Name: | qemu-guest-agent |
---|---|
Epoch: | 15 |
Version: | 2.12.0 |
Release: | 65.module+el8.0.0+5339+ebcc8ca7.5 |
Architecture: | aarch64 |
Module: | virt:ol:8000020190828150510:9edba152 |
Group: | Development/Tools |
Size: | 391111 |
License: | GPLv2 and GPLv2+ and CC-BY |
RPM: | qemu-guest-agent-2.12.0-65.module+el8.0.0+5339+ebcc8ca7.5.aarch64.rpm |
Source RPM: | qemu-kvm-2.12.0-65.module+el8.0.0+5339+ebcc8ca7.5.src.rpm |
Build Date: | Mon Sep 16 2019 |
Build Host: | ca-arm-builder-01.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | QEMU guest agent |
Description: | qemu-kvm is an open source virtualizer that provides hardware emulation for the KVM hypervisor. This package provides an agent to run inside guests, which communicates with the host over a virtio-serial channel named "org.qemu.guest_agent.0" This package does not need to be installed on the host OS. |
- kvm-i386-Add-new-MSR-indices-for-IA32_PRED_CMD-and-IA32_.patch [bz#1718235] - kvm-i386-Add-CPUID-bit-and-feature-words-for-IA32_ARCH_C.patch [bz#1718235] - kvm-x86-Data-structure-changes-to-support-MSR-based-feat.patch [bz#1718235] - kvm-x86-define-a-new-MSR-based-feature-word-FEATURE_WORD.patch [bz#1718235] - kvm-Add-support-to-KVM_GET_MSR_FEATURE_INDEX_LIST-an.patch [bz#1718235] - kvm-Use-KVM_GET_MSR_INDEX_LIST-for-MSR_IA32_ARCH_CAP.patch [bz#1718235] - kvm-i386-kvm-Disable-arch_capabilities-if-MSR-can-t-be-s.patch [bz#1718235] - kvm-i386-Make-arch_capabilities-migratable.patch [bz#1718235] - kvm-target-i386-add-MDS-NO-feature.patch [bz#1718235] - Resolves: bz#1718235 ([Intel 8.1 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM - qemu-kvm [rhel-8.0.0.z])
- kvm-Introduce-new-no_guest_reset-parameter-for-usb-host-.patch [bz#1719228] - kvm-usb-call-reset-handler-before-updating-state.patch [bz#1719228] - kvm-usb-host-skip-reset-for-untouched-devices.patch [bz#1719228] - kvm-usb-host-avoid-libusb_set_configuration-calls.patch [bz#1719228] - kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734750] - Resolves: bz#1719228 (Detached device when trying to upgrade USB device firmware when in doing USB Passthrough via QEMU [rhel-8.0.0.z]) - Resolves: bz#1734750 (CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during packet reassembly [rhel-8.0.0.z])
- kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1732324] - kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1732324] - kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1732324] - kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1732324] - kvm-virtio-scsi-Move-BlockBackend-back-to-the-main-AioCo.patch [bz#1718992] - kvm-scsi-disk-Acquire-the-AioContext-in-scsi_-_realize.patch [bz#1718992] - kvm-virtio-scsi-Forbid-devices-with-different-iothreads-.patch [bz#1718992] - Resolves: bz#1718992 (qemu-kvm core dumped after hotplug the deleted disk with iothread parameter [rhel-8.0.0.z]) - Resolves: bz#1732324 (CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-8.0.0.z])
- Rebuild all virt packages to fix RHEL's upgrade path - Resolves: rhbz#1696354 (Ensure modular RPM upgrade path [ZStream Clone] [rhel-8.0.0.z])
- Bump release version to fix the versioning problem (zstream release lower than ystream). - Resolves: bz#1704545 (CVE-2018-12126 virt:rhel/qemu-kvm: hardware: Microarchitectural Store Buffer Data Sampling [rhel-8.0.0.z])
- kvm-target-i386-define-md-clear-bit-rhev.patch [bz#1704545] - Resolves: bz#1704545 (CVE-2018-12126 virt:rhel/qemu-kvm: hardware: Microarchitectural Store Buffer Data Sampling [rhel-8.0.0.z])
- kvm-device_tree-Fix-integer-overflowing-in-load_device_t.patch [bz#1693116] - Resolves: bz#1693116 (CVE-2018-20815 qemu-kvm: QEMU: device_tree: heap buffer overflow while loading device tree blob [rhel-8.0])
- kvm-scsi-generic-avoid-possible-out-of-bounds-access-to-.patch [bz#1668162] - Resolves: bz#1668162 (CVE-2019-6501 qemu-kvm: QEMU: scsi-generic: possible OOB access while handling inquiry request [rhel-8])
- kvm-slirp-check-data-length-while-emulating-ident-functi.patch [bz#1669069] - Resolves: bz#1669069 (CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-8.0])
- kvm-qemu-ga-make-get-fsinfo-work-over-pci-bridges.patch [bz#1666952] - kvm-qga-fix-driver-leak-in-guest-get-fsinfo.patch [bz#1666952] - Resolves: bz#1666952 (qemu-guest-agent does not parse PCI bridge links in "build_guest_fsinfo_for_real_device" (q35))