Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2019-03-15 |
[15:3.1.0-1.el7]
- vfio-pci: emit FAILOVER_PRIMARY_CHANGED event on guest behalf when unrealized
- vfio-pci: emit FAILOVER_PRIMARY_CHANGED event on guest behalf when unrealized (Si-Wei Liu) [Orabug: 29216696]
- vfio-pci: add FAILOVER_PRIMARY_CHANGED event to shorten downtime during failover (Si-Wei Liu) [Orabug: 29216701]
- virtio_net: Add support for 'Data Path Switching' during Live Migration. (Venu Busireddy) [Orabug: 29216704]
- virtio_net: Introduce VIRTIO_NET_F_STANDBY feature bit to virtio_net (Sridhar Samudrala) [Orabug: 29216714]
- i386: Add some MSR based features on Cascadelake-Server CPU model (Tao Xu) [Orabug: 29216681]
- i386: Update stepping of Cascadelake-Server (Tao Xu) [Orabug: 29216681]
- usb-mtp: use O_NOFOLLOW and O_CLOEXEC. (Gerd Hoffmann) [Orabug: 29216656] {CVE-2018-16872}
- pvrdma: add uar_read routine (Prasad J Pandit) [Orabug: 29216658] {CVE-2018-20191}
- pvrdma: release ring object in case of an error (Prasad J Pandit) [Orabug: 29216659] {CVE-2018-20126}
- pvrdma: check number of pages when creating rings (Prasad J Pandit) [Orabug: 29216666] {CVE-2018-20125}
- pvrdma: check return value from pvrdma_idx_ring_has_ routines (Prasad J Pandit) [Orabug: 29216672] {CVE-2018-20216}
- rdma: remove unused VENDOR_ERR_NO_SGE macro (Prasad J Pandit) [Orabug: 29216678] {CVE-2018-20124}
- rdma: check num_sge does not exceed MAX_SGE (Prasad J Pandit) [Orabug: 29216678] {CVE-2018-20124}
- i386: Add 'stibp' flag name (Eduardo Habkost)
- parfait: Run static analysis when --with parfait specified (Liam Merwick) [Orabug: 29216688]
- parfait: add buildrpm/parfait-qemu.conf (Liam Merwick) [Orabug: 29216688]
- Document various CVEs as fixed (Mark Kanda) [Orabug: 29212424] {CVE-2017-10806} {CVE-2017-11334} {CVE-2017-12809} {CVE-2017-13672} {CVE-2017-13673} {CVE-2017-13711} {CVE-2017-14167} {CVE-2017-15038} {CVE-2017-15119} {CVE-2017-15124} {CVE-2017-15268} {CVE-2017-15289} {CVE-2017-16845} {CVE-2017-17381} {CVE-2017-18030} {CVE-2017-18043} {CVE-2017-2630} {CVE-2017-2633} {CVE-2017-5715} {CVE-2017-5753} {CVE-2017-5754} {CVE-2017-7471} {CVE-2017-7493} {CVE-2017-8112} {CVE-2017-8309} {CVE-2017-8379} {CVE-2017-8380} {CVE-2017-9503} {CVE-2018-10839} {CVE-2018-11806} {CVE-2018-12617} {CVE-2018-15746} {CVE-2018-16847} {CVE-2018-16867} {CVE-2018-17958} {CVE-2018-17962} {CVE-2018-17963} {CVE-2018-18849} {CVE-2018-19364} {CVE-2018-19489} {CVE-2018-3639} {CVE-2018-5683} {CVE-2018-7550} {CVE-2018-7858}
- qemu.spec: Initial qemu.spec (Mark Kanda)
- virtio-pci: Set subsystem vendor ID to Oracle (Mark Kanda)
- qemu_regdump.py: Initial qemu_regdump.py (Mark Kanda)
- qmp-regdump: Initial qmp-regdump (Mark Kanda)
- bridge.conf: Initial bridge.conf (Mark Kanda)
- kvm.conf: Initial kvm.conf (Mark Kanda)
- 80-kvm.rules: Initial 80-kvm.rules (Mark Kanda)
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 7 (aarch64) | qemu-3.1.0-1.el7.src.rpm | 1ecf89057271f1f8f8782aeb23b11ab5 | ELBA-2021-9161 |
ivshmem-tools-3.1.0-1.el7.aarch64.rpm | 3c8c8db00130e54e428153dd0357056b | ELBA-2021-9161 | |
qemu-3.1.0-1.el7.aarch64.rpm | ee54cb2a8181c5cc74cc88e984187a97 | ELBA-2021-9161 | |
qemu-block-gluster-3.1.0-1.el7.aarch64.rpm | 89d8aa119331171731d9173a3de9c604 | ELBA-2021-9161 | |
qemu-block-iscsi-3.1.0-1.el7.aarch64.rpm | cf511a30c531c70d085abc643aef3707 | ELBA-2021-9161 | |
qemu-block-rbd-3.1.0-1.el7.aarch64.rpm | b54b0dc21671f19a249cb15b4c4cf932 | ELBA-2021-9161 | |
qemu-common-3.1.0-1.el7.aarch64.rpm | c852793e094cb8c9ea7332bb2a99a764 | ELBA-2021-9161 | |
qemu-img-3.1.0-1.el7.aarch64.rpm | f27c81563a5f6c162b6e5d008777b516 | ELBA-2021-9161 | |
qemu-kvm-3.1.0-1.el7.aarch64.rpm | f2776e59e8c3e3021eb5001b09614cd1 | ELBA-2021-9161 | |
qemu-kvm-core-3.1.0-1.el7.aarch64.rpm | fdb326a94b1af41c6f33078650e6a65d | ELBA-2021-9161 | |
qemu-system-aarch64-3.1.0-1.el7.aarch64.rpm | 2a693a24013462274658de2913a4bf95 | ELBA-2021-9161 | |
qemu-system-aarch64-core-3.1.0-1.el7.aarch64.rpm | e46da3f700caad0321925b36af76e578 | ELBA-2021-9161 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team