[Pkg-libvirt-commits] [libguestfs] 38/61: Further updates to the release notes, for 1.26.

Hilko Bengen bengen at moszumanska.debian.org
Sat Mar 29 14:36:27 UTC 2014


This is an automated email from the git hooks/post-receive script.

bengen pushed a commit to branch experimental
in repository libguestfs.

commit 218ac6996be19b84d92f654633d8ad53d1937a02
Author: Richard W.M. Jones <rjones at redhat.com>
Date:   Tue Mar 25 23:52:51 2014 +0000

    Further updates to the release notes, for 1.26.
---
 guestfs-release-notes.pod | 20 ++++++++++----------
 guestfs-release-notes.txt | 15 ++++++++-------
 2 files changed, 18 insertions(+), 17 deletions(-)

diff --git a/guestfs-release-notes.pod b/guestfs-release-notes.pod
index 13c477b..74bbbf8 100644
--- a/guestfs-release-notes.pod
+++ b/guestfs-release-notes.pod
@@ -86,8 +86,8 @@ Inspection can recognize Debian live images.
 
 ARMv7 (32 bit) now supports KVM acceleration.
 
-Aarch64 (ARM 64 bit) is supported, but the appliance part does not yet
-work.
+Aarch64 (ARM 64 bit) is supported, but the appliance part does not
+work yet.
 
 PPC64 support has been fixed and enhanced.
 
@@ -97,17 +97,17 @@ PPC64 support has been fixed and enhanced.
 
 =item Denial of service when inspecting disk images with corrupt btrfs volumes
 
-It was possible to crash libguestfs, and programs that use libguestfs
-as a library, by presenting a disk image containing a corrupt btrfs
+It was possible to crash libguestfs (and programs that use libguestfs
+as a library) by presenting a disk image containing a corrupt btrfs
 volume.
 
 This was caused by a NULL pointer dereference causing a denial of
 service, and is not thought to be exploitable any further.
 
-See commit d70ceb4cbea165c960710576efac5a5716055486 for the fix.
-This fix is included in libguestfs stable branches S<E<ge> 1.26.0>,
-S<E<ge> 1.24.6> and S<E<ge> 1.22.8>.  Earlier versions of libguestfs
-are not vulnerable.
+See commit d70ceb4cbea165c960710576efac5a5716055486 for the fix.  This
+fix is included in libguestfs stable branches S<E<ge> 1.26.0>, S<E<ge>
+1.24.6> and S<E<ge> 1.22.8>, and also in RHEL S<E<ge> 7.0>.
+Earlier versions of libguestfs are not vulnerable.
 
 =item Better generation of random root passwords and random seeds
 
@@ -219,8 +219,8 @@ if qemu supports it.
 C<./configure --without-qemu> can be used if you don't want to specify
 a default hypervisor.
 
-Overlays (for readonly drives) are now created through an internal
-backend API.
+Copy-on-write [COW] overlays, used for example for read-only drives,
+are now created through an internal backend API (C<.create_cow_overlay>).
 
 Libvirt backend uses some funky C macros to generate XML.  These are
 simpler and safer.
diff --git a/guestfs-release-notes.txt b/guestfs-release-notes.txt
index f6fb8f3..865e95d 100644
--- a/guestfs-release-notes.txt
+++ b/guestfs-release-notes.txt
@@ -70,8 +70,8 @@ RELEASE NOTES FOR LIBGUESTFS 1.26
 
     ARMv7 (32 bit) now supports KVM acceleration.
 
-    Aarch64 (ARM 64 bit) is supported, but the appliance part does not yet
-    work.
+    Aarch64 (ARM 64 bit) is supported, but the appliance part does not work
+    yet.
 
     PPC64 support has been fixed and enhanced.
 
@@ -80,8 +80,8 @@ RELEASE NOTES FOR LIBGUESTFS 1.26
     Denial of service when inspecting disk images with corrupt btrfs
     volumes
 
-      It was possible to crash libguestfs, and programs that use libguestfs
-      as a library, by presenting a disk image containing a corrupt btrfs
+      It was possible to crash libguestfs (and programs that use libguestfs
+      as a library) by presenting a disk image containing a corrupt btrfs
       volume.
 
       This was caused by a NULL pointer dereference causing a denial of
@@ -89,7 +89,8 @@ RELEASE NOTES FOR LIBGUESTFS 1.26
 
       See commit d70ceb4cbea165c960710576efac5a5716055486 for the fix. This
       fix is included in libguestfs stable branches ≥ 1.26.0, ≥ 1.24.6 and
-      ≥ 1.22.8. Earlier versions of libguestfs are not vulnerable.
+      ≥ 1.22.8, and also in RHEL ≥ 7.0. Earlier versions of libguestfs are
+      not vulnerable.
 
     Better generation of random root passwords and random seeds
 
@@ -187,8 +188,8 @@ RELEASE NOTES FOR LIBGUESTFS 1.26
     ./configure --without-qemu can be used if you don't want to specify a
     default hypervisor.
 
-    Overlays (for readonly drives) are now created through an internal
-    backend API.
+    Copy-on-write [COW] overlays, used for example for read-only drives,
+    are now created through an internal backend API (.create_cow_overlay).
 
     Libvirt backend uses some funky C macros to generate XML. These are
     simpler and safer.

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-libvirt/libguestfs.git



More information about the Pkg-libvirt-commits mailing list