Debian Package Tracker
Register | Log in
Subscribe

qemu

Choose email to subscribe with

general
  • source: qemu (main)
  • version: 1:10.0.2+ds-1
  • maintainer: Debian QEMU Team (archive) (DMD)
  • uploaders: Michael Tokarev [DMD]
  • arch: all
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1:5.2+dfsg-11+deb11u3
  • old-sec: 1:5.2+dfsg-11+deb11u4
  • old-bpo: 1:7.2+dfsg-7+deb12u2~bpo11+1
  • stable: 1:7.2+dfsg-7+deb12u13
  • stable-bpo: 1:10.0.0+ds-2~bpo12+2
  • testing: 1:10.0.2+ds-1
  • unstable: 1:10.0.2+ds-1
versioned links
  • 1:5.2+dfsg-11+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:5.2+dfsg-11+deb11u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7+deb12u2~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:7.2+dfsg-7+deb12u13: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:10.0.0+ds-2~bpo12+2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:10.0.2+ds-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • qemu-block-extra
  • qemu-guest-agent (3 bugs: 0, 3, 0, 0)
  • qemu-system (8 bugs: 0, 3, 5, 0)
  • qemu-system-arm (4 bugs: 0, 2, 2, 0)
  • qemu-system-common (6 bugs: 0, 0, 6, 0)
  • qemu-system-data (1 bugs: 0, 0, 1, 0)
  • qemu-system-gui (3 bugs: 0, 3, 0, 0)
  • qemu-system-mips
  • qemu-system-misc (1 bugs: 0, 1, 0, 0)
  • qemu-system-modules-opengl
  • qemu-system-modules-spice
  • qemu-system-ppc (3 bugs: 1, 2, 0, 0)
  • qemu-system-riscv (1 bugs: 0, 1, 0, 0)
  • qemu-system-s390x
  • qemu-system-sparc
  • qemu-system-x86 (28 bugs: 0, 23, 5, 0)
  • qemu-system-xen
  • qemu-user (1 bugs: 0, 1, 0, 0)
  • qemu-user-binfmt
  • qemu-user-static (17 bugs: 0, 14, 3, 0)
  • qemu-utils (2 bugs: 0, 1, 1, 0)
action needed
13 security issues in trixie high

There are 13 open security issues in trixie.

10 important issues:
  • CVE-2022-3872: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2024-6519: A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape.
  • CVE-2024-8354: A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
  • CVE-2024-8612: A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
  • CVE-2019-12067: The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2025-54566: hw/pci/pcie_sriov.c in QEMU through 10.0.3 has a migration state inconsistency, a related issue to CVE-2024-26327.
  • CVE-2025-54567: hw/pci/pcie_sriov.c in QEMU through 10.0.3 mishandles the VF Enable bit write mask, a related issue to CVE-2024-26327.
3 issues postponed or untriaged:
  • CVE-2021-3735: (postponed; to be fixed through a stable update) A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Created: 2023-06-11 Last update: 2025-07-25 14:32
13 security issues in sid high

There are 13 open security issues in sid.

13 important issues:
  • CVE-2021-3735: A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-3872: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2024-6519: A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape.
  • CVE-2024-8354: A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
  • CVE-2024-8612: A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
  • CVE-2019-12067: The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2025-54566: hw/pci/pcie_sriov.c in QEMU through 10.0.3 has a migration state inconsistency, a related issue to CVE-2024-26327.
  • CVE-2025-54567: hw/pci/pcie_sriov.c in QEMU through 10.0.3 mishandles the VF Enable bit write mask, a related issue to CVE-2024-26327.
Created: 2022-07-04 Last update: 2025-07-25 14:32
A new upstream version is available: 10.1.0~rc0 high
A new upstream version 10.1.0~rc0 is available, you should consider packaging it.
Created: 2025-07-24 Last update: 2025-07-25 13:30
2 bugs tagged patch in the BTS normal
The BTS contains patches fixing 2 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-07-25 16:01
Multiarch hinter reports 2 issue(s) normal
There are issues with the multiarch metadata for this package.
  • qemu-system could be converted to Architecture: all and marked Multi-Arch: foreign
  • qemu-system-modules-opengl could be marked Multi-Arch: same
Created: 2025-05-30 Last update: 2025-07-25 12:31
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-03-16 Last update: 2025-07-25 12:30
13 low-priority security issues in bookworm low

There are 13 open security issues in bookworm.

13 issues left for the package maintainer to handle:
  • CVE-2021-3735: (postponed; to be fixed through a stable update) A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
  • CVE-2022-3872: (postponed; to be fixed through a stable update) An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
  • CVE-2023-1386: (postponed; to be fixed through a stable update) A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
  • CVE-2024-6519: (needs triaging) A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI Host Bus Adapter emulation. This issue can lead to a crash or VM escape.
  • CVE-2024-7730: (needs triaging) A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero.
  • CVE-2024-8354: (needs triaging) A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
  • CVE-2024-8612: (needs triaging) A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
  • CVE-2019-12067: (postponed; to be fixed through a stable update) The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad->cur_cmd' is null.
  • CVE-2020-25741: (postponed; to be fixed through a stable update) fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.
  • CVE-2020-25742: (postponed; to be fixed through a stable update) pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
  • CVE-2020-25743: (postponed; to be fixed through a stable update) hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
  • CVE-2020-35503: (postponed; to be fixed through a stable update) A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
  • CVE-2021-20255: (postponed; to be fixed through a stable update) A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-07-25 14:32
debian/patches: 5 patches to forward upstream low

Among the 18 debian patches available in version 1:10.0.2+ds-1 of the package, we noticed the following issues:

  • 5 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-05-29 17:01
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2024-09-14 Last update: 2024-09-14 08:30
testing migrations
  • excuses:
    • Migrates after: ceph
    • Migration status for qemu (1:10.0.2+ds-1 to 1:10.0.2+ds-2): BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below)
    • Issues preventing migration:
    • ∙ ∙ missing build on riscv64
    • ∙ ∙ blocked by freeze: is a key package (Follow the freeze policy when applying for an unblock)
    • ∙ ∙ arch:riscv64 not built yet, autopkgtest delayed there
    • ∙ ∙ autopkgtest for architecture-properties: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for cinder: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for cloud-utils: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for cryptsetup: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for debos: amd64: Test in progress, arm64: Test in progress
    • ∙ ∙ autopkgtest for debusine: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for debvm: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for dropbear: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for edk2: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for fai: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for freedom-maker: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for ganeti: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for genimage: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for glance: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for golang-github-go-debos-fakemachine: amd64: Test in progress, arm64: Test in progress
    • ∙ ∙ autopkgtest for hare: amd64: Test in progress, arm64: Test in progress
    • ∙ ∙ autopkgtest for image-garden: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for incus: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for ipmitool: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for ironic: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for ironic-python-agent: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for isa-support: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress
    • ∙ ∙ autopkgtest for kworkflow: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for libguestfs: amd64: Test in progress, arm64: Test in progress, armel: Test in progress (will not be considered a regression), armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for libstdc++-riscv64-unknown-elf: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for libvhdi: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for libvirt: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for multipath-tools: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for nova: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for open-iscsi: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for osk-sdl: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for qbe: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for qemu: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for sbuild: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for shim: amd64: Test in progress, arm64: Test in progress
    • ∙ ∙ autopkgtest for snek: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for systemd: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for vagrant: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for vagrant-libvirt: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for vagrant-mutate: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ autopkgtest for vmdb2: amd64: Test in progress, arm64: Test in progress, armel: Test in progress, armhf: Test in progress, i386: Test in progress, ppc64el: Test in progress, s390x: Test in progress
    • ∙ ∙ Too young, only 0 of 20 days old
    • ∙ ∙ Depends: qemu ceph (not considered)
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/q/qemu.html
    • ∙ ∙ Waiting for reproducibility test results on amd64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • Not considered
news
[rss feed]
  • [2025-07-25] Accepted qemu 1:10.0.2+ds-2 (source) into unstable (Michael Tokarev)
  • [2025-06-20] qemu 1:10.0.2+ds-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-29] Accepted qemu 1:10.0.2+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-05-27] Accepted qemu 1:10.0.0+ds-2~bpo12+2 (source) into stable-backports (Michael Tokarev)
  • [2025-05-20] Accepted qemu 1:10.0.0+ds-2~bpo12+1 (source) into stable-backports (Michael Tokarev)
  • [2025-05-19] qemu 1:10.0.0+ds-2 MIGRATED to testing (Debian testing watch)
  • [2025-05-12] Accepted qemu 1:10.0.0+ds-2 (source) into unstable (Michael Tokarev)
  • [2025-05-06] qemu 1:10.0.0+ds-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-04] Accepted qemu 1:7.2+dfsg-7+deb12u13 (source) into proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • [2025-04-30] Accepted qemu 1:5.2+dfsg-11+deb11u4 (source) into oldstable-security (Santiago Ruano Rincón)
  • [2025-04-24] Accepted qemu 1:10.0.0+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-04-24] qemu 1:10.0.0~rc3+ds-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-13] Accepted qemu 1:10.0.0~rc3+ds-2 (source) into unstable (Michael Tokarev)
  • [2025-04-13] Accepted qemu 1:10.0.0~rc3+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-04-13] qemu 1:10.0.0~rc2+ds-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-07] Accepted qemu 1:10.0.0~rc2+ds-2 (source) into unstable (Michael Tokarev)
  • [2025-04-04] Accepted qemu 1:10.0.0~rc2+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-03-28] Accepted qemu 1:10.0.0~rc1+ds-2 (source) into unstable (Michael Tokarev)
  • [2025-03-26] Accepted qemu 1:10.0.0~rc1+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-03-20] Accepted qemu 1:10.0.0~rc0+ds-2 (source) into experimental (Michael Tokarev)
  • [2025-03-19] Accepted qemu 1:10.0.0~rc0+ds-1 (source) into experimental (Michael Tokarev)
  • [2025-03-17] Accepted qemu 1:9.2.2+ds-1~bpo12+1 (source) into stable-backports (Michael Tokarev)
  • [2025-03-15] qemu 1:9.2.2+ds-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-05] Accepted qemu 1:9.2.2+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-02-22] qemu 1:9.2.1+ds-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-17] Accepted qemu 1:9.2.1+ds-1 (source) into unstable (Michael Tokarev)
  • [2025-01-27] qemu 1:9.2.0+ds-5 MIGRATED to testing (Debian testing watch)
  • [2025-01-12] Accepted qemu 1:9.2.0+ds-5 (source) into unstable (Michael Tokarev)
  • [2025-01-04] Accepted qemu 1:9.2.0+ds-4 (source) into unstable (Michael Tokarev)
  • [2025-01-04] Accepted qemu 1:7.2+dfsg-7+deb12u12 (source) into proposed-updates (Debian FTP Masters) (signed by: Michael Tokarev)
  • 1
  • 2
bugs [bug history graph]
  • all: 133 140
  • RC: 1
  • I&N: 85 86
  • M&W: 47 53
  • F&P: 0
  • patch: 2
links
  • homepage
  • buildd: logs, checks, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 94)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:10.0.2+ds-1ubuntu2
  • 96 bugs (2 patches)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing