summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu
diff options
context:
space:
mode:
authorEmily Vekariya <emily.vekariya@einfochips.com>2023-08-09 18:10:44 +0530
committerSteve Sakoman <steve@sakoman.com>2023-08-16 03:55:12 -1000
commit00ba8af95657d6f17668a34ee12c49b9bb353844 (patch)
treeace83066d03aff5d8b8fcb57f5dd54653e92b20f /meta/recipes-devtools/qemu
parent3c6a02f04a2c958c974d0359d81bc0c833452857 (diff)
downloadpoky-00ba8af95657d6f17668a34ee12c49b9bb353844.tar.gz
qemu: CVE-ID correction for CVE-2020-35505
- The commit [https://github.com/qemu/qemu/commit/995457517340] ("esp: ensure cmdfifo is not empty and current_dev is non-NULL") fixes CVE-2020-35505 instead of CVE-2020-35504. - Hence, corrected the CVE-ID in CVE-2020-35505.patch. - Reference: https://bugzilla.redhat.com/show_bug.cgi?id=1909769 (From OE-Core rev: 9d54930a0c37e2878bbbe221341ebbd2bdd78a22) Signed-off-by: Emily Vekariya <emily.vekariya@einfochips.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/qemu')
-rw-r--r--meta/recipes-devtools/qemu/qemu/CVE-2020-35505.patch11
1 files changed, 7 insertions, 4 deletions
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2020-35505.patch b/meta/recipes-devtools/qemu/qemu/CVE-2020-35505.patch
index c5ff6e89ff..40c0b1e74f 100644
--- a/meta/recipes-devtools/qemu/qemu/CVE-2020-35505.patch
+++ b/meta/recipes-devtools/qemu/qemu/CVE-2020-35505.patch
@@ -20,16 +20,19 @@ Reviewed-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
20Tested-by: Alexander Bulekov <alxndr@bu.edu> 20Tested-by: Alexander Bulekov <alxndr@bu.edu>
21Message-Id: <20210407195801.685-7-mark.cave-ayland@ilande.co.uk> 21Message-Id: <20210407195801.685-7-mark.cave-ayland@ilande.co.uk>
22 22
23CVE: CVE-2020-35504 23CVE: CVE-2020-35505
24Upstream-Status: Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-35505.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/99545751734035b76bd372c4e7215bb337428d89 ] 24Upstream-Status: Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-35505.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/99545751734035b76bd372c4e7215bb337428d89 ]
25Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com> 25Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com>
26Signed-off-by: Emily Vekariya <emily.vekariya@einfochips.com>
26--- 27---
27 hw/scsi/esp.c | 3 +++ 28 hw/scsi/esp.c | 4 ++++
28 1 file changed, 3 insertions(+) 29 1 file changed, 4 insertions(+)
29 30
31diff --git a/hw/scsi/esp.c b/hw/scsi/esp.c
32index c7d701bf..c2a67bc8 100644
30--- a/hw/scsi/esp.c 33--- a/hw/scsi/esp.c
31+++ b/hw/scsi/esp.c 34+++ b/hw/scsi/esp.c
32@@ -193,6 +193,10 @@ static void do_busid_cmd(ESPState *s, ui 35@@ -193,6 +193,10 @@ static void do_busid_cmd(ESPState *s, uint8_t *buf, uint8_t busid)
33 36
34 trace_esp_do_busid_cmd(busid); 37 trace_esp_do_busid_cmd(busid);
35 lun = busid & 7; 38 lun = busid & 7;