Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0271

Опубликовано: 05 апр. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0271: kvm security, bug fix and enhancement update (IMPORTANT)

[kvm-83-164.0.1.el5]

  • Add kvm-Introduce-oel-machine-type.patch
  • Add kvm-add-oracle-workaround-for-libvirt-bug.patch

[kvm-83-164.el5]

  • kvm-Fix-Windows-guests-SVVP-tests.patch [bz#495844]
  • Resolves: bz#495844 (KVM SVVP: 'Signed Driver check' failure - on the disabled vCPUs (that the VM's BIOS doesn't hide))

[kvm-83-163.el5]

  • kvm-kernel-avoid-collision-between-out-of-sync-ksm-and-pci-pass.patch [bz#566385]
  • Resolves: bz#566385 (KVM host panic due to fault in paging64_sync_page() / panic occurs in connection with PCI passthru devices)

[kvm-83-162.el5]

  • kvm-qemu-img-rebase-Add-f-option.patch [bz#569762]
  • kvm-mark-PCI-IRQs-as-edge-triggered-in-mptables.patch [bz#536749]
  • Resolves: bz#536749 (can not boot rhel3.9 with if=virtio)
  • Resolves: bz#569762 ('qemu-img re-base' broken on block devices)
  • Moved kver to 2.6.18-191.el5 to match build root

[kvm-83-161.el5]

  • kvm-qemu-img-Fix-segfault-during-rebase.patch [bz#563141]
  • Resolves: bz#563141 (qemu-img re-base subcommand got Segmentation fault)
  • Moved kver to 2.6.18-190.el5 to match build root

[kvm-83-160.el5]

  • kvm-qxl-defer-vga-updates-in-case-commands-ring-is-full-.patch [bz#544785]
  • Resolves: bz#544785 (QEMU process can become non-responsive in case command are not pull from qxl vga ring)

[kvm-83-159.el5]

  • Applied patch to spec file [bz#533453]
  • Updated kversion to 2.6.18-189.el5 to match build root
  • Resolves: bz#533453 (kvm kmod package should require a compatible kernel version)

[kvm-83-158.el5]

  • Updated kversion to 2.6.18-187.el5 to match build root
  • kvm-kernel-KVM-Don-t-check-access-permission-when-loading-segme.patch [bz#563465]
  • kvm-kernel-KVM-Disable-move-to-segment-registers-and-jump-far-i.patch [bz#563465]
  • kvm-kernel-KVM-VMX-Check-cpl-before-emulating-debug-register-ac.patch [bz#563517]
  • Resolves: bz#563465 (EMBARGOED CVE-2010-0419 kvm: emulator privilege escalation segment selector check [rhel-5.5])
  • Resolves: bz#563517 (KVM: Check cpl before emulating debug register access [rhel-5.5])

[kvm-83-157.el5]

  • kvm-CVE-2010-0297-usb-linux.c-fix-buffer-overflow.patch [bz#560770]
  • Resolves: bz#560770 (CVE-2010-0297 kvm-userspace-rhel5: usb-linux.c: fix buffer overflow [rhel-5.5])

[kvm-83-156.el5]

  • kvm-kernel-KVM-PIT-control-word-is-write-only.patch [bz#553126]
  • kvm-kernel-KVM-introduce-kvm_read_guest_virt-kvm_write_guest_vi.patch [bz#559095]
  • kvm-kernel-KVM-remove-the-vmap-usage.patch [bz#559095]
  • kvm-kernel-KVM-Use-kvm_-read-write-_guest_virt-to-read-and-writ.patch [bz#559095]
  • kvm-kernel-KVM-fix-memory-access-during-x86-emulation.patch [bz#559095]
  • kvm-kernel-Check-IOPL-level-during-io-instruction-emulation.patch [bz#560698]
  • kvm-kernel-Fix-popf-emulation.patch [bz#560698]
  • kvm-kernel-Check-CPL-level-during-privilege-instruction-emulati.patch [bz#560698]
  • Resolves: bz#553126 (CVE-2010-0309 kvm: cat /dev/port in guest cause the host hang [rhel-5.5])
  • Resolves: bz#559095 (EMBARGOED CVE-2010-0298 kvm: emulator privilege escalation [rhel-5.5])
  • Resolves: bz#560698 (EMBARGOED CVE-2010-0306 kvm: emulator privilege escalation IOPL/CPL level check [rhel-5.5])

[kvm-83-155.el5]

  • kvm-virtio-blk-Fix-reads-turned-into-writes-after-read-e.patch [bz#552487]
  • kvm-virtio-blk-Handle-bdrv_aio_read-write-NULL-return.patch [bz#552487]
  • Resolves: bz#552487 (Guest image corruption after RHEV-H update to 5.4-2.1.3.el5_4rhev2_1)
  • Moved kver to 2.6.18-186.el5 to match build root

[kvm-83-154.el5]

  • kvm-qemu-img-Fix-qemu-img-with-backing-file.patch [bz#558195]
  • kvm-qemu-add-routines-for-atomic-16-bit-accesses.patch [bz#525323]
  • kvm-qemu-virtio-atomic-access-for-index-values.patch [bz#525323]
  • kvm-fix-ide-versioning.patch [bz#559163]
  • kvm-cpu-CPU_SAVE_VERSION-is-9-know.patch [bz#559163]
  • Resolves: bz#525323 (QEMU terminates without warning with virtio-net and SMP enabled)
  • Resolves: bz#558195 (kvm: NFS : kvm-qemu-img convert failure on RAW/Sparse template with COW/Sparse snapshot)
  • Resolves: bz#559163 (migration failed host 5.5 with -M rhel5.5.0 to host 5.5 with -M rhel5.5.0.)

[kvm-83-153.el5]

  • kvm-qcow2-Fix-error-handling-in-qcow2_grow_l1_table.patch [bz#537077]
  • kvm-qcow2-Fix-error-handling-in-qcow_save_vmstate.patch [bz#537077]
  • kvm-qcow2-Return-0-errno-in-get_cluster_table.patch [bz#537077]
  • kvm-qcow2-Return-0-errno-in-qcow2_alloc_cluster_offset.patch [bz#537077]
  • kvm-block-Return-original-error-codes-in-bdrv_pread-writ.patch [bz#537077]
  • kvm-qcow2-Fix-error-handling-in-grow_refcount_table.patch [bz#537077]
  • kvm-qcow2-Improve-error-handling-in-update_refcount.patch [bz#537077]
  • kvm-qcow2-Allow-updating-no-refcounts.patch [bz#537077]
  • kvm-qcow2-Don-t-ignore-update_refcount-return-value.patch [bz#537077]
  • kvm-qcow2-Don-t-ignore-qcow2_alloc_clusters-return-value.patch [bz#537077]
  • Resolves: bz#537077 (error codes aren't always propagated up through the block layer (e.g. -ENOSPC))

[kvm-83-152.el5]

  • kvm-Revert-Queue-notify-support-for-virtio-block-device.patch [bz#552250] (Reverts kvm-Queue-notify-support-for-virtio-block-device.patch)
  • Related: bz#552250 (Windows virtio block driver performs poorly on small size requests)

[kvm-83-151.el5]

  • kvm-Fix-cpu-versioning.patch [bz#557327]
  • kvm-reduce-number-of-reinjects-on-ACK.patch [bz#556455]
  • Resolves: bz#556455 (KVM: WIN7-32bit blue screen (IMAGE_NAME: ntkrnlmp.exe).)
  • Resolves: bz#557327 (migration failed with -M rhel5.4.4 between host 5.5 and host 5.4.4)

[kvm-83-150.el5]

  • kvm-vnc-more-keypad-fixing.patch [bz#497507]
  • kvm-qxl-add-netbooks-common-resolutions.-Rhel-5.5-552240.patch [bz#552240]
  • kvm-block-raw-posix-Abort-on-pread-beyond-end-of-file.patch [bz#515655]
  • Resolves: bz#497507 (Numeric keypad cannot be used in qemu monitor when using vnc to connect guest.)
  • Resolves: bz#515655 (Add result test to prevent Infinite loop in raw_pread, reading too large offset)
  • Resolves: bz#552240 (Spice (QXL) - please add 1024x576 resolution to the driver (netbooks))

[kvm-83-149.el5]

  • kvm-qemu-qxl-fix-unsafe-rom-data-handling-bug-537888.patch [bz#537888]
  • kvm-qxl-fix-qxl-backwards-migration-to-version-3.patch [bz#537888]
  • kvm-Allow-export-of-sse4.1-sse4.2-cpuid-flags-to-guest.-.patch [bz#518090]
  • Resolves: bz#518090 ([RFE] KVM should be able to export advanced cpu flags to the guest)
  • Resolves: bz#537888 (fix unsafe device data handling)

[kvm-83-148.el5]

  • Updated kversion to 2.6.18-185.el5 to match build root
  • Require qspice-libs to make sure the right libspice.so.0 file is installed
  • Related: bz#555657

[kvm-83-147.el5]

  • kvm-block-Introduce-BDRV_O_NO_BACKING.patch [bz#530134]
  • kvm-qemu-img-rebase.patch [bz#530134]
  • kvm-vnc-improve-capslock-handling.patch [bz#517814]
  • kvm-block-Add-bdrv_change_backing_file.patch [bz#530134]
  • kvm-qemu-img-Automatically-detect-block-devices.patch [bz#537655]
  • Resolves: bz#517814 (Caps Lock the key's appearance of guest is not synchronous as host's --view kvm with vnc)
  • Resolves: bz#530134 (RFE - In-place backing file format change)
  • Resolves: bz#537655 (qemu-img: error creating a new preallocated volume image on FCP storage)

[kvm-83-146.el5]

  • Require compatible etherboot-zroms-kvm package
  • Resolves: bz#550053 (require newer etherboot package that is compatible with new pxe ROM paths)

[kvm-83-145.el5]

  • kvm-fix-barriers-support-during-migration.patch [bz#549938]
  • kvm-Add-machine-name-alias-support.patch [bz#553187]
  • kvm-make-pc-an-alias-of-rhel5.4.0.patch [bz#553187]
  • kvm-Introduce-rhel5.4.4-machine-type.patch [bz#553187]
  • Resolves: bz#549938 (Maintain barrier state after migration)
  • Resolves: bz#553187 (Add rhel-5.4.4 support to rhel5.5.0)

[kvm-83-144.el5]

  • kvm-kernel-KVM-x86-Add-KVM_GET-SET_VCPU_EVENTS.patch [bz#541084]
  • Resolves: bz#541084 (KVM: x86: Add KVM_GET/SET_VCPU_EVENTS)
  • kvm-x86-Add-support-for-VCPU-event-states.patch [bz#541084]
  • kvm-BZ550265-compute-checksum-for-roms-bigger-than-a-seg.patch [bz#550265]
  • kvm-Fix-a-race-in-the-device-that-cuased-guest-stack-on-.patch [bz#503759]
  • kvm-Queue-notify-support-for-virtio-block-device.patch [bz#552250]
  • kvm-The-driver-device-pair-does-not-have-a-reset-option-.patch [bz#550755]
  • kvm-The-driver-device-pair-does-not-have-a-reset-option-2.patch [bz#550755]
  • Resolves: bz#503759 (hypercall device - Vm becomes non responsive on Sysmark benchmark (when more than 7 vm's running simultaneously))
  • Resolves: bz#541084 (KVM: x86: Add KVM_GET/SET_VCPU_EVENTS)
  • Resolves: bz#550265 (gPXE fails to PXE boot on e1000 virtual NIC)
  • Resolves: bz#550755 (Hypercall driver doesn't reset device on power-down)
  • Resolves: bz#552250 (Windows virtio block driver performs poorly on small size requests. In addition, cpu usage on the quest side is very high while handling write requests.)

[kvm-83-143.el5]

  • kvm-Documentation-Fix-description-of-cache-option-for-dr.patch [bz#545194]
  • kvm-monitor-allow-device-to-be-ejected-if-no-disk-is-ins.patch [bz#539250]
  • Resolves: bz#539250 (Cannot eject cd-rom when configured to host cd-rom)
  • Resolves: bz#545194 (Discrepancy between man page and source code for qcow2 with regards to default value used when no explicit caching is specified)

[kvm-83-142.el5]

  • Updated kversion to 2.6.18-183.el5 to match build root
  • kvm-removing-debugging-printf-leftover.patch [bz#530533]
  • kvm-enable_write_cache-is-one-bool-no-need-for-32bits.patch [bz#549938]
  • kvm-virtio_blk-save-if-cache-was-enabled.patch [bz#549938]
  • kvm-ide-propagate-version_id-to-all-save-load-functions.patch [bz#549938]
  • kvm-ide-save-if-cache-was-enabled.patch [bz#549938]
  • kvm-savevm-add-version_id-to-all-savevm-functions.patch [bz#541731]
  • kvm-We-need-current-machine-defined-sooner.patch [bz#541731]
  • kvm-Add-support-for-DeviceVersion-to-machine-type.patch [bz#541731]
  • kvm-Introduce-rhel5.4.0-machine-type.patch [bz#541731]
  • kvm-Introduce-rhel-5.5.0-machine-type.patch [bz#541731]
  • kvm-cpu-for-x86-don-t-save-new-fields-if-version-8.patch [bz#541731]
  • kvm-RHEL5.4-needs-cpu-at-version-7.patch [bz#541731]
  • kvm-RHEL-5.4.0-don-t-have-kvmclock.patch [bz#541731]
  • kvm-RHEL5.4-needs-ide-at-device-version-3.patch [bz#541731]
  • kvm-RHEL5.4-needs-virtio-blk-at-device-version-2.patch [bz#541731]
  • kvm-make-5.4.0-machine-the-default.patch [bz#541731]
  • Resolves: bz#530533 (debug message is displayed when save VM state into a compressed file)
  • Resolves: bz#541731 (kvm: migration: mechanism to make older savevm versions to be emitted on some cases)
  • Resolves: bz#549938 (Maintain barrier state after migration)

[kvm-83-140.el5]

  • kvm-kernel-KVM-MMU-remove-prefault-from-invlpg-handler.patch [bz#531887]
  • Resolves: bz#531887 (BSOD BAD_POOL_HEADER STOP 0x19 during boot of Windows Server 2008 R2 installer)
  • kvm-Make-SMBIOS-pass-MS-SVVP-test.patch [bz#537178]
  • kvm-bz-545136-whitelist-host-virtio-networking-features.patch [bz#545136]
  • kvm-fix-rtc-td-hack-on-host-without-high-res-timers.patch [bz#543137]
  • kvm-v2-RHEL5-BZ543979-get-roms-more-room.-Glauber-Costa.patch [bz#543979]
  • Resolves: bz#537178 (Need to generate SMBIOS table 4 data for windows guests)
  • Resolves: bz#543137 (time drift in win2k364 KVM guest)
  • Resolves: bz#543979 (gPXE fails to PXE boot on e1000 virtual NIC)
  • Resolves: bz#545136 (whitelist host virtio networking features)

[kvm-83-139.el5]

  • Updated kversion to 2.6.18-182.el5 to match build root
  • Require etherboot directly, to make sure it is installed by default
  • Resolves: bz#546019

[kvm-83-138.el5]

  • Updated kversion to 2.6.18-181.el5 to match build root
  • Use the new gpxe/etherboot configurable pxe-zroms-qemu system
  • Resolves: bz#546019

[kvm-83-137.el5]

  • Updated kversion to 2.6.18-176.el5 to match build root

  • kvm-kernel-KVM-x86-make-double-triple-fault-promotion-generic-t.patch [bz#532086]

  • kvm-kernel-KVM-x86-raise-TSS-exception-for-NULL-CS-and-SS-segme.patch [bz#532086]

  • kvm-kernel-KVM-x86-emulator-limit-instructions-to-15-bytes.patch [bz#541165]

  • Resolves: bz#532086 (Rhev-Block driver causes 'unhandled vm exit' with 32bit win2k3r2sp2 Guest VM on restart)

  • Resolves: bz#541165 (CVE-2009-4031 kernel: KVM: x86 emulator: limit instructions to 15 bytes [rhel-5.5])

  • kvm-qcow2-Store-exact-backing-format-length.patch [bz#540893]

  • kvm-qcow-qcow2-Add-bdrv_aio_flush.patch [bz#542923]

  • Resolves: bz#540893 (qemu-img: snapshot info error)

  • Resolves: bz#542923 (Get segmentation fault when running with ide block on kvm-83-136.el5)

[kvm-83-136.el5]

  • Update kversion to 2.6.18-175.el5 to match build root
  • kvm-block-use-fdatasync-instead-of-fsync-if-possible.patch [bz#537646]
  • kvm-block-add-aio_flush-operation.patch [bz#537646]
  • kvm-ide-use-bdrv_aio_flush.patch [bz#537646]
  • kvm-virtio-blk-add-volatile-writecache-feature.patch [bz#537646]
  • kvm-qcow2-Fix-grow_refcount_table-error-handling.patch [bz#537075]
  • kvm-virtio-blk-Stop-VM-on-read-errors.patch [bz#531827]
  • kvm-ide-Stop-VM-on-read-errors.patch [bz#531827 bz#531827 bz#533390]
  • kvm-slirp-Reassign-same-address-to-same-DHCP-client.patch [bz#531631]
  • kvm-block-add-enable_write_cache-flag.patch [bz#537646]
  • kvm-build-fix-add-pci_get_bus_and_slot-to-compat_apis.patch [bz#539589]
  • kvm-Fix-race-between-migration-and-cpu-main-loop.patch [bz#533090]
  • Resolves: bz#531631 (Windows XP unattended install doesn't get an IP address after rebooting, if using -net user)
  • Resolves: bz#531827 (O/S Filesystem Corruption with RHEL-5.4 on a RHEV Guest)
  • Resolves: bz#533090 (Windows Server 2008 R2 shutdown hangs after restore from migration)
  • Resolves: bz#533390 (RHEL5.4 VM image corruption with an IDE v-disk)
  • Resolves: bz#537075 (qcow2: infinite recursion on grow_refcount_table() error handling)
  • Resolves: bz#537646 (backports of qemu barrier support)
  • Resolves: bz#539589 (kvm can't build against kernel-2.6.18-174.el5)

[kvm-83-135.el5]

  • kvm-kernel-531701-KERNEL-v2-allow-userspace-to-adjust-kvmclock-.patch [bz#531701]

  • kvm-531701-properly-save-kvm-system-time-msr-registers.patch [bz#531701]

  • kvm-BZ531701-get-and-set-clock-upon-migration.patch [bz#531701]

  • Resolves: bz#531701 (pvclock msr values are not preserved across remote migration)

  • Filter out ksym dependencies only known non-whitelisted symbols [bz#533197]

  • Resolves: bz#533197

[kvm-83-134.el5]

  • kvm-kernel-allow-to-address-up-to-48-bits-of-physical-memory-in.patch [bz#516545 bz#517223]

  • Resolves: bz#516545 (qemu-kvm crashed when setting 32bitwin28k with 64G ram)

  • Related: bz#517223 (BUG: warning at /builddir/build/BUILD/kvm-83-maint-snapshot-20090205/kernel-/x86/x86.c:240/kvm_queue_exception_e() (Tainted: G ))

  • kvm-Add-smp_call_function_many-to-compat_apis.patch [bz#533059]

  • Resolves: bz#533059 (kvm modules can't be built against latest kernel-devel package)

[kvm-83-133.el5]

  • Update kversion to 2.6.18-172.el5 to match build root
  • kvm-kernel-KVM-Timer-event-should-not-unconditionally-unhalt-vc.patch [bz#492663]
  • kvm-kernel-KVM-Fix-interrupt-unhalting-a-vcpu-when-it-shouldn-t.patch [bz#502086]
  • Resolves: bz#492663 (KVM: Timer event should not unconditionally unhalt vcpu)
  • Resolves: bz#502086 (KVM: Fix interrupt unhalting a vcpu when it shouldn't)

[kvm-83-132.el5]

  • kvm-keep-initrd-in-below-4g-area.patch [bz#529694]
  • Resolves: bz#529694 (-initrd is broken with > 4GB guests)

[kvm-83-131.el5]

  • kvm-kernel-KVM-SVM-Reset-cr0-properly-on-vcpu-reset.patch [bz#525699]
  • Resolves: bz#525699 (x86_64 guest hang when set guest's cpu1 online on AMD host)

[kvm-83-130.el5]

  • Update kversion to 2.6.18-168.el5 to match kernel-devel on build root
  • kvm-kernel-get_tss_base_addr-should-return-gpa_t-type.patch [bz#516762]
  • Resolves: bz#516762 (qemu aborted when restart 32bitwin23k with more than 4G mem in intel host.)

[kvm-83-129.el5]

  • kvm-Fix-VDI-audio-stop.patch [bz#520394]
  • Resolves: bz#520394 (KVM : QEMU-Audio attempting to stop unactivated audio device (snd_playback_stop: ASSERT playback_channel->base.active failed).)

[kvm-83-128.el5]

  • kvm-fix-kvm_arch_save_regs-potential-stack-corruptio.patch [bz#528917]
  • Resolves: bz#528917 (qemu-kvm : msrs[] array in kvm_arch_save_regs() too small / may cause stack corruption)

[kvm-83-127.el5]

  • kvm-RHEL-5.X-5.4.Z-Makefile-fix-ksm-dir-has-no-ARCH-pref.patch [bz#527722]
  • Resolves: bz#527722 (Build tree for RHEL 5.X and RHEL 5.4.z contains build bugs)

[kvm-83-126.el5]

  • Add --disable-pcspk option to ./configure [bz#516672]
  • Resolves: bz#516672 (Disable unused/unsupported features on qemu-kvm)

[kvm-83-125.el5]

  • kvm-kernel-KVM-VMX-Adjust-rflags-if-in-real-mode-emulation.patch [bz#517324]

  • kvm-kernel-KVM-When-switching-to-a-vm8086-task-load-segments-as.patch [bz#517324]

  • kvm-kernel-RHEL5.4-defined-this-constants-in-asm-msr.h.patch [bz#515749]

  • kvm-kernel-For-RHEl5.x-return-types-of-hrtimers-is-int.patch [bz#515749]

  • kvm-kernel-KVM-VMX-flush-TLB-with-INVEPT-on-cpu-migration.patch [bz#518081]

  • kvm-kernel-KVM-Fix-task-switch-back-link-handling-v2-including-.patch [bz#517324]

  • Resolves: bz#515749 (Remove warnings from kvm compilation)

  • Resolves: bz#517324 (KVM does not implement proper support for hardware task linking when using vm8086 mode)

  • Resolves: bz#518081 (vmentry fails with ept misconfig)

  • kvm-test-access-remove-warning.patch [bz#515749]

  • kvm-test-emulator-remove-unused-variable.patch [bz#515749]

  • kvm-test-vmexit-remove-warning-undefined-printf.patch [bz#515749]

  • kvm-external-module-compat-bring-c89-prototypes-to-intel.patch [bz#515749]

  • Resolves: bz#515749 (Remove warnings from kvm compilation)

[kvm-83-124.el5]

  • kvm-kernel-KVM-x86-verify-MTRR-PAT-validity.patch [bz#526837]
  • Resolves: bz#526837 (KVM: x86: verify MTRR/PAT validity (upstream backport))

[kvm-83-123.el5]

  • kvm-Disable-help-for-vmware-vga-and-enable-nesting.patch [bz#516672]
  • kvm-Now-that-we-have-disable-bluetooth-disable-also-bt-c.patch [bz#516672]
  • kvm-migration_notify_register-is-only-used-by-spice.patch [bz#516672]
  • kvm-Fix-typo-should-have-been-from-the-beggining.patch [bz#516672]
  • kvm-Don-t-compile-drivers-that-are-not-used-in-a-pc.patch [bz#516672]
  • kvm-Add-option-to-disable-pcspk.patch [bz#516672]
  • kvm-usb_bluez-depends-of-bluez.patch [bz#516672]
  • Resolves: bz#516672 (Disable unused/unsupported features on qemu-kvm)

[kvm-83-122.el5]

  • Update kversion to 2.6.18-164.2.1.el5 to match kernel-devel on build root
  • kvm-libkvm-Add-a-wrapper-for-an-ioctl-for-the-KVM_SE.patch [bz#508040]
  • kvm-Fetch-sub-leaf-cpuid-values-for-functions-4-0xb-0xd.patch [bz#508040]
  • kvm-Initialize-entire-cpuid2-structure.patch [bz#508040]
  • kvm-extend-smp-parsing-to-include-cores-and-threads-opti.patch [bz#508040]
  • kvm-push-CPUID-level-to-4-to-allow-Intel-multicore-decod.patch [bz#508040]
  • kvm-set-CPUID-bits-to-present-cores-and-threads-topology.patch [bz#508040]
  • kvm-allow-overriding-of-CPUID-level-on-command-line.patch [bz#508040]
  • kvm-force-enable-options.patch [bz#489900]
  • kvm-move-kvm-extra-features-detection-after-kvm-detectio.patch [bz#489900]
  • kvm-add-options-to-request-kvm-pit-and-device-assignment.patch [bz#489900]
  • Added configure options to make build dependency checks more reliable: --enable-kvm --enable-qxl --enable-spice --enable-gcrypt --enable-vnc-tls [bz#489900]
  • Resolves: bz#489900 (kvm configure should abort if a required option failed)
  • Resolves: bz#508040 (Windows XP not using all CPUS)

[kvm-83-121.el5]

  • Use rtl8029.zrom for ne2k_pci PXE booting (bz#526124)
  • Resolves: bz#526124 (ne model failed to get ip address)

[kvm-83-120.el5]

  • kvm-Add-host_device-support-to-qemu-img.-Nolan-Leake.patch [bz#511072 bz#511072]
  • kvm-raw-posix-Handle-errors-in-raw_create.patch [bz#511072 bz#511072]
  • Resolves: bz#511072 (KVM - qemu-img fail to copy a RAW format image over FCP storage)

[kvm-83-119.el5]

  • kvm-Use-kernel-s-smp_call_function_single-instead-of-emu.patch [bz#524970]
  • kvm-Properly-handle-pthread_cond_timedwait-timing-out.patch [bz#525114]
  • kvm-fix-segfault-in-setting-migration-speed.patch [bz#522887]
  • Resolves: bz#522887 (Call to migrate_set_speed after a migrate_cancel causes segmentation fault in kvm)
  • Resolves: bz#524970 (Guest single-cpu IPI leads to a global IPI on host)
  • Resolves: bz#525114 (KVM QEMU:RHEL OS VM's became not-responding and stopped answering monitor Commands.)

[kvm-83-118.el5]

  • kvm-qemu-virtio-net-do-not-return-stack-pointer-from-fun.patch [bz#521829]
  • Resolves: bz#521829 (QEMU crash (during virtio-net WHQL tests for Win2008 R2))

[kvm-83-117.el5]

  • kvm-kernel-KVM-VMX-Optimize-vmx_get_cpl.patch [bz#524126]

  • kvm-kernel-KVM-x86-Disallow-hypercalls-for-guest-callers-in-rin.patch [bz#524126]

  • kvm-kernel-KVM-VMX-Don-t-intercept-MSR_KERNEL_GS_BASE-v2.patch [bz#488130 bz#488130]

  • Resolves: bz#488130 (KVM: VMX: Don't intercept MSR_KERNEL_GS_BASE (upstream patch))

