summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu/qemu_2.5.0.bb
Commit message (Collapse)AuthorAgeFilesLines
* qemu: Security fix CVE-2016-4952Adrian Dudau2017-05-181-0/+1
| | | | | | | | | | | | | | | | | | | | | | affects qemu < 2.7.0 Quick Emulator(Qemu) built with the VMWARE PVSCSI paravirtual SCSI bus emulation support is vulnerable to an OOB r/w access issue. It could occur while processing SCSI commands 'PVSCSI_CMD_SETUP_RINGS' or 'PVSCSI_CMD_SETUP_MSG_RING'. A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS. References: ---------- http://www.openwall.com/lists/oss-security/2016/05/23/1 (From OE-Core rev: 3d6b4fd6bc4338b139ebcaf51b67c56cc97ba2ed) Signed-off-by: Adrian Dudau <adrian.dudau@enea.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-4439Adrian Dudau2017-05-181-0/+1
| | | | | | | | | | | | | | | | | | | | | | | affects qemu < 2.7.0 Quick Emulator(Qemu) built with the ESP/NCR53C9x controller emulation support is vulnerable to an OOB write access issue. The controller uses 16-byte FIFO buffer for command and data transfer. The OOB write occurs while writing to this command buffer in routine get_cmd(). A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS. References: ---------- http://www.openwall.com/lists/oss-security/2016/05/19/4 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-4441 (From OE-Core rev: 1bc071172236ea020cac9db96e33de81950a15ff) Signed-off-by: Adrian Dudau <adrian.dudau@enea.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Secuirty fix for CVE-2016-5403Armin Kuster2016-09-231-0/+1
| | | | | | | | | affects qemu < 2.7.0-rc0 (From OE-Core rev: c53820180cdccd97de1f314078570fac1ff16052) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix for CVE-2016-4002Armin Kuster2016-09-231-0/+1
| | | | | | | | | affects qemu < 2.6.0 (From OE-Core rev: 4c6493e90c7102a5bfa8aba4c00b112d083e91b8) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-6351Armin Kuster2016-09-231-0/+2
| | | | | | | | | affects qemu < 2.6.0 (From OE-Core rev: 72ee7cac11523a56b99282c03199b5b84326edf5) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-4439Armin Kuster2016-09-231-0/+1
| | | | | | | | | affects qemu < 2.6.0 (From OE-Core rev: b5c787631cd35fa5b3f10391c883ae7a3717690f) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security Fix CVE-2016-3712Armin Kuster2016-09-231-0/+4
| | | | | | | | | affects qemu < 2.6.0 (From OE-Core rev: ed78691a46a3c928297ae166e92fabdffa9e53c9) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security Fix CVE-2016-3710Armin Kuster2016-09-231-0/+1
| | | | | | | | | affects Qemu < 2.6.0 (From OE-Core rev: aa366a5cb5c4ed84537381d71dd5e66514c575be) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-2858Armin Kuster2016-04-291-0/+4
| | | | | | | (From OE-Core rev: 48909052e7b19ba108ee7813c1efdbed0c2e06ab) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-2857Armin Kuster2016-04-291-0/+1
| | | | | | | (From OE-Core rev: d1b972a55c59a3f3336b3ebd309532dc204ea97b) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Limit paths searched during user mode emulationRichard Purdie2016-03-101-0/+1
| | | | | | | | | | | | | | | | | | | By default qemu builds a complete list of directories within the user emulation sysroot (-L option). The OE sysroot directory is large and this is confusing, for example it indexes all pkgdata. In particular this confuses strace of qemu binaries with tons of irrelevant paths. This patch stops the code indexing up front and instead only indexes things if/as/when it needs to. This drastically reduces the files it reads and reduces memory usage and cleans up strace. It would also avoid the infinite directory traversal bug in [YOCTO #6996] although the code could still be vulnerable if it parsed those specific paths. (From OE-Core rev: 9ac5017b3328a18561c2912edfda2d7d97c675f2) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-2198Armin Kuster2016-02-111-0/+1
| | | | | | | | | CVE-2016-2198 Qemu: usb: ehci null pointer dereference in ehci_caps_write (From OE-Core rev: 33b5c3b4822b6bbb06ad5fdf7a120acd520f665d) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-2197Armin Kuster2016-02-111-0/+1
| | | | | | | | | CVE-2016-2197 Qemu: ide: ahci null pointer dereference when using FIS CLB engines (From OE-Core rev: bbc41337d28cc54d115378d4cad32f7b1c6f6cd5) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: Security fix CVE-2016-1568Armin Kuster2016-02-111-0/+1
| | | | | | | | | | CVE-2016-1568 Qemu: ide: ahci use-after-free vulnerability in aio port commands (From OE-Core rev: b1b2f629f8e2febd086eae8fabd24322333ea172) Signed-off-by: Armin Kuster <akuster@mvista.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* qemu: upgrade to 2.5.0Cristian Iorga2015-12-281-0/+20
- cpus.c-qemu_mutex_lock_iothread-fix-race-condition-a.patch removed, included upstream; - smc91c111_fix*.patch patches removed, included upstream; - trace-remove-malloc-tracing.patch patch removed, included upstream; - some configure options disappeared or changed name, updated. (From OE-Core rev: 11b14e80ac484df24459ef67746684bd49d1fbd8) Signed-off-by: Cristian Iorga <cristian.iorga@intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>