block/nvme.c -index 28d284346dd..8c35cab2b43 100644 ---- a/hw/block/nvme.c -+++ b/hw/block/nvme.c -@@ -1201,7 +1201,7 @@ static const MemoryRegionOps nvme_cmb_ops =3D { - .write =3D nvme_cmb_write, - .endianness =3D DEVICE_LITTLE_ENDIAN, - .impl =3D { -- .min_access_size =3D 2, -+ .min_access_size =3D 1, - .max_access_size =3D 8, - }, - }; -diff --git a/tests/Makefile.include b/tests/Makefile.include -index 613242bc6ef..fb0b449c02a 100644 ---- a/tests/Makefile.include -+++ b/tests/Makefile.include -@@ -730,7 +730,7 @@ tests/test-hmp$(EXESUF): tests/test-hmp.o - tests/machine-none-test$(EXESUF): tests/machine-none-test.o - tests/drive_del-test$(EXESUF): tests/drive_del-test.o $(libqos-virtio-obj= -y) - tests/qdev-monitor-test$(EXESUF): tests/qdev-monitor-test.o $(libqos-pc-o= bj-y) --tests/nvme-test$(EXESUF): tests/nvme-test.o -+tests/nvme-test$(EXESUF): tests/nvme-test.o $(libqos-pc-obj-y) - tests/pvpanic-test$(EXESUF): tests/pvpanic-test.o - tests/i82801b11-test$(EXESUF): tests/i82801b11-test.o - tests/ac97-test$(EXESUF): tests/ac97-test.o -diff --git a/tests/nvme-test.c b/tests/nvme-test.c -index 7674a446e4f..2700ba838aa 100644 ---- a/tests/nvme-test.c -+++ b/tests/nvme-test.c -@@ -8,25 +8,73 @@ - */ -=20 - #include "qemu/osdep.h" -+#include "qemu/units.h" - #include "libqtest.h" -+#include "libqos/libqos-pc.h" -+ -+static QOSState *qnvme_start(const char *extra_opts) -+{ -+ QOSState *qs; -+ const char *arch =3D qtest_get_arch(); -+ const char *cmd =3D "-drive id=3Ddrv0,if=3Dnone,file=3Dnull-co://,for= mat=3Draw " -+ "-device nvme,addr=3D0x4.0,serial=3Dfoo,drive=3Ddrv= 0 %s"; -+ -+ if (strcmp(arch, "i386") =3D=3D 0 || strcmp(arch, "x86_64") =3D=3D 0)= { -+ qs =3D qtest_pc_boot(cmd, extra_opts ? : ""); -+ global_qtest =3D qs->qts; -+ return qs; -+ } -+ -+ g_printerr("nvme tests are only available on x86\n"); -+ exit(EXIT_FAILURE); -+} -+ -+static void qnvme_stop(QOSState *qs) -+{ -+ qtest_shutdown(qs); -+} -=20 --/* Tests only initialization so far. TODO: Replace with functional tests = */ - static void nop(void) - { -+ QOSState *qs; -+ -+ qs =3D qnvme_start(NULL); -+ qnvme_stop(qs); - } -=20 --int main(int argc, char **argv) -+static void nvmetest_cmb_test(void) - { -- int ret; -+ const int cmb_bar_size =3D 2 * MiB; -+ QOSState *qs; -+ QPCIDevice *pdev; -+ QPCIBar bar; -=20 -- g_test_init(&argc, &argv, NULL); -- qtest_add_func("/nvme/nop", nop); -+ qs =3D qnvme_start("-global nvme.cmb_size_mb=3D2"); -+ pdev =3D qpci_device_find(qs->pcibus, QPCI_DEVFN(4,0)); -+ g_assert(pdev !=3D NULL); -+ -+ qpci_device_enable(pdev); -+ bar =3D qpci_iomap(pdev, 2, NULL); -+ -+ qpci_io_writel(pdev, bar, 0, 0xccbbaa99); -+ g_assert_cmpint(qpci_io_readb(pdev, bar, 0), =3D=3D, 0x99); -+ g_assert_cmpint(qpci_io_readw(pdev, bar, 0), =3D=3D, 0xaa99); -+ -+ /* Test partially out-of-bounds accesses. */ -+ qpci_io_writel(pdev, bar, cmb_bar_size - 1, 0x44332211); -+ g_assert_cmpint(qpci_io_readb(pdev, bar, cmb_bar_size - 1), =3D=3D, 0= x11); -+ g_assert_cmpint(qpci_io_readw(pdev, bar, cmb_bar_size - 1), !=3D, 0x2= 211); -+ g_assert_cmpint(qpci_io_readl(pdev, bar, cmb_bar_size - 1), !=3D, 0x4= 4332211); -+ g_free(pdev); -=20 -- qtest_start("-drive id=3Ddrv0,if=3Dnone,file=3Dnull-co://,format=3Dra= w " -- "-device nvme,drive=3Ddrv0,serial=3Dfoo"); -- ret =3D g_test_run(); -+ qnvme_stop(qs); -+} -=20 -- qtest_end(); -+int main(int argc, char **argv) -+{ -+ g_test_init(&argc, &argv, NULL); -+ qtest_add_func("/nvme/nop", nop); -+ qtest_add_func("/nvme/cmb_test", nvmetest_cmb_test); -=20 -- return ret; -+ return g_test_run(); - } ---=20 -2.19.2 - diff --git a/gnu/packages/patches/qemu-CVE-2018-16867.patch b/gnu/packages/= patches/qemu-CVE-2018-16867.patch deleted file mode 100644 index 1403d8e0f..000000000 --- a/gnu/packages/patches/qemu-CVE-2018-16867.patch +++ /dev/null @@ -1,49 +0,0 @@ -Fix CVE-2018-16867: - -https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-16867 -https://seclists.org/oss-sec/2018/q4/202 - -Patch copied from upstream source repository: - -https://git.qemu.org/?p=3Dqemu.git;a=3Dcommitdiff;h=3Dc52d46e041b42bb1ee6f= 692e00a0abe37a9659f6 - -From c52d46e041b42bb1ee6f692e00a0abe37a9659f6 Mon Sep 17 00:00:00 2001 -From: Gerd Hoffmann -Date: Mon, 3 Dec 2018 11:10:45 +0100 -Subject: [PATCH] usb-mtp: outlaw slashes in filenames -MIME-Version: 1.0 -Content-Type: text/plain; charset=3DUTF-8 -Content-Transfer-Encoding: 8bit - -Slash is unix directory separator, so they are not allowed in filenames. -Note this also stops the classic escape via "../". - -Fixes: CVE-2018-16867 -Reported-by: Michael Hanselmann -Signed-off-by: Gerd Hoffmann -Reviewed-by: Philippe Mathieu-Daud=C3=A9 -Message-id: 20181203101045.27976-3-kraxel@redhat.com ---- - hw/usb/dev-mtp.c | 6 ++++++ - 1 file changed, 6 insertions(+) - -diff --git a/hw/usb/dev-mtp.c b/hw/usb/dev-mtp.c -index 0f6a9702ef1..100b7171f4e 100644 ---- a/hw/usb/dev-mtp.c -+++ b/hw/usb/dev-mtp.c -@@ -1719,6 +1719,12 @@ static void usb_mtp_write_metadata(MTPState *s) -=20 - filename =3D utf16_to_str(dataset->length, dataset->filename); -=20 -+ if (strchr(filename, '/')) { -+ usb_mtp_queue_result(s, RES_PARAMETER_NOT_SUPPORTED, d->trans, -+ 0, 0, 0, 0); -+ return; -+ } -+ - o =3D usb_mtp_object_lookup_name(p, filename, dataset->length); - if (o !=3D NULL) { - next_handle =3D o->handle; ---=20 -2.19.2 - diff --git a/gnu/packages/virtualization.scm b/gnu/packages/virtualization.= scm index 0502bb38c..8e361558b 100644 --- a/gnu/packages/virtualization.scm +++ b/gnu/packages/virtualization.scm @@ -95,16 +95,14 @@ (define-public qemu (package (name "qemu") - (version "3.0.0") + (version "3.1.0") (source (origin (method url-fetch) (uri (string-append "https://download.qemu.org/qemu-" version ".tar.xz")) - (patches (search-patches "qemu-CVE-2018-16847.patch" - "qemu-CVE-2018-16867.patch")) (sha256 (base32 - "04sp3f1gp4bdb913jf7fw761njaqp2l32wgipp1sapmxx17zcyld")))) + "1z5bd5nfyjvhfi1s95labc82y4hjdjjkdabw931362ls0zghh1ba")))) (build-system gnu-build-system) (arguments '(;; Running tests in parallel can occasionally lead to failures, lik= e: --=20 2.20.0 --MP_/AMwB2m9cvsQEbj1C1cpx05g-- --Sig_/4p/OJ71D1DfzpVtnitc4POs Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEAVThuRzJ2e93ZI3n86cn20T8yjYFAlwQz54ACgkQ86cn20T8 