  • Resolves: bz#524126 (kernel: KVM: x86: Disallow hypercalls for guest callers in rings > 0 [rhel-5.5])

  • kvm-qcow2-Change-cluster-size-to-64k.patch [bz#502809]

  • kvm-Fix-for-Bug-510706-qemu-kvm-segfault-when-using-i825.patch [bz#510706]

  • Resolves: bz#502809 ([FEAT] Change qcow2 cluster size to 64k)

  • Resolves: bz#510706 (qemu-kvm segfault when using i82551 vnic)

[kvm-83-116.el5]

  • kvm-kernel-Revert-KVM-VMX-Don-t-intercept-MSR_KERNEL_GS_BASE.patch [bz#488130] kvm-kernel-KVM-VMX-Don-t-intercept-MSR_KERNEL_GS_BASE.patch was broken
  • Related: bz#488130 (KVM: VMX: Don't intercept MSR_KERNEL_GS_BASE (upstream patch))

[kvm-83-115.el5]

  • kvm-kernel-KVM-VMX-Don-t-intercept-MSR_KERNEL_GS_BASE.patch [bz#488130]
  • Resolves: bz#488130 (KVM: VMX: Don't intercept MSR_KERNEL_GS_BASE (upstream patch))
  • kvm-Use-quiet-command-to-get-a-cleaner-build-output.patch [bz#515749]
  • kvm-This-function-is-not-used-anymore.-It-is-opencoded-i.patch [bz#515749]
  • kvm-fds-variable-is-not-used.-Remaining-of-a-missmerge.patch [bz#515749]
  • kvm-use-proper-C89-declarations.patch [bz#515749]
  • kvm-pit-is-used-in-two-cases-not-easy-way-to-define-.patch [bz#515749]
  • kvm-In-qemu-all-buffers-are-uint8_t-not-char.patch [bz#515749]
  • kvm-kvm_allowed-is-exported-in-qemu-kvm.h-and-it-is-used.patch [bz#515749]
  • kvm-add-three-missing-static-modifiers-for-local-functio.patch [bz#515749]
  • kvm-put-declaration-of-enable_async_notification-in-a-pr.patch [bz#515749]
  • kvm-move-several-kvm-variables-after-qemu-kvm.h-include-.patch [bz#515749]
  • kvm-mark-static-do_block_set_watermark.patch [bz#515749]
  • kvm-txbufferaccu_offset-and-irq-fields-were-save-load-as.patch [bz#515749]
  • kvm-mp_state-is-treated-as-unsigned-int-uint32_t-for-sav.patch [bz#515749]
  • kvm-hp_reset-should-have-type-QEMUResetHandler.patch [bz#515749]
  • kvm-make-static-lsi_scsi_uninit.patch [bz#515749]
  • kvm-assigned_dev_data-was-not-used-anywhere.patch [bz#515749]
  • kvm-bios_enabled-is-load-saved-as-uint32_t-declare-it-as.patch [bz#515749]
  • kvm-remove-unused-variable.patch [bz#515749]
  • kvm-add-prototype-for-kvm_add_ioperm_data.patch [bz#515749]
  • kvm-removed-duplicated-re-declaration-of-kvm_context-2.patch [bz#515749]
  • kvm-make-static-update_vbios_real_tpr.patch [bz#515749]
  • kvm-fix-var-may-be-used-uninitialized.patch [bz#515749]
  • kvm-make-local-functions-static.patch [bz#515749]
  • kvm-remove-unused-variable-opt_rom_offset.patch [bz#515749]
  • kvm-removed-duplicated-re-declaration-of-kvm_context.patch [bz#515749]
  • kvm-perror-is-defined-in-stdio.h-that-got-included-indir.patch [bz#515749]
  • kvm-remove-unused-variable-cpu.patch [bz#515749]
  • kvm-nb_sectors-should-be-an-uint64_t.patch [bz#515749]
  • kvm-uhci_reset-should-have-QEMUResetHandler-type.patch [bz#515749]
  • kvm-initialize-blen-and-pa-variables-to-0.patch [bz#515749]
  • kvm-we-got-smp_cpus-declaration-through-sysemu.h.patch [bz#515749]
  • kvm-int-and-long-masked-as-pointers.-cast-to-avoid-warni.patch [bz#515749]
  • kvm-we-got-vm_running-declaration-through-sysemu.h.patch [bz#515749]
  • kvm-BZ503367-obey-S-on-migration.patch [bz#503367 bz#503367]
  • kvm-reason-paramenter-only-exist-in-newer-qemu-s-not-our.patch [bz#515749]
  • kvm-Fix-AltGr-and-dead-keys-with-VNC.patch [bz#521835]
  • kvm-time_t-is-a-long-in-x86_64.patch [bz#515749]
  • kvm-bugzilla-504237-changed-size-of-variables-to-uint64_.patch [bz#515749]
  • Resolves: bz#503367 (After migration, paused VM is running on destination)
  • Resolves: bz#515749 (Remove warnings from kvm compilation)
  • Resolves: bz#521835 (German keymap using KVM+VNC missing some keys)

[83-114.el5]

  • kvm-kernel-reset-hflags-on-cpu-reset.patch [bz#502543 bz#521749]
  • Resolves: bz#502543 (Windows 2008 R2 KVM guest can not restart when set it as multiple cpus)
  • Related: bz#521749 (Guest Window2008-R2-datacenter installation is stopped at step 'Setup will continue after restarting your computer')

[83-113.el5]

  • kvm-qcow2-Refactor-update_refcount.patch [bz#518169]
  • kvm-qcow2-Update-multiple-refcounts-at-once.patch [bz#518169]
  • kvm-Combined-patch-of-two-upstream-commits-the-second-fi.patch [bz#518169]
  • kvm-alloc_cluster_link_l2-Write-complete-sectors.patch [bz#518169]
  • kvm-update_refcount-Write-complete-sectors.patch [bz#518169]
  • Resolves: bz#518169 (Bad qcow2 performance with cache=off)

[83-112.el5]

  • kvm-kernel-Fix-coalesced-interrupt-reporting-in-IOAPIC.patch [bz#521025]
  • Resolves: bz#521025 (rtc-td-hack stopped working. Time drifts in windows)

[83-111.el5]

  • kvm-Fix-VM-state-change-handlers-running-out-of-order.patch [bz#514522]
  • kvm-Revert-Work-around-VM-state-change-handlers-running-.patch [bz#514522]
  • Resolves: bz#514522 (QEMU: Fix VM change state issue on IO errors)

[83-110.el5]

  • Update kversion to 2.6.18-164.el5 to match kernel-devel on build root
  • kvm-kernel-Backport-44882eed2ebe7f75f8cdae5671ab1d6e0fa40dbc.patch [bz#515549]
  • kvm-kernel-kvm-fix-ack-not-being-delivered-when-msi-present.patch [bz#515549]
  • kvm-kernel-kvm-fix-build-with-defconfig.patch [bz#515549]
  • Resolves: bz#515549 (upstream qemu issues on rhel 5.4)
  • kvm-Remove-initrd-warning-message.patch [bz#512672]
  • Resolves: bz#512672 (Remove initrd warning message)

[83-109.el5]

  • kvm-kernel-add-nmi-support-to-svm.patch [bz#502543 bz#503322 bz#492290]
  • kvm-kernel-VMX-Fix-cr8-exiting-control-clobbering-by-EPT.patch [bz#520285]
  • Resolves: bz#492290 (KVM: XP virtio-net tests fail with BSOD on AMD host (due to lack of NMI injection masking ability))
  • Resolves: bz#502543 (Windows 2008 R2 KVM guest can not restart when set it as multiple cpus)
  • Resolves: bz#503322 (NMI filtering for AMD (Windows 2008 R2 KVM guest can not restart when set it as multiple cpus))
  • Resolves: bz#520285 (windows 64 bit does vmexit on each cr8 access.)

[83-108.el5]

  • kvm-kernel-KVM-MMU-make-__kvm_mmu_free_some_pages-handle-empty-.patch [bz#519397]
  • Resolves: bz#519397 (KVM: MMU: make __kvm_mmu_free_some_pages handle empty list (upstream backport))

[83-107.el5]

  • kvm-kernel-KVM-MMU-fix-bogus-alloc_mmu_pages-assignment.patch [bz#487857]
  • Resolves: bz#487857 (The emulator hung after input 'cpu_set 1 online' on qemuMonitor and select 'System->Shutdown')

[83-106.el5]

  • Update kversion to 2.6.18-162.el5
  • kvm-Initialize-PS2-keyboard-mouse-state-on-reset.patch [bz#515275]
  • Resolves: bz#515275 (guest not accepting keystrokes or mouse clicks after reboot)

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kmod-kvm

83-164.0.1.el5

kvm

83-164.0.1.el5

kvm-qemu-img

83-164.0.1.el5

kvm-tools

83-164.0.1.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 15 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

redhat
почти 16 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

nvd
больше 15 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).

debian
больше 15 лет назад

The virtio_net_bad_features function in hw/virtio-net.c in the virtio- ...

ubuntu
больше 11 лет назад

libspice, as used in QEMU-KVM in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H or rhev-hypervisor) before 5.5-2.2 and possibly other products, allows guest OS users to read from or write to arbitrary QEMU memory by modifying the address that is used by Cairo for memory mappings.