diff options
author | Armin Kuster <akuster@mvista.com> | 2021-08-20 16:55:13 -0700 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2021-09-01 16:27:08 +0100 |
commit | e142f4ebfba18bc798c5361fbc360b598a30f96e (patch) | |
tree | e6e1cbeac2b3f59b8c294647c0aa46bbd886a489 /meta/recipes-devtools/qemu/qemu.inc | |
parent | 02108b6dbc78f291a64b78112234fd0c11675e0c (diff) | |
download | poky-e142f4ebfba18bc798c5361fbc360b598a30f96e.tar.gz |
qemu: Security fix CVE-2020-25085
Source: qemu.org
MR: 105773
Type: Security Fix
Disposition: Backport from https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.html
ChangeID: 77c8a9e75b94da3c03c64c95d9e6ab9d45037572
Description:
(From OE-Core rev: 6b4c58a31ec11e557d40c31f2532985dd53e61eb)
Signed-off-by: Armin Kuster <akuster@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu.inc')
-rw-r--r-- | meta/recipes-devtools/qemu/qemu.inc | 41 |
1 files changed, 21 insertions, 20 deletions
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index e25c2524aa..a33008670b 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc | |||
@@ -35,27 +35,28 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ | |||
35 | file://CVE-2020-7039-2.patch \ | 35 | file://CVE-2020-7039-2.patch \ |
36 | file://CVE-2020-7039-3.patch \ | 36 | file://CVE-2020-7039-3.patch \ |
37 | file://0001-Add-enable-disable-udev.patch \ | 37 | file://0001-Add-enable-disable-udev.patch \ |
38 | file://CVE-2020-7211.patch \ | 38 | file://CVE-2020-7211.patch \ |
39 | file://0001-qemu-Do-not-include-file-if-not-exists.patch \ | 39 | file://0001-qemu-Do-not-include-file-if-not-exists.patch \ |
40 | file://CVE-2020-11102.patch \ | 40 | file://CVE-2020-11102.patch \ |
41 | file://CVE-2020-11869.patch \ | 41 | file://CVE-2020-11869.patch \ |
42 | file://CVE-2020-13361.patch \ | 42 | file://CVE-2020-13361.patch \ |
43 | file://CVE-2020-10761.patch \ | 43 | file://CVE-2020-10761.patch \ |
44 | file://CVE-2020-10702.patch \ | 44 | file://CVE-2020-10702.patch \ |
45 | file://CVE-2020-13659.patch \ | 45 | file://CVE-2020-13659.patch \ |
46 | file://CVE-2020-13800.patch \ | 46 | file://CVE-2020-13800.patch \ |
47 | file://CVE-2020-13362.patch \ | 47 | file://CVE-2020-13362.patch \ |
48 | file://CVE-2020-15863.patch \ | 48 | file://CVE-2020-15863.patch \ |
49 | file://CVE-2020-14364.patch \ | 49 | file://CVE-2020-14364.patch \ |
50 | file://CVE-2020-14415.patch \ | 50 | file://CVE-2020-14415.patch \ |
51 | file://CVE-2020-16092.patch \ | 51 | file://CVE-2020-16092.patch \ |
52 | file://0001-target-mips-Increase-number-of-TLB-entries-on-the-34.patch \ | 52 | file://0001-target-mips-Increase-number-of-TLB-entries-on-the-34.patch \ |
53 | file://CVE-2019-20175.patch \ | 53 | file://CVE-2019-20175.patch \ |
54 | file://CVE-2020-24352.patch \ | 54 | file://CVE-2020-24352.patch \ |
55 | file://CVE-2020-25723.patch \ | 55 | file://CVE-2020-25723.patch \ |
56 | file://CVE-2021-20203.patch \ | 56 | file://CVE-2021-20203.patch \ |
57 | file://CVE-2021-3392.patch \ | 57 | file://CVE-2021-3392.patch \ |
58 | " | 58 | file://CVE-2020-25085.patch \ |
59 | " | ||
59 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" | 60 | UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar" |
60 | 61 | ||
61 | SRC_URI[md5sum] = "278eeb294e4b497e79af7a57e660cb9a" | 62 | SRC_URI[md5sum] = "278eeb294e4b497e79af7a57e660cb9a" |