[ovirt-users] qemu-kvm-ev-2.9.0-16.el7_4.11.1 now available for testing

Markus Stockhausen stockhausen at collogia.de
Mon Dec 11 17:11:34 UTC 2017


Hi Sandro,

I'm wondering if BZ1513362 (AIO stuck fixed in qemu-kvm-rhev-2.9.0-16.el7_4.12)
will be worth to give the newer version a try.

Best regards.

Markus

---------------------
Von: users-bounces at ovirt.org [users-bounces at ovirt.org]" im Auftrag von "Sandro Bonazzola [sbonazzo at redhat.com]
Gesendet: Montag, 11. Dezember 2017 17:43
An: Discussion about the virtualization on CentOS; devel; users
Betreff: [ovirt-users] qemu-kvm-ev-2.9.0-16.el7_4.11.1 now available for testing

Hi, qemu-kvm-ev-2.9.0-16.el7_4.11.1<https://cbs.centos.org/koji/buildinfo?buildID=21003> is now available for testing.
If no negative feedback will be reported, I'm going to push to release on Thursday, December 14th.

Here's the changelog:

* Mon Dec 11 2017 Sandro Bonazzola <sbonazzo at redhat.com<mailto:sbonazzo at redhat.com>> - ev-2.9.0-16.el7_4.11.1 - Removing RH branding from package name * Mon Nov 13 2017 Miroslav Rezanina <mrezanin at redhat.com<mailto:mrezanin at redhat.com>> - rhev-2.9.0-16.el7_4.11 - kvm-exec-use-qemu_ram_ptr_length-to-access-guest-ram.patch [bz#1472185] - kvm-multiboot-validate-multiboot-header-address-values.patch [bz#1501123] - Resolves: bz#1472185 (CVE-2017-11334 qemu-kvm-rhev: Qemu: exec: oob access during dma operation [rhel-7.4.z]) - Resolves: bz#1501123 (CVE-2017-14167 qemu-kvm-rhev: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.4.z]) * Mon Oct 23 2017 Miroslav Rezanina <mrezanin at redhat.com<mailto:mrezanin at redhat.com>> - rhev-2.9.0-16.el7_4.10 - kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch [bz#1501300] - kvm-vga-drop-line_offset-variable.patch [bz#1501300] - kvm-vga-handle-cirrus-vbe-mode-wraparounds.patch [bz#1501300] - kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501300] - Resolves: bz#1501300 (CVE-2017-15289 qemu-kvm-rhev: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-7.4.z]) * Mon Oct 09 2017 Miroslav Rezanina <mrezanin at redhat.com<mailto:mrezanin at redhat.com>> - rhev-2.9.0-16.el7_4.9 - kvm-nbd-client-Fix-regression-when-server-sends-garbage.patch [bz#1495474] - kvm-fix-build-failure-in-nbd_read_reply_entry.patch [bz#1495474] - kvm-nbd-client-avoid-spurious-qio_channel_yield-re-entry.patch [bz#1495474] - kvm-nbd-client-avoid-read_reply_co-entry-if-send-failed.patch [bz#1495474] - kvm-qemu-iotests-improve-nbd-fault-injector.py-startup-p.patch [bz#1495474] - kvm-qemu-iotests-test-NBD-over-UNIX-domain-sockets-in-08.patch [bz#1495474] - kvm-block-nbd-client-nbd_co_send_request-fix-return-code.patch [bz#1495474] - Resolves: bz#1495474 (Fail to quit source qemu when do live migration after mirroring guest to NBD server [rhel-7.4.z])

<https://cbs.centos.org/koji/buildinfo?buildID=21003>--

SANDRO BONAZZOLA

ASSOCIATE MANAGER, SOFTWARE ENGINEERING, EMEA ENG VIRTUALIZATION R&D

Red Hat EMEA<https://www.redhat.com/>

[https://www.redhat.com/profiles/rh/themes/redhatdotcom/img/logo-red-hat-black.png]<https://red.ht/sig>
TRIED. TESTED. TRUSTED.<https://redhat.com/trusted>


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ovirt.org/pipermail/users/attachments/20171211/2e1a7288/attachment.html>
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: InterScan_Disclaimer.txt
URL: <http://lists.ovirt.org/pipermail/users/attachments/20171211/2e1a7288/attachment.txt>


More information about the Users mailing list