[ovirt-users] qemu-kvm-ev-2.9.0-16.el7_4.11.1 now available for testing
Sandro Bonazzola
sbonazzo at redhat.com
Tue Dec 12 12:01:15 UTC 2017
2017-12-11 18:11 GMT+01:00 Markus Stockhausen <stockhausen at collogia.de>:
> Hi Sandro,
>
> I'm wondering if BZ1513362 (AIO stuck fixed in qemu-kvm-rhev-2.9.0-16.el7_
> 4.12)
> will be worth to give the newer version a try.
>
Above version is not yet released, can't see it on
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/7Server/en/RHEV/SRPMS/
>
> Best regards.
>
> Markus
>
> ---------------------
> *Von:* users-bounces at ovirt.org [users-bounces at ovirt.org]" im Auftrag von
> "Sandro Bonazzola [sbonazzo at redhat.com]
> *Gesendet:* Montag, 11. Dezember 2017 17:43
> *An:* Discussion about the virtualization on CentOS; devel; users
> *Betreff:* [ovirt-users] qemu-kvm-ev-2.9.0-16.el7_4.11.1 now available
> for testing
>
> Hi, qemu-kvm-ev-2.9.0-16.el7_4.11.1
> <https://cbs.centos.org/koji/buildinfo?buildID=21003> is now available
> for testing.
> If no negative feedback will be reported, I'm going to push to release on
> Thursday, December 14th.
>
> Here's the changelog:
>
> * Mon Dec 11 2017 Sandro Bonazzola <sbonazzo at redhat.com> -
> ev-2.9.0-16.el7_4.11.1 - Removing RH branding from package name * Mon Nov
> 13 2017 Miroslav Rezanina <mrezanin at redhat.com> - rhev-2.9.0-16.el7_4.11
> - kvm-exec-use-qemu_ram_ptr_length-to-access-guest-ram.patch [bz#1472185]
> - kvm-multiboot-validate-multiboot-header-address-values.patch
> [bz#1501123] - Resolves: bz#1472185 (CVE-2017-11334 qemu-kvm-rhev: Qemu:
> exec: oob access during dma operation [rhel-7.4.z]) - Resolves: bz#1501123
> (CVE-2017-14167 qemu-kvm-rhev: Qemu: i386: multiboot OOB access while
> loading kernel image [rhel-7.4.z]) * Mon Oct 23 2017 Miroslav Rezanina <
> mrezanin at redhat.com> - rhev-2.9.0-16.el7_4.10 -
> kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch
> [bz#1501300] - kvm-vga-drop-line_offset-variable.patch [bz#1501300] -
> kvm-vga-handle-cirrus-vbe-mode-wraparounds.patch [bz#1501300] -
> kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501300]
> - Resolves: bz#1501300 (CVE-2017-15289 qemu-kvm-rhev: Qemu: cirrus: OOB
> access issue in mode4and5 write functions [rhel-7.4.z]) * Mon Oct 09 2017
> Miroslav Rezanina <mrezanin at redhat.com> - rhev-2.9.0-16.el7_4.9 -
> kvm-nbd-client-Fix-regression-when-server-sends-garbage.patch
> [bz#1495474] - kvm-fix-build-failure-in-nbd_read_reply_entry.patch
> [bz#1495474] - kvm-nbd-client-avoid-spurious-qio_channel_yield-re-entry.patch
> [bz#1495474] - kvm-nbd-client-avoid-read_reply_co-entry-if-send-failed.patch
> [bz#1495474] - kvm-qemu-iotests-improve-nbd-fault-injector.py-startup-p.patch
> [bz#1495474] - kvm-qemu-iotests-test-NBD-over-UNIX-domain-sockets-in-08.patch
> [bz#1495474] - kvm-block-nbd-client-nbd_co_send_request-fix-return-code.patch
> [bz#1495474] - Resolves: bz#1495474 (Fail to quit source qemu when do live
> migration after mirroring guest to NBD server [rhel-7.4.z])
>
> <https://cbs.centos.org/koji/buildinfo?buildID=21003>--
>
> SANDRO BONAZZOLA
>
> ASSOCIATE MANAGER, SOFTWARE ENGINEERING, EMEA ENG VIRTUALIZATION R&D
>
> Red Hat EMEA <https://www.redhat.com/>
> <https://red.ht/sig>
> TRIED. TESTED. TRUSTED. <https://redhat.com/trusted>
>
>
--
SANDRO BONAZZOLA
ASSOCIATE MANAGER, SOFTWARE ENGINEERING, EMEA ENG VIRTUALIZATION R&D
Red Hat EMEA <https://www.redhat.com/>
<https://red.ht/sig>
TRIED. TESTED. TRUSTED. <https://redhat.com/trusted>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ovirt.org/pipermail/users/attachments/20171212/2fb72fd3/attachment.html>
More information about the Users
mailing list