<div dir="ltr">Hi, <font face="arial, helvetica, sans-serif" style="color:rgb(0,102,204)"><a href="https://cbs.centos.org/koji/buildinfo?buildID=21003" style="color:rgb(0,102,204)">qemu-kvm-ev-2.9.0-16.el7_4.11.1</a></font> is now available for testing.<div><font><span style="font-size:12.8px">If no negative feedback will be reported, I'm going to push to release on Thursday, December 14th.</span></font></div><div><font><font color="#222222"><font color="#222222"><br></font></font></font></div><div><font><font style="" color="#000000">Here's the changelog:</font></font></div><div><font color="#000000"><br></font></div><div><font color="#000000"><span style="font-family:monospace;font-size:medium;white-space:pre">* Mon Dec 11 2017 Sandro Bonazzola <<a href="mailto:sbonazzo@redhat.com">sbonazzo@redhat.com</a>> - ev-2.9.0-16.el7_4.11.1
- Removing RH branding from package name
* Mon Nov 13 2017 Miroslav Rezanina <<a href="mailto:mrezanin@redhat.com">mrezanin@redhat.com</a>> - rhev-2.9.0-16.el7_4.11
- kvm-exec-use-qemu_ram_ptr_length-to-access-guest-ram.patch [bz#1472185]
- kvm-multiboot-validate-multiboot-header-address-values.patch [bz#1501123]
- Resolves: bz#1472185
(CVE-2017-11334 qemu-kvm-rhev: Qemu: exec: oob access during dma operation [rhel-7.4.z])
- Resolves: bz#1501123
(CVE-2017-14167 qemu-kvm-rhev: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.4.z])
* Mon Oct 23 2017 Miroslav Rezanina <<a href="mailto:mrezanin@redhat.com">mrezanin@redhat.com</a>> - rhev-2.9.0-16.el7_4.10
- kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch [bz#1501300]
- kvm-vga-drop-line_offset-variable.patch [bz#1501300]
- kvm-vga-handle-cirrus-vbe-mode-wraparounds.patch [bz#1501300]
- kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501300]
- Resolves: bz#1501300
(CVE-2017-15289 qemu-kvm-rhev: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-7.4.z])
* Mon Oct 09 2017 Miroslav Rezanina <<a href="mailto:mrezanin@redhat.com">mrezanin@redhat.com</a>> - rhev-2.9.0-16.el7_4.9
- kvm-nbd-client-Fix-regression-when-server-sends-garbage.patch [bz#1495474]
- kvm-fix-build-failure-in-nbd_read_reply_entry.patch [bz#1495474]
- kvm-nbd-client-avoid-spurious-qio_channel_yield-re-entry.patch [bz#1495474]
- kvm-nbd-client-avoid-read_reply_co-entry-if-send-failed.patch [bz#1495474]
- kvm-qemu-iotests-improve-nbd-fault-injector.py-startup-p.patch [bz#1495474]
- kvm-qemu-iotests-test-NBD-over-UNIX-domain-sockets-in-08.patch [bz#1495474]
- kvm-block-nbd-client-nbd_co_send_request-fix-return-code.patch [bz#1495474]
- Resolves: bz#1495474
(Fail to quit source qemu when do live migration after mirroring guest to NBD server [rhel-7.4.z])</span><br></font></div><div><font color="#000000"><font><span style="font-size:12.8px"><a href="https://cbs.centos.org/koji/buildinfo?buildID=21003"><br></a></span></font>-- </font><br><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><p style="color:rgb(0,0,0);font-family:overpass,sans-serif;font-weight:bold;margin:0px;padding:0px;font-size:14px;text-transform:uppercase"><span>SANDRO</span> <span>BONAZZOLA</span></p><p style="color:rgb(0,0,0);font-family:overpass,sans-serif;font-size:10px;margin:0px 0px 4px;text-transform:uppercase"><span>ASSOCIATE MANAGER, SOFTWARE ENGINEERING, EMEA ENG VIRTUALIZATION R&D</span></p><p style="font-family:overpass,sans-serif;margin:0px;font-size:10px;color:rgb(153,153,153)"><a href="https://www.redhat.com/" style="color:rgb(0,136,206);margin:0px" target="_blank">Red Hat <span>EMEA</span></a></p><table border="0" style="color:rgb(0,0,0);font-family:overpass,sans-serif;font-size:medium"><tbody><tr><td width="100px"><a href="https://red.ht/sig" target="_blank"><img src="https://www.redhat.com/profiles/rh/themes/redhatdotcom/img/logo-red-hat-black.png" width="90" height="auto"></a></td><td style="font-size:10px"><div><a href="https://redhat.com/trusted" style="color:rgb(204,0,0);font-weight:bold" target="_blank">TRIED. TESTED. TRUSTED.</a></div></td></tr></tbody></table><br></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div>