| Name: | qemu-guest-agent |
|---|---|
| Epoch: | 10 |
| Version: | 1.5.3 |
| Release: | 60.el7 |
| Architecture: | x86_64 |
| Group: | System Environment/Daemons |
| Size: | 368002 |
| License: | GPLv2+ and LGPLv2+ and BSD |
| RPM: | qemu-guest-agent-1.5.3-60.el7.x86_64.rpm |
| Source RPM: | qemu-kvm-1.5.3-60.el7.src.rpm |
| Build Date: | Thu May 08 2014 |
| Build Host: | ca-buildj3.us.oracle.com |
| Vendor: | Oracle America |
| URL: | http://www.qemu.org/ |
| Summary: | QEMU guest agent |
| Description: | qemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. This package provides an agent to run inside guests, which communicates with the host over a virtio-serial channel named "org.qemu.guest_agent.0" This package does not need to be installed on the host OS. |
- kvm-qcow2-fix-dangling-refcount-table-entry.patch [bz#1081793] - kvm-qcow2-link-all-L2-meta-updates-in-preallocate.patch [bz#1081393] - Resolves: bz#1081393 (qemu-img will prompt that 'leaked clusters were found' while creating images with '-o preallocation=metadata,cluster_size<=1024') - Resolves: bz#1081793 (qemu-img core dumped when creating a qcow2 image base on block device(iscsi or libiscsi))
- kvm-qemu-iotests-add-.-check-cloop-support.patch [bz#1066691] - kvm-qemu-iotests-add-cloop-input-validation-tests.patch [bz#1066691] - kvm-block-cloop-validate-block_size-header-field-CVE-201.patch [bz#1079455] - kvm-block-cloop-prevent-offsets_size-integer-overflow-CV.patch [bz#1079320] - kvm-block-cloop-refuse-images-with-huge-offsets-arrays-C.patch [bz#1079455] - kvm-block-cloop-refuse-images-with-bogus-offsets-CVE-201.patch [bz#1079455] - kvm-size-off-by-one.patch [bz#1066691] - kvm-qemu-iotests-Support-for-bochs-format.patch [bz#1066691] - kvm-bochs-Unify-header-structs-and-make-them-QEMU_PACKED.patch [bz#1066691] - kvm-bochs-Use-unsigned-variables-for-offsets-and-sizes-C.patch [bz#1079339] - kvm-bochs-Check-catalog_size-header-field-CVE-2014-0143.patch [bz#1079320] - kvm-bochs-Check-extent_size-header-field-CVE-2014-0142.patch [bz#1079315] - kvm-bochs-Fix-bitmap-offset-calculation.patch [bz#1066691] - kvm-vpc-vhd-add-bounds-check-for-max_table_entries-and-b.patch [bz#1079455] - kvm-vpc-Validate-block-size-CVE-2014-0142.patch [bz#1079315] - kvm-vdi-add-bounds-checks-for-blocks_in_image-and-disk_s.patch [bz#1079455] - kvm-vhdx-Bounds-checking-for-block_size-and-logical_sect.patch [bz#1079346] - kvm-curl-check-data-size-before-memcpy-to-local-buffer.-.patch [bz#1079455] - kvm-qcow2-Check-header_length-CVE-2014-0144.patch [bz#1079455] - kvm-qcow2-Check-backing_file_offset-CVE-2014-0144.patch [bz#1079455] - kvm-qcow2-Check-refcount-table-size-CVE-2014-0144.patch [bz#1079455] - kvm-qcow2-Validate-refcount-table-offset.patch [bz#1066691] - kvm-qcow2-Validate-snapshot-table-offset-size-CVE-2014-0.patch [bz#1079455] - kvm-qcow2-Validate-active-L1-table-offset-and-size-CVE-2.patch [bz#1079455] - kvm-qcow2-Fix-backing-file-name-length-check.patch [bz#1066691] - kvm-qcow2-Don-t-rely-on-free_cluster_index-in-alloc_refc.patch [bz#1079339] - kvm-qcow2-Avoid-integer-overflow-in-get_refcount-CVE-201.patch [bz#1079320] - kvm-qcow2-Check-new-refcount-table-size-on-growth.patch [bz#1066691] - kvm-qcow2-Fix-types-in-qcow2_alloc_clusters-and-alloc_cl.patch [bz#1066691] - kvm-qcow2-Protect-against-some-integer-overflows-in-bdrv.patch [bz#1066691] - kvm-qcow2-Fix-new-L1-table-size-check-CVE-2014-0143.patch [bz#1079320] - kvm-dmg-coding-style-and-indentation-cleanup.patch [bz#1066691] - kvm-dmg-prevent-out-of-bounds-array-access-on-terminator.patch [bz#1066691] - kvm-dmg-drop-broken-bdrv_pread-loop.patch [bz#1066691] - kvm-dmg-use-appropriate-types-when-reading-chunks.patch [bz#1066691] - kvm-dmg-sanitize-chunk-length-and-sectorcount-CVE-2014-0.patch [bz#1079325] - kvm-dmg-use-uint64_t-consistently-for-sectors-and-length.patch [bz#1066691] - kvm-dmg-prevent-chunk-buffer-overflow-CVE-2014-0145.patch [bz#1079325] - kvm-block-vdi-bounds-check-qemu-io-tests.patch [bz#1066691] - kvm-block-Limit-request-size-CVE-2014-0143.patch [bz#1079320] - kvm-qcow2-Fix-copy_sectors-with-VM-state.patch [bz#1066691] - kvm-qcow2-Fix-NULL-dereference-in-qcow2_open-error-path-.patch [bz#1079333] - kvm-qcow2-Fix-L1-allocation-size-in-qcow2_snapshot_load_.patch [bz#1079325] - kvm-qcow2-Check-maximum-L1-size-in-qcow2_snapshot_load_t.patch [bz#1079320] - kvm-qcow2-Limit-snapshot-table-size.patch [bz#1066691] - kvm-parallels-Fix-catalog-size-integer-overflow-CVE-2014.patch [bz#1079320] - kvm-parallels-Sanity-check-for-s-tracks-CVE-2014-0142.patch [bz#1079315] - kvm-fix-machine-check-propagation.patch [bz#740107] - Resolves: bz#1066691 (qemu-kvm: include leftover patches from block layer security audit) - Resolves: bz#1079315 (CVE-2014-0142 qemu-kvm: qemu: crash by possible division by zero [rhel-7.0]) - Resolves: bz#1079320 (CVE-2014-0143 qemu-kvm: Qemu: block: multiple integer overflow flaws [rhel-7.0]) - Resolves: bz#1079325 (CVE-2014-0145 qemu-kvm: Qemu: prevent possible buffer overflows [rhel-7.0]) - Resolves: bz#1079333 (CVE-2014-0146 qemu-kvm: Qemu: qcow2: NULL dereference in qcow2_open() error path [rhel-7.0]) - Resolves: bz#1079339 (CVE-2014-0147 qemu-kvm: Qemu: block: possible crash due signed types or logic error [rhel-7.0]) - Resolves: bz#1079346 (CVE-2014-0148 qemu-kvm: Qemu: vhdx: bounds checking for block_size and logical_sector_size [rhel-7.0]) - Resolves: bz#1079455 (CVE-2014-0144 qemu-kvm: Qemu: block: missing input validation [rhel-7.0]) - Resolves: bz#740107 ([Hitachi 7.0 FEAT] KVM: MCA Recovery for KVM guest OS memory)
- kvm-pc-Use-cpu64-rhel6-CPU-model-by-default-on-rhel6-mac.patch [bz#1080170] - kvm-target-i386-Copy-cpu64-rhel6-definition-into-qemu64.patch [bz#1078607 bz#1080170] - Resolves: bz#1080170 (intel 82576 VF not work in windows 2008 x86 - Code 12 [TestOnly]) - Resolves: bz#1080170 (Default CPU model for rhel6.* machine-types is different from RHEL-6)
- kvm-virtio-net-fix-guest-triggerable-buffer-overrun.patch [bz#1078308] - Resolves: bz#1078308 (EMBARGOED CVE-2014-0150 qemu: virtio-net: fix guest-triggerable buffer overrun [rhel-7.0])
- kvm-configure-Fix-bugs-preventing-Ceph-inclusion.patch [bz#1078809] - Resolves: bz#1078809 (can not boot qemu-kvm-rhev with rbd image)
- kvm-scsi-Change-scsi-sense-buf-size-to-252.patch [bz#1058173] - kvm-scsi-Fix-migration-of-scsi-sense-data.patch [bz#1058173] - Resolves: bz#1058173 (qemu-kvm core dump booting guest with scsi-generic disk attached when using built-in iscsi driver)
- kvm-qdev-monitor-Set-properties-after-parent-is-assigned.patch [bz#1046248] - kvm-block-Update-image-size-in-bdrv_invalidate_cache.patch [bz#1048575] - kvm-qcow2-Keep-option-in-qcow2_invalidate_cache.patch [bz#1048575] - kvm-qcow2-Check-bs-drv-in-copy_sectors.patch [bz#1048575] - kvm-block-bs-drv-may-be-NULL-in-bdrv_debug_resume.patch [bz#1048575] - kvm-iotests-Test-corruption-during-COW-request.patch [bz#1048575] - Resolves: bz#1046248 (qemu-kvm crash when send "info qtree" after hot plug a device with invalid addr) - Resolves: bz#1048575 (Segmentation fault occurs after migrate guest(use scsi disk and add stress) to des machine)
