system environment/kernel

kmod-kvm-debug - kvm kernel module(s)

Website: http://kvm.sf.net
License: GPLv2
Vendor: Scientific Linux
Description:
This package provides the kvm kernel modules built for the Linux
kernel 2.6.18-419.el5debug for the x86_64 family of processors.

Packages

kmod-kvm-debug-83-277.el5_11.x86_64 [1.4 MiB] Changelog by Miroslav Rezanina (2017-02-24):
- kvm-Fix-hardware-accelerated-video-to-video-copy-on-Cirr.patch [bz#1421564]
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1421564]
- kvm-cirrus-fix-blit-region-check.patch [bz#1421564]
- kvm-cirrus-don-t-overflow-CirrusVGAState-cirrus_bltbuf.patch [bz#1421564]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1421564]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1421564]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1421564]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1421564]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1421564]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1421564]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1421564]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1421564]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1421564]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1421564]
- Resolves: bz#1421564
  (CVE-2017-2615 kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-5.11.z])
kmod-kvm-debug-83-276.el5_11.x86_64 [1.4 MiB] Changelog by Miroslav Rezanina (2016-08-01):
- kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359723]
- Resolves: bz#1359723
  CVE-2016-5403 kvm: Qemu: virtio: unbounded memory allocation on host via guest leading to DoS [rhel-5.11.z]
kmod-kvm-debug-83-274.el5_11.x86_64 [1.4 MiB] Changelog by Jeff E. Nelson (2015-09-28):
- net-add-checks-to-validate-ring-buffer-pointers.patch [bz#1263272]
- Resolves: bz#1263272
  (CVE-2015-5279 kvm: qemu: Heap overflow vulnerability in ne2000_receive() function [rhel-5.11.z])
kmod-kvm-debug-83-273.el5_11.x86_64 [1.4 MiB] Changelog by Miroslav Rezanina (2015-06-03):
- kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896]
- kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896]
- kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896]
- Resolves: bz#1225896 
  (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z)
kmod-kvm-debug-83-272.el5_11.x86_64 [1.4 MiB] Changelog by Miroslav Rezanina (2015-05-09):
- kvm-fdc-force-the-fifo-access-to-be-in-bounds-of-the-all.patch [bz#1219266]
- Resolves: bz#1219266
  (kvm: qemu: floppy disk controller flaw [rhel-5.11.z])
kmod-kvm-debug-83-270.el5_11.x86_64 [1.4 MiB] Changelog by Jeff E. Nelson (2015-03-24):
- KVM: x86: Check non canonical addresses upon WRMSR
- Resolves: bz#1152982
 (CVE-2014-3610 kernel: kvm: noncanonical MSR writes [rhel-5.11.z])
kmod-kvm-debug-83-266.el5_10.1.x86_64 [1.4 MiB] Changelog by Miroslav Rezanina (2014-02-06):
- KVM: x86: prevent cross page vapic_addr access (CVE-2013-6368) [bz#1032219]
- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) [bz#1032216]
- Resolves: bz#1032219
  (CVE-2013-6368 kvm: cross page vapic_addr access [rhel-5.10])
- Resolves: bz#1032216
  CVE-2013-6367 kvm: division by zero in apic_get_tmcct() [rhel-5.10.z]
kmod-kvm-debug-83-262.el5_9.3.x86_64 [1.4 MiB] Changelog by Michal Novotny (2013-04-02):
- kvm-kernel-kvm-accept-unaligned-MSR_KVM_SYSTEM_TIME-writes.patch [bz#947363]
- Resolves: bz#947363
  (RHEL.5.8.32 guest hang when installing)
kmod-kvm-debug-83-262.el5_9.1.x86_64 [1.4 MiB] Changelog by Michal Novotny (2013-02-27):
- kvm-e1000-Discard-packets-that-are-too-long-if-SBP-and-L.patch [bz#910839]
- kvm-e1000-Discard-oversized-packets-based-on-SBP-LPE.patch [bz#910839]
- Resolves: bz#910839
  (CVE-2012-6075  qemu (e1000 device driver): Buffer overflow when processing large packets when SBP and LPE flags are disabled [rhel-5.9.z])
kmod-kvm-debug-83-249.el5_8.5.x86_64 [1.3 MiB] Changelog by Michal Novotny (2012-09-03):
- kvm-console-bounds-check-whenever-changing-the-cursor-du-58.patch [bz#851255]
- CVE: CVE-2012-3515
- Resolves: bz#851255
  (EMBARGOED CVE-2012-3515 qemu/kvm: VT100 emulation vulnerability [rhel-5.8.z])
kmod-kvm-debug-83-249.el5_8.4.x86_64 [1.3 MiB] Changelog by Michal Novotny (2012-05-09):
- kvm-kernel-KVM-unmap-pages-from-the-iommu-when-slots-are-remove.patch [bz#814151]
- CVE: CVE-2012-2121
- Resolves: bz#814151
  (CVE-2012-2121 kvm: device assignment page leak [rhel-5.8])
kmod-kvm-debug-83-249.el5.x86_64 [1.3 MiB] Changelog by Michal Novotny (2012-01-16):
- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770101]
- CVE: CVE-2011-4622
- Resolves: bz#770101
  (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.8])
kmod-kvm-debug-83-239.el5_7.1.x86_64 [1.3 MiB] Changelog by Eduardo Habkost (2012-01-16):
- kvm-e1000-prevent-buffer-overflow-when-processing-legacy.patch [bz#772079]
- Resolves: bz#772079
  (EMBARGOED CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [rhel-5.7.z])
- kvm-Fix-external-module-compat.c-not-to-use-unsupported-.patch [bz#753860]
  (build fix)
- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770100]
- Resolves: bz#770100
  (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.7.z])
kmod-kvm-debug-83-224.el5.x86_64 [1.3 MiB] Changelog by Eduardo Habkost (2010-12-23):
- kvm-kernel-KVM-x86-zero-kvm_vcpu_events-interrupt.pad.patch [bz#665407]
- Resolves: bz#665407
  (kvm_vcpu_events.interrupt.pad must be zeroed)
- CVE: CVE-2010-4525

Listing created by Repoview-0.6.6-1.el6