Name: | qemu-kvm-core |
---|---|
Epoch: | 15 |
Version: | 4.2.0 |
Release: | 59.module+el8.5.0+20460+2eddfbf5.1 |
Architecture: | aarch64 |
Module: | virt:ol:8050020211203195115:c5368500 virt:ol:8050020220113125354:c5368500 |
Group: | Development/Tools |
Size: | 13511437 |
License: | GPLv2 and GPLv2+ and CC-BY |
RPM: | qemu-kvm-core-4.2.0-59.module+el8.5.0+20460+2eddfbf5.1.aarch64.rpm |
Source RPM: | qemu-kvm-4.2.0-59.module+el8.5.0+20460+2eddfbf5.1.src.rpm |
Build Date: | Wed Dec 22 2021 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | qemu-kvm core components |
Description: | qemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. qemu-kvm acts as a virtual machine monitor together with the KVM kernel modules, and emulates the hardware for a full system such as a PC and its associated peripherals. |
- kvm-hw-scsi-scsi-disk-MODE_PAGE_ALLS-not-allowed-in-MODE.patch [bz#2025605] - kvm-e1000-fix-tx-re-entrancy-problem.patch [bz#2025011] - Resolves: bz#2025605 (CVE-2021-3930 virt:rhel/qemu-kvm: QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c [rhel-8.5.0.z]) - Resolves: bz#2025011 (CVE-2021-20257 virt:rhel/qemu-kvm: QEMU: net: e1000: infinite loop while processing transmit descriptors [rhel-8.5.0.z])
- kvm-scsi-make-io_timeout-configurable.patch [bz#1994041] - Resolves: bz#1994041 (qemu-kvm scsi: change default passthrough timeout to non-infinite)
- kvm-virtiofsd-Disable-remote-posix-locks-by-default.patch [bz#1967496] - kvm-virtiofsd-Fix-the-help-message-of-posix-lock.patch [bz#1967496] - Resolves: bz#1967496 ([virtio-fs] nfs/xfstest generic/089 generic/478 generic/632 failed)
- kvm-aio-wait-delegate-polling-of-main-AioContext-if-BQL-.patch [bz#1969848] - kvm-async-use-explicit-memory-barriers.patch [bz#1969848] - Resolves: bz#1969848 (qemu-img convert hangs on aarch64)
- kvm-glib-compat-add-g_unix_get_passwd_entry_qemu.patch [bz#1967716] - kvm-qga-add-ssh-add-remove-authorized-keys.patch [bz#1967716] - kvm-qga-add-reset-argument-to-ssh-add-authorized-keys.patch [bz#1967716] - kvm-qga-add-ssh-get-authorized-keys.patch [bz#1967716] - kvm-Add-mtod_check.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970819] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970835] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970843] - kvm-tftp-introduce-a-header-structure.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970853] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-net-check-if-the-file-descriptor-is-valid-before-usi.patch [bz#1982134] - kvm-net-detect-errors-from-probing-vnet-hdr-flag-for-TAP.patch [bz#1982134] - Resolves: bz#1967716 (RFE: rebuild guest agent to include public ssh injection api support) - Resolves: bz#1970819 (CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]) - Resolves: bz#1970835 (CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]) - Resolves: bz#1970843 (CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]) - Resolves: bz#1970853 (CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]) - Resolves: bz#1982134 (QEMU core dump while booting guest with a non-exist fd on tap)
- kvm-net-introduce-qemu_receive_packet.patch [bz#1932917] - kvm-e1000-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-dp8393x-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-sungem-switch-to-use-qemu_receive_packet-for-loopbac.patch [bz#1932917] - kvm-tx_pkt-switch-to-use-qemu_receive_packet_iov-for-loo.patch [bz#1932917] - kvm-rtl8139-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-pcnet-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-cadence_gem-switch-to-use-qemu_receive_packet-for-lo.patch [bz#1932917] - kvm-lan9118-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - Resolves: bz#1932917 (CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow)
- kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1967329] - Resolves: bz#1967329 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev)
- kvm-virtiofsd-Whitelist-fchmod.patch [bz#1967914] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1957866] - kvm-Compress-lines-for-immediate-return.patch [bz#1970912] - kvm-file-posix-Handle-EINVAL-fallocate-return-value.patch [bz#1970912] - Resolves: bz#1967914 ([virtio-fs] virtiofsd quit when coping file to a folder in virtio-fs mounted volume(windows guest)) - Resolves: bz#1957866 (RHEL8.4 - EEH capability disabled on KVM guest and recovery of PCI passthru device fails(CX5 / mlx5_core) (qemu-kvm)) - Resolves: bz#1970912 (Deployment fails with "Invalid or missing agent token received")
- kvm-file-posix-Mitigate-file-fragmentation-with-extent-s.patch [bz#1877163] - kvm-block-file-posix-Fix-problem-with-fallocate-PUNCH_HO.patch [bz#1944861] - kvm-spapr-Remove-stale-comment-about-power-saving-LPCR-b.patch [bz#1969768] - kvm-spapr-Set-LPCR-to-current-AIL-mode-when-starting-a-n.patch [bz#1969768] - Resolves: bz#1877163 ([FJ 8.3 Bug] The progress bar of the "virt-clone --nonsparse" command shows the progress rate exceeding 100%.) - Resolves: bz#1944861 (Qemu-img convert fails when source image is on gpfs) - Resolves: bz#1969768 ([ppc64le] Hotplug vcpu device hit call trace:[qemu output] KVM: unknown exit, hardware reason 7fff9ce87ed8)
- kvm-linux-headers-Add-VFIO_CCW_REQ_IRQ_INDEX.patch [bz#1940450] - kvm-vfio-ccw-Connect-the-device-request-notifier.patch [bz#1940450] - kvm-pc-bios-s390-ccw-fix-off-by-one-error.patch [bz#1942880] - kvm-pc-bios-s390-ccw-break-loop-if-a-null-block-number-i.patch [bz#1942880] - kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1942880] - Resolves: bz#1940450 (RHEL8.5 - Mediated Device already in use by same domain we are booting (vfio-ccw/Multipath Testing) (kvm) - qemu-kvm part (also has kernel and libvirt parts)) - Resolves: bz#1942880 (RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm))