diff options
author | Sakib Sajal <sakib.sajal@windriver.com> | 2021-08-20 16:55:19 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-09-01 16:27:09 +0100 |
commit | 4bd52d64c9581cc9a87a0b6b113575881566e5fc (patch) | |
tree | 84815aa7498a42d6df70817d6b270d0c03b72e89 /meta/recipes-devtools/qemu/qemu.inc | |
parent | 474c37c17ee8c8938de58d03e71e9f6a67ed4471 (diff) | |
download | poky-4bd52d64c9581cc9a87a0b6b113575881566e5fc.tar.gz |
qemu: fix CVE-2021-3416
Source: poky.org
MR: 109686
Type: Security Fix
Disposition: Backport from http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/meta/recipes-devtools/qemu?h=hardknott&id=381aebe82f1f6fcc26b47966bc8520dbb1476961
ChangeID: 50b1589249cc3c595d224e3a8347da2b54339ef8
Description:
Drop CVE-2021-3416_4.patch as hw/net/msf2-emac.c does not exist in 4.2.0
(From OE-Core rev: 7a3ce8a79a6c682e1b38f757eb68534e0ce5589d)
(From OE-Core rev: 44bb99fdd1a7eee78078f7d48b9b8aad729f84ec)
Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit e2b5bc11d1b26b73b62e1a63cb75572793282dcb)
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 381aebe82f1f6fcc26b47966bc8520dbb1476961)
[Drop CVE-2021-3416_4.patch, affected file does not exist in 4.2.0]
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu.inc')
-rw-r--r-- | meta/recipes-devtools/qemu/qemu.inc | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index a61f69ba49..e64a6b2cb2 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc | |||
@@ -62,6 +62,15 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ | |||
62 | file://CVE-2020-29443.patch \ | 62 | file://CVE-2020-29443.patch \ |
63 | file://CVE-2021-20221.patch \ | 63 | file://CVE-2021-20221.patch \ |
64 | file://CVE-2021-20181.patch \ | 64 | file://CVE-2021-20181.patch \ |
65 | file://CVE-2021-3416_1.patch \ | ||
66 | file://CVE-2021-3416_2.patch \ | ||
67 | file://CVE-2021-3416_3.patch \ | ||
68 | file://CVE-2021-3416_5.patch \ | ||
69 | file://CVE-2021-3416_6.patch \ | ||
70 | file://CVE-2021-3416_7.patch \ | ||
71 | file://CVE-2021-3416_8.patch \ | ||
72 | file://CVE-2021-3416_9.patch \ | ||
73 | file://CVE-2021-3416_10.patch \ | ||
65 | " | 74 | " |
66 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" | 75 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" |
67 | 76 | ||