Name: | qemu |
---|---|
Epoch: | 15 |
Version: | 4.2.1 |
Release: | 3.el7 |
Architecture: | x86_64 |
Group: | Development/Tools |
Size: | 0 |
License: | GPLv2+ and LGPLv2+ and BSD |
RPM: | qemu-4.2.1-3.el7.x86_64.rpm |
Source RPM: | qemu-4.2.1-3.el7.src.rpm |
Build Date: | Mon Sep 28 2020 |
Build Host: | jenkins-172-17-0-2-69cf6c58-f4b5-4e55-8584-338b038120d2.appad3iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | QEMU is a FAST! processor emulator |
Description: | QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compiled for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use. |
- qemu-kvm.spec: Install block storage module RPMs by default (Karl Heubaum) [Orabug: 31943789] - qemu-kvm.spec: Enable block-ssh module RPM (Karl Heubaum) [Orabug: 31943763] - hw: usb: hcd-ohci: check for processed TD before retire (Prasad J Pandit) [Orabug: 31901690] {CVE-2020-25625} - hw: usb: hcd-ohci: check len and frame_number variables (Prasad J Pandit) [Orabug: 31901690] {CVE-2020-25625} - hw: ehci: check return value of 'usb_packet_map' (Li Qiang) [Orabug: 31901649] {CVE-2020-25084} - hw: xhci: check return value of 'usb_packet_map' (Li Qiang) [Orabug: 31901649] {CVE-2020-25084} - qemu.spec: Enable '-Werror' for OL7 builds (Mark Kanda) [Orabug: 31922718] - usb: fix setup_len init (CVE-2020-14364) (Gerd Hoffmann) [Orabug: 31848849] {CVE-2020-14364} - Document CVE-2020-12829 and CVE-2020-14415 as fixed (Mark Kanda) [Orabug: 31855502] [Orabug: 31855427] {CVE-2020-12829} {CVE-2020-14415}
- hw/net/xgmac: Fix buffer overflow in xgmac_enet_send() (Mauro Matteo Cascella) [Orabug: 31667649] {CVE-2020-15863} - hw/net/net_tx_pkt: fix assertion failure in net_tx_pkt_add_raw_fragment() (Mauro Matteo Cascella) [Orabug: 31737809] {CVE-2020-16092} - migration: fix memory leak in qmp_migrate_set_parameters (Zheng Chuan) [Orabug: 31806256] - virtio-net: fix removal of failover device (Juan Quintela) [Orabug: 31806255] - pvpanic: implement crashloaded event handling (Zhenwei Pi) [Orabug: 31677154] - pvpanic: introduce crashloaded for pvpanic (Zhenwei Pi) [Orabug: 31677154]
- hw/sd/sdcard: Do not switch to ReceivingData if address is invalid (Philippe Mathieu-Daudé) [Orabug: 31414336] {CVE-2020-13253} - hw/sd/sdcard: Update coding style to make checkpatch.pl happy (Philippe Mathieu-Daudé) [Orabug: 31414336] - hw/sd/sdcard: Do not allow invalid SD card sizes (Philippe Mathieu-Daudé) [Orabug: 31414336] {CVE-2020-13253} - hw/sd/sdcard: Simplify realize() a bit (Philippe Mathieu-Daudé) [Orabug: 31414336] - hw/sd/sdcard: Restrict Class 6 commands to SCSD cards (Philippe Mathieu-Daudé) [Orabug: 31414336] - libslirp: Update to v4.3.1 to fix CVE-2020-10756 (Karl Heubaum) [Orabug: 31604999] {CVE-2020-10756} - Document CVEs as fixed 2/2 (Karl Heubaum) [Orabug: 30618035] {CVE-2017-18043} {CVE-2018-10839} {CVE-2018-11806} {CVE-2018-12617} {CVE-2018-15746} {CVE-2018-16847} {CVE-2018-16867} {CVE-2018-17958} {CVE-2018-17962} {CVE-2018-17963} {CVE-2018-18849} {CVE-2018-19364} {CVE-2018-19489} {CVE-2018-3639} {CVE-2018-5683} {CVE-2018-7550} {CVE-2018-7858} {CVE-2019-12068} {CVE-2019-15034} {CVE-2019-15890} {CVE-2019-20382} {CVE-2020-10702} {CVE-2020-10761} {CVE-2020-11102} {CVE-2020-11869} {CVE-2020-13361} {CVE-2020-13765} {CVE-2020-13800} {CVE-2020-1711} {CVE-2020-1983} {CVE-2020-8608} - Document CVEs as fixed 1/2 (Karl Heubaum) [Orabug: 30618035] {CVE-2017-10806} {CVE-2017-11334} {CVE-2017-12809} {CVE-2017-13672} {CVE-2017-13673} {CVE-2017-13711} {CVE-2017-14167} {CVE-2017-15038} {CVE-2017-15119} {CVE-2017-15124} {CVE-2017-15268} {CVE-2017-15289} {CVE-2017-16845} {CVE-2017-17381} {CVE-2017-18030} {CVE-2017-2630} {CVE-2017-2633} {CVE-2017-5715} {CVE-2017-5753} {CVE-2017-5754} {CVE-2017-5931} {CVE-2017-6058} {CVE-2017-7471} {CVE-2017-7493} {CVE-2017-8112} {CVE-2017-8309} {CVE-2017-8379} {CVE-2017-8380} {CVE-2017-9503} {CVE-2017-9524} {CVE-2018-12126} {CVE-2018-12127} {CVE-2018-12130} {CVE-2018-16872} {CVE-2018-20123} {CVE-2018-20124} {CVE-2018-20125} {CVE-2018-20126} {CVE-2018-20191} {CVE-2018-20216} {CVE-2018-20815} {CVE-2019-11091} {CVE-2019-12155} {CVE-2019-14378} {CVE-2019-3812} {CVE-2019-5008} {CVE-2019-6501} {CVE-2019-6778} {CVE-2019-8934} {CVE-2019-9824} - qemu-kvm.spec: Add .spec file for OL8 (Karl Heubaum) [Orabug: 30618035] - qemu.spec: Add .spec file for OL7 (Karl Heubaum) [Orabug: 30618035] - qemu-submodule-init: Add Git submodule init script (Karl Heubaum) [Orabug: 30618035] - vhost.conf: Initial vhost.conf (Karl Heubaum) [Orabug: 30618035] - parfait: Add buildrpm/parfait-qemu.conf (Karl Heubaum) [Orabug: 30618035] - virtio: Set PCI subsystem vendor ID to Oracle (Karl Heubaum) [Orabug: 30618035] - qemu_regdump.py: Initial qemu_regdump.py (Karl Heubaum) [Orabug: 30618035] - qmp-regdump: Initial qmp-regdump (Karl Heubaum) [Orabug: 30618035] - bridge.conf: Initial bridge.conf (Karl Heubaum) [Orabug: 30618035] - kvm.conf: Initial kvm.conf (Karl Heubaum) [Orabug: 30618035] - 80-kvm.rules: Initial 80-kvm.rules (Karl Heubaum) [Orabug: 30618035] - exec: set map length to zero when returning NULL (Prasad J Pandit) [Orabug: 31439733] {CVE-2020-13659} - megasas: use unsigned type for reply_queue_head and check index (Prasad J Pandit) [Orabug: 31414338] {CVE-2020-13362} - memory: Revert "memory: accept mismatching sizes in memory_region_access_valid" (Michael S. Tsirkin) [Orabug: 31439736] [Orabug: 31452202] {CVE-2020-13754} {CVE-2020-13791}
- buildrpm/spec files: Don't package elf2dmp (Karl Heubaum) [Orabug: 31657424] - qemu-kvm.spec: Enable the block-curl package (Karl Heubaum) [Orabug: 31657424] - qemu.spec: enable have_curl in spec (Dongli Zhang) [Orabug: 31657424]
- Document CVE-2020-13765 as fixed (Karl Heubaum) [Orabug: 31463250] {CVE-2020-13765} - kvm: Reallocate dirty_bmap when we change a slot (Dr. David Alan Gilbert) [Orabug: 31076399] - kvm: split too big memory section on several memslots (Igor Mammedov) [Orabug: 31076399] - target/i386: do not set unsupported VMX secondary execution controls (Vitaly Kuznetsov) [Orabug: 31463710] - target/i386: add VMX definitions (Paolo Bonzini) [Orabug: 31463710] - ati-vga: check mm_index before recursive call (CVE-2020-13800) (Prasad J Pandit) [Orabug: 31452206] {CVE-2020-13800} - es1370: check total frame count against current frame (Prasad J Pandit) [Orabug: 31463235] {CVE-2020-13361} - ati-vga: Fix checks in ati_2d_blt() to avoid crash (BALATON Zoltan) [Orabug: 31238432] {CVE-2020-11869} - libslirp: Update to stable-4.2 to fix CVE-2020-1983 (Karl Heubaum) [Orabug: 31241227] {CVE-2020-1983} - Document CVEs as fixed (Karl Heubaum) {CVE-2019-12068} {CVE-2019-15034} - libslirp: Update to version 4.2.0 to fix CVEs (Karl Heubaum) [Orabug: 30274592] [Orabug: 30869830] {CVE-2019-15890} {CVE-2020-8608} - target/i386: add support for MSR_IA32_TSX_CTRL (Paolo Bonzini) [Orabug: 31124041] - qemu-img: Add --target-is-zero to convert (David Edmondson) - vnc: fix memory leak when vnc disconnect (Li Qiang) [Orabug: 30996427] {CVE-2019-20382} - iscsi: Cap block count from GET LBA STATUS (CVE-2020-1711) (Felipe Franciosi) [Orabug: 31124035] {CVE-2020-1711} - qemu.spec: Remove "BuildRequires: kernel" (Karl Heubaum) [Orabug: 31124047]
- qemu-submodule-init: Add Git submodule init script