-
Mon Apr 16 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-156.el7_5.1
- kvm-vga-add-ram_addr_t-cast.patch [bz#1567913]
- kvm-vga-fix-region-calculation.patch [bz#1567913]
- Resolves: bz#1567913
(CVE-2018-7858 qemu-kvm: Qemu: cirrus: OOB access when updating vga display [rhel-7] [rhel-7.5.z])
-
Tue Feb 20 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-156.el7
- kvm-vnc-Fix-qemu-crashed-when-vnc-client-disconnect-sudd.patch [bz#1527405]
- kvm-fix-full-frame-updates-for-VNC-clients.patch [bz#1527405]
- kvm-vnc-update-fix.patch [bz#1527405]
- kvm-vnc-return-directly-if-no-vnc-client-connected.patch [bz#1527405]
- kvm-buffer-add-buffer_move_empty.patch [bz#1527405]
- kvm-buffer-add-buffer_move.patch [bz#1527405]
- kvm-vnc-kill-jobs-queue-buffer.patch [bz#1527405]
- kvm-vnc-jobs-move-buffer-reset-use-new-buffer-move.patch [bz#1527405]
- kvm-vnc-zap-dead-code.patch [bz#1527405]
- kvm-vnc-add-vnc_width-vnc_height-helpers.patch [bz#1527405]
- kvm-vnc-factor-out-vnc_update_server_surface.patch [bz#1527405]
- kvm-vnc-use-vnc_-width-height-in-vnc_set_area_dirty.patch [bz#1527405]
- kvm-vnc-only-alloc-server-surface-with-clients-connected.patch [bz#1527405]
- kvm-ui-fix-refresh-of-VNC-server-surface.patch [bz#1527405]
- kvm-ui-move-disconnecting-check-to-start-of-vnc_update_c.patch [bz#1527405]
- kvm-ui-remove-redundant-indentation-in-vnc_client_update.patch [bz#1527405]
- kvm-ui-avoid-pointless-VNC-updates-if-framebuffer-isn-t-.patch [bz#1527405]
- kvm-ui-track-how-much-decoded-data-we-consumed-when-doin.patch [bz#1527405]
- kvm-ui-introduce-enum-to-track-VNC-client-framebuffer-up.patch [bz#1527405]
- kvm-ui-correctly-reset-framebuffer-update-state-after-pr.patch [bz#1527405]
- kvm-ui-refactor-code-for-determining-if-an-update-should.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-audio-capture-is-a.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-forced-update-is-r.patch [bz#1527405]
- kvm-ui-place-a-hard-cap-on-VNC-server-output-buffer-size.patch [bz#1527405]
- kvm-ui-avoid-sign-extension-using-client-width-height.patch [bz#1527405]
- kvm-ui-correctly-advance-output-buffer-when-writing-SASL.patch [bz#1527405]
- kvm-io-skip-updates-to-client-if-websocket-output-buffer.patch [bz#1518711]
- Resolves: bz#1518711
(CVE-2017-15268 qemu-kvm: Qemu: I/O: potential memory exhaustion via websock connection to VNC [rhel-7.5])
- Resolves: bz#1527405
(CVE-2017-15124 qemu-kvm: Qemu: memory exhaustion through framebuffer update request message in VNC server [rhel-7.5])
-
Tue Jan 30 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-155.el7
- kvm-qdev-Fix-assert-in-PCI-address-property-when-used-by.patch [bz#1538866]
- kvm-vga-check-the-validation-of-memory-addr-when-draw-te.patch [bz#1534691]
- kvm-savevm-Improve-error-message-for-blocked-migration.patch [bz#1536883]
- kvm-savevm-fail-if-migration-blockers-are-present.patch [bz#1536883]
- Resolves: bz#1534691
(CVE-2018-5683 qemu-kvm: Qemu: Out-of-bounds read in vga_draw_text routine [rhel-7.5])
- Resolves: bz#1536883
([abrt] [faf] qemu-kvm: unknown function(): /usr/libexec/qemu-kvm killed by 6)
- Resolves: bz#1538866
(qemu will coredump after executing info qtree)
-
Wed Jan 24 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-154.el7
- kvm-virtio-net-validate-backend-queue-numbers-against-bu.patch [bz#1460872]
- kvm-dump-guest-memory.py-fix-python-2-support.patch [bz#1411490]
- kvm-qxl-add-migration-blocker-to-avoid-pre-save-assert.patch [bz#1536883]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
- Resolves: bz#1460872
(Aborted(core dumped) when booting guest with "-netdev tap....vhost=on,queues=32")
- Resolves: bz#1536883
([abrt] [faf] qemu-kvm: unknown function(): /usr/libexec/qemu-kvm killed by 6)
-
Fri Jan 12 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-153.el7
- kvm-i386-update-ssdt-misc.hex.generated.patch [bz#1411490]
- kvm-main-loop-Acquire-main_context-lock-around-os_host_m.patch [bz#1435432 bz#1473536]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
- Resolves: bz#1435432
(Emulated ISA serial port hangs randomly when sending lots of data from guest -> host)
- Resolves: bz#1473536
(Hangs in serial console under qemu)
-
Thu Jan 04 2018 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-152.el7
- kvm-target-i386-cpu-add-new-CPUID-bits-for-indirect-bran.patch [CVE-2017-5715]
- kvm-target-i386-add-support-for-SPEC_CTRL-MSR.patch [CVE-2017-5715]
- kvm-target-i386-cpu-add-new-CPU-models-for-indirect-bran.patch [CVE-2017-5715]
-
Tue Dec 19 2017 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-151.el7
- kvm-fw_cfg-remove-support-for-guest-side-data-writes.patch [bz#1411490]
- kvm-fw_cfg-prevent-selector-key-conflict.patch [bz#1411490]
- kvm-fw_cfg-prohibit-insertion-of-duplicate-fw_cfg-file-n.patch [bz#1411490]
- kvm-fw_cfg-factor-out-initialization-of-FW_CFG_ID-rev.-n.patch [bz#1411490]
- kvm-Implement-fw_cfg-DMA-interface.patch [bz#1411490]
- kvm-fw_cfg-avoid-calculating-invalid-current-entry-point.patch [bz#1411490]
- kvm-fw-cfg-support-writeable-blobs.patch [bz#1411490]
- kvm-Enable-fw_cfg-DMA-interface-for-x86.patch [bz#1411490]
- kvm-fw_cfg-unbreak-migration-compatibility.patch [bz#1411490]
- kvm-i386-expose-fw_cfg-QEMU0002-in-SSDT.patch [bz#1411490]
- kvm-fw_cfg-add-write-callback.patch [bz#1411490]
- kvm-hw-misc-add-vmcoreinfo-device.patch [bz#1411490]
- kvm-vmcoreinfo-put-it-in-the-misc-device-category.patch [bz#1411490]
- kvm-fw_cfg-enable-DMA-if-device-vmcoreinfo.patch [bz#1411490]
- kvm-build-sys-restrict-vmcoreinfo-to-fw_cfg-dma-capable-.patch [bz#1411490]
- kvm-dump-Make-DumpState-and-endian-conversion-routines-a.patch [bz#1411490]
- kvm-dump.c-Fix-memory-leak-issue-in-cleanup-processing-f.patch [bz#1411490]
- kvm-dump-Propagate-errors-into-qmp_dump_guest_memory.patch [bz#1411490]
- kvm-dump-Turn-some-functions-to-void-to-make-code-cleane.patch [bz#1411490]
- kvm-dump-Fix-dump-guest-memory-termination-and-use-after.patch [bz#1411490]
- kvm-dump-allow-target-to-set-the-page-size.patch [bz#1411490]
- kvm-dump-allow-target-to-set-the-physical-base.patch [bz#1411490]
- kvm-dump-guest-memory-cleanup-removing-dump_-error-clean.patch [bz#1411490]
- kvm-dump-guest-memory-using-static-DumpState-add-DumpSta.patch [bz#1411490]
- kvm-dump-guest-memory-add-dump_in_progress-helper-functi.patch [bz#1411490]
- kvm-dump-guest-memory-introduce-dump_process-helper-func.patch [bz#1411490]
- kvm-dump-guest-memory-disable-dump-when-in-INMIGRATE-sta.patch [bz#1411490]
- kvm-DumpState-adding-total_size-and-written_size-fields.patch [bz#1411490]
- kvm-dump-do-not-dump-non-existent-guest-memory.patch [bz#1411490]
- kvm-dump-add-guest-ELF-note.patch [bz#1411490]
- kvm-dump-update-phys_base-header-field-based-on-VMCOREIN.patch [bz#1411490]
- kvm-kdump-set-vmcoreinfo-location.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Move-constants-to-the-t.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Make-methods-functions.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Improve-python-3-compat.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Cleanup-functions.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Introduce-multi-arch-su.patch [bz#1411490]
- kvm-Fix-typo-in-variable-name-found-and-fixed-by-codespe.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-add-vmcoreinfo.patch [bz#1411490]
- kvm-dump-guest-memory.py-fix-No-symbol-vmcoreinfo_find.patch [bz#1411490]
- kvm-dump-guest-memory.py-fix-You-can-t-do-that-without-a.patch [bz#1411490]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
-
Tue Dec 12 2017 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-150.el7
- kvm-Build-only-x86_64-packages.patch [bz#1520793]
- Resolves: bz#1520793
(Do not build non-x86_64 subpackages)
-
Wed Nov 29 2017 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-149.el7
- kvm-block-linux-aio-fix-memory-and-fd-leak.patch [bz#1491434]
- kvm-linux-aio-Fix-laio-resource-leak.patch [bz#1491434]
- kvm-slirp-cleanup-leftovers-from-misc.h.patch [bz#1508745]
- kvm-Avoid-embedding-struct-mbuf-in-other-structures.patch [bz#1508745]
- kvm-slirp-Fix-access-to-freed-memory.patch [bz#1508745]
- kvm-slirp-fix-clearing-ifq_so-from-pending-packets.patch [bz#1508745]
- kvm-qcow2-Prevent-backing-file-names-longer-than-1023.patch [bz#1459714]
- kvm-qemu-img-Use-strerror-for-generic-resize-error.patch [bz#1459725]
- kvm-qcow2-Avoid-making-the-L1-table-too-big.patch [bz#1459725]
- Resolves: bz#1459714
(Throw error if qemu-img rebasing backing file is too long or provide way to fix a "too long" backing file.)
- Resolves: bz#1459725
(Prevent qemu-img resize from causing "Active L1 table too large")
- Resolves: bz#1491434
(KVM leaks file descriptors when attaching and detaching virtio-scsi block devices)
- Resolves: bz#1508745
(CVE-2017-13711 qemu-kvm: Qemu: Slirp: use-after-free when sending response [rhel-7.5])
-
Fri Nov 10 2017 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-148.el7
- kvm-multiboot-validate-multiboot-header-address-values.patch [bz#1501121]
- kvm-qemu-option-reject-empty-number-value.patch [bz#1417864]
- Resolves: bz#1417864
(Qemu-kvm starts with unspecified port)
- Resolves: bz#1501121
(CVE-2017-14167 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.5])