qemu-kvm-common-1.5.3-175.el7_9.6.x86_64
[440 KiB] |
Changelog
by Jon Maloy (2022-02-25):
- kvm-rbd-avoid-qemu_rbd_snap_list-memory-leaks.patch [bz#2056725]
- Resolves: bz#2056725
(qemu-kvm leaks on qemu_rbd_snap_list)
|
qemu-kvm-common-1.5.3-175.el7_9.5.x86_64
[440 KiB] |
Changelog
by Jon Maloy (2021-11-12):
- kvm-dma-helpers-Initialize-DMAAIOCB-in_cancel-flag.patch [bz#2007036]
- Resolves: bz#2007036
(Memory leak when using dma_read/write with virtio-scsi)
|
qemu-kvm-common-1.5.3-175.el7_9.4.x86_64
[440 KiB] |
Changelog
by Jon Maloy (2021-05-07):
- kvm-ide-atapi-check-logical-block-address-and-read-size-.patch [bz#1917449]
- Resolves: bz#1917449
(CVE-2020-29443 qemu-kvm: QEMU: ide: atapi: OOB access while processing read commands [rhel-7.9.z])
|
qemu-kvm-common-1.5.3-175.el7_9.3.x86_64
[440 KiB] |
Changelog
by Jon Maloy (2021-01-05):
- kvm-Suppress-prototype-warning-for-nss-headers.patch [bz#1884997]
- Resolves: bz#1884997
(qemu-kvm FTBFS on rhel7.9)
|
qemu-kvm-common-1.5.3-175.el7_9.1.x86_64
[439 KiB] |
Changelog
by Jon Maloy (2020-09-08):
- Fixing release number for z-stream
|
qemu-kvm-common-1.5.3-175.el7.x86_64
[438 KiB] |
Changelog
by Jon Maloy (2020-06-01):
- kvm-vnc-fix-memory-leak-when-vnc-disconnect.patch [bz#1810408]
- Resolves: bz#1810408
(CVE-2019-20382 qemu-kvm: QEMU: vnc: memory leakage upon disconnect [rhel-7])
|
qemu-kvm-common-1.5.3-173.el7_8.3.x86_64
[438 KiB] |
Changelog
by Miroslav Rezanina (2020-04-14):
- kvm-gluster-Handle-changed-glfs_ftruncate-signature.patch [bz#1822235]
- kvm-gluster-the-glfs_io_cbk-callback-function-pointer-ad.patch [bz#1822235]
- Resolves: bz#1822235
(Add support for newer glusterfs [rhel-7.8.z])
|
qemu-kvm-common-1.5.3-173.el7_8.1.x86_64
[438 KiB] |
Changelog
by Miroslav Rezanina (2020-03-04):
- kvm-util-add-slirp_fmt-helpers.patch [bz#1798970]
- kvm-tcp_emu-fix-unsafe-snprintf-usages.patch [bz#1798970]
- Resolves: bz#1798970
(CVE-2020-8608 qemu-kvm: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages [rhel-7.8.z])
|
qemu-kvm-common-1.5.3-173.el7.x86_64
[437 KiB] |
Changelog
by Miroslav Rezanina (2020-01-23):
- kvm-tcp_emu-Fix-oob-access.patch [bz#1791560]
- kvm-slirp-use-correct-size-while-emulating-IRC-commands.patch [bz#1791560]
- kvm-slirp-use-correct-size-while-emulating-commands.patch [bz#1791560]
- Resolves: bz#1791560
(CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-7.8])
|
qemu-kvm-common-1.5.3-167.el7_7.4.x86_64
[436 KiB] |
Changelog
by Miroslav Rezanina (2020-01-06):
- kvm-target-i386-add-MDS-NO-feature.patch [bz#1755333]
- Resolves: bz#1755333
([Intel 7.8 FEAT] MDS_NO exposure to guest - qemu-kvm [rhel-7.7.z])
|
qemu-kvm-common-1.5.3-167.el7_7.1.x86_64
[434 KiB] |
Changelog
by Miroslav Rezanina (2019-08-12):
- kvm-qxl-check-release-info-object.patch [bz#1732337]
- kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734748]
- Resolves: bz#1732337
(CVE-2019-12155 qemu-kvm: QEMU: qxl: null pointer dereference while releasing spice resources [rhel-7] [rhel-7.7.z])
- Resolves: bz#1734748
(CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during packet reassembly [rhel-7.7.z])
|
qemu-kvm-common-1.5.3-167.el7.x86_64
[434 KiB] |
Changelog
by Miroslav Rezanina (2019-06-12):
- Reverting kvm-seccomp-set-the-seccomp-filter-to-all-threads.patch [bz#1618503]
- Resolves: bz#1618503
(qemu-kvm: Qemu: seccomp: blacklist is not applied to all threads [rhel-7])
|
qemu-kvm-common-1.5.3-160.el7_6.3.x86_64
[432 KiB] |
Changelog
by Miroslav Rezanina (2019-05-28):
- kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1669067]
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1669067]
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1669067]
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669067]
- Resolves: bz#1669067
(CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-7.6.z])
|
qemu-kvm-common-1.5.3-160.el7_6.2.x86_64
[432 KiB] |
Changelog
by Danilo C. L. de Paula (2019-04-10):
- kvm-target-i386-define-md-clear-bit-rhel.patch
- Resolves: bz#1693216
(qemu-kvm: hardware: Microarchitectural Store Buffer Data Sampling)
|
qemu-kvm-common-1.5.3-160.el7_6.1.x86_64
[431 KiB] |
Changelog
by Miroslav Rezanina (2019-01-14):
- kvm-i386-Deprecate-arch-facilities-and-make-it-block-liv.patch [bz#1664792]
- Resolves: bz#1664792
(mode="host-model" VMs include broken "arch-facilities" flag name [qemu-kvm] [rhel-7.6.z])
|
qemu-kvm-common-1.5.3-160.el7.x86_64
[431 KiB] |
Changelog
by Johnny Hughes (2018-10-30):
- Added kvm_target arm (Jacco@redsleeve.org)
|
qemu-kvm-common-1.5.3-156.el7_5.5.x86_64
[429 KiB] |
Changelog
by Miroslav Rezanina (2018-08-01):
- kvm-multiboot-bss_end_addr-can-be-zero.patch [bz#1549824]
- kvm-multiboot-Remove-unused-variables-from-multiboot.c.patch [bz#1549824]
- kvm-multiboot-Use-header-names-when-displaying-fields.patch [bz#1549824]
- kvm-multiboot-fprintf-stderr.-error_report.patch [bz#1549824]
- kvm-multiboot-Reject-kernels-exceeding-the-address-space.patch [bz#1549824]
- kvm-multiboot-Check-validity-of-mh_header_addr.patch [bz#1549824]
- kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586248]
- kvm-slirp-correct-size-computation-while-concatenating-m.patch [bz#1586248]
- Resolves: bz#1549824
(CVE-2018-7550 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.5.z])
- Resolves: bz#1586248
(CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-7.5.z])
|
qemu-kvm-common-1.5.3-156.el7_5.3.x86_64
[428 KiB] |
Changelog
by Fabian Arrotin (2018-06-27):
- Added kvm_target arm (Jacco@redsleeve.org)
|
qemu-kvm-common-1.5.3-156.el7_5.2.x86_64
[427 KiB] |
Changelog
by Miroslav Rezanina (2018-05-11):
- kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1574075]
- Resolves: bz#1574075
(EMBARGOED CVE-2018-3639 qemu-kvm: Kernel: omega-4 [rhel-7.5.z])
|
qemu-kvm-common-1.5.3-156.el7_5.1.x86_64
[427 KiB] |
Changelog
by Miroslav Rezanina (2018-04-16):
- kvm-vga-add-ram_addr_t-cast.patch [bz#1567913]
- kvm-vga-fix-region-calculation.patch [bz#1567913]
- Resolves: bz#1567913
(CVE-2018-7858 qemu-kvm: Qemu: cirrus: OOB access when updating vga display [rhel-7] [rhel-7.5.z])
|
qemu-kvm-common-1.5.3-156.el7.x86_64
[427 KiB] |
Changelog
by Miroslav Rezanina (2018-02-20):
- kvm-vnc-Fix-qemu-crashed-when-vnc-client-disconnect-sudd.patch [bz#1527405]
- kvm-fix-full-frame-updates-for-VNC-clients.patch [bz#1527405]
- kvm-vnc-update-fix.patch [bz#1527405]
- kvm-vnc-return-directly-if-no-vnc-client-connected.patch [bz#1527405]
- kvm-buffer-add-buffer_move_empty.patch [bz#1527405]
- kvm-buffer-add-buffer_move.patch [bz#1527405]
- kvm-vnc-kill-jobs-queue-buffer.patch [bz#1527405]
- kvm-vnc-jobs-move-buffer-reset-use-new-buffer-move.patch [bz#1527405]
- kvm-vnc-zap-dead-code.patch [bz#1527405]
- kvm-vnc-add-vnc_width-vnc_height-helpers.patch [bz#1527405]
- kvm-vnc-factor-out-vnc_update_server_surface.patch [bz#1527405]
- kvm-vnc-use-vnc_-width-height-in-vnc_set_area_dirty.patch [bz#1527405]
- kvm-vnc-only-alloc-server-surface-with-clients-connected.patch [bz#1527405]
- kvm-ui-fix-refresh-of-VNC-server-surface.patch [bz#1527405]
- kvm-ui-move-disconnecting-check-to-start-of-vnc_update_c.patch [bz#1527405]
- kvm-ui-remove-redundant-indentation-in-vnc_client_update.patch [bz#1527405]
- kvm-ui-avoid-pointless-VNC-updates-if-framebuffer-isn-t-.patch [bz#1527405]
- kvm-ui-track-how-much-decoded-data-we-consumed-when-doin.patch [bz#1527405]
- kvm-ui-introduce-enum-to-track-VNC-client-framebuffer-up.patch [bz#1527405]
- kvm-ui-correctly-reset-framebuffer-update-state-after-pr.patch [bz#1527405]
- kvm-ui-refactor-code-for-determining-if-an-update-should.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-audio-capture-is-a.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-forced-update-is-r.patch [bz#1527405]
- kvm-ui-place-a-hard-cap-on-VNC-server-output-buffer-size.patch [bz#1527405]
- kvm-ui-avoid-sign-extension-using-client-width-height.patch [bz#1527405]
- kvm-ui-correctly-advance-output-buffer-when-writing-SASL.patch [bz#1527405]
- kvm-io-skip-updates-to-client-if-websocket-output-buffer.patch [bz#1518711]
- Resolves: bz#1518711
(CVE-2017-15268 qemu-kvm: Qemu: I/O: potential memory exhaustion via websock connection to VNC [rhel-7.5])
- Resolves: bz#1527405
(CVE-2017-15124 qemu-kvm: Qemu: memory exhaustion through framebuffer update request message in VNC server [rhel-7.5])
|
qemu-kvm-common-1.5.3-141.el7_4.6.x86_64
[416 KiB] |
Changelog
by Miroslav Rezanina (2017-12-14):
- Fix CVE-2017-5715
|
qemu-kvm-common-1.5.3-141.el7_4.5.x86_64
[416 KiB] |
Changelog
by Miroslav Rezanina (2017-11-29):
- kvm-vfio-pci-Only-mmap-TARGET_PAGE_SIZE-regions.patch [bz#1515110]
- Resolves: bz#1515110
(Regression in QEMU handling for sub-page MMIO BARs for vfio-pci devices [rhel-7.4.z])
|
qemu-kvm-common-1.5.3-141.el7_4.4.x86_64
[415 KiB] |
Changelog
by Miroslav Rezanina (2017-11-10):
- kvm-multiboot-validate-multiboot-header-address-values.patch [bz#1501120]
- Resolves: bz#1501120
(CVE-2017-14167 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.4.z])
|
qemu-kvm-common-1.5.3-141.el7_4.2.x86_64
[414 KiB] |
Changelog
by Miroslav Rezanina (2017-08-21):
- kvm-virtio-net-dynamic-network-offloads-configuration.patch [bz#1482468]
- kvm-Workaround-rhel6-ctrl_guest_offloads-machine-type-mi.patch [bz#1482468]
- Resolves: bz#1482468
(KVM: windows guest migration from EL6 to EL7 fails. [rhel-7.4.z])
|
qemu-kvm-common-1.5.3-141.el7_4.1.x86_64
[414 KiB] |
Changelog
by Miroslav Rezanina (2017-07-11):
- kvm-qemu-nbd-Ignore-SIGPIPE.patch [bz#1468107]
- Resolves: bz#1468107
(CVE-2017-10664 qemu-kvm: Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort [rhel-7.4.z])
|
qemu-kvm-common-1.5.3-141.el7.x86_64
[414 KiB] |
Changelog
by Miroslav Rezanina (2017-06-13):
- kvm-Fix-memory-slot-page-alignment-logic-bug-1455745.patch [bz#1455745]
- kvm-Do-not-hang-on-full-PTY.patch [bz#1452067]
- kvm-serial-fixing-vmstate-for-save-restore.patch [bz#1452067]
- kvm-serial-reinstate-watch-after-migration.patch [bz#1452067]
- kvm-nbd-Fully-initialize-client-in-case-of-failed-negoti.patch [bz#1451614]
- kvm-nbd-Fix-regression-on-resiliency-to-port-scan.patch [bz#1451614]
- Resolves: bz#1451614
(CVE-2017-9524 qemu-kvm: segment fault when private user nmap qemu-nbd server [rhel-7.4])
- Resolves: bz#1452067
(migration can confuse serial port user)
- Resolves: bz#1455745
(Backport fix for broken logic that's supposed to ensure memory slots are page aligned)
|
qemu-kvm-common-1.5.3-126.el7_3.10.x86_64
[408 KiB] |
Changelog
by Miroslav Rezanina (2017-06-16):
- kvm-nbd-Fully-initialize-client-in-case-of-failed-negoti.patch [bz#1460179]
- kvm-nbd-Fix-regression-on-resiliency-to-port-scan.patch [bz#1460179]
- Resolves: bz#1460179
(CVE-2017-9524 qemu-kvm: Qemu: nbd: segmentation fault due to client non-negotiation [rhel-7.3.z])
|
qemu-kvm-common-1.5.3-126.el7_3.9.x86_64
[407 KiB] |
Changelog
by Miroslav Rezanina (2017-06-06):
- kvm-spice-fix-spice_chr_add_watch-pre-condition.patch [bz#1452332]
- Resolves: bz#1452332
(RHEL 7.2 based VM (Virtual Machine) hung for several hours apparently waiting for lock held by main_loop)
|
qemu-kvm-common-1.5.3-126.el7_3.6.x86_64
[406 KiB] |
Changelog
by Miroslav Rezanina (2017-03-24):
- kvm-fix-cirrus_vga-fix-OOB-read-case-qemu-Segmentation-f.patch [bz#1430059]
- kvm-cirrus-vnc-zap-bitblit-support-from-console-code.patch [bz#1430059]
- kvm-cirrus-add-option-to-disable-blitter.patch [bz#1430059]
- kvm-cirrus-fix-cirrus_invalidate_region.patch [bz#1430059]
- kvm-cirrus-stop-passing-around-dst-pointers-in-the-blitt.patch [bz#1430059]
- kvm-cirrus-stop-passing-around-src-pointers-in-the-blitt.patch [bz#1430059]
- kvm-cirrus-fix-off-by-one-in-cirrus_bitblt_rop_bkwd_tran.patch [bz#1430059]
- Resolves: bz#1430059
(CVE-2016-9603 qemu-kvm: Qemu: cirrus: heap buffer overflow via vnc connection [rhel-7.3.z])
|
qemu-kvm-common-1.5.3-126.el7_3.5.x86_64
[405 KiB] |
Changelog
by Miroslav Rezanina (2017-02-13):
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420490]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420490]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420490]
- Resolves: bz#1420490
(EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-7.3.z])
|
qemu-kvm-common-1.5.3-126.el7_3.3.x86_64
[404 KiB] |
Changelog
by Miroslav Rezanina (2017-01-04):
- kvm-net-check-packet-payload-length.patch [bz#1398217]
- Resolves: bz#1398217
(CVE-2016-2857 qemu-kvm: Qemu: net: out of bounds read in net_checksum_calculate() [rhel-7.3.z])
|
qemu-kvm-common-1.5.3-126.el7.x86_64
[402 KiB] |
Changelog
by Miroslav Rezanina (2016-09-20):
- kvm-virtio-recalculate-vq-inuse-after-migration.patch [bz#1376542]
- Resolves: bz#1376542
(RHSA-2016-1756 breaks migration of instances)
|
qemu-kvm-common-1.5.3-105.el7_2.7.x86_64
[391 KiB] |
Changelog
by Miroslav Rezanina (2016-08-02):
- kvm-block-iscsi-avoid-potential-overflow-of-acb-task-cdb.patch [bz#1358996]
- Resolves: bz#1358996
(CVE-2016-5126 qemu-kvm: Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl [rhel-7.2.z])
|
qemu-kvm-common-1.5.3-105.el7_2.4.x86_64
[391 KiB] |
Changelog
by Miroslav Rezanina (2016-05-03):
- kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patch [bz#1331412]
- kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710.patch [bz#1331412]
- kvm-vga-add-vbe_enabled-helper.patch [bz#1331412]
- kvm-vga-factor-out-vga-register-setup.patch [bz#1331412]
- kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331412]
- kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch [bz#1331412]
- Resolves: bz#1331412
(EMBARGOED CVE-2016-3710 qemu-kvm: qemu: incorrect banked access bounds checking in vga module [rhel-7.2.z])
|
qemu-kvm-common-1.5.3-105.el7_2.3.x86_64
[390 KiB] |
Changelog
by Miroslav Rezanina (2016-01-21):
- kvm-fw_cfg-add-check-to-validate-current-entry-value-CVE.patch [bz#1298047]
- Resolves: bz#1298047
(CVE-2016-1714 qemu-kvm: Qemu: nvram: OOB r/w access in processing firmware configurations [rhel-7.2.z])
|
qemu-kvm-common-1.5.3-105.el7_2.1.x86_64
[390 KiB] |
Changelog
by Miroslav Rezanina (2015-11-17):
- kvm-rbd-make-qemu-s-cache-setting-override-any-ceph-sett.patch [bz#1279389]
- kvm-rbd-fix-ceph-settings-precedence.patch [bz#1279389]
- Resolves: bz#1279389
(ceph.conf properties override qemu's command-line properties)
|
qemu-kvm-common-1.5.3-105.el7.x86_64
[389 KiB] |
Changelog
by Jeff E. Nelson (2015-10-16):
- kvm-qtest-ide-test-disable-flush-test.patch [bz#1270341]
- Resolves: bz#1270341
(qemu-kvm build failure race condition in tests/ide-test)
|
qemu-kvm-common-1.5.3-86.el7_1.8.x86_64
[369 KiB] |
Changelog
by Jeff E. Nelson (2015-10-19):
- kvm-qtest-ide-test-disable-flush-test.patch [bz#1273098]
- Resolves: bz#1273098
(qemu-kvm build failure race condition in tests/ide-test)
|
qemu-kvm-common-1.5.3-86.el7_1.6.x86_64
[368 KiB] |
Changelog
by Miroslav Rezanina (2015-08-06):
- kvm-rtl8139-avoid-nested-ifs-in-IP-header-parsing-CVE-20.patch [bz#1248764]
- kvm-rtl8139-drop-tautologous-if-ip-.-statement-CVE-2015-.patch [bz#1248764]
- kvm-rtl8139-skip-offload-on-short-Ethernet-IP-header-CVE.patch [bz#1248764]
- kvm-rtl8139-check-IP-Header-Length-field-CVE-2015-5165.patch [bz#1248764]
- kvm-rtl8139-check-IP-Total-Length-field-CVE-2015-5165.patch [bz#1248764]
- kvm-rtl8139-skip-offload-on-short-TCP-header-CVE-2015-51.patch [bz#1248764]
- kvm-rtl8139-check-TCP-Data-Offset-field-CVE-2015-5165.patch [bz#1248764]
- Resolves: bz#1248764
(CVE-2015-5165 qemu-kvm: Qemu: rtl8139 uninitialized heap memory information leakage to guest [rhel-7.1.z])
|
qemu-kvm-common-1.5.3-86.el7_1.5.x86_64
[367 KiB] |
Changelog
by Miroslav Rezanina (2015-07-20):
- kvm-i8254-fix-out-of-bounds-memory-access-in-pit_ioport_.patch [bz#1243726]
- Resolves: bz#1243726
(CVE-2015-3214 qemu-kvm: qemu: i8254: out-of-bounds memory access in pit_ioport_read function [rhel-7.1.z])
|
qemu-kvm-common-1.5.3-86.el7_1.2.x86_64
[367 KiB] |
Changelog
by Miroslav Rezanina (2015-05-08):
- kvm-fdc-force-the-fifo-access-to-be-in-bounds-of-the-all.patch [bz#1219269]
- Resolves: bz#1219269
(EMBARGOED CVE-2015-3456 qemu-kvm: qemu: floppy disk controller flaw [rhel-7.1.z])
|
qemu-kvm-common-1.5.3-86.el7_1.1.x86_64
[366 KiB] |
Changelog
by Miroslav Rezanina (2015-03-05):
- kvm-pc-add-rhel6.6.0-machine-type.patch [bz#1198958]
- Resolves: bz#1198958
(Add rhel-6.6.0 machine type to RHEL 7.1.z to support RHEL 6.6 to RHEL 7.1 live migration)
|