-
Mon Sep 29 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.10
- kvm-block-add-helper-function-to-determine-if-a-BDS-is-i.patch [bz#1122925]
- kvm-block-extend-block-commit-to-accept-a-string-for-the.patch [bz#1122925]
- kvm-block-add-backing-file-option-to-block-stream.patch [bz#1122925]
- kvm-block-add-__com.redhat_change-backing-file-qmp-comma.patch [bz#1122925]
- Resolves: bz#1122925
(Maintain relative path to backing file image during live merge (block-commit))
-
Tue Sep 23 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.9
- kvm-scsi-disk-fix-bug-in-scsi_block_new_request-introduc.patch [bz#1141189]
- Resolves: bz#1141189
(bug in scsi_block_new_request() function introduced by upstream commit 137745c5c60f083ec982fe9e861e8c16ebca1ba8)
-
Mon Sep 22 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.8
- kvm-vmstate_xhci_event-fix-unterminated-field-list.patch [bz#1145055]
- kvm-vmstate_xhci_event-bug-compat-with-RHEL-7.0-RHEL-onl.patch [bz#1145055]
- kvm-vbe-make-bochs-dispi-interface-return-the-correct-me.patch [bz#1139117]
- kvm-vbe-rework-sanity-checks.patch [bz#1139117]
- kvm-spice-display-add-display-channel-id-to-the-debug-me.patch [bz#1139117]
- kvm-spice-make-sure-we-don-t-overflow-ssd-buf.patch [bz#1139117]
- Resolves: bz#1139117
(CVE-2014-3615 qemu-kvm: Qemu: crash when guest sets high resolution [rhel-7.0.z])
- Resolves: bz#1145055
(vmstate_xhci_event: fix unterminated field list [rhel-7.0.z])
-
Tue Aug 26 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.7
- kvm-mirror-Fix-resource-leak-when-bdrv_getlength-fails.patch [bz#1132806]
- kvm-blockjob-Add-block_job_yield.patch [bz#1132806]
- kvm-mirror-Go-through-ready-complete-process-for-0-len-i.patch [bz#1132806]
- kvm-qemu-iotests-Test-BLOCK_JOB_READY-event-for-0Kb-imag.patch [bz#1132806]
- kvm-block-make-top-argument-to-block-commit-optional.patch [bz#1132806]
- kvm-qemu-iotests-Test-0-length-image-for-mirror.patch [bz#1132806]
- kvm-mirror-Fix-qiov-size-for-short-requests.patch [bz#1132806]
- Resolves: bz#1132806
(advertise active commit to libvirt)
-
Fri Aug 15 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.6
- kvm-vmstate-reduce-code-duplication.patch [bz#1095706]
- kvm-vfio-pci-Add-debug-config-options-to-disable-MSI-X-K.patch [bz#1110693 bz#1110695]
- kvm-vfio-correct-debug-macro-typo.patch [bz#1110693 bz#1110695]
- kvm-vfio-pci-Fix-MSI-X-debug-code.patch [bz#1110693 bz#1110695]
- kvm-vfio-pci-Fix-MSI-X-masking-performance.patch [bz#1110693 bz#1110695]
- kvm-vfio-Fix-MSI-X-vector-expansion.patch [bz#1110693 bz#1110695]
- kvm-vfio-Don-t-cache-MSIMessage.patch [bz#1110693 bz#1110695]
- kvm-virtio-net-Do-not-filter-VLANs-without-F_CTRL_VLAN.patch [bz#1130149]
- kvm-virtio-net-add-vlan-receive-state-to-RxFilterInfo.patch [bz#1130149]
- kvm-memory-Don-t-call-memory_region_update_coalesced_ran.patch [bz#1124660]
- Resolves: bz#1110693
(2x RHEL 5.10 VM running on RHEL 7 KVM have low TCP_STREAM throughput)
- Resolves: bz#1110695
(2x RHEL 5.10 VM running on RHEL 7 KVM have low TCP_STREAM throughput)
- Resolves: bz#1124660
([FJ7.0 Bug] RHEL7.0 guest attaching 150 or more virtio-blk disks fails to start up)
- Resolves: bz#1130149
(rx filter incorrect when guest disables VLAN filtering)
-
Wed Jul 02 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.5
- kvm-Allow-mismatched-virtio-config-len.patch [bz#1095782]
- Resolves: bz#1095782
(CVE-2014-0182 qemu-kvm: qemu: virtio: out-of-bounds buffer write on state load with invalid config_len [rhel-7.0.z])
-
Wed Jun 18 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.4
- kvm-zero-initialize-KVM_SET_GSI_ROUTING-input.patch [bz#1110693]
- kvm-skip-system-call-when-msi-route-is-unchanged.patch [bz#1110693]
- Resolves: bz#1110693
(2x RHEL 5.10 VM running on RHEL 7 KVM have low TCP_STREAM throughput)
-
Tue Jun 17 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.3
- kvm-virtio-net-fix-buffer-overflow-on-invalid-state-load.patch [bz#1095677]
- kvm-virtio-net-out-of-bounds-buffer-write-on-load.patch [bz#1095684]
- kvm-virtio-net-out-of-bounds-buffer-write-on-invalid-sta.patch [bz#1095689]
- kvm-virtio-out-of-bounds-buffer-write-on-invalid-state-l.patch [bz#1095694]
- kvm-virtio-avoid-buffer-overrun-on-incoming-migration.patch [bz#1095737]
- kvm-virtio-scsi-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095741]
- kvm-virtio-validate-config_len-on-load.patch [bz#1095782]
- kvm-virtio-validate-num_sg-when-mapping.patch [bz#1095765]
- kvm-virtio-allow-mapping-up-to-max-queue-size.patch [bz#1095765]
- kvm-vmstate-add-VMS_MUST_EXIST.patch [bz#1095706]
- kvm-vmstate-add-VMSTATE_VALIDATE.patch [bz#1095706]
- kvm-hpet-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095706]
- kvm-hw-pci-pcie_aer.c-fix-buffer-overruns-on-invalid-sta.patch [bz#1095714]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_load.patch [bz#1095746]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_l2.patch [bz#1095746]
- kvm-usb-fix-up-post-load-checks.patch [bz#1096828]
- kvm-XBZRLE-Fix-qemu-crash-when-resize-the-xbzrle-cache.patch [bz#1110191]
- kvm-Provide-init-function-for-ram-migration.patch [bz#1110191]
- kvm-Init-the-XBZRLE.lock-in-ram_mig_init.patch [bz#1110191]
- kvm-XBZRLE-Fix-one-XBZRLE-corruption-issues.patch [bz#1110191]
- kvm-Count-used-RAMBlock-pages-for-migration_dirty_pages.patch [bz#1110189]
- kvm-qcow-correctly-propagate-errors.patch [bz#1097229]
- kvm-qcow1-Make-padding-in-the-header-explicit.patch [bz#1097229]
- kvm-qcow1-Check-maximum-cluster-size.patch [bz#1097229]
- kvm-qcow1-Validate-L2-table-size-CVE-2014-0222.patch [bz#1097229]
- kvm-qcow1-Validate-image-size-CVE-2014-0223.patch [bz#1097236]
- kvm-qcow1-Stricter-backing-file-length-check.patch [bz#1097236]
- kvm-char-restore-read-callback-on-a-reattached-hotplug-c.patch [bz#1110219]
- kvm-qcow2-Free-preallocated-zero-clusters.patch [bz#1110188]
- kvm-qemu-iotests-Discard-preallocated-zero-clusters.patch [bz#1110188]
- Resolves: bz#1095677
(CVE-2013-4148 qemu-kvm: qemu: virtio-net: buffer overflow on invalid state load [rhel-7.0.z])
- Resolves: bz#1095684
(CVE-2013-4149 qemu-kvm: qemu: virtio-net: out-of-bounds buffer write on load [rhel-7.0.z])
- Resolves: bz#1095689
(CVE-2013-4150 qemu-kvm: qemu: virtio-net: out-of-bounds buffer write on invalid state load [rhel-7.0.z])
- Resolves: bz#1095694
(CVE-2013-4151 qemu-kvm: qemu: virtio: out-of-bounds buffer write on invalid state load [rhel-7.0.z])
- Resolves: bz#1095706
(CVE-2013-4527 qemu-kvm: qemu: hpet: buffer overrun on invalid state load [rhel-7.0.z])
- Resolves: bz#1095714
(CVE-2013-4529 qemu-kvm: qemu: hw/pci/pcie_aer.c: buffer overrun on invalid state load [rhel-7.0.z])
- Resolves: bz#1095737
(CVE-2013-6399 qemu-kvm: qemu: virtio: buffer overrun on incoming migration [rhel-7.0.z])
- Resolves: bz#1095741
(CVE-2013-4542 qemu-kvm: qemu: virtio-scsi: buffer overrun on invalid state load [rhel-7.0.z])
- Resolves: bz#1095746
(CVE-2013-4541 qemu-kvm: qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load [rhel-7.0.z])
- Resolves: bz#1095765
(CVE-2013-4535 CVE-2013-4536 qemu-kvm: qemu: virtio: insufficient validation of num_sg when mapping [rhel-7.0.z])
- Resolves: bz#1095782
(CVE-2014-0182 qemu-kvm: qemu: virtio: out-of-bounds buffer write on state load with invalid config_len [rhel-7.0.z])
- Resolves: bz#1096828
(CVE-2014-3461 qemu-kvm: Qemu: usb: fix up post load checks [rhel-7.0.z])
- Resolves: bz#1097229
(CVE-2014-0222 qemu-kvm: Qemu: qcow1: validate L2 table size to avoid integer overflows [rhel-7.0.z])
- Resolves: bz#1097236
(CVE-2014-0223 qemu-kvm: Qemu: qcow1: validate image size to avoid out-of-bounds memory access [rhel-7.0.z])
- Resolves: bz#1110188
(qcow2 corruptions (leaked clusters after installing a rhel7 guest using virtio_scsi))
- Resolves: bz#1110189
(migration can not finish with 1024k 'remaining ram' left after hotunplug 4 nics)
- Resolves: bz#1110191
(Reduce the migrate cache size during migration causes qemu segment fault)
- Resolves: bz#1110219
(Guest can't receive any character transmitted from host after hot unplugging virtserialport then hot plugging again)
-
Wed May 07 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.2
- kvm-pc-add-hot_add_cpu-callback-to-all-machine-types.patch [bz#1094820]
- Resolves: bz#1094820
(Hot plug CPU not working with RHEL6 machine types running on RHEL7 host.)
-
Fri May 02 2014 Miroslav Rezanina <mrezanin@redhat.com> - 1.5.3-60.el7_0.1
- kvm-iscsi-fix-indentation.patch [bz#1090978]
- kvm-iscsi-correctly-propagate-errors-in-iscsi_open.patch [bz#1090978]
- kvm-block-iscsi-query-for-supported-VPD-pages.patch [bz#1090978]
- kvm-block-iscsi-fix-segfault-if-writesame-fails.patch [bz#1090978]
- kvm-iscsi-recognize-invalid-field-ASCQ-from-WRITE-SAME-c.patch [bz#1090978]
- kvm-iscsi-ignore-flushes-on-scsi-generic-devices.patch [bz#1090978]
- kvm-iscsi-always-query-max-WRITE-SAME-length.patch [bz#1090978]
- kvm-iscsi-Don-t-set-error-if-already-set-in-iscsi_do_inq.patch [bz#1090978]
- kvm-iscsi-Remember-to-set-ret-for-iscsi_open-in-error-ca.patch [bz#1090978]
- kvm-qemu_loadvm_state-shadow-SeaBIOS-for-VM-incoming-fro.patch [1091322]
- kvm-uhci-UNfix-irq-routing-for-RHEL-6-machtypes-RHEL-onl.patch [bz#1090981]
- kvm-ide-Correct-improper-smart-self-test-counter-reset-i.patch [bz#1093612]
- Resolves: bz#1091322
(fail to reboot guest after migration from RHEL6.5 host to RHEL7.0 host)
- Resolves: bz#1090981
(Guest hits call trace migrate from RHEL6.5 to RHEL7.0 host with -M 6.1 & balloon & uhci device)
- Resolves: bz#1090978
(qemu-kvm: iSCSI: Failure. SENSE KEY:ILLEGAL_REQUEST(5) ASCQ:INVALID_FIELD_IN_CDB(0x2400))
- Resolves: bz#1093612
(CVE-2014-2894 qemu-kvm: QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART [rhel-7.0.z])