معرفی شرکت ها


edk2-ovmf-20240524-10.el9.noarch.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

UEFI firmware for x86_64 virtual machines
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 10-stream
مخزن Centos CRB noarch
نام بسته edk2-ovmf
نام فایل بسته edk2-ovmf-20240524-10.el9.noarch.rpm
نسخه بسته 20240524
انتشار بسته 10.el9
معماری بسته noarch
نگهدارنده -
تاریخ ساخت Fri Nov 22 23
هاست سازنده x86-02.stream.rdu2.redhat.com
نوع بسته .rpm
آدرس صفحه اصلی http://www.tianocore.org/ovmf/
مجوز BSD-2-Clause-Patent and Apache-2.0
حجم دانلود 6.1M
حجم نصب 23.601M
OVMF (Open Virtual Machine Firmware) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.


جایگزین ها

بسته نسخه معماری مخزن
edk2-ovmf-20230301gitf80f052277c8-5.el9.noarch.rpm 20230301gitf80f052277c8 noarch CentOS CRB
edk2-ovmf-20230524-1.el9.noarch.rpm 20230524 noarch CentOS CRB
edk2-ovmf-20230524-2.el9.noarch.rpm 20230524 noarch CentOS CRB
edk2-ovmf-20230524-3.el9.noarch.rpm 20230524 noarch CentOS CRB
edk2-ovmf-20230524-4.el9.noarch.rpm 20230524 noarch CentOS CRB
edk2-ovmf-20231122-1.el9.noarch.rpm 20231122 noarch CentOS CRB
edk2-ovmf-20231122-2.el9.noarch.rpm 20231122 noarch CentOS CRB
edk2-ovmf-20231122-3.el9.noarch.rpm 20231122 noarch CentOS CRB
edk2-ovmf-20231122-4.el9.noarch.rpm 20231122 noarch CentOS CRB
edk2-ovmf-20231122-6.el9.noarch.rpm 20231122 noarch CentOS CRB
edk2-ovmf-20240524-8.el9.noarch.rpm 20240524 noarch CentOS CRB
edk2-ovmf-20240524-9.el9.noarch.rpm 20240524 noarch CentOS CRB
edk2-ovmf-20241117-1.el9.noarch.rpm 20241117 noarch CentOS CRB
edk2-ovmf-20241117-2.el9.noarch.rpm 20241117 noarch CentOS CRB
edk2-ovmf-20240524-10.el10.noarch.rpm 20240524 noarch CentOS CRB
edk2-ovmf-20240524-11.el10.noarch.rpm 20240524 noarch CentOS CRB
edk2-ovmf-20240524-12.el10.noarch.rpm 20240524 noarch CentOS CRB
edk2-ovmf-20241117-1.el10.noarch.rpm 20241117 noarch CentOS CRB
edk2-ovmf-20241117-2.el10.noarch.rpm 20241117 noarch CentOS CRB


ارائه دهنده

مقدار نام
= 20240524-10.el9 OVMF
= 3.0.7 bundled(openssl)
= 20240524-10.el9 edk2-ovmf


نحوه نصب


نصب پکیج rpm edk2-ovmf:

    None


فایل ها

مسیرها
/usr/share/OVMF
/usr/share/OVMF/OVMF_CODE.secboot.fd
/usr/share/OVMF/OVMF_VARS.fd
/usr/share/OVMF/OVMF_VARS.secboot.fd
/usr/share/OVMF/UefiShell.iso
/usr/share/doc/edk2-ovmf
/usr/share/doc/edk2-ovmf/README
/usr/share/doc/edk2-ovmf/ovmf-whitepaper-c770f8c.txt
/usr/share/edk2
/usr/share/edk2/ovmf
/usr/share/edk2/ovmf/DBXUpdate-20230509.x64.bin
/usr/share/edk2/ovmf/EnrollDefaultKeys.efi
/usr/share/edk2/ovmf/OVMF.amdsev.fd
/usr/share/edk2/ovmf/OVMF.inteltdx.fd
/usr/share/edk2/ovmf/OVMF.inteltdx.secboot.fd
/usr/share/edk2/ovmf/OVMF_CODE.cc.fd
/usr/share/edk2/ovmf/OVMF_CODE.fd
/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd
/usr/share/edk2/ovmf/OVMF_VARS.fd
/usr/share/edk2/ovmf/OVMF_VARS.secboot.fd
/usr/share/edk2/ovmf/Shell.efi
/usr/share/edk2/ovmf/UefiShell.iso
/usr/share/licenses/edk2-ovmf
/usr/share/licenses/edk2-ovmf/LICENSE.openssl
/usr/share/licenses/edk2-ovmf/License-History.txt
/usr/share/licenses/edk2-ovmf/License.OvmfPkg.txt
/usr/share/licenses/edk2-ovmf/License.txt
/usr/share/qemu
/usr/share/qemu/firmware
/usr/share/qemu/firmware/30-edk2-ovmf-x64-sb-enrolled.json
/usr/share/qemu/firmware/40-edk2-ovmf-x64-sb.json
/usr/share/qemu/firmware/50-edk2-ovmf-x64-nosb.json
/usr/share/qemu/firmware/60-edk2-ovmf-x64-amdsev.json