- kvm-dataplane-Fix-startup-race.patch [bz#1069541] - kvm-QMP-Relax-__com.redhat_drive_add-parameter-checking.patch [bz#1057471] - kvm-all-exit-in-case-max-vcpus-exceeded.patch [bz#993429] - kvm-block-gluster-code-movements-state-storage-changes.patch [bz#1031526] - kvm-block-gluster-add-reopen-support.patch [bz#1031526] - kvm-virtio-net-add-feature-bit-for-any-header-s-g.patch [bz#990989] - kvm-spec-Add-README.rhel6-gpxe-source.patch [bz#1073774] - kvm-pc-Add-RHEL6-e1000-gPXE-image.patch [bz#1073774] - kvm-loader-rename-in_ram-has_mr.patch [bz#1064018] - kvm-pc-avoid-duplicate-names-for-ROM-MRs.patch [bz#1064018] - kvm-qemu-img-convert-Fix-progress-output.patch [bz#1073728] - kvm-qemu-iotests-Test-progress-output-for-conversion.patch [bz#1073728] - kvm-iscsi-Use-bs-sg-for-everything-else-than-disks.patch [bz#1067784] - kvm-block-Fix-bs-request_alignment-assertion-for-bs-sg-1.patch [bz#1067784] - kvm-qemu_file-use-fwrite-correctly.patch [bz#1005103] - kvm-qemu_file-Fix-mismerge-of-use-fwrite-correctly.patch [bz#1005103] - Resolves: bz#1005103 (Migration should fail when migrate guest offline to a file which is specified to a readonly directory.) - Resolves: bz#1031526 (Can not commit snapshot when disk is using glusterfs:native backend) - Resolves: bz#1057471 (fail to do hot-plug with "discard = on" with "Invalid parameter 'discard'" error) - Resolves: bz#1064018 (abort from conflicting genroms) - Resolves: bz#1067784 (qemu-kvm: block.c:850: bdrv_open_common: Assertion `bs->request_alignment != 0' failed. Aborted (core dumped)) - Resolves: bz#1069541 (Segmentation fault when boot guest with dataplane=on) - Resolves: bz#1073728 (progress bar doesn't display when converting with -p) - Resolves: bz#1073774 (e1000 ROM cause migrate fail from RHEL6.5 host to RHEL7.0 host) - Resolves: bz#990989 (backport inline header virtio-net optimization) - Resolves: bz#993429 (kvm: test maximum number of vcpus supported (rhel7))
- kvm-target-i386-Move-hyperv_-static-globals-to-X86CPU.patch [bz#1004773] - kvm-Fix-uninitialized-cpuid_data.patch [bz#1057173] - kvm-fix-coexistence-of-KVM-and-Hyper-V-leaves.patch [bz#1004773] - kvm-make-availability-of-Hyper-V-enlightenments-depe.patch [bz#1004773] - kvm-make-hyperv-hypercall-and-guest-os-id-MSRs-migra.patch [bz#1004773] - kvm-make-hyperv-vapic-assist-page-migratable.patch [bz#1004773] - kvm-target-i386-Convert-hv_relaxed-to-static-property.patch [bz#1057173] - kvm-target-i386-Convert-hv_vapic-to-static-property.patch [bz#1057173] - kvm-target-i386-Convert-hv_spinlocks-to-static-property.patch [bz#1057173] - kvm-target-i386-Convert-check-and-enforce-to-static-prop.patch [bz#1004773] - kvm-target-i386-Cleanup-foo-feature-handling.patch [bz#1057173] - kvm-add-support-for-hyper-v-timers.patch [bz#1057173] - Resolves: bz#1004773 (Hyper-V guest OS id and hypercall MSRs not migrated) - Resolves: bz#1057173 (KVM Hyper-V Enlightenment - New feature - hv-time (QEMU))
- kvm-qmp-access-the-local-QemuOptsLists-for-drive-option.patch [bz#1026184] - kvm-qxl-add-sanity-check.patch [bz#751937] - kvm-Fix-two-XBZRLE-corruption-issues.patch [bz#1063417] - kvm-qdev-monitor-set-DeviceState-opts-before-calling-rea.patch [bz#1037956] - kvm-vfio-blacklist-loading-of-unstable-roms.patch [bz#1037956] - kvm-block-Set-block-filename-sizes-to-PATH_MAX-instead-o.patch [bz#1072339] - Resolves: bz#1026184 (QMP: querying -drive option returns a NULL parameter list) - Resolves: bz#1037956 (bnx2x: boot one guest to do vfio-pci with all PFs assigned in same group meet QEMU segmentation fault (Broadcom BCM57810 card)) - Resolves: bz#1063417 (google stressapptest vs Migration) - Resolves: bz#1072339 (RHEV: Cannot start VMs that have more than 23 snapshots.) - Resolves: bz#751937 (qxl triggers assert during iofuzz test)