Name: | qemu-kvm-ui-spice |
---|---|
Epoch: | 15 |
Version: | 6.2.0 |
Release: | 21.module+el8.7.0+20905+f38afd22.2 |
Architecture: | x86_64 |
Module: | virt:ol:8070020221215195627:bd1311ed virt:ol:8070020230105112251:bd1311ed |
Group: | Development/Tools |
Size: | 205096 |
License: | GPLv2 and GPLv2+ and CC-BY |
RPM: | qemu-kvm-ui-spice-6.2.0-21.module+el8.7.0+20905+f38afd22.2.x86_64.rpm |
Source RPM: | qemu-kvm-6.2.0-21.module+el8.7.0+20905+f38afd22.2.src.rpm |
Build Date: | Fri Jan 13 2023 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | QEMU spice support |
Description: | This package provides spice support. |
- kvm-ui-vnc.c-Fixed-a-deadlock-bug.patch [bz#2148504] - kvm-hw-display-qxl-Have-qxl_log_command-Return-early-if-.patch [bz#2152085] - kvm-hw-display-qxl-Document-qxl_phys2virt.patch [bz#2152085] - kvm-hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch [bz#2152085] - kvm-hw-display-qxl-Avoid-buffer-overrun-in-qxl_phys2virt.patch [bz#2152085] - kvm-hw-display-qxl-Assert-memory-slot-fits-in-preallocat.patch [bz#2152085] - Resolves: bz#2148504 (VMs hung on vnc_clipboard_send [rhel-8.7.0.z]) - Resolves: bz#2152085 (CVE-2022-4144 virt:rhel/qemu-kvm: QEMU: QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read [rhel-8] [rhel-8.7.0.z])
- kvm-virtiofsd-use-g_date_time_get_microsecond-to-get-sub.patch [bz#2132391] - Resolves: bz#2132391 ([virtiofs] virtiofsd debug log's timestamp is NULL [rhel-8.7.0.z])
- kvm-i386-reset-KVM-nested-state-upon-CPU-reset.patch [bz#2116743] - kvm-i386-do-kvm_put_msr_feature_control-first-thing-when.patch [bz#2116743] - Resolves: bz#2116743 ([RHEL8.7] Guests in VMX root operation fail to reboot with QEMU's 'system_reset' command)
- kvm-scsi-generic-Fix-emulated-block-limits-VPD-page.patch [bz#2120279] - Resolves: bz#2120279 (Wrong max_sectors_kb and Maximum transfer length on the pass-through device [rhel-8.7])
- kvm-migration-Introduce-ram_transferred_add.patch [bz#2110203] - kvm-migration-Tally-pre-copy-downtime-and-post-copy-byte.patch [bz#2110203] - kvm-QIOChannelSocket-Fix-zero-copy-flush-returning-code-.patch [bz#2110203] - kvm-Add-dirty-sync-missed-zero-copy-migration-stat.patch [bz#2110203] - kvm-migration-multifd-Report-to-user-when-zerocopy-not-w.patch [bz#2110203] - kvm-migration-Avoid-false-positive-on-non-supported-scen.patch [bz#2110203] - kvm-migration-add-remaining-params-has_-true-in-migratio.patch [bz#2110203] - kvm-QIOChannelSocket-Add-support-for-MSG_ZEROCOPY-IPV6.patch [bz#2110203] - kvm-pc-bios-s390-ccw-Fix-booting-with-logical-block-size.patch [bz#2112296] - Resolves: bz#2110203 (zerocopy capability can be enabled when set migrate capabilities with multifd and compress/xbzrle together) - Resolves: bz#2112296 (virtio-blk: Can't boot fresh installation from used 512 cluster_size image under certain conditions)
- kvm-linux-aio-fix-unbalanced-plugged-counter-in-laio_io_.patch [bz#2105410] - kvm-linux-aio-explain-why-max-batch-is-checked-in-laio_i.patch [bz#2105410] - Resolves: bz#2105410 (Stalled IO Operations in VM)
