bluhm
15a7367811
Add wxneeded flag when linking qemu.
...
Add build dependency for msgfmt.
OK jca@ jung@ Brad Smith (maintainer)
2016-08-16 10:59:47 +00:00
ajacoutot
e3006d696d
Update to qemu-2.6.0.
...
from Brad (maintainer)
2016-05-13 07:20:46 +00:00
ajacoutot
45393be551
Update to qemu-2.5.1.1.
2016-05-10 16:08:13 +00:00
ajacoutot
93f3563ace
Update to qemu-2.5.1.
...
from Brad (maintainer)
2016-04-11 05:56:45 +00:00
ajacoutot
eb809066a9
Tweak for CFLAGS handling. No change in resulting binary.
...
from Brad (maintainer)
2016-03-15 08:26:06 +00:00
ajacoutot
12142f4442
Major update to qemu-2.5.0.
...
Please direct any runtime fallout to Brad.
from Brad (maintainer)
2016-03-14 19:46:12 +00:00
ajacoutot
562c51d947
Fix for CVE-2016-2538.
...
from Brad (maintainer)
2016-03-01 10:18:25 +00:00
ajacoutot
d0d12a862e
Security fix for CVE-2016-2391 and CVE-2016-2393.
...
from Brad (maintainer)
ok sthen@
2016-02-20 22:46:46 +00:00
sthen
e7fb0a762a
Add a patch from QEMU upstream to fix CVE-2016-2198. From Brad, ok aja@
...
"USB Ehci emulation supports host controller capability registers.
But its mmio '.write' function was missing, which lead to a null
pointer dereference issue. Add a do nothing 'ehci_caps_write'
definition to avoid it; Do nothing because capability registers
are Read Only(RO)."
2016-02-14 11:27:32 +00:00
ajacoutot
14fc4e7dee
SECURITY fix for CVE-2016-1981.
...
from Brad (maintainer)
2016-01-22 07:00:15 +00:00
ajacoutot
1731f561b1
SECURITY fix for CVE-2016-1714.
...
from Brad (maintainer)
2016-01-14 06:12:10 +00:00
ajacoutot
46b621ab9d
SECURITY fixes for:
...
CVE-2015-8619, CVE-2015-8666, CVE-2015-8743, CVE-2015-8744, and CVE-2015-8745
from Brad (maintainer)
2016-01-05 06:56:12 +00:00
ajacoutot
0986de7918
SECURITY fix for CVE-2015-8613; from Brad (maintainer)
...
While here, fix path to smbd(8); reported by mlarkin@
2015-12-22 06:43:05 +00:00
ajacoutot
f1ac26cc40
SECURITY fixes for:
...
CVE-2015-7549, CVE-2015-8504, CVE-2015-8558, CVE-2015-8567 and CVE-2015-8568
from Brad (maintainer)
2015-12-16 06:41:06 +00:00
ajacoutot
b8cd4fd2ab
SECURITY fixes for CVE-2015-7504, CVE-2015-7512, CVE-2015-8345.
...
from Brad (maintainer)
2015-12-08 06:55:13 +00:00
sthen
6f8fbf707d
Remove malloc tracing from QEMU, this was removed in newer glib and results
...
in annoying messages:
(process:23283): GLib-WARNING **: gmem.c:482: custom memory allocation vtable not supported
From Brad.
2015-11-03 16:25:24 +00:00
sthen
783a43b006
tap(4) and sudo cleanup for QEMU, from Brad.
2015-10-28 09:17:31 +00:00
sthen
ac0240b63f
Adjust Qemu following the split of tun(4)'s "link0" mode into tap(4).
2015-10-23 15:15:28 +00:00
ajacoutot
15b06e762f
SECURITY: CVE-2015-5278, CVE-2015-5279, CVE-2015-6815
...
Some more fixes, mostly security related.
from Brad (maintainer)
2015-09-16 09:18:13 +00:00
ajacoutot
1fe8b1ca1f
SECURITY: CVE-2015-5745
...
virtio-serial: fix ANY_LAYOUT
Don't assume a specific layout for control messages.
Required by virtio 1.
from Brad (maintainer)
2015-09-16 07:08:41 +00:00
ajacoutot
2be6e94ebb
Enable USB support now that libusb1>=1.0.20 is in.
...
from Brad (maintainer)
2015-09-15 12:48:39 +00:00
ajacoutot
e6c71023c7
SECURITY: vnc, fix memory corruption (CVE-2015-5225).
...
from Brad (maintainer)
2015-09-04 14:20:29 +00:00
ajacoutot
e07c6dbcdb
Enable the built-in iSCSI and NFS clients, the LZO support and the UUID
...
support.
from Brad (maintainer)
2015-08-25 06:43:35 +00:00
sthen
de389f3209
Backport SECURITY fixes for qemu, from Brad.
...
ide/atapi: Fix START STOP UNIT command completion
rtl8139: avoid nested ifs in IP header parsing (CVE-2015-5165)
rtl8139: drop tautologous if (ip) {...} statement (CVE-2015-5165)
rtl8139: skip offload on short Ethernet/IP header (CVE-2015-5165)
rtl8139: check IP Header Length field (CVE-2015-5165)
rtl8139: check IP Total Length field (CVE-2015-5165)
rtl8139: skip offload on short TCP header (CVE-2015-5165)
rtl8139: check TCP Data Offset field (CVE-2015-5165)
scsi: fix buffer overflow in scsi_req_parse_cdb (CVE-2015-5158)
slirp: use less predictable directory name in /tmp for smb config (CVE-2015-4037)
i8254: fix out-of-bounds memory access in pit_ioport_read() (CVE-2015-3214)
incrementally decode websocket frames (CVE-2015-1779)
limit size of HTTP headers from websockets clients (CVE-2015-1779)
2015-08-11 21:28:53 +00:00
jung
2083baf13b
remove sudo as run dependency and switch to doas in readme and scripts
...
ok sthen deraadt
2015-08-03 19:14:56 +00:00
sthen
3c9b0fc32d
add security fix for qemu CVE-2015-5154, from brad:
...
ide: Check array bounds before writing to io_buffer
2015-07-28 09:51:20 +00:00
sthen
78402cc18f
Security fixes for qemu, from brad:
...
CVE-2015-3456 fdc: force the fifo access to be in bounds of the allocated buffer
During processing of certain commands such as FD_CMD_READ_ID and
FD_CMD_DRIVE_SPECIFICATION_COMMAND the fifo memory access could
get out of bounds leading to memory corruption with values coming
from the guest.
Fix this by making sure that the index is always bounded by the
allocated memory.
CVE-2015-3209 pcnet: force the buffer access to be in bounds during tx
4096 is the maximum length per TMD and it is also currently the size of
the relay buffer pcnet driver uses for sending the packet data to QEMU
for further processing. With packet spanning multiple TMDs it can
happen that the overall packet size will be bigger than sizeof(buffer),
which results in memory corruption.
Fix this by only allowing to queue maximum sizeof(buffer) bytes.
2015-07-18 20:36:56 +00:00
ajacoutot
16a0151b00
ifdow/ifup require security/sudo.
...
ok brad@ (maintainer)
2015-07-18 05:48:43 +00:00
sthen
35319542e1
Update to QEMU 2.2.1, from Brad (maintainer).
...
"The QEMU update was also Ok'd by rpe@ bcallah@"
2015-04-09 20:12:15 +00:00
brad
6abaf2e78d
Update to QEMU 2.2.0.
...
ok rpe@
2014-12-15 18:19:51 +00:00
brad
30facbd95e
Update to QEMU 2.1.2.
...
ok bcallah@
2014-09-28 21:36:45 +00:00
brad
c0d02750eb
Update to QEMU 2.1.1.
...
ok bcallah@
2014-09-20 03:03:19 +00:00
brad
a5111197c2
and this too.
2014-08-14 22:34:54 +00:00
brad
331885c656
commit from the right dir so the actual 2.1.0 Makefile goes in.
2014-08-14 21:14:09 +00:00
brad
fce588d812
Update to QEMU 2.1.0
...
ok bcallah@ rpe@
2014-08-14 01:05:03 +00:00
brad
33fe61d150
Update to QEMU 2.0.0
...
ok bcallah@ gsoares@ rpe@
2014-04-25 20:59:43 +00:00
brad
ffdba50c3d
Update to QEMU 1.7.1.
...
ok gsoares@
2014-03-26 14:14:47 +00:00
brad
990f95de44
- Sync PIE bits with what was commited upstream
...
- Use stack protector strong instead of all
ok sthen@
2014-03-09 22:50:17 +00:00
brad
dbbfb242e6
Update to QEMU 1.7.0.
...
ok rpe@
2013-11-29 21:21:38 +00:00
sthen
701c91e413
kill VMEM_WARNING
2013-11-25 14:16:22 +00:00
brad
5396b30573
Update to QEMU 1.6.1.
...
ok sthen@
2013-10-30 19:53:29 +00:00
brad
afc65a9928
Update to QEMU 1.6.0.
...
ok sthen@ rpe@
2013-09-08 14:15:00 +00:00
brad
002dee61a3
Switch TIME_MAX from int to long long.
...
ok sthen@
2013-08-19 05:28:20 +00:00
brad
06578bfc85
Update to QEMU 1.5.1.
...
ok sthen@
2013-07-18 20:20:18 +00:00
brad
dd7b90b352
Back port a commit from master to make use of external libfdt
...
instead of the integrated copy.
ok sthen@
2013-06-23 21:27:55 +00:00
brad
d1f37b1012
Update to QEMU 1.5.0.
...
ok sthen@
2013-06-03 22:34:24 +00:00
brad
770c6df8bc
Update to QEMU 1.4.2. Includes a fix for CVE-2013-2007.
...
ok sthen@
2013-05-24 22:05:51 +00:00
brad
e1fc1f0ef4
Update to QEMU 1.4.1. Includes a fix for CVE-2013-1922.
...
ok sthen@
2013-04-19 02:47:43 +00:00
brad
6f9fb3668a
Make use of the testsuite.
...
ok sthen@
2013-04-14 20:28:56 +00:00
brad
0ba56332b3
Update the get_clock() function so it will utilize clock_gettime() with
...
monotonic time on OpenBSD instead of using gettimeofday().
ok sthen@
2013-04-01 13:40:32 +00:00