[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ELSA-2021-9285 -- Oracle qemu

ID: oval:org.secpod.oval:def:1504947Date: (C)2021-06-08   (M)2024-04-17
Class: PATCHFamily: unix




[15:4.2.1-9.el7] - Revert oslib-posix: refactor memory prealloc threads [Orabug: 32903662] - Revert oslib-posix: initialize backend memory objects in parallel [Orabug: 32903662] [15:4.2.1-8.el7] - i386/pc: let iterator handle regions below 4G [15:4.2.1-7.el7] - arm/virt: Add memory hot remove support [Orabug: 32643506] - i386/pc: consolidate usable iova iteration - i386/acpi: fix SRAT ranges in accordance to usable IOVA - migration: increase listening socket backlog [Orabug: 32792545] - multifd: Make multifd_save_setup get an Error parameter - multifd: Make multifd_load_setup get an Error parameter - migration: fix maybe-uninitialized warning - migration: Fix the re-run check of the migrate-incoming command - multifd: Initialize local variable - multifd: Be consistent about using uint64_t - Bug #1829242 correction. - migration/multifd: fix destroyed mutex access in terminating multifd threads - migration/multifd: fix nullptr access in terminating multifd threads - migration/multifd: not use multifd during postcopy - migration/multifd: clean pages after filling packet - migration: Make sure that we don"t call write in case of error - migration: fix multifd_send_pages next channel - migration/multifd: bypass uuid check for initial packet [Orabug: 32610480] - migration/tls: add error handling in multifd_tls_handshake_thread - migration/tls: fix inverted semantics in multifd_channel_connect - migration/multifd: do not access uninitialized multifd_recv_state [Orabug: 32795384] - io/channel-tls.c: make qio_channel_tls_shutdown thread-safe - qemu.spec: Enable qemu-guest-agent RPM for OL7 [Orabug: 32415543] - virtio-net: Set mac address to hardware if the peer is vdpa - net: Add vhost-vdpa in show_netdevs - vhost-vdpa: Add qemu_close in vhost_vdpa_cleanup - hw/virtio/vhost-vdpa: Fix Coverity CID 1432864 - vhost-vdpa: negotiate VIRTIO_NET_F_STATUS with driver - configure: Fix build dependencies with vhost-vdpa. - configure: simplify vhost condition with Kconfig - vhost-vdpa: add trace-events - dma/pl330: Fix qemu_hexdump usage in pl330.c - util/hexdump: introduce qemu_hexdump_line - util/hexdump: Reorder qemu_hexdump arguments - util/hexdump: Convert to take a void pointer argument - net/colo-compare.c: Only hexdump packets if tracing is enabled - vhost-vdpa: batch updating IOTLB mappings - vhost: switch to use IOTLB v2 format - vhost-vdpa: remove useless variable - virtio: vdpa: omit check return of g_malloc - vhost-vdpa: fix indentation in vdpa_ops - virtio-net: check the existence of peer before accessing vDPA config - virtio-pci: fix wrong index in virtio_pci_queue_enabled - virtio-pci: fix virtio_pci_queue_enabled - vhost-vdpa :Fix Coverity CID 1430270 / CID 1420267 - vhost-vdpa: fix the compile issue without kvm - vhost-vdpa: introduce vhost-vdpa net client - vhost-vdpa: introduce vhost-vdpa backend - linux headers: sync to 5.9-rc4 - Linux headers: update - virtio-net: fix rsc_ext compat handling - linux-headers: update against Linux 5.7-rc3 - virtiofsd: Pull in kernel"s fuse.h - linux-headers: Update - vhost_net: introduce set_config get_config - vhost: implement vhost_force_iommu method - vhost: introduce new VhostOps vhost_force_iommu - vhost: implement vhost_vq_get_addr method - vhost: introduce new VhostOps vhost_vq_get_addr - vhost: implement vhost_dev_start method - vhost: introduce new VhostOps vhost_dev_start - vhost: check the existence of vhost_set_iotlb_callback - virtio-pci: implement queue_enabled method - virtio-bus: introduce queue_enabled method - vhost_net: use the function qemu_get_peer - net: introduce qemu_get_peer - vhost: correctly turn on VIRTIO_F_IOMMU_PLATFORM - imx7-ccm: add digprog mmio write method [Orabug: 31576552] {CVE-2020-15469} - tz-ppc: add dummy read/write methods [Orabug: 31576552] {CVE-2020-15469} - spapr_pci: add spapr msi read method [Orabug: 31576552] {CVE-2020-15469} - nvram: add nrf51_soc flash read method [Orabug: 31576552] {CVE-2020-15469} - prep: add ppc-parity write method [Orabug: 31576552] {CVE-2020-15469} - vfio: add quirk device write method [Orabug: 31576552] {CVE-2020-15469} - pci-host: designware: add pcie-msi read method [Orabug: 31576552] {CVE-2020-15469} - hw/pci-host: add pci-intack write method [Orabug: 31576552] {CVE-2020-15469} - oslib-posix: initialize backend memory objects in parallel [Orabug: 32555402] - oslib-posix: refactor memory prealloc threads [Orabug: 32555402] - oslib-posix: take lock before qemu_cond_broadcast [Orabug: 32555402] - oslib-posix: initialize mutex and condition variable [Orabug: 32555402] - mem-prealloc: optimize large guest startup [Orabug: 32555402] - i386: Add the support for AMD EPYC 3rd generation processors - acpi: cpuhp: document CPHP_GET_CPU_ID_CMD command - acpi: cpuhp: add CPHP_GET_CPU_ID_CMD command - acpi: cpuhp: spec: add typical usecases - acpi: cpuhp: spec: clarify store into "Command data" when "Command field" == 0 - acpi: cpuhp: spec: fix "Command data" description - acpi: cpuhp: spec: clarify "CPU selector" register usage and endianness - acpi: cpuhp: introduce "Command data 2" field - x86: ich9: let firmware negotiate "CPU hot-unplug with SMI" feature - x86: ich9: factor out guest_cpu_hotplug_features - x86: acpi: let the firmware handle pending CPU remove events in SMM - x86: acpi: introduce AcpiPmInfo::smi_on_cpu_unplug - acpi: cpuhp: introduce "firmware performs eject" status/control bits - x68: acpi: trigger SMI before sending hotplug Notify event to OSPM - x86: acpi: introduce the PCI0.SMI0 ACPI device - x86: acpi: introduce AcpiPmInfo::smi_on_cpuhp - x86: ich9: expose smi_negotiated_features as a QOM property - tests: acpi: mark to be changed tables in bios-tables-test-allowed-diff - acpi: add aml_land and aml_break primitives - x86: cpuhp: refuse cpu hot-unplug request earlier if not supported - x86: cpuhp: prevent guest crash on CPU hotplug when broadcast SMI is in use - x86: lpc9: let firmware negotiate "CPU hotplug with SMI" features - q35: implement 128K SMRAM at default SMBASE address - hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register [Orabug: 32470471] {CVE-2021-20221} - memory: clamp cached translation in case it points to an MMIO region [Orabug: 32252673] {CVE-2020-27821} - hw/sd/sdhci: Fix DMA Transfer Block Size field [Orabug: 32613470] {CVE-2021-3409}

Platform:
Oracle Linux 7
Product:
qemu
Reference:
ELSA-2021-9285
CVE-2020-15469
CVE-2020-27821
CVE-2021-20221
CVE-2021-3409
CVE    4
CVE-2021-20221
CVE-2021-3409
CVE-2020-15469
CVE-2020-27821
...
CPE    2
cpe:/a:qemu:qemu
cpe:/o:oracle:linux:7

© SecPod Technologies