Name: | qemu-kvm-block-rbd |
---|---|
Epoch: | 15 |
Version: | 4.2.0 |
Release: | 60.module+el8.5.0+20640+efbe7156.2 |
Architecture: | aarch64 |
Module: | virt:ol:8050020220322234807:c5368500 |
Group: | Development/Tools |
Size: | 70984 |
License: | GPLv2 and GPLv2+ and CC-BY |
RPM: | qemu-kvm-block-rbd-4.2.0-60.module+el8.5.0+20640+efbe7156.2.aarch64.rpm |
Source RPM: | qemu-kvm-4.2.0-60.module+el8.5.0+20640+efbe7156.2.src.rpm |
Build Date: | Thu Apr 28 2022 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.qemu.org/ |
Summary: | QEMU Ceph/RBD block driver |
Description: | This package provides the additional Ceph/RBD block driver for QEMU. Install this package if you want to access remote Ceph volumes using the rbd protocol. |
- kvm-target-i386-Declare-constants-for-XSAVE-offsets.patch [bz#2065239] - kvm-target-i386-Consolidate-the-X86XSaveArea-offset-chec.patch [bz#2065239] - kvm-target-i386-Clarify-the-padding-requirements-of-X86X.patch [bz#2065239] - kvm-target-i386-Pass-buffer-and-length-to-XSAVE-helper.patch [bz#2065239] - kvm-target-i386-Make-x86_ext_save_areas-visible-outside-.patch [bz#2065239] - kvm-target-i386-Observe-XSAVE-state-area-offsets.patch [bz#2065239] - kvm-target-i386-Populate-x86_ext_save_areas-offsets-usin.patch [bz#2065239] - Resolves: bz#2065239 (KVM Fedora 35 guest x86 programs randomly crash in signal handler [rhel-8.5.0.z])
- kvm-virtiofsd-Drop-membership-of-all-supplementary-group.patch [bz#2048627] - Resolves: bz#2048627 (CVE-2022-0358 virt:rhel/qemu-kvm: QEMU: virtiofsd: potential privilege escalation via CVE-2018-13405 [rhel-8.5.0.z])
- kvm-hw-scsi-scsi-disk-MODE_PAGE_ALLS-not-allowed-in-MODE.patch [bz#2025605] - kvm-e1000-fix-tx-re-entrancy-problem.patch [bz#2025011] - Resolves: bz#2025605 (CVE-2021-3930 virt:rhel/qemu-kvm: QEMU: off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c [rhel-8.5.0.z]) - Resolves: bz#2025011 (CVE-2021-20257 virt:rhel/qemu-kvm: QEMU: net: e1000: infinite loop while processing transmit descriptors [rhel-8.5.0.z])
- kvm-scsi-make-io_timeout-configurable.patch [bz#1994041] - Resolves: bz#1994041 (qemu-kvm scsi: change default passthrough timeout to non-infinite)
- kvm-virtiofsd-Disable-remote-posix-locks-by-default.patch [bz#1967496] - kvm-virtiofsd-Fix-the-help-message-of-posix-lock.patch [bz#1967496] - Resolves: bz#1967496 ([virtio-fs] nfs/xfstest generic/089 generic/478 generic/632 failed)
- kvm-aio-wait-delegate-polling-of-main-AioContext-if-BQL-.patch [bz#1969848] - kvm-async-use-explicit-memory-barriers.patch [bz#1969848] - Resolves: bz#1969848 (qemu-img convert hangs on aarch64)
- kvm-glib-compat-add-g_unix_get_passwd_entry_qemu.patch [bz#1967716] - kvm-qga-add-ssh-add-remove-authorized-keys.patch [bz#1967716] - kvm-qga-add-reset-argument-to-ssh-add-authorized-keys.patch [bz#1967716] - kvm-qga-add-ssh-get-authorized-keys.patch [bz#1967716] - kvm-Add-mtod_check.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-bootp-limit-vendor-specific-area-to-input-packet-mem.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-bootp-check-bootp_input-buffer-size.patch [bz#1970819] - kvm-upd6-check-udp6_input-buffer-size.patch [bz#1970835] - kvm-tftp-check-tftp_input-buffer-size.patch [bz#1970843] - kvm-tftp-introduce-a-header-structure.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-udp-check-upd_input-buffer-size.patch [bz#1970853] - kvm-Fix-DHCP-broken-in-libslirp-v4.6.0.patch [bz#1970819 bz#1970835 bz#1970843 bz#1970853] - kvm-net-check-if-the-file-descriptor-is-valid-before-usi.patch [bz#1982134] - kvm-net-detect-errors-from-probing-vnet-hdr-flag-for-TAP.patch [bz#1982134] - Resolves: bz#1967716 (RFE: rebuild guest agent to include public ssh injection api support) - Resolves: bz#1970819 (CVE-2021-3592 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (bootp) [rhel-8]) - Resolves: bz#1970835 (CVE-2021-3593 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp6) [rhel-8]) - Resolves: bz#1970843 (CVE-2021-3595 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (tftp) [rhel-8]) - Resolves: bz#1970853 (CVE-2021-3594 virt:rhel/qemu-kvm: QEMU: slirp: invalid pointer initialization may lead to information disclosure (udp) [rhel-8]) - Resolves: bz#1982134 (QEMU core dump while booting guest with a non-exist fd on tap)
- kvm-net-introduce-qemu_receive_packet.patch [bz#1932917] - kvm-e1000-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-dp8393x-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-sungem-switch-to-use-qemu_receive_packet-for-loopbac.patch [bz#1932917] - kvm-tx_pkt-switch-to-use-qemu_receive_packet_iov-for-loo.patch [bz#1932917] - kvm-rtl8139-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - kvm-pcnet-switch-to-use-qemu_receive_packet-for-loopback.patch [bz#1932917] - kvm-cadence_gem-switch-to-use-qemu_receive_packet-for-lo.patch [bz#1932917] - kvm-lan9118-switch-to-use-qemu_receive_packet-for-loopba.patch [bz#1932917] - Resolves: bz#1932917 (CVE-2021-3416 virt:rhel/qemu-kvm: QEMU: net: infinite loop in loopback mode may lead to stack overflow)
- kvm-redhat-Fix-unversioned-Obsoletes-warning.patch [bz#1967329] - Resolves: bz#1967329 (Make qemu-kvm use versioned obsoletes for qemu-kvm-ma and qemu-kvm-rhev)
- kvm-virtiofsd-Whitelist-fchmod.patch [bz#1967914] - kvm-spapr-Fix-EEH-capability-issue-on-KVM-guest-for-PCI-.patch [bz#1957866] - kvm-Compress-lines-for-immediate-return.patch [bz#1970912] - kvm-file-posix-Handle-EINVAL-fallocate-return-value.patch [bz#1970912] - Resolves: bz#1967914 ([virtio-fs] virtiofsd quit when coping file to a folder in virtio-fs mounted volume(windows guest)) - Resolves: bz#1957866 (RHEL8.4 - EEH capability disabled on KVM guest and recovery of PCI passthru device fails(CX5 / mlx5_core) (qemu-kvm)) - Resolves: bz#1970912 (Deployment fails with "Invalid or missing agent token received")