Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2024-11-14 |
[9.0.0-10]
- kvm-nbd-server-CVE-2024-7409-Avoid-use-after-free-when-c.patch [RHEL-52617]
- Resolves: RHEL-52617
(CVE-2024-7409 qemu-kvm: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure [rhel-9.5])
[9.0.0-9]
- kvm-qemu-guest-agent-Update-the-logfile-path-of-qga-fsfr.patch [RHEL-52250]
- Resolves: RHEL-52250
(fsfreeze hooks break on the systems first restorecon)
[9.0.0-8]
- kvm-introduce-pc_rhel_9_5_compat.patch [RHEL-39544]
- kvm-target-i386-add-guest-phys-bits-cpu-property.patch [RHEL-39544]
- kvm-kvm-add-support-for-guest-physical-bits.patch [RHEL-39544]
- kvm-i386-kvm-Move-architectural-CPUID-leaf-generation-to.patch [RHEL-39544]
- kvm-target-i386-Introduce-Icelake-Server-v7-to-enable-TS.patch [RHEL-39544]
- kvm-target-i386-Add-new-CPU-model-SierraForest.patch [RHEL-39544]
- kvm-target-i386-Export-RFDS-bit-to-guests.patch [RHEL-39544]
- kvm-pci-host-q35-Move-PAM-initialization-above-SMRAM-ini.patch [RHEL-39544]
- kvm-q35-Introduce-smm_ranges-property-for-q35-pci-host.patch [RHEL-39544]
- kvm-hw-i386-acpi-Set-PCAT_COMPAT-bit-only-when-pic-is-no.patch [RHEL-39544]
- kvm-confidential-guest-support-Add-kvm_init-and-kvm_rese.patch [RHEL-39544]
- kvm-i386-sev-Switch-to-use-confidential_guest_kvm_init.patch [RHEL-39544]
- kvm-ppc-pef-switch-to-use-confidential_guest_kvm_init-re.patch [RHEL-39544]
- kvm-s390-Switch-to-use-confidential_guest_kvm_init.patch [RHEL-39544]
- kvm-scripts-update-linux-headers-Add-setup_data.h-to-imp.patch [RHEL-39544]
- kvm-scripts-update-linux-headers-Add-bits.h-to-file-impo.patch [RHEL-39544]
- kvm-linux-headers-update-to-current-kvm-next.patch [RHEL-39544]
- kvm-runstate-skip-initial-CPU-reset-if-reset-is-not-actu.patch [RHEL-39544]
- kvm-KVM-track-whether-guest-state-is-encrypted.patch [RHEL-39544]
- kvm-KVM-remove-kvm_arch_cpu_check_are_resettable.patch [RHEL-39544]
- kvm-target-i386-introduce-x86-confidential-guest.patch [RHEL-39544]
- kvm-target-i386-Implement-mc-kvm_type-to-get-VM-type.patch [RHEL-39544]
- kvm-target-i386-SEV-use-KVM_SEV_INIT2-if-possible.patch [RHEL-39544]
- kvm-i386-sev-Add-legacy-vm-type-parameter-for-SEV-guest-.patch [RHEL-39544]
- kvm-hw-i386-sev-Use-legacy-SEV-VM-types-for-older-machin.patch [RHEL-39544]
- kvm-trace-kvm-Split-address-space-and-slot-id-in-trace_k.patch [RHEL-39544]
- kvm-kvm-Introduce-support-for-memory_attributes.patch [RHEL-39544]
- kvm-RAMBlock-Add-support-of-KVM-private-guest-memfd.patch [RHEL-39544]
- kvm-kvm-Enable-KVM_SET_USER_MEMORY_REGION2-for-memslot.patch [RHEL-39544]
- kvm-kvm-memory-Make-memory-type-private-by-default-if-it.patch [RHEL-39544]
- kvm-HostMem-Add-mechanism-to-opt-in-kvm-guest-memfd-via-.patch [RHEL-39544]
- kvm-RAMBlock-make-guest_memfd-require-uncoordinated-disc.patch [RHEL-39544]
- kvm-physmem-Introduce-ram_block_discard_guest_memfd_rang.patch [RHEL-39544]
- kvm-kvm-handle-KVM_EXIT_MEMORY_FAULT.patch [RHEL-39544]
- kvm-kvm-tdx-Don-t-complain-when-converting-vMMIO-region-.patch [RHEL-39544]
- kvm-kvm-tdx-Ignore-memory-conversion-to-shared-of-unassi.patch [RHEL-39544]
- kvm-hw-i386-x86-Eliminate-two-if-statements-in-x86_bios_.patch [RHEL-39544]