yjaxnAf9FIhFxysuzK2eQ5Vn9n/TP6nANimyQBPIcATob3/f9Q2lRIUvcsPR3vWC zBR+Z2UUtGTi1gB4PsA1RGYj+jeK2QvwaesObewjoSfY5MkRVB81PH0WeKgDW/bJ +SGLmlZ518dpHrYJroLQ3JWrfR+UlCmUKkk6u1EDip//Gi20UhSMvkJKd8X4nl+L ltwc3Gg7FzO4Duh0hRAb7nqromR9e/YnuMX5Sn0zTAigt/KA9Yc1QF6py9H+3D/3 2uu4vHyhGKkEw+fuCoUaKckpP770d2GpaIu53oiQnJek80EGAzcvJ30btvz25ojH BJ6rzP0XIt1ehtGuyQjR1+fB4sPpVw== =T+/j -----END PGP SIGNATURE----- --Sig_/4p/OJ71D1DfzpVtnitc4POs-- From debbugs-submit-bounces@debbugs.gnu.org Wed Dec 12 06:03:56 2018 Received: (at 33715) by debbugs.gnu.org; 12 Dec 2018 11:03:56 +0000 Received: from localhost ([127.0.0.1]:44546 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gX2Iw-0002Bp-0U for submit@debbugs.gnu.org; Wed, 12 Dec 2018 06:03:56 -0500 Received: from mx.kolabnow.com ([95.128.36.41]:31542) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gX2Is-0002BY-FA for 33715@debbugs.gnu.org; Wed, 12 Dec 2018 06:03:48 -0500 Received: from localhost (unknown [127.0.0.1]) by ext-mx-out001.mykolab.com (Postfix) with ESMTP id 4FBFB6E6 for <33715@debbugs.gnu.org>; Wed, 12 Dec 2018 12:03:40 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mykolab.com; h= content-type:content-type:mime-version:references:in-reply-to :message-id:subject:subject:from:from:date:date:received :received:received; s=dkim20160331; t=1544612618; x=1546427019; bh=grLc+6DvRzELNgpcJYBCk95fNvYGZaq/AeEGnLF/v6A=; b=kTdFaf6wMzcB nMvQD3RDNkpiaFGvSKjblEdsBCEQLNv21sEQkRa+mHPtbE7Lu26lwMTQyu7qEMxQ npw91bBmRJ6v1M42xa0QEVvqoaKztrM1wGdtOM2sbEhpmtsLhePH7E6PMDiWaIuQ bl4RQymXP7HvC+QPYglsC8ThH99AlI8KJU2csv85144EQT+3MSyHysMeeiqJCUGE KgVxbAOrlm8nnQRPfKQchVWE+CamuHGeQtQAUg2vZNO3D9T91qZa3GgXw9un8OY2 Xj2hWgTH8leXmDxGHoi4DQVl7lQlDw+TxCqIaOuORkXCbCLtXYg/BNrlaOk+UNX/ WeFHD/oOucWaGPFHiilSo4TrOvhwcAiYDbluoF4PhZXl71dVXXB16aUS8tBk8OYj mzRJogVZ1LvGDXkGUsNI9KrKbWeIUjRT5zJtFBQcgFxPhD9y6r2AvSzJaFKSDisV NncixKa74KCwS7jWBVceP1lrw3Tj0XHAV7yjVTgumr4f+n6AO3TJ9rQHWE40/8yv O/oOmQYoxFf2+QkJfZwS+RWYVuDLvLNGK8U2cd2MY5yOZHUBqE79OOHLML7XmuGO soT1vlvRRiO0AAtk0iyhBsald6D9HXg/lPZSNq+mXMvxCM1GNBBiug5qzB59wZvq xMjUrhvuEZY57/2Ya4txU5BElY1x/7o= X-Virus-Scanned: amavisd-new at mykolab.com X-Spam-Flag: NO X-Spam-Score: 0.001 X-Spam-Level: X-Spam-Status: No, score=0.001 tagged_above=-10 required=5 tests=[FREEMAIL_FROM=0.001] autolearn=disabled Received: from mx.kolabnow.com ([127.0.0.1]) by localhost (ext-mx-out001.mykolab.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ciUwVIrwhPpy for <33715@debbugs.gnu.org>; Wed, 12 Dec 2018 12:03:38 +0100 (CET) Received: from int-mx003.mykolab.com (unknown [10.9.13.3]) by ext-mx-out001.mykolab.com (Postfix) with ESMTPS id 60077657 for <33715@debbugs.gnu.org>; Wed, 12 Dec 2018 12:03:38 +0100 (CET) Received: from ext-subm001.mykolab.com (unknown [10.9.6.1]) by int-mx003.mykolab.com (Postfix) with ESMTPS id 4A347A35 for <33715@debbugs.gnu.org>; Wed, 12 Dec 2018 12:03:38 +0100 (CET) Date: Wed, 12 Dec 2018 12:03:34 +0100 From: Rutger Helling To: 33715@debbugs.gnu.org Subject: Re: [PATCH] gnu: qemu: Update to 3.1.0. (v2) Message-ID: <20181212120334.3d9e6dc9@mykolab.com> In-Reply-To: <20181212100638.0252ee05@mykolab.com> References: <20181212100638.0252ee05@mykolab.