summaryrefslogtreecommitdiff
path: root/poky/meta/recipes-devtools/qemu
diff options
context:
space:
mode:
authorPatrick Williams <patrick@stwcx.xyz>2022-08-22 23:46:06 +0300
committerPatrick Williams <patrick@stwcx.xyz>2022-08-22 23:46:57 +0300
commit53fdac2b0aee16e297ce86b473c56547ff1330ac (patch)
tree2bee75c38a2f8a1c8e1ff5d629a0defab197113f /poky/meta/recipes-devtools/qemu
parentcb2a94c39eddda6e0df65f98fff97cce711c9134 (diff)
downloadopenbmc-53fdac2b0aee16e297ce86b473c56547ff1330ac.tar.xz
subtree updates
poky: e4b5c35fd4..387ab5f18b: Alex Kiernan (2): bind: Remove legacy python3 PACKAGECONFIG code openssh: Add openssh-sftp-server to openssh RDEPENDS Alexander Kanavin (16): gnupg: update 2.3.4 -> 2.3.6 xev: update 1.2.4 -> 1.2.5 xmodmap: update 1.0.10 -> 1.0.11 xf86-input-synaptics: update 1.9.1 -> 1.9.2 encodings: update 1.0.5 -> 1.0.6 font-util: update 1.3.2 -> 1.3.3 xserver-xorg: update 21.1.3 -> 21.1.4 linux-firmware: update 20220610 -> 20220708 libuv: upgrade 1.44.1 -> 1.44.2 log4cplus: upgrade 2.0.7 -> 2.0.8 vala: upgrade 0.56.0 -> 0.56.1 vala: upgrade 0.56.1 -> 0.56.2 webkitgtk: upgrade 2.36.3 -> 2.36.4 xwayland: upgrade 22.1.2 -> 22.1.3 epiphany: upgrade 42.2 -> 42.3 lttng-modules: update 2.13.3 -> 2.13.4 Bruce Ashfield (14): yocto-bsps: update to v5.10.113 yocto-bsps: update to v5.10.128 and buildpaths fixes yocto-bsps: update to v5.15.52 and buildpaths fixes yocto-bsps/5.10: fix buildpaths issue with gen-mach-types yocto-bsps/5.15: fix buildpaths issue with gen-mach-types yocto-bsps/5.10: fix buildpaths issue with pnmtologo yocto-bsps/5.15: fix buildpaths issue with pnmtologo yocto-bsps: update to v5.15.54 yocto-bsps: update to v5.10.130 linux-yocto/5.10: update to v5.10.135 linux-yocto/5.15: update to v5.15.58 linux-yocto-rt/5.15: update to -rt48 (and fix -stable merge) linux-yocto/5.15: update to v5.15.59 linux-yocto/5.15: fix reproducibility issues Dmitry Baryshkov (1): linux-firwmare: restore WHENCE_CHKSUM variable He Zhe (1): lttng-modules: Fix build failure for kernel v5.15.58 Hitendra Prajapati (2): qemu: CVE-2022-35414 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash libtirpc: CVE-2021-46828 DoS vulnerability with lots of connections Joshua Watt (1): sstatesig: Include all dependencies in SPDX task signatures Khem Raj (3): lua: Backport fix for CVE-2022-33099 gcc-runtime: Pass -nostartfiles when building dummy libstdc++.so libgcc: Fix standalone target builds with usrmerge distro feature Martin Jansa (2): kernel.bbclass: pass LD also in savedefconfig glibc: revert one upstream change to work around broken DEBUG_BUILD build Mihai Lindner (1): wic/plugins/rootfs: Fix NameError for 'orig_path' Ming Liu (2): rootfs-postcommands.bbclass: move host-user-contaminated.txt to ${S} udev-extraconf:mount.sh: fix a umount issue Mingli Yu (1): strace: set COMPATIBLE_HOST for riscv32 Naveen (1): gcc: Backport a fix for gcc bug 105039 Richard Purdie (5): vim: Upgrade 9.0.0021 -> 9.0.0063 xorg-app: Tweak handling of compression changes in SRC_URI xwayland: upgrade 22.1.1 -> 22.1.2 base/reproducible: Change Source Date Epoch generation methods build-appliance-image: Update to kirkstone head revision Ross Burton (2): oeqa/runtime: add test that the kernel has CONFIG_PREEMPT_RT enabled perf: fix reproduciblity in older releases of Linux Sakib Sajal (3): dpkg: fix CVE-2022-1664 go: update v1.17.10 -> v1.17.12 git: upgrade v2.35.3 -> v2.35.4 Shruthi Ravichandran (2): initscripts: run umountnfs as a KILL script package_manager/ipk: do not pipe stderr to stdout Steve Sakoman (1): poky.conf: bump version for 4.0.3 Sundeep KOKKONDA (2): binutils: stable 2.38 branch updates glibc : stable 2.35 branch updates Tom Hochstein (1): gobject-introspection-data: Disable cache for g-ir-scanner Yi Zhao (1): tiff: Security fixes CVE-2022-1354 and CVE-2022-1355 Yue Tao (1): gnupg: upgrade to 2.3.7 to fix CVE-2022-34903 gr embeter (1): efivar: fix import functionality leimaohui (1): systemd: Added base_bindir into pkg_postinst:udev-hwdb. wangmy (4): bind: upgrade 9.18.2 -> 9.18.3 bind: upgrade 9.18.3 -> 9.18.4 mkfontscale: upgrade 1.2.1 -> 1.2.2 xdpyinfo: upgrade 1.3.2 -> 1.3.3 meta-openembedded: a47ef04661..acbe748798: Akash Hadke (1): polkit: Add --shell /bin/nologin to polkitd user Anuj Mittal (1): yasm: fix