summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu/qemu_2.2.0.bb
diff options
context:
space:
mode:
authorKai Kang <kai.kang@windriver.com>2015-06-18 17:02:42 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-09-01 21:19:41 +0100
commit328d35b53db61c86717c68cc564a790ccfa2956c (patch)
tree6feab80e4eb7b1df81c6d6fdad6977726ed0f442 /meta/recipes-devtools/qemu/qemu_2.2.0.bb
parent2adb210c8cc5a11bb899e7dc76c31159ff3d4116 (diff)
downloadast2050-yocto-poky-328d35b53db61c86717c68cc564a790ccfa2956c.zip
ast2050-yocto-poky-328d35b53db61c86717c68cc564a790ccfa2956c.tar.gz
qemu: backport patches to fix CVE issues
Backport patches to fix CVE-2015-4103, CVE-2015-4104, CVE-2015-4105 and CVE-2015-4106. These patches are from debian, but they are originally from: http://git.qemu.org/?p=qemu.git;a=shortlog;h=c25bbf1 (From OE-Core master rev: 496b3ffba6755bb76709c88cf81399c9d23f830a) (From OE-Core rev: 29746e78ca000f4464c8e0a1da55c77e02c651e4) Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Refresh the following patches to apply cleanly to our qemu-2.2.0: 07-xen-pt-split-out-calculation-of-throughable-mask-CVE-2015-4106.patch 10-xen-pt-add-a-few-PCI-config-space-field-descriptions-CVE-2015-4106.patch Signed-off-by: Joshua Lock <joshua.lock@collabora.co.uk> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu_2.2.0.bb')
-rw-r--r--meta/recipes-devtools/qemu/qemu_2.2.0.bb13
1 files changed, 12 insertions, 1 deletions
diff --git a/meta/recipes-devtools/qemu/qemu_2.2.0.bb b/meta/recipes-devtools/qemu/qemu_2.2.0.bb
index 99995b6..54dd7cb 100644
--- a/meta/recipes-devtools/qemu/qemu_2.2.0.bb
+++ b/meta/recipes-devtools/qemu/qemu_2.2.0.bb
@@ -8,7 +8,18 @@ SRC_URI += "file://configure-fix-Darwin-target-detection.patch \
file://Qemu-Arm-versatilepb-Add-memory-size-checking.patch \
file://37ed3bf1ee07bb1a26adca0df8718f601f231c0b.patch \
file://qemu-CVE-2015-3456.patch \
- "
+ file://01-xen-properly-gate-host-writes-of-modified-PCI-CFG-contents-CVE-2015-4103.patch \
+ file://02-xen-dont-allow-guest-to-control-MSI-mask-register-CVE-2015-4104.patch \
+ file://03-xen-MSI-X-limit-error-messages-CVE-2015-4105.patch \
+ file://04-xen-MSI-dont-open-code-pass-through-of-enable-bit-mod-CVE-2015-4106.patch \
+ file://05-xen-pt-consolidate-PM-capability-emu_mask-CVE-2015-4106.patch \
+ file://06-xen-pt-correctly-handle-PM-status-bit-CVE-2015-4106.patch \
+ file://07-xen-pt-split-out-calculation-of-throughable-mask-CVE-2015-4106.patch \
+ file://08-xen-pt-mark-all-PCIe-capability-bits-read-only-CVE-2015-4106.patch \
+ file://09-xen-pt-mark-reserved-bits-in-PCI-config-space-fields-CVE-2015-4106.patch \
+ file://10-xen-pt-add-a-few-PCI-config-space-field-descriptions-CVE-2015-4106.patch \
+ file://11-xen-pt-unknown-PCI-config-space-fields-should-be-readonly-CVE-2015-4106.patch \
+ "
SRC_URI_prepend = "http://wiki.qemu-project.org/download/${BP}.tar.bz2"
SRC_URI[md5sum] = "f7a5e2da22d057eb838a91da7aff43c8"
SRC_URI[sha256sum] = "b68c9b6c7c694f5489b5a6bffe993cd976ffbb78e7d178eb3bc016caf460039c"
OpenPOWER on IntegriCloud