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; boundary="Sig_/2DODW=Qw7Xgp0bb/Zjk.VSy"; protocol="application/pgp-signature" X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 33715 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) --Sig_/2DODW=Qw7Xgp0bb/Zjk.VSy Content-Type: multipart/mixed; boundary="MP_/riepVXvRwle+vp9WBl3yVOc" --MP_/riepVXvRwle+vp9WBl3yVOc Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Content-Disposition: inline Forgot to remove the obsolete patches from local.mk. Here's a fixed version. > Hey Guix, >=20 > here's the latest update for QEMU. --MP_/riepVXvRwle+vp9WBl3yVOc Content-Type: text/x-patch Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename=0001-gnu-qemu-Update-to-3.1.0-v2.patch =46rom 8d82f31c8b4c7249b82314d4354e5973cb04c2c2 Mon Sep 17 00:00:00 2001 From: Rutger Helling Date: Wed, 12 Dec 2018 11:57:36 +0100 Subject: [PATCH] gnu: qemu: Update to 3.1.0. * gnu/local.mk: Remove qemu-CVE-2018-16847.patch and qemu-CVE-2018-16867.patch. * gnu/packages/patches/qemu-CVE-2018-16847.patch: Remove file. * gnu/packages/patches/qemu-CVE-2018-16867.patch: Remove file. * gnu/packages/virtualization.scm (qemu): Update to 3.1.0. [source]: Remove removed patches. --- gnu/local.mk | 2 - .../patches/qemu-CVE-2018-16847.patch | 158 ------------------ .../patches/qemu-CVE-2018-16867.patch | 49 ------ gnu/packages/virtualization.scm | 6 +- 4 files changed, 2 insertions(+), 213 deletions(-) delete mode 100644 gnu/packages/patches/qemu-CVE-2018-16847.patch delete mode 100644 gnu/packages/patches/qemu-CVE-2018-16867.patch diff --git a/gnu/local.mk b/gnu/local.mk index e566c221f..47217a8c1 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -1110,8 +1110,6 @@ dist_patch_DATA =3D \ %D%/packages/patches/python-unittest2-remove-argparse.patch \ %D%/packages/patches/python-waitress-fix-tests.patch \ %D%/packages/patches/qemu-glibc-2.27.patch \ - %D%/packages/patches/qemu-CVE-2018-16847.patch \ - %D%/packages/patches/qemu-CVE-2018-16867.patch \ %D%/packages/patches/qt4-ldflags.patch \ %D%/packages/patches/qtbase-use-TZDIR.patch \ %D%/packages/patches/qtscript-disable-tests.patch \ diff --git a/gnu/packages/patches/qemu-CVE-2018-16847.patch b/gnu/packages/= patches/qemu-CVE-2018-16847.patch deleted file mode 100644 index c76bdf764..000000000 --- a/gnu/packages/patches/qemu-CVE-2018-16847.patch +++ /dev/null @@ -1,158 +0,0 @@ -Fix CVE-2018-16847: - -https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-16847 - -Patch copied from upstream source repository: - -https://git.qemu.org/?p=3Dqemu.git;a=3Dcommitdiff;h=3D87ad860c622cc8f8916b= 5232bd8728c08f938fce - -From 87ad860c622cc8f8916b5232bd8728c08f938fce Mon Sep 17 00:00:00 2001 -From: Paolo Bonzini -Date: Tue, 20 Nov 2018 19:41:48 +0100 -Subject: [PATCH] nvme: fix out-of-bounds access to the CMB -MIME-Version: 1.0 -Content-Type: text/plain; charset=3DUTF-8 -Content-Transfer-Encoding: 8bit - -Because the CMB BAR has a min_access_size of 2, if you read the last -byte it will try to memcpy *2* bytes from n->cmbuf, causing an off-by-one -error. This is CVE-2018-16847. - -Another way to fix this might be to register the CMB as a RAM memory -region, which would also be more efficient. However, that might be a -change for big-endian machines; I didn't think this through and I don't -know how real hardware works. Add a basic testcase for the CMB in case -somebody does this change later on. - -Cc: Keith Busch -Cc: qemu-block@nongnu.org -Reported-by: Li Qiang -Reviewed-by: Li Qiang -Tested-by: Li Qiang -Signed-off-by: Paolo Bonzini -Reviewed-by: Philippe Mathieu-Daud=C3=A9 -Tested-by: Philippe Mathieu-Daud=C3=A9 -Signed-off-by: Kevin Wolf ---- - hw/block/nvme.c | 2 +- - tests/Makefile.include | 2 +- - tests/nvme-test.c | 68 +++++++++++++++++++++++++++++++++++------- - 3 files changed, 60 insertions(+), 12 deletions(-) - -diff --git a/hw/block/nvme.c b/hw/block/nvme.c -index 28d284346dd..8c35cab2b43 100644 ---- a/hw/block/nvme.c -+++ b/hw/block/nvme.c -@@ -1201,7 +1201,7 @@ static const MemoryRegionOps nvme_cmb_ops =3D { - .write =3D nvme_cmb_write, - .endianness =3D DEVICE_LITTLE_ENDIAN, - .impl =3D { -- .min_access_size =3D 2, -+ .min_access_size =3D 1, - .max_access_size =3D 8, - }, - }; -diff --git a/tests/Makefile.include b/tests/Makefile.include -index 613242bc6ef..fb0b449c02a 100644 ---- a/tests/Makefile.include -+++ b/tests/Makefile.include -@@ -730,7 +730,7 @@ tests/test-hmp$(EXESUF): tests/test-hmp.o - tests/machine-none-test$(EXESUF): tests/machine-none-test.o - tests/drive_del-test$(EXESUF): tests/drive_del-test.o $(libqos-virtio-obj= -y) - tests/qdev-monitor-test$(EXESUF): tests/qdev-monitor-test.o $(libqos-pc-o= bj-y) --tests/nvme-test$(EXESUF): tests/nvme-test.o -+tests/nvme-test$(EXESUF): tests/nvme-test.o $(libqos-pc-obj-y) - tests/pvpanic-test$(EXESUF): tests/pvpanic-test.o - tests/i82801b11-test$(EXESUF): tests/i82801b11-test.o - tests/ac97-test$(EXESUF): tests/ac97-test.o -diff --git a/tests/nvme-test.c b/tests/nvme-test.c -index 7674a446e4f..2700ba838aa 100644 ---- a/tests/nvme-test.c -+++ b/tests/nvme-test.c -@@ -8,25 +8,73 @@ - */ -=20 - #include "qemu/osdep.h" -+#include "qemu/units.h" - #include "libqtest.h" -+#include "libqos/libqos-pc.h" -+ -+static QOSState *qnvme_start(const char *extra_opts) -+{ -+ QOSState *qs; -+ const char *arch =3D qtest_get_arch(); -+ const char *cmd =3D "-drive id=3Ddrv0,if=3Dnone,file=3Dnull-co://,for= mat=3Draw " -+ "-device nvme,addr=3D0x4.0,serial=3Dfoo,drive=3Ddrv= 0 %s"; -+ -+ if (strcmp(arch, "i386") =3D=3D 0 || strcmp(arch, "x86_64") =3D=3D 0)= { -+ qs =3D qtest_pc_boot(cmd, extra_opts ? : ""); -+ global_qtest =3D qs->qts; -+ return qs; -+ } -+ -+ g_printerr("nvme tests are only available on x86\n"); -+ exit(EXIT_FAILURE); -+} -+ -+static void qnvme_stop(QOSState *qs) -+{ -+ qtest_shutdown(qs); -+} -=20 --/* Tests only initialization so far. TODO: Replace with functional tests = */ - static void nop(void) - { -+ QOSState *qs; -+ -+ qs =3D qnvme_start(NULL); -+ qnvme_stop(qs); - } -=20 --int main(int argc, char **argv) -+static void nvmetest_cmb_test(void) - { -- int ret; -+ const int cmb_bar_size =3D 2 * MiB; -+ QOSState *qs; -+ QPCIDevice *pdev; -+ QPCIBar bar; -=20 -- g_test_init(&argc, &argv, NULL); -- qtest_add_func("/nvme/nop", nop); -+ qs =3D qnvme_start("-global nvme.cmb_size_mb=3D2"); -+ pdev =3D qpci_device_find(qs->pcibus, QPCI_DEVFN(4,0)); -+ g_assert(pdev !=3D NULL); -+ -+ qpci_device_enable(pdev); -+ bar =3D qpci_iomap(pdev, 2, NULL); -+ -+ qpci_io_writel(pdev, bar, 0, 0xccbbaa99); -+ g_assert_cmpint(qpci_io_readb(pdev, bar, 0), =3D=3D, 0x99); -+ g_assert_cmpint(qpci_io_readw(pdev, bar, 0), =3D=3D, 0xaa99); -+ -+ /* Test partially out-of-bounds accesses. */ -+ qpci_io_writel(pdev, bar, cmb_bar_size - 1, 0x44332211); -+ g_assert_cmpint(qpci_io_readb(pdev, bar, cmb_bar_size - 1), =3D=3D, 0= x11); -+ g_assert_cmpint(qpci_io_readw(pdev, bar, cmb_bar_size - 1), !=3D, 0x2= 211); -+ g_assert_cmpint(qpci_io_readl(pdev, bar, cmb_bar_size - 1), !=3D, 0x4= 4332211); -+ g_free(pdev); -=20 -- qtest_start("-drive id=3Ddrv0,if=3Dnone,file=3Dnull-co://,format=3Dra= w " -- "-device nvme,drive=3Ddrv0,serial=3Dfoo"); -- ret =3D g_test_run(); -+ qnvme_stop(qs); -+} -=20 -- qtest_end(); -+int main(int argc, char **argv) -+{ -+ g_test_init(&argc, &argv, NULL); -+ qtest_add_func("/nvme/nop", nop); -+ qtest_add_func("/nvme/cmb_test", nvmetest_cmb_test); -=20 -- return ret; -+ return g_test_run(); - } ---=20 -2.19.2 - diff --git a/gnu/packages/patches/qemu-CVE-2018-16867.patch b/gnu/packages/= patches/qemu-CVE-2018-16867.patch deleted file mode 100644 index 1403d8e0f..000000000 --- a/gnu/packages/patches/qemu-CVE-2018-16867.patch +++ /dev/null @@ -1,49 +0,0 @@ -Fix CVE-2018-16867: - -https://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2018-16867 -https://seclists.org/oss-sec/2018/q4/202 - -Patch copied from upstream source repository: - -https://git.qemu.org/?p=3Dqemu.git;a=3Dcommitdiff;h=3Dc52d46e041b42bb1ee6f= 692e00a0abe37a9659f6 - -From c52d46e041b42bb1ee6f692e00a0abe37a9659f6 Mon Sep 17 00:00:00 2001 -From: Gerd Hoffmann -Date: Mon, 3 Dec 2018 11:10:45 +0100 -Subject: [PATCH] usb-mtp: outlaw slashes in filenames -MIME-Version: 1.0 -Content-Type: text/plain; charset=3DUTF-8 -Content-Transfer-Encoding: 8bit - -Slash is unix directory separator, so they are not allowed in filenames. -Note this also stops the classic escape via "../". - -Fixes: CVE-2018-16867 -Reported-by: Michael Hanselmann -Signed-off-by: Gerd Hoffmann -Reviewed-by: Philippe Mathieu-Daud=C3=A9 -Message-id: 20181203101045.27976-3-kraxel@redhat.com ---- - hw/usb/dev-mtp.c | 6 ++++++ - 1 file changed, 6 insertions(+) - -diff --git a/hw/usb/dev-mtp.c b/hw/usb/dev-mtp.c -index 0f6a9702ef1..100b7171f4e 100644 ---- a/hw/usb/dev-mtp.c -+++ b/hw/usb/dev-mtp.c -@@ -1719,6 +1719,12 @@ static void usb_mtp_write_metadata(MTPState *s) -=20 - filename =3D utf16_to_str(dataset->length, dataset->filename); -=20 -+ if (strchr(filename, '/')) { -+ usb_mtp_queue_result(s, RES_PARAMETER_NOT_SUPPORTED, d->trans, -+ 0, 0, 0, 0); -+ return; -+ } -+ - o =3D usb_mtp_object_lookup_name(p, filename, dataset->length); - if (o !=3D NULL) { - next_handle =3D o->handle; ---=20 -2.19.2 - diff --git a/gnu/packages/virtualization.scm b/gnu/packages/virtualization.= scm index 0502bb38c..8e361558b 100644 --- a/gnu/packages/virtualization.scm +++ b/gnu/packages/virtualization.scm @@ -95,16 +95,14 @@ (define-public qemu (package (name "qemu") - (version "3.0.0") + (version "3.1.0") (source (origin (method url-fetch) (uri (string-append "https://download.qemu.org/qemu-" version ".tar.xz")) - (patches (search-patches "qemu-CVE-2018-16847.patch" - "qemu-CVE-2018-16867.patch")) (sha256 (base32 - "04sp3f1gp4bdb913jf7fw761njaqp2l32wgipp1sapmxx17zcyld")))) + "1z5bd5nfyjvhfi1s95labc82y4hjdjjkdabw931362ls0zghh1ba")))) (build-system gnu-build-system) (arguments '(;; Running tests in parallel can occasionally lead to failures, lik= e: --=20 2.20.0 --MP_/riepVXvRwle+vp9WBl3yVOc-- --Sig_/2DODW=Qw7Xgp0bb/Zjk.VSy Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEAVThuRzJ2e93ZI3n86cn20T8yjYFAlwQ6wYACgkQ86cn20T8 yja24QgAs70ppSOVSKI3aUEgR/FpTjzO+2JiZ1FRGPakJ/klDTTeqcXzdwV7T2D7 63vff7nXYkm1wKAh31nxPFxG3sWoD2PHFsRyfsVMbnekYywI1jkUC1wF/WxIprTZ eu0dPRk5Ka8HHLMrAeKK2AlqZXU2ItypC4DNg5YtqKgfvVb87ArPyVe6mnBAC72e Ykix+P323x5jCLejRaArmvbjGFTkevjg7BYFzmrhfqSykg7lOeEs1Y8l5TJtmhpe D8ZUDi/ohAnLuoahrhKevL/PdTPPyskZHe2vvDXmjbXkHVMrhs3YH28m55Bp1yvN kizbR1BBgBhRd53TJR+Vek3wlzMxAw== =eTwW -----END PGP SIGNATURE----- --Sig_/2DODW=Qw7Xgp0bb/Zjk.VSy-- From debbugs-submit-bounces@debbugs.gnu.org Thu Dec 13 14:44:05 2018 Received: (at 33715-done) by debbugs.gnu.org; 13 Dec 2018 19:44:05 +0000 Received: from localhost ([127.0.0.1]:46772 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gXWtw-0007x3-CQ for submit@debbugs.gnu.org; Thu, 13 Dec 2018 14:44:05 -0500 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:42103) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gXWtu-0007wS-24 for 33715-done@debbugs.gnu.org; Thu, 13 Dec 2018 14:44:02 -0500 Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 414D1220CF; Thu, 13 Dec 2018 14:43:56 -0500 (EST) Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Thu, 13 Dec 2018 14:43:56 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=date:from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=mesmtp; bh=OJDUTpR3XA38+o0LGssVSTRP KbzieCLX9zlx8Duoe9Y=; b=dAO5oureIF176x+htijQz43/rQW3OI8HaWU67Nnw 6ShG8VAmHbsiZ5fAvd7sVkrdfZbFz1ckU8whpLDP+g42CG/afQZeMqlKXFowcYKm LXs3AZPuPTXMHPEu4bL1+nGBMCneYZgg4WplHlb++cgN7hCjPpJU1Hgz5EisW7J9 NfE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=OJDUTp R3XA38+o0LGssVSTRPKbzieCLX9zlx8Duoe9Y=; b=dP7jR3Xt0/ZqNbnut+ax9y FH8O/V2a4m0wPbcavhBcvgEn7XyPs9p1hr7ZKUWHBPvcSEZlqqQv58hBOi16N636 bIEl0uK6pt2lDa3tpprbNHMrU7eKFGztX2p/UqTkE8dmv4yjW/qd44EDup1FIboX xgQz696ep4O18WK9TumMC2yQlSZzWscY+Hy7tSl3fG9Sp+Nt9njCSg72k31R5ziU 5+Rb70o/hnMd+N/5W11WI/D8zXvKr2YTeJBy8tH5LNVf5wBfGQqKKko7FLokrF+x 6gJxinMIuniw/4CTv3rxtDQTAXceksH1SZEV+u9t/sLBPSfV2lNCBBOmjLVXZW2A == X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedtkedrudehvddguddvkecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfhuthenuceurghilhhouhhtmecu fedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujfgurhepfffhvffukf hfgggtuggjfgesghdtreertdervdenucfhrhhomhepnfgvohcuhfgrmhhulhgrrhhiuceo lhgvohesfhgrmhhulhgrrhhirdhnrghmvgeqnecukfhppeejiedruddvgedrvddtvddrud efjeenucfrrghrrghmpehmrghilhhfrhhomheplhgvohesfhgrmhhulhgrrhhirdhnrghm vgenucevlhhushhtvghrufhiiigvpedt X-ME-Proxy: Received: from localhost (c-76-124-202-137.hsd1.pa.comcast.net [76.124.202.137]) by mail.messagingengine.com (Postfix) with ESMTPA id 424EC102F2; Thu, 13 Dec 2018 14:43:55 -0500 (EST) Date: Thu, 13 Dec 2018 14:43:52 -0500 From: Leo Famulari To: Rutger Helling Subject: Re: [bug#33715] [PATCH] gnu: qemu: Update to 3.1.0. (v2) Message-ID: <20181213194352.GA20431@jasmine.lan> References: <20181212100638.0252ee05@mykolab.com> <20181212120334.3d9e6dc9@mykolab.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="k1lZvvs/B4yU6o8G" Content-Disposition: inline In-Reply-To: <20181212120334.3d9e6dc9@mykolab.com> User-Agent: Mutt/1.11.0 (2018-11-25) X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 33715-done Cc: 33715-done@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) --k1lZvvs/B4yU6o8G Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Dec 12, 2018 at 12:03:34PM +0100, Rutger Helling wrote: > From 8d82f31c8b4c7249b82314d4354e5973cb04c2c2 Mon Sep 17 00:00:00 2001 > From: Rutger Helling > Date: Wed, 12 Dec 2018 11:57:36 +0100 > Subject: [PATCH] gnu: qemu: Update to 3.1.0. >=20 > * gnu/local.mk: Remove qemu-CVE-2018-16847.patch and > qemu-CVE-2018-16867.patch. > * gnu/packages/patches/qemu-CVE-2018-16847.patch: Remove file. > * gnu/packages/patches/qemu-CVE-2018-16867.patch: Remove file. > * gnu/packages/virtualization.scm (qemu): Update to 3.1.0. > [source]: Remove removed patches. Thank you! I tweaked the commit log and pushed as 6b34499dc62a55283dabd04c39f9b4d53fcf13c8 For the record, I tested it by building qemu and qemu-minimal, building a bare-bones vm-image and gnu/system/install.scm, and booting the vm-image with the new qemu package. This exercises both QEMU packages and makes sure the new QEMU can still create the GuixSD installer. --k1lZvvs/B4yU6o8G Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEsFFZSPHn08G5gDigJkb6MLrKfwgFAlwStngACgkQJkb6MLrK fwjSLA/+Nkovt7WSSk6UclqfD4AFJSlefwZyVcCUZM2KZ942DNj2KsRGGBSJGtft pbuvfdEYObX43jpgQrnk97FYJ4gdeWcAp6sT6G7xYptVoa6xdX7q2oWsoWU18Ngc bmY36WZOENAyZ0Qcbb9VT73aLAfZhxHmbTwcus1hgtsUWvd+kNtrGOA3aiziSGaT ATBQEFBiFUDdNmI4d7ZPHyHhmhdqT+sPjDa7dDZX5+iMUYHKXQyxiyqQwqAo0hgL RtcngVzSl7NgvC2uHMkxZZRI7tHqDs0jznXh869VGiQZ5Gy0t6WbWb/LnqUenFJx T5xGbgfUKXep7CRquD0r/1yBEKUVfP/bBgJKUo/NaD90+s4SVkljFq/tqYFzbqHS MCENhW+SgfXf+AncSsi5L4TVwP+RLlLUX4NlDJWVPcikxpf45hQDTIlufwONd4TA hZB3YWhikxcmsPb4ByN8k3OyivS4D0oib+INGcto1gXDHtbgKvqLJ7MxfPbxsBRO JEVtZQYM94nYih6bS0Lf+ovKbXaXKhlIB4VMHsq11KYDYRGV1VzvGiX19Z5x+rhj l5cReSoGvCzoSkWH1p8+gq1eeUv7TCxsDiEFF24PWdi4Z6s2FcA7jQHdxmGOvhu1 eAptB/4h6grWlYUIhhLAQb7WAdCnqYxdM+9aNYBbQZv+GTPBrF8= =Xfoc -----END PGP SIGNATURE----- --k1lZvvs/B4yU6o8G-- From unknown Wed Jun 18 23:09:05 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Fri, 11 Jan 2019 12:24:04 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator