-
Wed Jun 15 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-11.el8_6.2
- kvm-Revert-redhat-Add-some-devices-for-exporting-upstrea.patch [bz#2077928]
- kvm-ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2.patch [bz#2082622]
- Resolves: bz#2077928
(Remove upstream-only devices from the qemu-kvm binary [rhel-8.6.0.z])
- Resolves: bz#2082622
(CVE-2021-4206 virt:rhel/qemu-kvm: QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow [rhel-8.6.0.z])
-
Wed May 25 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-11.el8_6.1
- kvm-RHEL-disable-seqpacket-for-vhost-vsock-device-in-rhe.patch [bz#2071103]
- kvm-hw-intc-arm_gicv3-Check-for-MEMTX_OK-instead-of-MEMT.patch [bz#2075686]
- kvm-softmmu-physmem-Simplify-flatview_write-and-address_.patch [bz#2075686]
- kvm-softmmu-physmem-Introduce-MemTxAttrs-memory-field-an.patch [bz#2075686]
- kvm-display-qxl-render-fix-race-condition-in-qxl_cursor-.patch [bz#2075683]
- kvm-virtio-net-fix-map-leaking-on-error-during-receive.patch [bz#2075637]
- kvm-vhost-vsock-detach-the-virqueue-element-in-case-of-e.patch [bz#2075639]
- kvm-qcow2-Improve-refcount-structure-rebuilding.patch [bz#2072242]
- kvm-iotests-108-Test-new-refcount-rebuild-algorithm.patch [bz#2072242]
- kvm-qcow2-Add-errp-to-rebuild_refcount_structure.patch [bz#2072242]
- kvm-iotests-108-Fix-when-missing-user_allow_other.patch [bz#2072242]
- Resolves: bz#2071103
(RHEL 9.0 guest with vsock device migration failed from RHEL 9.0 > RHEL 8.6 [rhel-8.6.0.z])
- Resolves: bz#2075686
(CVE-2021-3750 virt:rhel/qemu-kvm: QEMU: hcd-ehci: DMA reentrancy issue leads to use-after-free [rhel-8] [rhel-8.6.0.z])
- Resolves: bz#2075683
(CVE-2021-4207 virt:rhel/qemu-kvm: QEMU: QXL: double fetch in qxl_cursor() can lead to heap buffer overflow [rhel-8] [rhel-8.6.0.z])
- Resolves: bz#2075637
(CVE-2022-26353 virt:rhel/qemu-kvm: QEMU: virtio-net: map leaking on error during receive [rhel-8] [rhel-8.6.0.z])
- Resolves: bz#2075639
(CVE-2022-26354 virt:rhel/qemu-kvm: QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak [rhel-8] [rhel-8.6.0.z])
- Resolves: bz#2072242
(Fail to rebuild the reference count tables of qcow2 image on host block devices (e.g. LVs) [rhel-8.6.0.z])
-
Tue Apr 05 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-11
- kvm-target-i386-properly-reset-TSC-on-reset.patch [bz#1975840]
- Resolves: bz#1975840
(Windows guest hangs after updating and restarting from the guest OS)
-
Mon Mar 21 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-10
- kvm-vmxcap-Add-5-level-EPT-bit.patch [bz#2056986]
- kvm-i386-Add-Icelake-Server-v6-CPU-model-with-5-level-EP.patch [bz#2056986]
- kvm-acpi-fix-QEMU-crash-when-started-with-SLIC-table.patch [bz#2059311]
- kvm-tests-acpi-whitelist-expected-blobs-before-changing-.patch [bz#2059311]
- kvm-tests-acpi-add-SLIC-table-test.patch [bz#2059311]
- kvm-tests-acpi-SLIC-update-expected-blobs.patch [bz#2059311]
- kvm-tests-acpi-manually-pad-OEM_ID-OEM_TABLE_ID-for-test.patch [bz#2059311]
- kvm-tests-acpi-whitelist-nvdimm-s-SSDT-and-FACP.slic-exp.patch [bz#2059311]
- kvm-acpi-fix-OEM-ID-OEM-Table-ID-padding.patch [bz#2059311]
- kvm-tests-acpi-update-expected-blobs.patch [bz#2059311]
- kvm-tests-acpi-test-short-OEM_ID-OEM_TABLE_ID-values-in-.patch [bz#2059311]
- kvm-rhel-workaround-for-lack-of-binary-patches-in-SRPM.patch [bz#2059311]
- Resolves: bz#2056986
(Win11 (q35+edk2) guest broke after install wsl2 through 'wsl --install -d Ubuntu-20.04')
- Resolves: bz#2059311
(Guest can not start with SLIC acpi table)
-
Sat Mar 12 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-9
- kvm-Revert-redhat-Add-hw_compat_4_2_extra-and-apply-to-u.patch [bz#2061856]
- kvm-Revert-redhat-Enable-FDC-device-for-upstream-machine.patch [bz#2061856]
- kvm-Revert-redhat-Expose-upstream-machines-pc-4.2-and-pc.patch [bz#2061856]
