| Name: | qemu-guest-agent | 
|---|---|
| Epoch: | 15 | 
| Version: | 2.12.0 | 
| Release: | 63.module+el8+5195+2513194d | 
| Architecture: | aarch64 | 
| Module: | virt:ol:20190517012730:9edba152 | 
| Group: | Development/Tools | 
| Size: | 391111 | 
| License: | GPLv2 and GPLv2+ and CC-BY | 
| RPM: | qemu-guest-agent-2.12.0-63.module+el8+5195+2513194d.aarch64.rpm | 
| Source RPM: | qemu-kvm-2.12.0-63.module+el8+5195+2513194d.src.rpm | 
| Build Date: | Sun May 19 2019 | 
| Build Host: | ca-arm-rh8-builder-03.us.oracle.com | 
| Vendor: | Oracle America | 
| URL: | http://www.qemu.org/ | 
| Summary: | QEMU guest agent | 
| Description: | qemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. This package provides an agent to run inside guests, which communicates with the host over a virtio-serial channel named "org.qemu.guest_agent.0" This package does not need to be installed on the host OS.  | 
- kvm-scsi-generic-avoid-possible-out-of-bounds-access-to-.patch [bz#1668162] - Resolves: bz#1668162 (CVE-2019-6501 qemu-kvm: QEMU: scsi-generic: possible OOB access while handling inquiry request [rhel-8])
- kvm-slirp-check-data-length-while-emulating-ident-functi.patch [bz#1669069] - Resolves: bz#1669069 (CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-8.0])
- kvm-qemu-ga-make-get-fsinfo-work-over-pci-bridges.patch [bz#1666952] - kvm-qga-fix-driver-leak-in-guest-get-fsinfo.patch [bz#1666952] - Resolves: bz#1666952 (qemu-guest-agent does not parse PCI bridge links in "build_guest_fsinfo_for_real_device" (q35))
- kvm-ne2000-fix-possible-out-of-bound-access-in-ne2000_re.patch [bz#1636784] - kvm-rtl8139-fix-possible-out-of-bound-access.patch [bz#1636784] - kvm-pcnet-fix-possible-buffer-overflow.patch [bz#1636784] - kvm-net-ignore-packet-size-greater-than-INT_MAX.patch [bz#1636784] - kvm-net-drop-too-large-packet-early.patch [bz#1636784] - kvm-net-hub-suppress-warnings-of-no-host-network-for-qte.patch [bz#1636784] - kvm-virtio-net-test-accept-variable-length-argument-in-p.patch [bz#1636784] - kvm-virtio-net-test-remove-unused-macro.patch [bz#1636784] - kvm-virtio-net-test-add-large-tx-buffer-test.patch [bz#1636784] - kvm-s390x-Return-specification-exception-for-unimplement.patch [bz#1668261] - kvm-cpus-ignore-ESRCH-in-qemu_cpu_kick_thread.patch [bz#1665844] - Resolves: bz#1636784 (CVE-2018-17963 qemu-kvm: Qemu: net: ignore packets with large size [rhel-8]) - Resolves: bz#1665844 (Guest quit with error when hotunplug cpu) - Resolves: bz#1668261 ([RHEL8] Backport diag308 stable exception fix (qemu-kvm))
- kvm-hw-scsi-cleanups-before-VPD-BL-emulation.patch [bz#1639957] - kvm-hw-scsi-centralize-SG_IO-calls-into-single-function.patch [bz#1639957] - kvm-hw-scsi-add-VPD-Block-Limits-emulation.patch [bz#1639957] - kvm-scsi-disk-Block-Device-Characteristics-emulation-fix.patch [bz#1639957] - kvm-scsi-generic-keep-VPD-page-list-sorted.patch [bz#1639957] - kvm-scsi-generic-avoid-out-of-bounds-access-to-VPD-page-.patch [bz#1639957] - kvm-scsi-generic-avoid-invalid-access-to-struct-when-emu.patch [bz#1639957] - kvm-scsi-generic-do-not-do-VPD-emulation-for-sense-other.patch [bz#1639957] - Resolves: bz#1639957 ([RHEL.8] scsi host device passthrough limits IO writes - slow train)
- kvm-block-Update-flags-in-bdrv_set_read_only.patch [bz#1644996] - kvm-block-Add-auto-read-only-option.patch [bz#1644996] - kvm-rbd-Close-image-in-qemu_rbd_open-error-path.patch [bz#1644996] - kvm-block-Require-auto-read-only-for-existing-fallbacks.patch [bz#1644996] - kvm-nbd-Support-auto-read-only-option.patch [bz#1644996] - kvm-file-posix-Support-auto-read-only-option.patch [bz#1644996] - kvm-curl-Support-auto-read-only-option.patch [bz#1644996] - kvm-gluster-Support-auto-read-only-option.patch [bz#1644996] - kvm-iscsi-Support-auto-read-only-option.patch [bz#1644996] - kvm-block-Make-auto-read-only-on-default-for-drive.patch [bz#1644996] - kvm-qemu-iotests-Test-auto-read-only-with-drive-and-bloc.patch [bz#1644996] - kvm-block-Fix-update-of-BDRV_O_AUTO_RDONLY-in-update_fla.patch [bz#1644996] - kvm-qemu-img-Add-C-option-for-convert-with-copy-offloadi.patch [bz#1623082] - kvm-iotests-Add-test-for-qemu-img-convert-C-compatibilit.patch [bz#1623082] - Resolves: bz#1623082 ([rhel.8.0]Target files for 'qemu-img convert' do not support thin_provisoning with iscsi/nfs backend) - Resolves: bz#1644996 (block-commit can't be used with -blockdev)
- kvm-qemu-kvm.spec.template-Update-files-for-tests-rpm-to.patch [bz#1601107]
- kvm-Run-iotests-as-part-of-the-build-process.patch [bz#1661026] - kvm-Introduce-the-qemu-kvm-tests-rpm.patch [bz#1601107] - Resolves: bz#1601107 (qemu-kvm packaging: make running qemu-iotests more robust) - Resolves: bz#1661026 (Run iotests as part of build process)
- kvm-block-Don-t-inactivate-children-before-parents.patch [bz#1659395] - kvm-iotests-Test-migration-with-blockdev.patch [bz#1659395] - Resolves: bz#1659395 (src qemu core dump when do migration ( block device node-name changed after change cdrom) - Slow Train)
- kvm-s390x-tcg-avoid-overflows-in-time2tod-tod2time.patch [bz#1653569] - kvm-s390x-kvm-pass-values-instead-of-pointers-to-kvm_s39.patch [bz#1653569] - kvm-s390x-tod-factor-out-TOD-into-separate-device.patch [bz#1653569] - kvm-s390x-tcg-drop-tod_basetime.patch [bz#1653569] - kvm-s390x-tcg-properly-implement-the-TOD.patch [bz#1653569] - kvm-s390x-tcg-SET-CLOCK-COMPARATOR-can-clear-CKC-interru.patch [bz#1653569] - kvm-s390x-tcg-implement-SET-CLOCK.patch [bz#1653569] - kvm-s390x-tcg-rearm-the-CKC-timer-during-migration.patch [bz#1653569] - kvm-s390x-tcg-fix-locking-problem-with-tcg_s390_tod_upda.patch [bz#1653569] - kvm-hw-s390x-Include-the-tod-qemu-also-for-builds-with-d.patch [bz#1653569] - kvm-s390x-tod-Properly-stop-the-KVM-TOD-while-the-guest-.patch [bz#1653569] - kvm-hw-s390x-Fix-bad-mask-in-time2tod.patch [bz#1653569] - kvm-migration-discard-non-migratable-RAMBlocks.patch [bz#1539285] - kvm-vfio-pci-do-not-set-the-PCIDevice-has_rom-attribute.patch [bz#1539285] - kvm-memory-exec-Expose-all-memory-block-related-flags.patch [bz#1539285] - kvm-memory-exec-switch-file-ram-allocation-functions-to-.patch [bz#1539285] - kvm-configure-add-libpmem-support.patch [bz#1539285] - kvm-hostmem-file-add-the-pmem-option.patch [bz#1539285] - kvm-mem-nvdimm-ensure-write-persistence-to-PMEM-in-label.patch [bz#1539285] - kvm-migration-ram-Add-check-and-info-message-to-nvdimm-p.patch [bz#1539285] - kvm-migration-ram-ensure-write-persistence-on-loading-al.patch [bz#1539285] - Resolves: bz#1539285 ([Intel 8.0 Bug] [KVM][Crystal Ridge] Lack of data persistence guarantee of QEMU writes to host PMEM) - Resolves: bz#1653569 (Stress guest and stop it, then do live migration, guest hit call trace on destination end)