Name: | qemu-kvm-block-curl |
---|---|
Epoch: | 15 |
Version: | 4.2.0 |
Release: | 48.module+el8.4.0+20285+126f2e4b.3 |
Architecture: | aarch64 |
Module: | virt:ol:8040020210721215855:522a0ee4 |
Group: | Development/Tools |
Size: | 74128 |
License: | GPLv2 and GPLv2+ and CC-BY |
RPM: | qemu-kvm-block-curl-4.2.0-48.module+el8.4.0+20285+126f2e4b.3.aarch64.rpm |
Source RPM: | qemu-kvm-4.2.0-48.module+el8.4.0+20285+126f2e4b.3.src.rpm |
Build Date: | Wed Aug 11 2021 |
Build Host: | host-100-100-224-46.blddevtest1iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | QEMU CURL block driver |
Description: | This package provides the additional CURL block driver for QEMU. Install this package if you want to access remote disks over http, https, ftp and other transports provided by the CURL library. |
- kvm-net-introduce-qemu_receive_packet.patch [bz#1932917] - kvm-e1000-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-dp8393x-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-sungem-switch-to-use-qemu_receive_packet-for-loopbac.patch [bz#1932917] - kvm-tx_pkt-switch-to-use-qemu_receive_packet_iov-for-loo.patch [bz#1932917] - kvm-rtl8139-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-pcnet-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-cadence_gem-switch-to-use-qemu_receive_packet-for-lo.patch [bz#1932917] - kvm-lan9118-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - Resolves: bz#1932917 (CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow [rhel-8.4.z])
- kvm-pc-bios-s390-ccw-fix-off-by-one-error.patch [bz#1975679] - kvm-pc-bios-s390-ccw-break-loop-if-a-null-block-number-i.patch [bz#1975679] - kvm-pc-bios-s390-ccw-don-t-try-to-read-the-next-block-if.patch [bz#1975679] - Resolves: bz#1975679 (RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) [rhel-8.4.0.z])
- kvm-net-remove-an-assert-call-in-eth_get_gso_type.patch [bz#1939494] - kvm-libqos-usb-hcd-ehci-use-32-bit-write-for-config-regi.patch [bz#1944621] - kvm-libqos-pci-pc-use-32-bit-write-for-EJ-register.patch [bz#1944621] - kvm-memory-Revert-memory-accept-mismatching-sizes-in-mem.patch [bz#1944621] - kvm-acpi-accept-byte-and-word-access-to-core-ACPI-regist.patch [bz#1944621] - kvm-xhci-fix-valid.max_access_size-to-access-address-reg.patch [bz#1944621] - kvm-softmmu-memory-Log-invalid-memory-accesses.patch [bz#1944621] - kvm-hw-intc-arm_gic-Fix-interrupt-ID-in-GICD_SGIR-regist.patch [bz#1952986] - Resolves: bz#1939494 (CVE-2020-27617 virt:rhel/qemu-kvm: QEMU: net: an assert failure via eth_get_gso_type [rhel-8.4.0.z]) - Resolves: bz#1944621 (CVE-2020-13754 virt:rhel/qemu-kvm: QEMU: msix: OOB access during mmio operations may lead to DoS [rhel-8.4.0.z]) - Resolves: bz#1952986 (CVE-2021-20221 virt:rhel/qemu-kvm: qemu: out-of-bound heap buffer access via an interrupt ID field [rhel-8.4.0.z])
- kvm-ide-atapi-check-logical-block-address-and-read-size-.patch [bz#1917451] - Resolves: bz#1917451 (CVE-2020-29443 virt:rhel/qemu-kvm: QEMU: ide: atapi: OOB access while processing read commands [rhel-8.4.0])
- kvm-x86-cpu-Enable-AVX512_VP2INTERSECT-cpu-feature.patch [bz#1790620] - kvm-target-i386-add-fast-short-REP-MOV-support.patch [bz#1790620] - kvm-x86-cpu-Populate-SVM-CPUID-feature-bits.patch [bz#1790620] - kvm-i386-Add-the-support-for-AMD-EPYC-3rd-generation-pro.patch [bz#1790620] - Resolves: bz#1790620 ([RFE] AMD Milan - Add KVM/support for EPYC-Milan CPU Model - Slow Train)
- kvm-redhat-makes-qemu-respect-system-s-crypto-profile.patch [bz#1902960] - kvm-spapr-Adjust-firmware-path-of-PCI-devices.patch [bz#1912891] - Resolves: bz#1902960 (QEMU doesn't honour system crypto policies) - Resolves: bz#1912891 ([ppc64le] --disk cdimage.iso,bus=usb fails to boot)
- kvm-virtiofsd-extract-lo_do_open-from-lo_open.patch [bz#1919111] - kvm-virtiofsd-optionally-return-inode-pointer-from-lo_do.patch [bz#1919111] - kvm-virtiofsd-prevent-opening-of-special-files-CVE-2020-.patch [bz#1919111] - Resolves: bz#1919111 (CVE-2020-35517 virt:rhel/qemu-kvm: QEMU: virtiofsd: potential privileged host device access from guest [rhel-8.4.0])
- kvm-spapr-Improve-handling-of-fdt-buffer-size.patch [bz#1901837] - kvm-spapr-Fold-h_cas_compose_response-into-h_client_arch.patch [bz#1901837] - kvm-spapr-Don-t-use-spapr_drc_needed-in-CAS-code.patch [bz#1901837] - kvm-spapr-Fix-handling-of-unplugged-devices-during-CAS-a.patch [bz#1901837] - kvm-spapr-Allow-memory-unplug-to-always-succeed.patch [bz#1901837] - kvm-spapr-Improve-handling-of-memory-unplug-with-old-gue.patch [bz#1901837] - kvm-block-Require-aligned-image-size-to-avoid-assertion-.patch [bz#1834281] - kvm-file-posix-Allow-byte-aligned-O_DIRECT-with-NFS.patch [bz#1834281] - kvm-block-iscsi-fix-heap-buffer-overflow-in-iscsi_aio_io.patch [bz#1912974] - Resolves: bz#1834281 (qemu-img convert abort when converting image with unaligned size) - Resolves: bz#1901837 (Failed to hotunplug pc-dimm device) - Resolves: bz#1912974 (CVE-2020-11947 virt:rhel/qemu-kvm: QEMU: heap buffer overflow in iscsi_aio_ioctl_cb() in block/iscsi.c may lead to information disclosure [rhel-8])
- kvm-Drop-bogus-IPv6-messages.patch [bz#1918054] - Resolves: bz#1918054 (CVE-2020-10756 virt:rhel/qemu-kvm: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [rhel-8.4.0])
- kvm-linux-headers-add-vfio-DMA-available-capability.patch [bz#1905391] - kvm-s390x-pci-Move-header-files-to-include-hw-s390x.patch [bz#1905391] - kvm-vfio-Create-shared-routine-for-scanning-info-capabil.patch [bz#1905391] - kvm-vfio-Find-DMA-available-capability.patch [bz#1905391] - kvm-s390x-pci-Add-routine-to-get-the-vfio-dma-available-.patch [bz#1905391] - kvm-s390x-pci-Honor-DMA-limits-set-by-vfio.patch [bz#1905391] - kvm-s390x-fix-build-for-without-default-devices.patch [bz#1905391] - Resolves: bz#1905391 (RHEL8.4 - s390x/pci: Honor vfio DMA limiting (qemu-kvm))