Name: | libvirt-client |
---|---|
Version: | 6.0.0 |
Release: | 28.0.1.module+el8.3.0+7860+a7792d29 |
Architecture: | aarch64 |
Module: | virt:ol:8030020200909014558:9edba152 virt:ol:8030020201123162111:229f0a1c virt:ol:8030020210205201602:229f0a1c virt:ol:8030020210210212009:229f0a1c |
Group: | Unspecified |
Size: | 958351 |
License: | LGPLv2+ |
RPM: | libvirt-client-6.0.0-28.0.1.module+el8.3.0+7860+a7792d29.aarch64.rpm |
Source RPM: | libvirt-6.0.0-28.0.1.module+el8.3.0+7860+a7792d29.src.rpm |
Build Date: | Sat Nov 07 2020 |
Build Host: | ca-buildarm05 |
Vendor: | Oracle America |
URL: | https://libvirt.org/ |
Summary: | Client side utilities of the libvirt library |
Description: | The client binaries needed to access the virtualization capabilities of recent versions of Linux (and other OSes). |
- Add runtime deps for pkg librbd1 >= 1:10.2.5 (Keshav Sharma)
- virdevmapper: Don't cache device-mapper major (rhbz#1860421) - virdevmapper: Handle kernel without device-mapper support (rhbz#1860421) - virdevmapper: Ignore all errors when opening /dev/mapper/control (rhbz#1860421)
- src: assume sys/sysmacros.h always exists on Linux (rhbz#1860421) - virdevmapper.c: Join two WITH_DEVMAPPER sections together (rhbz#1860421) - virDevMapperGetTargetsImpl: Use VIR_AUTOSTRINGLIST (rhbz#1860421) - virdevmapper: Don't use libdevmapper to obtain dependencies (CVE-2020-14339, rhbz#1860421) - virDevMapperGetTargets: Don't ignore EBADF (rhbz#1860421)
- qemu: blockjob: Don't base bitmap handling of active-layer block commit on QEMU_CAPS_BLOCKDEV_REOPEN (rhbz#1857779) - qemu: blockjob: Actually delete temporary bitmap on failed active commit (rhbz#1857779) - qemu: block: Remove 'active-write' bitmap even if there are no bitmaps to merge (rhbz#1857779) - qemuDomainBlockPivot: Rename 'actions' to 'bitmapactions' (rhbz#1857779) - qemuDomainBlockPivot: Ignore failures of creating active layer bitmap (rhbz#1857779)
- Upgrade components in virt:rhel module:stream for RHEL-8.3 release (rhbz#1828317) - conf: Don't format http cookies unless VIR_DOMAIN_DEF_FORMAT_SECURE is used (CVE-2020-14301) - util: Introduce a parser for kernel cmdline arguments (rhbz#1848997) - qemu: Check if s390 secure guest support is enabled (rhbz#1848997) - qemu: Check if AMD secure guest support is enabled (rhbz#1848997) - tools: Secure guest check on s390 in virt-host-validate (rhbz#1848997) - tools: Secure guest check for AMD in virt-host-validate (rhbz#1848997) - docs: Update AMD launch secure description (rhbz#1848997) - docs: Describe protected virtualization guest setup (rhbz#1848997)
- Resolves: bz#1828317 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- Resolves: bz#1810193 (Upgrade components in virt:rhel module:stream for RHEL-8.3 release)
- RHEL: virscsi: Check device type before getting it's /dev node name (rhbz#1808388) - RHEL: virscsi: Support TAPEs in virSCSIDeviceGetDevName() (rhbz#1808388) - RHEL: virscsi: Introduce and use virSCSIDeviceGetUnprivSGIOSysfsPath() (rhbz#1808388) - RHEL: virutil: Accept non-block devices in virGetDeviceID() (rhbz#1808388) - RHEL: qemuSetUnprivSGIO: Actually use calculated @sysfs_path to set unpriv_sgio (rhbz#1808388) - RHEL: qemuCheckUnprivSGIO: use @sysfs_path to get unpriv_sgio (rhbz#1808399)