- kvm-hw-i386-Have-x86_bios_rom_init-take-X86MachineState-.patch [RHEL-39544]
- kvm-hw-i386-pc_sysfw-Remove-unused-parameter-from-pc_isa.patch [RHEL-39544]
- kvm-hw-i386-x86-Don-t-leak-isa-bios-memory-regions.patch [RHEL-39544]
- kvm-hw-i386-x86-Don-t-leak-pc.bios-memory-region.patch [RHEL-39544]
- kvm-hw-i386-x86-Extract-x86_isa_bios_init-from-x86_bios_.patch [RHEL-39544]
- kvm-hw-i386-pc_sysfw-Alias-rather-than-copy-isa-bios-reg.patch [RHEL-39544]
- kvm-i386-correctly-select-code-in-hw-i386-that-depends-o.patch [RHEL-39544]
- kvm-i386-pc-remove-unnecessary-MachineClass-overrides.patch [RHEL-39544]
- kvm-hw-i386-split-x86.c-in-multiple-parts.patch [RHEL-39544]
- kvm-scripts-update-linux-header.sh-be-more-src-tree-frie.patch [RHEL-39544]
- kvm-scripts-update-linux-headers.sh-Remove-temporary-dir.patch [RHEL-39544]
- kvm-scripts-update-linux-headers.sh-Fix-the-path-of-setu.patch [RHEL-39544]
- kvm-update-linux-headers-fix-forwarding-to-asm-generic-h.patch [RHEL-39544]
- kvm-update-linux-headers-move-pvpanic.h-to-correct-direc.patch [RHEL-39544]
- kvm-linux-headers-Update-to-current-kvm-next.patch [RHEL-39544]
- kvm-update-linux-headers-import-linux-kvm_para.h-header.patch [RHEL-39544]
- kvm-machine-allow-early-use-of-machine_require_guest_mem.patch [RHEL-39544]
- kvm-i386-sev-Replace-error_report-with-error_setg.patch [RHEL-39544]
- kvm-i386-sev-Introduce-sev-common-type-to-encapsulate-co.patch [RHEL-39544]
- kvm-i386-sev-Move-sev_launch_update-to-separate-class-me.patch [RHEL-39544]
- kvm-i386-sev-Move-sev_launch_finish-to-separate-class-me.patch [RHEL-39544]
- kvm-i386-sev-Introduce-sev-snp-guest-object.patch [RHEL-39544]
- kvm-i386-sev-Add-a-sev_snp_enabled-helper.patch [RHEL-39544]
- kvm-i386-sev-Add-sev_kvm_init-override-for-SEV-class.patch [RHEL-39544]
- kvm-i386-sev-Add-snp_kvm_init-override-for-SNP-class.patch [RHEL-39544]
- kvm-i386-cpu-Set-SEV-SNP-CPUID-bit-when-SNP-enabled.patch [RHEL-39544]
- kvm-i386-sev-Don-t-return-launch-measurements-for-SEV-SN.patch [RHEL-39544]
- kvm-i386-sev-Add-a-class-method-to-determine-KVM-VM-type.patch [RHEL-39544]
- kvm-i386-sev-Update-query-sev-QAPI-format-to-handle-SEV-.patch [RHEL-39544]
- kvm-i386-sev-Add-the-SNP-launch-start-context.patch [RHEL-39544]
- kvm-i386-sev-Add-handling-to-encrypt-finalize-guest-laun.patch [RHEL-39544]
- kvm-i386-sev-Set-CPU-state-to-protected-once-SNP-guest-p.patch [RHEL-39544]
- kvm-hw-i386-sev-Add-function-to-get-SEV-metadata-from-OV.patch [RHEL-39544]
- kvm-i386-sev-Add-support-for-populating-OVMF-metadata-pa.patch [RHEL-39544]
- kvm-i386-sev-Add-support-for-SNP-CPUID-validation.patch [RHEL-39544]
- kvm-hw-i386-sev-Add-support-to-encrypt-BIOS-when-SEV-SNP.patch [RHEL-39544]
- kvm-i386-sev-Invoke-launch_updata_data-for-SEV-class.patch [RHEL-39544]
- kvm-i386-sev-Invoke-launch_updata_data-for-SNP-class.patch [RHEL-39544]
- kvm-i386-kvm-Add-KVM_EXIT_HYPERCALL-handling-for-KVM_HC_.patch [RHEL-39544]
- kvm-i386-sev-Enable-KVM_HC_MAP_GPA_RANGE-hcall-for-SNP-g.patch [RHEL-39544]
- kvm-i386-sev-Extract-build_kernel_loader_hashes.patch [RHEL-39544]
- kvm-i386-sev-Reorder-struct-declarations.patch [RHEL-39544]
- kvm-i386-sev-Allow-measured-direct-kernel-boot-on-SNP.patch [RHEL-39544]
- kvm-memory-Introduce-memory_region_init_ram_guest_memfd.patch [RHEL-39544]
- kvm-hw-i386-sev-Use-guest_memfd-for-legacy-ROMs.patch [RHEL-39544]
- kvm-hw-i386-Add-support-for-loading-BIOS-using-guest_mem.patch [RHEL-39544]
- kvm-i386-sev-fix-unreachable-code-coverity-issue.patch [RHEL-39544]
- kvm-i386-sev-Move-SEV_COMMON-null-check-before-dereferen.patch [RHEL-39544]
- kvm-i386-sev-Return-when-sev_common-is-null.patch [RHEL-39544]
- kvm-target-i386-SEV-fix-formatting-of-CPUID-mismatch-mes.patch [RHEL-39544]
- kvm-i386-sev-Fix-error-message-in-sev_get_capabilities.patch [RHEL-39544]
- kvm-i386-sev-Fallback-to-the-default-SEV-device-if-none-.patch [RHEL-39544]
- kvm-i386-sev-Don-t-allow-automatic-fallback-to-legacy-KV.patch [RHEL-39544]
- kvm-target-i386-SEV-fix-mismatch-in-vcek-disabled-proper.patch [RHEL-39544]
- kvm-virtio-rng-block-max-bytes-0.patch [RHEL-50336]
- kvm-scsi-disk-Use-positive-return-value-for-status-in-dm.patch [RHEL-50000]
- kvm-scsi-block-Don-t-skip-callback-for-sgio-error-status.patch [RHEL-50000]
- kvm-scsi-disk-Add-warning-comments-that-host_status-erro.patch [RHEL-50000]
- kvm-scsi-disk-Always-report-RESERVATION_CONFLICT-to-gues.patch [RHEL-50000]
- kvm-nbd-server-Plumb-in-new-args-to-nbd_client_add.patch [RHEL-52617]
- kvm-nbd-server-CVE-2024-7409-Cap-default-max-connections.patch [RHEL-52617]
- kvm-nbd-server-CVE-2024-7409-Drop-non-negotiating-client.patch [RHEL-52617]
- kvm-nbd-server-CVE-2024-7409-Close-stray-clients-at-serv.patch [RHEL-52617]
- Resolves: RHEL-39544
([QEMU] Add support for AMD SEV-SNP to Qemu)
- Resolves: RHEL-50336
(Fail to boot up the guest including vtpm and virtio-rng (max-bytes=0) devices)
- Resolves: RHEL-50000
(scsi-block: Cannot setup Windows Failover Cluster, qemu crashes on assert)
- Resolves: RHEL-52617
(CVE-2024-7409 qemu-kvm: Denial of Service via Improper Synchronization in QEMU NBD Server During Socket Closure [rhel-9.5])
[9.0.0-7]
- kvm-hw-virtio-Fix-the-de-initialization-of-vhost-user-de.patch [RHEL-40708]
- kvm-hw-arm-virt-Avoid-unexpected-warning-from-Linux-gues.patch [RHEL-39936]
- Resolves: RHEL-40708
([RHEL9.5.0][virtio_fs][s390x] after hot-unplug the vhost-user-fs-ccw device, the device is failed to hot-plug again )
- Resolves: RHEL-39936
(ARCH_DMA_MINALIGN smaller than CTR_EL0.CWG (128 < 256) on FUJITSU)
[9.0.0-6]
- kvm-qcow2-Don-t-open-data_file-with-BDRV_O_NO_IO.patch [RHEL-35611]
- kvm-iotests-244-Don-t-store-data-file-with-protocol-in-i.patch [RHEL-35611]
- kvm-iotests-270-Don-t-store-data-file-with-json-prefix-i.patch [RHEL-35611]
- kvm-block-Parse-filenames-only-when-explicitly-requested.patch [RHEL-35611]
- Resolves: RHEL-35611
(CVE-2024-4467 qemu-kvm: QEMU: 'qemu-img info' leads to host file read/write [rhel-9.5])
[9.0.0-5]
- kvm-linux-aio-add-IO_CMD_FDSYNC-command-support.patch [RHEL-42411]
- kvm-Revert-monitor-use-aio_co_reschedule_self.patch [RHEL-34618 RHEL-38697]
- kvm-aio-warn-about-iohandler_ctx-special-casing.patch [RHEL-34618 RHEL-38697]
- kvm-block-crypto-create-ciphers-on-demand.patch [RHEL-36159]
- kvm-crypto-block-drop-qcrypto_block_open-n_threads-argum.patch [RHEL-36159]
- Resolves: RHEL-42411
(qemu-kvm: linux-aio: add support for IO_CMD_FDSYNC command)
- Resolves: RHEL-34618
(aio=io_uring: Assertion failure luringcb->co->ctx == s->aio_context' with block_resize)
- Resolves: RHEL-38697
(aio=native: Assertion failure laiocb->co->ctx == laiocb->ctx->aio_context' with block_resize)
- Resolves: RHEL-36159
(qemu crash on Assertion block->n_free_ciphers > 0' failed in guest installation with luks and iothread-vq-mapping)
[9.0.0-4]
- kvm-qio-Inherit-follow_coroutine_ctx-across-TLS.patch [RHEL-33440]
- kvm-iotests-test-NBD-TLS-iothread.patch [RHEL-33440]
- kvm-virtio-gpu-fix-v2-migration.patch [RHEL-34621]
- kvm-rhel-9.4.0-machine-type-compat-for-virtio-gpu-migrat.patch [RHEL-34621]
- Resolves: RHEL-33440
(Qemu hang when quit dst vm after storage migration(nbd+tls))
- Resolves: RHEL-34621
([RHEL9.5.0][stable_guest_abi]Failed to migrate VM with (qemu) qemu-kvm: Missing section footer for 0000:00:01.0/virtio-gpu qemu-kvm: load of migration failed: Invalid argument)
[9.0.0-3]
- kvm-nbd-server-do-not-poll-within-a-coroutine-context.patch [RHEL-33440]
- kvm-nbd-server-Mark-negotiation-functions-as-coroutine_f.patch [RHEL-33440]
- Resolves: RHEL-33440
(Qemu hang when quit dst vm after storage migration(nbd+tls))
[9.0.0-2]
- kvm-hw-arm-virt-Fix-spurious-call-to-arm_virt_compat_set.patch [RHEL-34945]
- kvm-Revert-x86-rhel-9.4.0-machine-type-compat-fix.patch [RHEL-30362]
- Resolves: RHEL-34945
([aarch64, kvm-unit-tests] all tests tagged as FAIL [qemu-kvm: GLib: g_ptr_array_add: assertion 'rarray' failed] )
- Resolves: RHEL-30362
(Check/fix machine type compatibility for QEMU 9.0.0 [x86_64][rhel-9.5.0])
[9.0.0-1]
- Rebase to QEMU 9.0.0 [RHEL-28073]
- Resolves: RHEL-28073
(Rebase qemu-kvm to QEMU 9.0.0 for RHEL 9.5)
CVE-2024-26327 |
CVE-2024-7409 |
CVE-2024-3446 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory | Channel Label |
Oracle Linux 9 (aarch64) | qemu-kvm-9.0.0-10.el9_5.src.rpm | 936dc9fda486776cb4f056bd542e5bd7 | - | ol9_aarch64_appstream |
qemu-guest-agent-9.0.0-10.el9_5.aarch64.rpm | 1a66d9481b56e72ab69751bf2423c307 | - | ol9_aarch64_appstream | |
qemu-img-9.0.0-10.el9_5.aarch64.rpm | a9b677636cfe7c0a44df4bff427e55d8 | - | ol9_aarch64_appstream | |
qemu-kvm-9.0.0-10.el9_5.aarch64.rpm | 15eb40bc7b2072bf250dcb1d0bf3f6fa | - | ol9_aarch64_appstream | |
qemu-kvm-audio-pa-9.0.0-10.el9_5.aarch64.rpm | 4d94385d3941801cd51b003276a5c052 | - | ol9_aarch64_appstream | |
qemu-kvm-block-blkio-9.0.0-10.el9_5.aarch64.rpm | 1d8ecabf13c86316fc0901e9d1b659c5 | - | ol9_aarch64_appstream | |
qemu-kvm-block-curl-9.0.0-10.el9_5.aarch64.rpm | 78b0818c155c717e276197cc9c6fd226 | - | ol9_aarch64_appstream | |
qemu-kvm-block-rbd-9.0.0-10.el9_5.aarch64.rpm | ca18e61c4b924a8be7e9eef937e047a3 | - | ol9_aarch64_appstream | |
qemu-kvm-common-9.0.0-10.el9_5.aarch64.rpm | ae5634453a4beaca8b38573741344d42 | - | ol9_aarch64_appstream | |
qemu-kvm-core-9.0.0-10.el9_5.aarch64.rpm | 0f032cc0a033ef580d0f5ce0af4d74f1 | - | ol9_aarch64_appstream | |
qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.aarch64.rpm | 6acd7bc39fd197a691ee55421d9eede5 | - | ol9_aarch64_appstream | |
qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.aarch64.rpm | 3e656da363ecb0ad4b303849a10ad56a | - | ol9_aarch64_appstream | |
qemu-kvm-device-usb-host-9.0.0-10.el9_5.aarch64.rpm | 12f5f539bd31a9590cf3efbf4bd642fc | - | ol9_aarch64_appstream | |
qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.aarch64.rpm | 6862099c0cb7dc3c9089120c83cb8c2d | - | ol9_aarch64_appstream | |
qemu-kvm-docs-9.0.0-10.el9_5.aarch64.rpm | 2cc8f11f6d66bc58be31439b5bdc2669 | - | ol9_aarch64_appstream | |
qemu-kvm-tools-9.0.0-10.el9_5.aarch64.rpm | f9ec9a19caf6ebf9eb1eb82f5d0f1744 | - | ol9_aarch64_appstream | |
qemu-pr-helper-9.0.0-10.el9_5.aarch64.rpm | f5fb5941513e7c1cb136ca8d2dc5b1fb | - | ol9_aarch64_appstream | |
Oracle Linux 9 (x86_64) | qemu-kvm-9.0.0-10.el9_5.src.rpm | 936dc9fda486776cb4f056bd542e5bd7 | - | ol9_x86_64_appstream |
qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpm | 0cead4ab8290f4699be57b6bf83b41a4 | - | ol9_x86_64_appstream | |
qemu-img-9.0.0-10.el9_5.x86_64.rpm | b4478c0d0a8e8d62f34de6aa1c861a71 | - | ol9_x86_64_appstream | |
qemu-kvm-9.0.0-10.el9_5.x86_64.rpm | 570c554f63062161d393b10af3a8adda | - | ol9_x86_64_appstream | |
qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpm | 7c66ec1003da5e9def40f8d6395ca1c8 | - | ol9_x86_64_appstream | |
qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm | f9bafc305ece94198391a0a51fddd4a0 | - | ol9_x86_64_appstream | |
qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm | ca66db99c3cfc7e1994f5423761205a1 | - | ol9_x86_64_appstream | |
qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpm | 669568b2c8ef2abd138edd5af82ae7aa | - | ol9_x86_64_appstream | |
qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpm | 5ed6002193f547abb80b74055d99c76b | - | ol9_x86_64_appstream | |
qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpm | d83ebab7e2896938aa485320a2611255 | - | ol9_x86_64_appstream | |
qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpm | af2ea0c0ea062508ad8e88b41a54bc87 | - | ol9_x86_64_appstream | |
qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm | d00e45e10d989a4183d53fb022d605b3 | - | ol9_x86_64_appstream | |
qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpm | e6386a1437c3b2dfb96f81e5bcbcd03d | - | ol9_x86_64_appstream | |
qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm | f0d1296c105bf5eccba374130f1b9824 | - | ol9_x86_64_appstream | |
qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpm | 2a54ce213b68c311f833f172ffe98281 | - | ol9_x86_64_appstream | |
qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpm | 7e73ea752b06447e7ca1218ef571eaff | - | ol9_x86_64_appstream | |
qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm | f3814d76a0be6fccb898296782c2e4ac | - | ol9_x86_64_appstream | |
qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm | 5caedd792f91033c68018c569e87d5f2 | - | ol9_x86_64_appstream | |
qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpm | 6742c05eff0afc8e9f4c31db4985ee08 | - | ol9_x86_64_appstream | |
qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm | 329b872cfb4c2844cb526f4f87a373fa | - | ol9_x86_64_appstream |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: