diff options
author | Kai Kang <kai.kang@windriver.com> | 2015-06-18 17:02:42 +0800 |
---|---|---|
committer | Joshua Lock <joshua.lock@collabora.co.uk> | 2015-09-01 12:36:15 +0100 |
commit | 29746e78ca000f4464c8e0a1da55c77e02c651e4 (patch) | |
tree | fd8da2590aa44d3a42403762a6f3958bc6c3dc39 /meta/recipes-devtools/qemu/qemu_2.2.0.bb | |
parent | 12fc04731d26597bfb9d9f1713c96b11c8186c43 (diff) | |
download | openembedded-core-29746e78ca000f4464c8e0a1da55c77e02c651e4.tar.gz |
qemu: backport patches to fix CVE issues
Backport patches to fix CVE-2015-4103, CVE-2015-4104, CVE-2015-4105 and
CVE-2015-4106. These patches are from debian, but they are originally
from:
http://git.qemu.org/?p=qemu.git;a=shortlog;h=c25bbf1
(From OE-Core master rev: 496b3ffba6755bb76709c88cf81399c9d23f830a)
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Refresh the following patches to apply cleanly to our qemu-2.2.0:
07-xen-pt-split-out-calculation-of-throughable-mask-CVE-2015-4106.patch
10-xen-pt-add-a-few-PCI-config-space-field-descriptions-CVE-2015-4106.patch
Signed-off-by: Joshua Lock <joshua.lock@collabora.co.uk>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu_2.2.0.bb')
-rw-r--r-- | meta/recipes-devtools/qemu/qemu_2.2.0.bb | 13 |
1 files changed, 12 insertions, 1 deletions
diff --git a/meta/recipes-devtools/qemu/qemu_2.2.0.bb b/meta/recipes-devtools/qemu/qemu_2.2.0.bb index 99995b62aa..54dd7cbf51 100644 --- a/meta/recipes-devtools/qemu/qemu_2.2.0.bb +++ b/meta/recipes-devtools/qemu/qemu_2.2.0.bb @@ -8,7 +8,18 @@ SRC_URI += "file://configure-fix-Darwin-target-detection.patch \ file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \ file://37ed3bf1ee07bb1a26adca0df8718f601f231c0b.patch \ file://qemu-CVE-2015-3456.patch \ - " + file://01-xen-properly-gate-host-writes-of-modified-PCI-CFG-contents-CVE-2015-4103.patch \ + file://02-xen-dont-allow-guest-to-control-MSI-mask-register-CVE-2015-4104.patch \ + file://03-xen-MSI-X-limit-error-messages-CVE-2015-4105.patch \ + file://04-xen-MSI-dont-open-code-pass-through-of-enable-bit-mod-CVE-2015-4106.patch \ + file://05-xen-pt-consolidate-PM-capability-emu_mask-CVE-2015-4106.patch \ + file://06-xen-pt-correctly-handle-PM-status-bit-CVE-2015-4106.patch \ + file://07-xen-pt-split-out-calculation-of-throughable-mask-CVE-2015-4106.patch \ + file://08-xen-pt-mark-all-PCIe-capability-bits-read-only-CVE-2015-4106.patch \ + file://09-xen-pt-mark-reserved-bits-in-PCI-config-space-fields-CVE-2015-4106.patch \ + file://10-xen-pt-add-a-few-PCI-config-space-field-descriptions-CVE-2015-4106.patch \ + file://11-xen-pt-unknown-PCI-config-space-fields-should-be-readonly-CVE-2015-4106.patch \ + " SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2" SRC_URI[md5sum] = "f7a5e2da22d057eb838a91da7aff43c8" SRC_URI[sha256sum] = "b68c9b6c7c694f5489b5a6bffe993cd976ffbb78e7d178eb3bc016caf460039c" |