- kvm-hw-virtio-vdpa-Fix-leak-of-host-notifier-memory-regi.patch [bz#2027208]
- kvm-pci-expose-TYPE_XIO3130_DOWNSTREAM-name.patch [bz#2054597]
- kvm-acpi-pcihp-pcie-set-power-on-cap-on-parent-slot.patch [bz#2054597]
- Resolves: bz#2061856
(Revert IBM-specific Ubuntu-compatibility machine type for 8.6-AV GA)
- Resolves: bz#2027208
([virtual network][vDPA] qemu crash after hot unplug vdpa device)
- Resolves: bz#2054597
(Do operation to disk will hang in the guest of target host after hotplugging and migrating)
-
Tue Feb 22 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-8
- kvm-block-nbd-Delete-reconnect-delay-timer-when-done.patch [bz#2035185]
- kvm-block-nbd-Assert-there-are-no-timers-when-closed.patch [bz#2035185]
- kvm-iotests.py-Add-QemuStorageDaemon-class.patch [bz#2035185]
- kvm-iotests-281-Test-lingering-timers.patch [bz#2035185]
- kvm-block-nbd-Move-s-ioc-on-AioContext-change.patch [bz#2035185]
- kvm-iotests-281-Let-NBD-connection-yield-in-iothread.patch [bz#2035185]
- Resolves: bz#2035185
(Qemu core dump when start guest with nbd node or do block jobs to nbd node)
-
Tue Feb 15 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-7
- kvm-numa-Enable-numa-for-SGX-EPC-sections.patch [bz#1518984]
- kvm-numa-Support-SGX-numa-in-the-monitor-and-Libvirt-int.patch [bz#1518984]
- kvm-doc-Add-the-SGX-numa-description.patch [bz#1518984]
- kvm-Enable-SGX-RH-Only.patch [bz#1518984]
- kvm-qapi-Cleanup-SGX-related-comments-and-restore-sectio.patch [bz#1518984]
- kvm-block-io-Update-BSC-only-if-want_zero-is-true.patch [bz#2041480]
- kvm-iotests-block-status-cache-New-test.patch [bz#2041480]
- Resolves: bz#1518984
([Intel 8.6 Feat] qemu-kvm: SGX 1.5 (SGX1 + Flexible Launch Control) support)
- Resolves: bz#2041480
([incremental_backup] Inconsistent block status reply in qemu-nbd)
-
Tue Feb 08 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-6
- kvm-virtiofsd-Drop-membership-of-all-supplementary-group.patch [bz#2046198]
- kvm-softmmu-fix-device-deletion-events-with-device-JSON-.patch [bz#2033279]
- kvm-block-backend-prevent-dangling-BDS-pointers-across-a.patch [bz#2021778 bz#2036178]
- kvm-iotests-stream-error-on-reset-New-test.patch [bz#2021778 bz#2036178]
- kvm-block-rbd-fix-handling-of-holes-in-.bdrv_co_block_st.patch [bz#2037135]
- kvm-block-rbd-workaround-for-ceph-issue-53784.patch [bz#2037135]
- Resolves: bz#2046198
(CVE-2022-0358 virt:av/qemu-kvm: QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 [rhel-8.6])
- Resolves: bz#2033279
([wrb][qemu-kvm 6.2] The hot-unplugged device can not be hot-plugged back)
- Resolves: bz#2021778
(Qemu core dump when do full backup during system reset)
- Resolves: bz#2036178
(Qemu core dumped when do block-stream to a snapshot node on non-enough space storage)
- Resolves: bz#2037135
(Booting from Local Snapshot Core Dumped Whose Backing File Is Based on RBD)
-
Tue Jan 25 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-5
- kvm-acpi-validate-hotplug-selector-on-access.patch [bz#2036580]
- kvm-x86-Add-q35-RHEL-8.6.0-machine-type.patch [bz#2031035]
- Resolves: bz#2036580
(CVE-2021-4158 virt:rhel/qemu-kvm: QEMU: NULL pointer dereference in pci_write() in hw/acpi/pcihp.c [rhel-8])
- Resolves: bz#2031035
(Add rhel-8.6.0 machine types for RHEL 8.6 [x86])
-
Mon Jan 17 2022 Jon Maloy <jmaloy@redhat.com> - 6.2.0-4
- kvm-hw-arm-virt-Register-iommu-as-a-class-property.patch [bz#2031039]
- kvm-hw-arm-virt-Register-its-as-a-class-property.patch [bz#2031039]
- kvm-hw-arm-virt-Rename-default_bus_bypass_iommu.patch [bz#2031039]
- kvm-hw-arm-virt-Add-8.6-machine-type.patch [bz#2031039]
- kvm-hw-arm-virt-Check-no_tcg_its-and-minor-style-changes.patch [bz#2031039]
- kvm-rhel-machine-types-x86-set-prefer_sockets.patch [bz#2029582]
- Resolves: bz#2031039
(Add rhel-8.6.0 machine types for RHEL 8.6 [aarch64])
- Resolves: bz#2029582
([8.6] machine types: 6.2: Fix prefer_sockets)