- kvm-migration-Never-call-twice-qemu_target_page_size.patch [bz#2072049] - kvm-multifd-Rename-used-field-to-num.patch [bz#2072049] - kvm-multifd-Add-missing-documentation.patch [bz#2072049] - kvm-multifd-The-variable-is-only-used-inside-the-loop.patch [bz#2072049] - kvm-multifd-remove-used-parameter-from-send_prepare-meth.patch [bz#2072049] - kvm-multifd-remove-used-parameter-from-send_recv_pages-m.patch [bz#2072049] - kvm-multifd-Fill-offset-and-block-for-reception.patch [bz#2072049] - kvm-multifd-Make-zstd-compression-method-not-use-iovs.patch [bz#2072049] - kvm-multifd-Make-zlib-compression-method-not-use-iovs.patch [bz#2072049] - kvm-migration-All-this-fields-are-unsigned.patch [bz#2072049] - kvm-multifd-Move-iov-from-pages-to-params.patch [bz#2072049] - kvm-multifd-Make-zlib-use-iov-s.patch [bz#2072049] - kvm-multifd-Make-zstd-use-iov-s.patch [bz#2072049] - kvm-multifd-Remove-send_write-method.patch [bz#2072049] - kvm-multifd-Use-a-single-writev-on-the-send-side.patch [bz#2072049] - kvm-multifd-Use-normal-pages-array-on-the-send-side.patch [bz#2072049] - kvm-QIOChannel-Add-flags-on-io_writev-and-introduce-io_f.patch [bz#2072049] - kvm-QIOChannelSocket-Implement-io_writev-zero-copy-flag-.patch [bz#2072049] - kvm-migration-Add-zero-copy-send-parameter-for-QMP-HMP-f.patch [bz#2072049] - kvm-migration-Add-migrate_use_tls-helper.patch [bz#2072049] - kvm-multifd-multifd_send_sync_main-now-returns-negative-.patch [bz#2072049] - kvm-multifd-Send-header-packet-without-flags-if-zero-cop.patch [bz#2072049] - kvm-multifd-Implement-zero-copy-write-in-multifd-migrati.patch [bz#2072049] - kvm-QIOChannelSocket-Introduce-assert-and-reduce-ifdefs-.patch [bz#2072049] - kvm-QIOChannelSocket-Fix-zero-copy-send-so-socket-flush-.patch [bz#2072049] - kvm-migration-Change-zero_copy_send-from-migration-param.patch [bz#2072049] - kvm-migration-Add-migration_incoming_transport_cleanup.patch [bz#2097652] - kvm-migration-Allow-migrate-recover-to-run-multiple-time.patch [bz#2097652] - kvm-pc-bios-s390-ccw-virtio-Introduce-a-macro-for-the-DA.patch [bz#2098076] - kvm-pc-bios-s390-ccw-bootmap-Improve-the-guessing-logic-.patch [bz#2098076] - kvm-pc-bios-s390-ccw-virtio-blkdev-Simplify-fix-virtio_i.patch [bz#2098076] - kvm-pc-bios-s390-ccw-virtio-blkdev-Remove-virtio_assume_.patch [bz#2098076] - kvm-pc-bios-s390-ccw-virtio-Set-missing-status-bits-whil.patch [bz#2098076] - kvm-pc-bios-s390-ccw-virtio-Read-device-config-after-fea.patch [bz#2098076] - kvm-pc-bios-s390-ccw-virtio-Beautify-the-code-for-readin.patch [bz#2098076] - kvm-pc-bios-s390-ccw-Split-virtio-scsi-code-from-virtio_.patch [bz#2098076] - kvm-pc-bios-s390-ccw-virtio-blkdev-Request-the-right-fea.patch [bz#2098076] - Resolves: bz#2072049 (Pull MSG_ZEROCOPY on QEMU Live Migration Patches into RHEL 8) - Resolves: bz#2097652 (The migration port is not released if use it again for recovering postcopy migration) - Resolves: bz#2098076 (virtio-blk: Can't boot fresh installation from used virtio-blk dasd disk under certain conditions)
- kvm-virtiofsd-Fix-breakage-due-to-fuse_init_in-size-chan.patch [bz#2097209] - kvm-hw-block-fdc-Prevent-end-of-track-overrun-CVE-2021-3.patch [bz#1951521] - kvm-tests-qtest-fdc-test-Add-a-regression-test-for-CVE-2.patch [bz#1951521] - Resolves: bz#2097209 ([virtiofs] mount virtiofs failed: SELinux: (dev virtiofs, type virtiofs) getxattr errno 111) - Resolves: bz#1951521 (CVE-2021-3507 virt:rhel/qemu-kvm: QEMU: fdc: heap buffer overflow in DMA read data transfers [rhel-8])
- kvm-virtio-gpu-do-not-byteswap-padding.patch [bz#1916415] - kvm-linux-headers-update-to-5.16-rc1.patch [bz#1916415] - kvm-linux-headers-Update-headers-to-v5.17-rc1.patch [bz#1916415] - kvm-linux-headers-include-missing-changes-from-5.17.patch [bz#1916415] - kvm-x86-Fix-the-64-byte-boundary-enumeration-for-extende.patch [bz#1916415] - kvm-x86-Add-AMX-XTILECFG-and-XTILEDATA-components.patch [bz#1916415] - kvm-x86-Grant-AMX-permission-for-guest.patch [bz#1916415] - kvm-x86-Add-XFD-faulting-bit-for-state-components.patch [bz#1916415] - kvm-x86-Add-AMX-CPUIDs-enumeration.patch [bz#1916415] - kvm-x86-add-support-for-KVM_CAP_XSAVE2-and-AMX-state-mig.patch [bz#1916415] - kvm-x86-Support-XFD-and-AMX-xsave-data-migration.patch [bz#1916415] - kvm-target-i386-kvm-do-not-access-uninitialized-variable.patch [bz#1916415] - kvm-KVM-x86-workaround-invalid-CPUID-0xD-9-info-on-some-.patch [bz#1916415] - kvm-virtio-net-setup-vhost_dev-and-notifiers-for-cvq-onl.patch [bz#2069946] - kvm-virtio-net-align-ctrl_vq-index-for-non-mq-guest-for-.patch [bz#2069946] - kvm-vhost-vdpa-fix-improper-cleanup-in-net_init_vhost_vd.patch [bz#2069946] - kvm-vhost-net-fix-improper-cleanup-in-vhost_net_start.patch [bz#2069946] - kvm-vhost-vdpa-backend-feature-should-set-only-once.patch [bz#2069946] - kvm-vhost-vdpa-change-name-and-polarity-for-vhost_vdpa_o.patch [bz#2069946] - kvm-virtio-net-don-t-handle-mq-request-in-userspace-hand.patch [bz#2069946] - kvm-ide-Increment-BB-in-flight-counter-for-TRIM-BH.patch [bz#2029980] - kvm-block-Make-bdrv_refresh_limits-non-recursive.patch [bz#2072932] - kvm-iotests-Allow-using-QMP-with-the-QSD.patch [bz#2072932] - kvm-iotests-graph-changes-while-io-New-test.patch [bz#2072932] - Resolves: bz#1916415 ([Intel 8.7 FEAT] qemu-kvm Sapphire Rapids (SPR) AMX Instructions) - Resolves: bz#2069946 (PXE boot crash qemu when using multiqueue vDPA) - Resolves: bz#2029980 (Failed assertion in IDE emulation with Ceph backend) - Resolves: bz#2072932 (Qemu coredump when refreshing block limits on an actively used iothread block device [rhel.8.7])
- kvm-Revert-redhat-Add-some-devices-for-exporting-upstrea.patch [bz#2065043] - kvm-target-i386-properly-reset-TSC-on-reset.patch [bz#2070417] - kvm-ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2.patch [bz#2040734] - Resolves: bz#2065043 (Remove upstream-only devices from the qemu-kvm binary) - Resolves: bz#2070417 (Windows guest hangs after updating and restarting from the guest OS [rhel-8.7.0]) - Resolves: bz#2040734 (CVE-2021-4206 virt:rhel/qemu-kvm: QEMU: QXL: integer overflow in cursor_alloc() can lead to heap buffer overflow [rhel-8.7])