development/tools

kvm - Kernel-based Virtual Machine

Website: http://kvm.sf.net
License: GPLv2
Vendor: Scientific Linux
Description:
KVM (for Kernel-based Virtual Machine) is a full virtualization solution
for Linux on x86 hardware.

Using KVM, one can run multiple virtual machines running unmodified Linux
or Windows images. Each virtual machine has private virtualized hardware:
a network card, disk, graphics adapter, etc.

Packages

kvm-83-277.el5_11.x86_64 [941 KiB] Changelog by Miroslav Rezanina (2017-02-24):
- kvm-Fix-hardware-accelerated-video-to-video-copy-on-Cirr.patch [bz#1421564]
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1421564]
- kvm-cirrus-fix-blit-region-check.patch [bz#1421564]
- kvm-cirrus-don-t-overflow-CirrusVGAState-cirrus_bltbuf.patch [bz#1421564]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1421564]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1421564]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1421564]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1421564]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1421564]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1421564]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1421564]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1421564]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1421564]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1421564]
- Resolves: bz#1421564
  (CVE-2017-2615 kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-5.11.z])
kvm-83-276.el5_11.x86_64 [940 KiB] Changelog by Miroslav Rezanina (2016-08-01):
- kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359723]
- Resolves: bz#1359723
  CVE-2016-5403 kvm: Qemu: virtio: unbounded memory allocation on host via guest leading to DoS [rhel-5.11.z]
kvm-83-274.el5_11.x86_64 [939 KiB] Changelog by Jeff E. Nelson (2015-09-28):
- net-add-checks-to-validate-ring-buffer-pointers.patch [bz#1263272]
- Resolves: bz#1263272
  (CVE-2015-5279 kvm: qemu: Heap overflow vulnerability in ne2000_receive() function [rhel-5.11.z])
kvm-83-273.el5_11.x86_64 [939 KiB] Changelog by Miroslav Rezanina (2015-06-03):
- kvm-pcnet-Properly-handle-TX-requests-during-Link-Fail.patch [bz#1225896]
- kvm-pcnet-fix-Negative-array-index-read.patch [bz#1225896]
- kvm-pcnet-force-the-buffer-access-to-be-in-bounds-during.patch [bz#1225896]
- Resolves: bz#1225896 
  (EMBARGOED CVE-2015-3209 kvm: qemu: pcnet: multi-tmd buffer overflow in the tx path [rhel-5.11.z)
kvm-83-272.el5_11.x86_64 [938 KiB] Changelog by Miroslav Rezanina (2015-05-09):
- kvm-fdc-force-the-fifo-access-to-be-in-bounds-of-the-all.patch [bz#1219266]
- Resolves: bz#1219266
  (kvm: qemu: floppy disk controller flaw [rhel-5.11.z])
kvm-83-270.el5_11.x86_64 [938 KiB] Changelog by Jeff E. Nelson (2015-03-24):
- KVM: x86: Check non canonical addresses upon WRMSR
- Resolves: bz#1152982
 (CVE-2014-3610 kernel: kvm: noncanonical MSR writes [rhel-5.11.z])
kvm-83-266.el5_10.1.x86_64 [938 KiB] Changelog by Miroslav Rezanina (2014-02-06):
- KVM: x86: prevent cross page vapic_addr access (CVE-2013-6368) [bz#1032219]
- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) [bz#1032216]
- Resolves: bz#1032219
  (CVE-2013-6368 kvm: cross page vapic_addr access [rhel-5.10])
- Resolves: bz#1032216
  CVE-2013-6367 kvm: division by zero in apic_get_tmcct() [rhel-5.10.z]
kvm-83-262.el5_9.3.x86_64 [937 KiB] Changelog by Michal Novotny (2013-04-02):
- kvm-kernel-kvm-accept-unaligned-MSR_KVM_SYSTEM_TIME-writes.patch [bz#947363]
- Resolves: bz#947363
  (RHEL.5.8.32 guest hang when installing)
kvm-83-262.el5_9.1.x86_64 [936 KiB] Changelog by Michal Novotny (2013-02-27):
- kvm-e1000-Discard-packets-that-are-too-long-if-SBP-and-L.patch [bz#910839]
- kvm-e1000-Discard-oversized-packets-based-on-SBP-LPE.patch [bz#910839]
- Resolves: bz#910839
  (CVE-2012-6075  qemu (e1000 device driver): Buffer overflow when processing large packets when SBP and LPE flags are disabled [rhel-5.9.z])
kvm-83-249.el5_8.5.x86_64 [893 KiB] Changelog by Michal Novotny (2012-09-03):
- kvm-console-bounds-check-whenever-changing-the-cursor-du-58.patch [bz#851255]
- CVE: CVE-2012-3515
- Resolves: bz#851255
  (EMBARGOED CVE-2012-3515 qemu/kvm: VT100 emulation vulnerability [rhel-5.8.z])
kvm-83-249.el5_8.4.x86_64 [893 KiB] Changelog by Michal Novotny (2012-05-09):
- kvm-kernel-KVM-unmap-pages-from-the-iommu-when-slots-are-remove.patch [bz#814151]
- CVE: CVE-2012-2121
- Resolves: bz#814151
  (CVE-2012-2121 kvm: device assignment page leak [rhel-5.8])
kvm-83-249.el5.x86_64 [892 KiB] Changelog by Michal Novotny (2012-01-16):
- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770101]
- CVE: CVE-2011-4622
- Resolves: bz#770101
  (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.8])
kvm-83-239.el5_7.1.x86_64 [890 KiB] Changelog by Eduardo Habkost (2012-01-16):
- kvm-e1000-prevent-buffer-overflow-when-processing-legacy.patch [bz#772079]
- Resolves: bz#772079
  (EMBARGOED CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [rhel-5.7.z])
- kvm-Fix-external-module-compat.c-not-to-use-unsupported-.patch [bz#753860]
  (build fix)
- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770100]
- Resolves: bz#770100
  (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.7.z])
kvm-83-224.el5.x86_64 [881 KiB] Changelog by Eduardo Habkost (2010-12-23):
- kvm-kernel-KVM-x86-zero-kvm_vcpu_events-interrupt.pad.patch [bz#665407]
- Resolves: bz#665407
  (kvm_vcpu_events.interrupt.pad must be zeroed)
- CVE: CVE-2010-4525
kvm-83-164.el5_5.30.x86_64 [866 KiB] Changelog by Eduardo Habkost (2010-12-15):
- Revert the bz#661397 patches as they are not enough
  - kvm-kernel-Revert-KVM-VMX-Return-0-from-a-failed-VMREAD.patch [bz#661397]
  - kvm-kernel-Revert-KVM-Don-t-spin-on-virt-instruction-faults-dur.patch [bz#661397]
- Related: bz#661397
  (reboot(RB_AUTOBOOT) fails if kvm instance is running)
- kvm-kernel-KVM-fix-AMD-initial-TSC-offset-problems-additional-f.patch [bz#656984]
- Resolves: bz#656984
  (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)
kvm-83-164.el5_5.25.x86_64 [864 KiB] Changelog by Eduardo Habkost (2010-10-18):
- Adding load_gs_index to kmod symbol greylist
- Related: bz#639886
  (CVE-2010-3698 kvm: invalid selector in fs/gs causes kernel panic [rhel-5.5.z])
kvm-83-164.el5_5.21.x86_64 [863 KiB] Changelog by Eduardo Habkost (2010-07-30):
- kvm-Fix-segfault-in-mmio-subpage-handling-code.patch [bz#619412]
- Resolves: bz#619412
  (CVE-2010-2784 qemu: insufficient constraints checking in exec.c:subpage_register() [rhel-5.5.z])
kvm-83-164.el5_5.9.x86_64 [857 KiB] Changelog by Eduardo Habkost (2010-05-04):
- Remove bios-nohotplug.bin from package
- Related: bz#579737
  (QEMU: Too many devices are available for unplug in Windows XP (and we don't support that))
kvm-83-105.el5_4.27.x86_64 [837 KiB] Changelog by Eduardo Habkost (2010-02-10):
- kvm-kernel-KVM-VMX-Check-cpl-before-emulating-debug-register-ac.patch [bz#563516]
- Resolves: bz#563516
  (KVM: Check cpl before emulating debug register access [rhel-5.4.z])
kvm-83-105.el5_4.22.x86_64 [835 KiB] Changelog by Eduardo Habkost (2010-02-04):
- kvm-CVE-2010-0297-usb-linux.c-fix-buffer-overflow.patch [bz#560769]
- Resolves: bz#560769
  (CVE-2010-0297 kvm-userspace-rhel5: usb-linux.c: fix buffer overflow [rhel-5.4.z])
kvm-83-105.el5_4.13.x86_64 [829 KiB] Changelog by Eduardo Habkost (2009-11-30):
- kvm-kernel-KVM-x86-emulator-limit-instructions-to-15-bytes.patch [bz#541164]
- Resolves: bz#541164
  (CVE-2009-4031 kernel: KVM: x86 emulator: limit instructions to 15 bytes [rhel-5.4.z])

Listing created by Repoview-0.6.6-1.el6