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2024-11-22

edk2-OvmfPkg-Rerun-dispatcher-after-initializing-virtio-r.patch [RHEL-58631]
Resolves: RHEL-58631
ovmf-20231122-6.el9_4.2 and greater)

2024-11-11

edk2-OvmfPkg-ArmVirtPkg-Add-a-Fallback-RNG-RH-only.patch [RHEL-66230]
Resolves: RHEL-66230
rng device present [rhel-9.6])

2024-11-06

edk2-OvmfPkg-Add-a-Fallback-RNG-RH-only.patch [RHEL-65725]
Resolves: RHEL-65725
rng device present [rhel-9.6])

2024-10-08

edk2-OvmfPkg-VirtioGpuDxe-ignore-display-resolutions-smal.patch [RHEL-56248]
edk2-OvmfPkg-QemuVideoDxe-ignore-display-resolutions-smal.patch [RHEL-56248]
edk2-MdePkg-Fix-overflow-issue-in-BasePeCoffLib.patch [RHEL-60833]
Resolves: RHEL-56248
9.6])
Resolves: RHEL-60833
2024-38796 edk2: Integer overflows in PeCoffLoaderRelocateImage [rhel-9.6])

2024-09-13

edk2-OvmfPkg-CpuHotplugSmm-delay-SMM-exit.patch [RHEL-56974]
edk2-Bumped-openssl-submodule-version-to-0205b5898872.patch [RHEL-55336]
Resolves: RHEL-56974
kvm: warning: Blocked re-entrant IO on MemoryRegion: acpi-cpu-hotplug at addr: 0x0 [rhel-9])
Resolves: RHEL-55336
2024-6119 edk2/openssl: Possible denial of service in X.509 name checks [rhel-9.5])

2024-09-09

edk2-UefiCpuPkg-PiSmmCpuDxeSmm-skip-PatchInstructionX86-c.patch [RHEL-45847]
Resolves: RHEL-45847

2024-09-02

edk2-AmdSevDxe-Fix-the-shim-fallback-reboot-workaround-fo.patch [RHEL-56081]
Resolves: RHEL-56081

2024-08-20

edk2-NetworkPkg-DxeNetLib-adjust-PseudoRandom-error-loggi.patch [RHEL-45899]
edk2-NetworkPkg-DxeNetLib-Reword-PseudoRandom-error-loggi.patch [RHEL-45899]
Resolves: RHEL-45899
9.5.0] edk2 hit Failed to generate random data)

2024-07-25

edk2-MdeModulePkg-Warn-if-out-of-flash-space-when-writing.patch [RHEL-43442]
Resolves: RHEL-43442

2024-06-20

Rebase to edk2-stable202405
Bumo openssl to 8e5beb77088b
Resolves: RHEL-32486
stable202405 [rhel-9])
Resolves: RHEL-36446
9])
Resolves: RHEL-21653
2023-6237 edk2: openssl: Excessive time spent checking invalid RSA public keys [rhel-9])
Resolves: RHEL-21150
2023-6129 edk2: mysql: openssl: POLY1305 MAC implementation corrupts vector registers on PowerPC)
Resolves: RHEL-22490
2024-0727 edk2: openssl: denial of service via null dereference [rhel-9])

2024-04-08

edk2-OvmfPkg-PlatformPei-log-a-warning-when-memory-is-tig.patch [RHEL-22202]
edk2-OvmfPkg-PlatformPei-consider-AP-stacks-for-pei-memor.patch [RHEL-22202]
edk2-OvmfPkg-PlatformPei-rewrite-page-table-calculation.patch [RHEL-22202]
edk2-OvmfPkg-PlatformPei-log-pei-memory-cap-details.patch [RHEL-22202]
edk2-UefiCpuPkg-MpInitLib-Add-support-for-multiple-HOBs-t.patch [RHEL-22202]
edk2-UefiCpuPkg-MpInitLib-Add-support-for-multiple-HOBs-t.p2.patch [RHEL-22202]
edk2-UefiCpuPkg-MpInitLib-Add-support-for-multiple-HOBs-t.p3.patch [RHEL-22202]
edk2-UefiCpuPkg-MpInitLib-Add-support-for-multiple-HOBs-t.p4.patch [RHEL-22202]
edk2-UefiCpuPkg-MpInitLib-Add-support-for-multiple-HOBs-t.p5.patch [RHEL-22202]
edk2-UefiCpuPkg-MpInitLib-return-early-in-GetBspNumber.patch [RHEL-22202]
Resolves: RHEL-22202

2024-02-27

Rebase to edk2-stable202302
Resolves: RHEL-26879

2024-02-22

edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45230-Pa.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Add-Unit-tests-to-CI-and-create-Host-Test.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45230-Un.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Pa.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Un.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45231-Patc.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45231-Unit.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45232-Patc.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Ip6Dxe-SECURITY-PATCH-CVE-2023-45232-Unit.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523p2.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523p3.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-UefiPxeBcDxe-SECURITY-PATCH-CVE-2023-4523p4.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Adds-a-SecurityFix.yaml-file.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Dhcp6Dxe-SECURITY-PATCH-CVE-2023-45229-Re.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Dhcp6Dxe-Removes-duplicate-check-and-repl.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Dhcp6Dxe-Packet-Length-is-not-updated-bef.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
edk2-NetworkPkg-Updating-SecurityFixes.yaml.patch [RHEL-21841 RHEL-21843 RHEL-21845 RHEL-21847 RHEL-21849 RHEL-21851 RHEL-21853]
Resolves: RHEL-21841
2023-45229 edk2: Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message [rhel-9])
Resolves: RHEL-21843
2023-45230 edk2: Buffer overflow in the DHCPv6 client via a long Server ID option [rhel-9])
Resolves: RHEL-21845
2023-45231 edk2: Out of Bounds read when handling a ND Redirect message with truncated options [rhel-9])
Resolves: RHEL-21847
2023-45232 edk2: Infinite loop when parsing unknown options in the Destination Options header [rhel-9])
Resolves: RHEL-21849
2023-45233 edk2: Infinite loop when parsing a PadN option in the Destination Options header [rhel-9])
Resolves: RHEL-21851
2023-45234 edk2: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message [rhel-9])
Resolves: RHEL-21853
2023-45235 edk2: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message [rhel-9])

2024-02-19

edk2-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-4118.patch [RHEL-21157]
edk2-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4118.patch [RHEL-21157]
edk2-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-411-2.patch [RHEL-21157]
edk2-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-411-3.patch [RHEL-21157]
edk2-SecurityPkg-Updating-SecurityFixes.yaml-after-symbol.patch [RHEL-21157]
edk2-OvmfPkg-Sec-Setup-MTRR-early-in-the-boot-process.patch [RHEL-21704]
edk2-MdePkg-ArchitecturalMsr.h-add-defines-for-MTRR-cache.patch [RHEL-21704]
edk2-UefiCpuPkg-MtrrLib.h-use-cache-type-defines-from-Arc.patch [RHEL-21704]
edk2-OvmfPkg-Sec-use-cache-type-defines-from-Architectura.patch [RHEL-21704]
Resolves: RHEL-21157
2022-36764 edk2: heap buffer overflow in Tcg2MeasurePeImage() [rhel-9])
Resolves: RHEL-21704

2024-01-31

edk2-OvmfPkg-VirtNorFlashDxe-add-casts-to-UINTN-and-UINT3.patch [RHEL-20963]
edk2-OvmfPkg-VirtNorFlashDxe-clarify-block-write-logic-fi.patch [RHEL-20963]
edk2-OvmfPkg-VirtNorFlashDxe-add-a-loop-for-NorFlashWrite.patch [RHEL-20963]
edk2-OvmfPkg-VirtNorFlashDxe-allow-larger-writes-without-.patch [RHEL-20963]
edk2-OvmfPkg-VirtNorFlashDxe-ValidateFvHeader-unwritten-s.patch [RHEL-20963]
edk2-OvmfPkg-VirtNorFlashDxe-move-DoErase-code-block-into.patch [RHEL-20963]
Resolves: RHEL-20963

2024-01-22

edk2-SecurityPkg-DxeTpm2MeasureBootLib-SECURITY-PATCH-411.patch [RHEL-21155]
edk2-SecurityPkg-DxeTpmMeasureBootLib-SECURITY-PATCH-4117.patch [RHEL-21155]
edk2-SecurityPkg-Adding-CVE-2022-36763-to-SecurityFixes.y.patch [RHEL-21155]
Resolves: RHEL-21155
2022-36763 edk2: heap buffer overflow in Tcg2MeasureGptTable() [rhel-9])