Jump to letter: [
ABCFGHJKLMNOPQRSTVWXY
]
kvm - Kernel-based Virtual Machine
- Description:
KVM (for Kernel-based Virtual Machine) is a full virtualization solution
for Linux on x86 hardware.
Using KVM, one can run multiple virtual machines running unmodified Linux
or Windows images. Each virtual machine has private virtualized hardware:
a network card, disk, graphics adapter, etc.
Packages
kvm-83-277.el5_11.x86_64
[941 KiB] |
Changelog
by Miroslav Rezanina (2017-02-24):
- kvm-Fix-hardware-accelerated-video-to-video-copy-on-Cirr.patch [bz#1421564]
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1421564]
- kvm-cirrus-fix-blit-region-check.patch [bz#1421564]
- kvm-cirrus-don-t-overflow-CirrusVGAState-cirrus_bltbuf.patch [bz#1421564]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1421564]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1421564]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1421564]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1421564]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1421564]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1421564]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1421564]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1421564]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1421564]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1421564]
- Resolves: bz#1421564
(CVE-2017-2615 kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-5.11.z])
|
kvm-83-276.el5_11.x86_64
[940 KiB] |
Changelog
by Miroslav Rezanina (2016-08-01):
- kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359723]
- Resolves: bz#1359723
CVE-2016-5403 kvm: Qemu: virtio: unbounded memory allocation on host via guest leading to DoS [rhel-5.11.z]
|
kvm-83-274.el5_11.x86_64
[939 KiB] |
Changelog
by Jeff E. Nelson (2015-09-28):
- net-add-checks-to-validate-ring-buffer-pointers.patch [bz#1263272]
- Resolves: bz#1263272
(CVE-2015-5279 kvm: qemu: Heap overflow vulnerability in ne2000_receive() function [rhel-5.11.z])
|
kvm-83-273.el5_11.x86_64
[939 KiB] |
Changelog
by Miroslav Rezanina (2015-06-03):
- kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896]
- kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896]
- kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896]
- Resolves: bz#1225896
(EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z)
|
kvm-83-272.el5_11.x86_64
[938 KiB] |
Changelog
by Miroslav Rezanina (2015-05-09):
- kvm-fdc-force-the-fifo-access-to-be-in-bounds-of-the-all.patch [bz#1219266]
- Resolves: bz#1219266
(kvm: qemu: floppy disk controller flaw [rhel-5.11.z])
|
kvm-83-270.el5_11.x86_64
[938 KiB] |
Changelog
by Jeff E. Nelson (2015-03-24):
- KVM: x86: Check non canonical addresses upon WRMSR
- Resolves: bz#1152982
(CVE-2014-3610 kernel: kvm: noncanonical MSR writes [rhel-5.11.z])
|
kvm-83-266.el5_10.1.x86_64
[938 KiB] |
Changelog
by Miroslav Rezanina (2014-02-06):
- KVM: x86: prevent cross page vapic_addr access (CVE-2013-6368) [bz#1032219]
- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) [bz#1032216]
- Resolves: bz#1032219
(CVE-2013-6368 kvm: cross page vapic_addr access [rhel-5.10])
- Resolves: bz#1032216
CVE-2013-6367 kvm: division by zero in apic_get_tmcct() [rhel-5.10.z]
|