-
Tue May 28 2019 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-160.el7_6.3
- kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1669067]
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1669067]
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1669067]
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669067]
- Resolves: bz#1669067
(CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-7.6.z])
-
Wed Apr 10 2019 Danilo C. L. de Paula <ddepaula@redhat.com> - 1.5.3-160.el7_6.2
- kvm-target-i386-define-md-clear-bit-rhel.patch
- Resolves: bz#1693216
(qemu-kvm: hardware: Microarchitectural Store Buffer Data Sampling)
-
Mon Jan 14 2019 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-160.el7_6.1
- kvm-i386-Deprecate-arch-facilities-and-make-it-block-liv.patch [bz#1664792]
- Resolves: bz#1664792
(mode="host-model" VMs include broken "arch-facilities" flag name [qemu-kvm] [rhel-7.6.z])
-
Mon Aug 20 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-160.el7
- kvm-scsi-disk-support-reporting-of-rotation-rate.patch [bz#1583807]
- kvm-ide-support-reporting-of-rotation-rate.patch [bz#1583807]
- kvm-ide-avoid-referencing-NULL-dev-in-rotational-rate-se.patch [bz#1583807]
- kvm-slirp-Correct-size-check-in-m_inc.patch [bz#1586253]
- Resolves: bz#1583807
([DELL EMC 7.6 FEAT] option to mark virtual block device as rotational/non-rotational)
- Resolves: bz#1586253
(CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-7.6])
-
Wed Aug 01 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-159.el7
- kvm-multiboot-bss_end_addr-can-be-zero.patch [bz#1549822]
- kvm-multiboot-Remove-unused-variables-from-multiboot.c.patch [bz#1549822]
- kvm-multiboot-Use-header-names-when-displaying-fields.patch [bz#1549822]
- kvm-multiboot-fprintf-stderr.-error_report.patch [bz#1549822]
- kvm-multiboot-Reject-kernels-exceeding-the-address-space.patch [bz#1549822]
- kvm-multiboot-Check-validity-of-mh_header_addr.patch [bz#1549822]
- kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586253]
- kvm-slirp-correct-size-computation-while-concatenating-m.patch [bz#1586253]
- Resolves: bz#1549822
(CVE-2018-7550 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.6])
- Resolves: bz#1586253
(CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-7.6])
-
Wed Jun 27 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-158.el7
- kvm-x86-cpu-Enable-new-SSE-AVX-AVX512-cpu-features.patch [bz#1513686]
- kvm-target-i386-Add-support-for-UMIP-and-RDPID-CPUID-bit.patch [bz#1526638]
- kvm-i386-Define-the-Virt-SSBD-MSR-and-handling-of-it-CVE.patch [bz#1584583]
- kvm-i386-define-the-AMD-virt-ssbd-CPUID-feature-bit-CVE-.patch [bz#1584583]
- kvm-qcow2-Repair-OFLAG_COPIED-when-fixing-leaks.patch [bz#1527122]
- kvm-iotests-Repairing-error-during-snapshot-deletion.patch [bz#1527122]
- kvm-headers-add-drm_fourcc.h.patch [bz#1555246]
- kvm-spice-fix-simple-display-on-bigendian-hosts.patch [bz#1555246]
- kvm-ui-pixman-add-qemu_drm_format_to_pixman.patch [bz#1555246]
- kvm-console-nicer-initial-screen.patch [bz#1555246]
- kvm-console-minimal-hotplug-suport.patch [bz#1555246]
- kvm-vfio-common-cleanup-in-vfio_region_finalize.patch [bz#1555246]
- kvm-linux-headers-Update-to-include-region-based-display.patch [bz#1555246]
- kvm-qdev-New-DEFINE_PROP_ON_OFF_AUTO.patch [bz#1555246]
- kvm-vfio-display-core-wireup.patch [bz#1555246]
- kvm-vfio-display-adding-region-support.patch [bz#1555246]
- kvm-vfio-pci-Default-display-option-to-off.patch [bz#1555246]
- Resolves: bz#1513686
([Intel 7.6 Feat] qemu-kvm Enabling Icelake new NIs)
- Resolves: bz#1526638
([Intel 7.6 FEAT] KVM User Mode Instruction Prevention (UMIP) - qemu-kvm)
- Resolves: bz#1527122
(The copied flag should be updated during '-r leaks')
- Resolves: bz#1555246
([RFE] Support console VNC on Nvidia vGPU - qemu)
- Resolves: bz#1584583
(CVE-2018-3639 qemu-kvm: hw: cpu: speculative store bypass [rhel-7.6])
-
Thu Jun 07 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-157.el7
- kvm-vga-add-ram_addr_t-cast.patch [bz#1553670]
- kvm-vga-fix-region-calculation.patch [bz#1553670]
- kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1574082]
- kvm-target-i386-introduce-kvm_put_one_msr.patch [bz#1577680]
- kvm-apic-fix-2.2-2.1-migration.patch [bz#1577680]
- kvm-x86-lapic-Load-LAPIC-state-at-post_load.patch [bz#1577680]
- kvm-apic-drop-debugging.patch [bz#1577680]
- kvm-apic-set-APIC-base-as-part-of-kvm_apic_put.patch [bz#1577680]
- kvm-spec-Change-License-line.patch [bz#1549108]
- kvm-spec-Use-hardening-flags-for-ksmctl-build.patch [bz#1558895]
- Resolves: bz#1549108
(Incorrect License information in RPM specfile)
- Resolves: bz#1553670
(CVE-2018-7858 qemu-kvm: Qemu: cirrus: OOB access when updating vga display [rhel-7])
- Resolves: bz#1558895
(ksmctl is built without any hardening flags set [rhel-7.6])
- Resolves: bz#1574082
(CVE-2018-3639 qemu-kvm: hw: cpu: speculative store bypass [rhel-7.6])
- Resolves: bz#1577680
(Windows 2012 Guest hangs after live migration with RTC clock stopped.)
