-
Tue Jul 03 2018 Mark Kanda <mark.kanda@oracle.com> - 15:2.11.1-5.el7
- slirp: correct size computation while concatenating mbuf (Prasad J Pandit) [Orabug: 28279250] {CVE-2018-11806}
- hostmem-file: add "align" option (Haozhong Zhang) [Orabug: 28166355]
- sev/i386: fix memory leak in sev_guest_init() (Greg Kurz)
- hmp: free sev info (Marc-André Lureau)
- sev/i386: add sev_get_capabilities() (Brijesh Singh)
- sev/i386: qmp: add query-sev-capabilities command (Brijesh Singh)
- sev/i386: qmp: add query-sev-launch-measure command (Brijesh Singh)
- sev/i386: hmp: add 'info sev' command (Brijesh Singh)
- cpu/i386: populate CPUID 0x8000_001F when SEV is active (Brijesh Singh)
- sev/i386: add migration blocker (Brijesh Singh)
- sev/i386: finalize the SEV guest launch flow (Brijesh Singh)
- sev/i386: add support to LAUNCH_MEASURE command (Brijesh Singh)
- target/i386: encrypt bios rom (Brijesh Singh)
- sev/i386: add command to encrypt guest memory region (Brijesh Singh)
- sev/i386: add command to create launch memory encryption context (Brijesh Singh)
- sev/i386: register the guest memory range which may contain encrypted data (Brijesh Singh)
- sev/i386: add command to initialize the memory encryption context (Mark Kanda)
- include: add psp-sev.h header file (Brijesh Singh)
- sev/i386: qmp: add query-sev command (Brijesh Singh)
- target/i386: add Secure Encrypted Virtualization (SEV) object (Brijesh Singh)
- kvm: introduce memory encryption APIs (Brijesh Singh)
- kvm: add memory encryption context (Brijesh Singh)
- docs: add AMD Secure Encrypted Virtualization (SEV) (Brijesh Singh)
- machine: add memory-encryption option (Brijesh Singh)
- update Linux headers to 4.16-rc5 (Paolo Bonzini)
- i386: Define the Virt SSBD MSR and handling of it (CVE-2018-3639) (Konrad Rzeszutek Wilk) [Orabug: 28165452] {CVE-2018-3639}
- i386: define the AMD 'virt-ssbd' CPUID feature bit (CVE-2018-3639) (Konrad Rzeszutek Wilk) [Orabug: 28165452] {CVE-2018-3639}
- i386: define the 'ssbd' CPUID feature bit (CVE-2018-3639) (Daniel P. Berrangé) [Orabug: 28165452] {CVE-2018-3639}
-
Mon May 14 2018 Mark Kanda <mark.kanda@oracle.com> - 15:2.11.1-4.el7
- qemu.spec: Bump epoch to 15 (Mark Kanda)
-
Mon Apr 30 2018 Mark Kanda <mark.kanda@oracle.com> - 12:2.11.1-3.el7
- qemu.spec: Add aarch64 support, perform clean up (Karl Heubaum)
-
Fri Apr 13 2018 Mark Kanda <mark.kanda@oracle.com> - 12:2.11.1-2.el7
- hw/acpi-build: build SRAT memory affinity structures for DIMM devices (Haozhong Zhang) [Orabug: 27509753]
- qmp: distinguish PC-DIMM and NVDIMM in MemoryDeviceInfoList (Haozhong Zhang) [Orabug: 27509753]
- pc-dimm: make qmp_pc_dimm_device_list() sort devices by address (Haozhong Zhang) [Orabug: 27509753]
- nvdimm: add a macro for property "label-size" (Haozhong Zhang) [Orabug: 27509753]
- nvdimm: add 'unarmed' option (Haozhong Zhang) [Orabug: 27509753]
- block: Fix NULL dereference on empty drive error (Kevin Wolf) [Orabug: 27832106]
- Revert "IDE: Do not flush empty CDROM drives" (Stefan Hajnoczi) [Orabug: 27832106]
- block: test blk_aio_flush() with blk->root == NULL (Kevin Wolf) [Orabug: 27832106]
- block: add BlockBackend->in_flight counter (Stefan Hajnoczi) [Orabug: 27832106]
- block: extract AIO_WAIT_WHILE() from BlockDriverState (Stefan Hajnoczi) [Orabug: 27832106]
- aio: rename aio_context_in_iothread() to in_aio_context_home_thread() (Stefan Hajnoczi) [Orabug: 27832106]
- qemu.spec: Add dependency for libiscsi 1.9.0-8 (Mark Kanda) [Orabug: 27832300]
- multiboot.c: Document as fixed against CVE-2018-7550 (Jack Schwartz) [Orabug: 27832332] {CVE-2018-7550}
- CVE-2017-18030: cirrus_invalidate_region() lets priv guest user cause DoS (Mark Kanda) [Orabug: 27832319] {CVE-2017-18030}
- vga: fix region calculation (Gerd Hoffmann) [Orabug: 27832309] {CVE-2018-7858}
- keymap: use glib hash for kbd_layout_t (Gerd Hoffmann) [Orabug: 27663795]
- qemu.spec: Enable coroutine pool and vhost-vsock (Karl Heubaum) [Orabug: 27832337]
-
Fri Mar 02 2018 Mark Kanda <mark.kanda@oracle.com> - 12:2.11.1-1.el7
- BUILDINFO: commit=9fc0f70c83d6de5667c45cd1e420a080e75c7d04
- Update qemu.spec version for 2.11.1