buildpaths warning Armin Kuster (1): bigbuckbunny-1080p: update SRC_URI Aryaman Gupta (1): rsyslog: update 8.2202->8.2206 Chen Qi (1): catfish: fix buildpaths issue Davide Gardenal (6): libplist: ignore patched CVEs meta-oe: ignore patched CVEs mongodb: ignore unrelated CVEs php: ignore patched CVEs postgresql: ignore unrelated CVE openjpeg: ignore CVE-2015-1239 Khem Raj (1): ibus: Swith to use main branch instead of master Marta Rybczynska (1): polkit: update patches for musl compilation Martin Jansa (1): glmark2: fix compatibility with python-3.11 Mingli Yu (6): net-snmp: set ac_cv_path_PSPROG postgresql: Fix the buildpaths issue freeradius: Fix buildpaths issue openipmi: Fix buildpaths issue apache2: Fix the buildpaths issue frr: fix buildpaths issue Peter Kjellerstedt (2): libwebsockets: Avoid absolute paths in *.cmake files in the sysroot cryptsetup: Add support for building without SSH tokens Vyacheslav Yurkov (1): polkit: add udisks2 rule Wang Mingyu (3): php: upgrade 8.1.7 -> 8.1.8 ndisc6: upgrade 1.0.5 -> 1.0.6 tracker: upgrade 3.3.0 -> 3.3.1 Yi Zhao (1): polkit-group-rule-udisks2: fix override syntax in RDEPENDS Yue Tao (1): python3-lxml: Security fix CVE-2022-2309 wangmy (4): stunnel: upgrade 5.63 -> 5.64 stunnel: upgrade 5.64 -> 5.65 redis: upgrade 7.0.2 -> 7.0.4 tracker: upgrade 3.3.1 -> 3.3.2 Signed-off-by: Patrick Williams <patrick@stwcx.xyz> Change-Id: I48e5e47f05b456589a0c3106b5a095f1b43780b0
Diffstat (limited to 'poky/meta/recipes-devtools/qemu')
-rw-r--r--poky/meta/recipes-devtools/qemu/qemu.inc1
-rw-r--r--poky/meta/recipes-devtools/qemu/qemu/CVE-2022-35414.patch53
2 files changed, 54 insertions, 0 deletions
diff --git a/poky/meta/recipes-devtools/qemu/qemu.inc b/poky/meta/recipes-devtools/qemu/qemu.inc
index 63f0569d06..54a68e1730 100644
--- a/poky/meta/recipes-devtools/qemu/qemu.inc
+++ b/poky/meta/recipes-devtools/qemu/qemu.inc
@@ -35,6 +35,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \
file://pvrdma.patch \
file://CVE-2021-4206.patch \
file://CVE-2021-4207.patch \
+ file://CVE-2022-35414.patch \
"
UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar"
diff --git a/poky/meta/recipes-devtools/qemu/qemu/CVE-2022-35414.patch b/poky/meta/recipes-devtools/qemu/qemu/CVE-2022-35414.patch
new file mode 100644
index 0000000000..3786497f01
--- /dev/null
+++ b/poky/meta/recipes-devtools/qemu/qemu/CVE-2022-35414.patch
@@ -0,0 +1,53 @@
+From ee76e64ee1cb232b77652b21cc94ec6b6c7e4b13 Mon Sep 17 00:00:00 2001
+From: Hitendra Prajapati <hprajapati@mvista.com>
+Date: Wed, 27 Jul 2022 10:49:47 +0530
+Subject: [PATCH] CVE-2022-35414
+
+Upstream-Status: Backport [https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c]
+CVE: CVE-2022-35414
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ softmmu/physmem.c | 13 ++++++++++++-
+ 1 file changed, 12 insertions(+), 1 deletion(-)
+
+diff --git a/softmmu/physmem.c b/softmmu/physmem.c
+index 3524c04c2..3c467527d 100644
+--- a/softmmu/physmem.c
++++ b/softmmu/physmem.c
+@@ -667,7 +667,7 @@ void tcg_iommu_init_notifier_list(CPUState *cpu)
+
+ /* Called from RCU critical section */
+ MemoryRegionSection *
+-address_space_translate_for_iotlb(CPUState *cpu, int asidx, hwaddr addr,
++address_space_translate_for_iotlb(CPUState *cpu, int asidx, hwaddr orig_addr,
+ hwaddr *xlat, hwaddr *plen,
+ MemTxAttrs attrs, int *prot)
+ {
+@@ -676,6 +676,7 @@ address_space_translate_for_iotlb(CPUState *cpu, int asidx, hwaddr addr,
+ IOMMUMemoryRegionClass *imrc;
+ IOMMUTLBEntry iotlb;
+ int iommu_idx;
++ hwaddr addr = orig_addr;
+ AddressSpaceDispatch *d =
+ qatomic_rcu_read(&cpu->cpu_ases[asidx].memory_dispatch);
+
+@@ -720,6 +721,16 @@ address_space_translate_for_iotlb(CPUState *cpu, int asidx, hwaddr addr,
+ return section;
+
+ translate_fail:
++ /*
++ * We should be given a page-aligned address -- certainly
++ * tlb_set_page_with_attrs() does so. The page offset of xlat
++ * is used to index sections[], and PHYS_SECTION_UNASSIGNED = 0.
++ * The page portion of xlat will be logged by memory_region_access_valid()
++ * when this memory access is rejected, so use the original untranslated
++ * physical address.
++ */
++ assert((orig_addr & ~TARGET_PAGE_MASK) == 0);
++ *xlat = orig_addr;
+ return &d->map.sections[PHYS_SECTION_UNASSIGNED];
+ }
+
+--
+2.25.1
+