-
Tue Feb 20 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-156.el7
- kvm-vnc-Fix-qemu-crashed-when-vnc-client-disconnect-sudd.patch [bz#1527405]
- kvm-fix-full-frame-updates-for-VNC-clients.patch [bz#1527405]
- kvm-vnc-update-fix.patch [bz#1527405]
- kvm-vnc-return-directly-if-no-vnc-client-connected.patch [bz#1527405]
- kvm-buffer-add-buffer_move_empty.patch [bz#1527405]
- kvm-buffer-add-buffer_move.patch [bz#1527405]
- kvm-vnc-kill-jobs-queue-buffer.patch [bz#1527405]
- kvm-vnc-jobs-move-buffer-reset-use-new-buffer-move.patch [bz#1527405]
- kvm-vnc-zap-dead-code.patch [bz#1527405]
- kvm-vnc-add-vnc_width-vnc_height-helpers.patch [bz#1527405]
- kvm-vnc-factor-out-vnc_update_server_surface.patch [bz#1527405]
- kvm-vnc-use-vnc_-width-height-in-vnc_set_area_dirty.patch [bz#1527405]
- kvm-vnc-only-alloc-server-surface-with-clients-connected.patch [bz#1527405]
- kvm-ui-fix-refresh-of-VNC-server-surface.patch [bz#1527405]
- kvm-ui-move-disconnecting-check-to-start-of-vnc_update_c.patch [bz#1527405]
- kvm-ui-remove-redundant-indentation-in-vnc_client_update.patch [bz#1527405]
- kvm-ui-avoid-pointless-VNC-updates-if-framebuffer-isn-t-.patch [bz#1527405]
- kvm-ui-track-how-much-decoded-data-we-consumed-when-doin.patch [bz#1527405]
- kvm-ui-introduce-enum-to-track-VNC-client-framebuffer-up.patch [bz#1527405]
- kvm-ui-correctly-reset-framebuffer-update-state-after-pr.patch [bz#1527405]
- kvm-ui-refactor-code-for-determining-if-an-update-should.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-audio-capture-is-a.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-forced-update-is-r.patch [bz#1527405]
- kvm-ui-place-a-hard-cap-on-VNC-server-output-buffer-size.patch [bz#1527405]
- kvm-ui-avoid-sign-extension-using-client-width-height.patch [bz#1527405]
- kvm-ui-correctly-advance-output-buffer-when-writing-SASL.patch [bz#1527405]
- kvm-io-skip-updates-to-client-if-websocket-output-buffer.patch [bz#1518711]
- Resolves: bz#1518711
(CVE-2017-15268 qemu-kvm: Qemu: I/O: potential memory exhaustion via websock connection to VNC [rhel-7.5])
- Resolves: bz#1527405
(CVE-2017-15124 qemu-kvm: Qemu: memory exhaustion through framebuffer update request message in VNC server [rhel-7.5])
-
Tue Jan 30 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-155.el7
- kvm-qdev-Fix-assert-in-PCI-address-property-when-used-by.patch [bz#1538866]
- kvm-vga-check-the-validation-of-memory-addr-when-draw-te.patch [bz#1534691]
- kvm-savevm-Improve-error-message-for-blocked-migration.patch [bz#1536883]
- kvm-savevm-fail-if-migration-blockers-are-present.patch [bz#1536883]
- Resolves: bz#1534691
(CVE-2018-5683 qemu-kvm: Qemu: Out-of-bounds read in vga_draw_text routine [rhel-7.5])
- Resolves: bz#1536883
([abrt] [faf] qemu-kvm: unknown function(): /usr/libexec/qemu-kvm killed by 6)
- Resolves: bz#1538866
(qemu will coredump after executing info qtree)
-
Wed Jan 24 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-154.el7
- kvm-virtio-net-validate-backend-queue-numbers-against-bu.patch [bz#1460872]
- kvm-dump-guest-memory.py-fix-python-2-support.patch [bz#1411490]
- kvm-qxl-add-migration-blocker-to-avoid-pre-save-assert.patch [bz#1536883]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
- Resolves: bz#1460872
(Aborted(core dumped) when booting guest with "-netdev tap....vhost=on,queues=32")
- Resolves: bz#1536883
([abrt] [faf] qemu-kvm: unknown function(): /usr/libexec/qemu-kvm killed by 6)