qemu-guest-agent-0.12.1.2-2.506.el6_10.8.i686
[514 KiB] |
Changelog
by Danilo Cesar Lemes de Paula (2020-09-10):
- kvm-qemu-kvm-QEMU-usb-check-RNDIS-message-length.patch [bz#1869684]
- kvm-qemu-kvm-QEMU-usb-fix-setup_len-init-CVE-2020-14364.patch [bz#1869684]
- Resolves: bz#1869684
(CVE-2020-14364 qemu-kvm: QEMU: usb: out-of-bounds r/w access issue while processing usb packets [rhel-6.10.z])
|
qemu-guest-agent-0.12.1.2-2.506.el6_10.7.i686
[514 KiB] |
Changelog
by Wainer dos Santos Moschetta (2020-03-25):
- kvm-slirp-disable-tcp_emu.patch [bz#1791680]
- kvm-slirp-add-slirp_fmt-helpers.patch [bz#1798966]
- kvm-tcp_emu-fix-unsafe-snprintf-usages.patch [bz#1798966]
- Resolves: bz#1791680
(QEMU: Slirp: disable emulation of tcp programs like ftp IRC etc. [rhel-6])
- Resolves: bz#1798966
(CVE-2020-8608 qemu-kvm: QEMU: Slirp: potential OOB access due to unsafe snprintf() usages [rhel-6.10.z])
|
qemu-guest-agent-0.12.1.2-2.506.el6_10.6.i686
[513 KiB] |
Changelog
by Wainer dos Santos Moschetta (2020-02-10):
- kvm-Fix-heap-overflow-in-ip_reass-on-big-packet-input.patch [bz#1734747]
- kvm-Using-ip_deq-after-m_free-might-read-pointers-from-a.patch [bz#1749731]
- kvm-tcp_emu-Fix-oob-access.patch [bz#1791558]
- kvm-slirp-use-correct-size-while-emulating-IRC-commands.patch [bz#1791558]
- kvm-slirp-use-correct-size-while-emulating-commands.patch [bz#1791558]
- Resolves: bz#1734747
(CVE-2019-14378 qemu-kvm: QEMU: slirp: heap buffer overflow during packet reassembly [rhel-6.10.z])
- Resolves: bz#1749731
(CVE-2019-15890 qemu-kvm: QEMU: Slirp: use-after-free during packet reassembly [rhel-6])
- Resolves: bz#1791558
(CVE-2020-7039 qemu-kvm: QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu() [rhel-6.10.z])
|
qemu-guest-agent-0.12.1.2-2.506.el6_10.5.i686
[512 KiB] |
Changelog
by Wainer dos Santos Moschetta (2019-09-09):
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot.patch [bz#1669066]
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t.patch [bz#1669066]
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669066]
- kvm-qxl-check-release-info-object.patch [bz#1712728]
- kvm-net-Use-iov-helper-functions.patch [bz#1636415]
- kvm-net-increase-buffer-size-to-accommodate-Jumbo-frame-.patch [bz#1636415]
- kvm-net-ignore-packet-size-greater-than-INT_MAX.patch [bz#1636415]
- kvm-net-drop-too-large-packet-early.patch [bz#1636415]
- kvm-PATCH-slirp-fix-buffer-overrun.patch [bz#1586251]
- kvm-Fix-build-from-previous-commit.patch [bz#1586251]
- kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586251]
- kvm-slirp-Convert-mbufs-to-use-g_malloc-and-g_free.patch [bz#1586251]
- kvm-slirp-correct-size-computation-while-concatenating-m.patch [bz#1586251]
- kvm-pcnet-fix-possible-buffer-overflow.patch [bz#1636774]
- Resolves: bz#1586251
(CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-6.10.z])
- Resolves: bz#1636415
(CVE-2018-10839 qemu-kvm: Qemu: ne2000: integer overflow leads to buffer overflow issue [rhel-6])
- Resolves: bz#1636774
(CVE-2018-17962 qemu-kvm: Qemu: pcnet: integer overflow leads to buffer overflow [rhel-6])
- Resolves: bz#1669066
(CVE-2019-6778 qemu-kvm: QEMU: slirp: heap buffer overflow in tcp_emu() [rhel-6.10.z])
- Resolves: bz#1712728
(CVE-2019-12155 qemu-kvm: QEMU: qxl: null pointer dereference while releasing spice resources [rhel-6])
|
qemu-guest-agent-0.12.1.2-2.506.el6_10.4.i686
[511 KiB] |
Changelog
by Wainer dos Santos Moschetta (2019-06-18):
- kvm-target-i386-Sanitize-the-XSAVE-related-feature-bits.patch [bz#1673779]
- kvm-slirp-check-sscanf-result-when-emulating-ident.patch [bz#1689790]
- Resolves: bz#1673779
(RHEL8 VM's do not install on RHEL6 KVM hypervisor)
- Resolves: bz#1689790
(CVE-2019-9824 qemu-kvm: QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables [rhel-6])
|
qemu-guest-agent-0.12.1.2-2.506.el6_10.3.i686
[510 KiB] |
Changelog
by Danilo Cesar Lemes de Paula (2019-05-10):
- kvm-target-i386-define-md-clear-bit.patch [bz#1698996]
- Resolves: bz#1698996
(CVE-2018-12130 qemu-kvm: hardware: MFBDS)
|
qemu-guest-agent-0.12.1.2-2.506.el6_10.1.i686
[510 KiB] |
Changelog
by Wainer dos Santos Moschetta (2018-06-21):
- qemu-kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1574074]
- qemu-kvm-i386-Define-the-Virt-SSBD-MSR-and-handling-of-it-CVE.patch [bz#1574074]
- qemu-kvm-i386-define-the-AMD-virt-ssbd-CPUID-feature-bit-CVE-.patch [bz#1574074]
- Resolves: bz#1574074
(CVE-2018-3639 qemu-kvm: hw: cpu: speculative store bypass [rhel-6.10.z])
|
qemu-guest-agent-0.12.1.2-2.503.el6_9.6.i686
[509 KiB] |
Changelog
by Wainer dos Santos Moschetta (2018-05-11):
- qemu-kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1574067]
- Resolves: bz#1574067
(EMBARGOED CVE-2018-3639 qemu-kvm: Kernel: omega-4 [rhel-6.9.z])
|
qemu-guest-agent-0.12.1.2-2.503.el6_9.5.i686
[509 KiB] |
Changelog
by Wainer dos Santos Moschetta (2018-02-16):
- kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501296]
- Resolves: bz#1501296
(CVE-2017-15289 qemu-kvm: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-6.9.z])
|
qemu-guest-agent-0.12.1.2-2.503.el6_9.4.i686
[509 KiB] |
Changelog
by Wainer dos Santos Moschetta (2017-12-14):
- Fix CVE-2017-5715
|
qemu-guest-agent-0.12.1.2-2.503.el6_9.3.i686
[508 KiB] |
Changelog
by Danilo Cesar Lemes de Paula (2017-05-05):
- kvm-cirrus-avoid-write-only-variables.patch [bz#1444377 bz#1444379]
- kvm-cirrus-stop-passing-around-dst-pointers-in-the-blitt.patch [bz#1444377 bz#1444379]
- kvm-cirrus-stop-passing-around-src-pointers-in-the-blitt.patch [bz#1444377 bz#1444379]
- kvm-cirrus-fix-off-by-one-in-cirrus_bitblt_rop_bkwd_tran.patch [bz#1444377 bz#1444379]
- kvm-cirrus-fix-PUTPIXEL-macro.patch [bz#1444377 bz#1444379]
- Resolves: bz#1444377
(CVE-2017-7980 qemu-kvm: Qemu: display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.9.z])
- Resolves: bz#1444379
(CVE-2017-7980 qemu-kvm-rhev: Qemu: display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.9.z])
|
qemu-guest-agent-0.12.1.2-2.503.el6.i686
[507 KiB] |
Changelog
by Danilo Cesar Lemes de Paula (2017-02-13):
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420487 bz#1420489]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420487 bz#1420489]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420487 bz#1420489]
- Resolves: bz#1420487
(EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.9])
- Resolves: bz#1420489
(EMBARGOED CVE-2017-2620 qemu-kvm-rhev: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.9])
|
qemu-guest-agent-0.12.1.2-2.491.el6_8.7.i686
[503 KiB] |
Changelog
by Danilo Cesar Lemes de Paula (2017-02-13):
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420486 bz#1420488]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420486 bz#1420488]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420486 bz#1420488]
- Resolves: bz#1420486
(EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.8.z])
- Resolves: bz#1420488
(EMBARGOED CVE-2017-2620 qemu-kvm-rhev: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.8.z])
|
qemu-guest-agent-0.12.1.2-2.491.el6_8.6.i686
[502 KiB] |
Changelog
by Danilo Cesar Lemes de Paula (2017-02-09):
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1418230 bz#1419416]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418230 bz#1419416]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418230 bz#1419416]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418230 bz#1419416]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418230 bz#1419416]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418230 bz#1419416]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418230 bz#1419416]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418230 bz#1419416]
- Resolves: bz#1418230
(CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.8.z])
- Resolves: bz#1419416
(CVE-2017-2615 qemu-kvm-rhev: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.8.z])
|
qemu-guest-agent-0.12.1.2-2.491.el6_8.3.i686
[500 KiB] |
Changelog
by Miroslav Rezanina (2016-07-27):
- kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359724]
- Resolves: bz#1359724
(EMBARGOED CVE-2016-5403 qemu-kvm: Qemu: virtio: unbounded memory allocation on host via guest leading to DoS [rhel-6.8.z])
|
qemu-guest-agent-0.12.1.2-2.491.el6_8.1.i686
[500 KiB] |
Changelog
by Miroslav Rezanina (2016-05-03):
- kvm-Add-vga.h-unmodified-from-Linux.patch [bz#1331407]
- kvm-vga.h-remove-unused-stuff-and-reformat.patch [bz#1331407]
- kvm-vga-use-constants-from-vga.h.patch [bz#1331407]
- kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patch [bz#1331407]
- kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710.patch [bz#1331407]
- kvm-vga-add-vbe_enabled-helper.patch [bz#1331407]
- kvm-vga-factor-out-vga-register-setup.patch [bz#1331407]
- kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331407]
- kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch [bz#1331407]
- Resolves: bz#1331407
(EMBARGOED CVE-2016-3710 qemu-kvm: qemu: incorrect banked access bounds checking in vga module [rhel-6.8.z])
|
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686
[494 KiB] |
Changelog
by Jeff E. Nelson (2016-01-25):
- kvm-fw_cfg-add-check-to-validate-current-entry-value-CVE.patch [bz#1298045]
- Resolves: bz#1298045
(CVE-2016-1714 qemu-kvm: Qemu: nvram: OOB r/w access in processing firmware configurations [rhel-6.7.z])
|
qemu-guest-agent-0.12.1.2-2.479.el6_7.3.i686
[493 KiB] |
Changelog
by Jeff E. Nelson (2015-12-16):
- kvm-net-pcnet-add-check-to-validate-receive-data-size-CV.patch [bz#1287950]
- kvm-pcnet-fix-rx-buffer-overflow-CVE-2015-7512.patch [bz#1287950]
- Resolves: bz#1287950
(CVE-2015-7504 CVE-2015-7512 qemu-kvm: various flaws [rhel-6.7.z])
|
qemu-guest-agent-0.12.1.2-2.479.el6_7.2.i686
[493 KiB] |
Changelog
by Jeff E. Nelson (2015-09-28):
- kvm-net-add-checks-to-validate-ring-buffer-pointers-CVE-.patch [bz#1263274]
- Resolves: bz#1263274
(CVE-2015-5279 qemu-kvm: qemu: Heap overflow vulnerability in ne2000_receive() function [rhel-6.7.z])
|
qemu-guest-agent-0.12.1.2-2.479.el6_7.1.i686
[493 KiB] |
Changelog
by Jeff E. Nelson (2015-08-06):
- kvm-rtl8139-avoid-nested-ifs-in-IP-header-parsing-CVE-20.patch [bz#1248761]
- kvm-rtl8139-drop-tautologous-if-ip-.-statement-CVE-2015-.patch [bz#1248761]
- kvm-rtl8139-skip-offload-on-short-Ethernet-IP-header-CVE.patch [bz#1248761]
- kvm-rtl8139-check-IP-Header-Length-field-CVE-2015-5165.patch [bz#1248761]
- kvm-rtl8139-check-IP-Total-Length-field-CVE-2015-5165.patch [bz#1248761]
- kvm-rtl8139-skip-offload-on-short-TCP-header-CVE-2015-51.patch [bz#1248761]
- kvm-rtl8139-check-TCP-Data-Offset-field-CVE-2015-5165.patch [bz#1248761]
- Resolves: bz#1248761
(CVE-2015-5165 qemu-kvm: Qemu: rtl8139 uninitialized heap memory information leakage to guest [rhel-6.7.z])
|