124 Commits

Author SHA1 Message Date
ajacoutot
9a11c1ba8f Improvements to the sndio probing.
from Brad (maintainer)
2020-01-26 04:03:04 +00:00
ajacoutot
ed89ce3308 Update to qemu-4.2.0.
sndio backend updated for QEMU API changes by ratchov@.

from Brad (maintainer)
2020-01-25 17:40:29 +00:00
ajacoutot
4db370bc0a Update to qemu-4.1.0. 2019-08-18 06:56:07 +00:00
sthen
3d68d906f2 update to qemu-4.0.0, from Brad "With much help from ratchov@ to update
the sndio backend for various API changes with QEMU."
2019-07-04 17:11:05 +00:00
sthen
941977f45f Re-add a patch for PowerPC which was dropped by mistake. From Brad. 2019-06-13 21:11:11 +00:00
ratchov
1d80b4a515 Add sndio backend. It should allow guest operating systems with no
sndio support to use sndio audio interfaces of the host system.

With help from brad@, ok sthen@.
2019-05-09 05:12:53 +00:00
sthen
3b227cb1bc rm 0-byte patches, reminded by Brad 2018-12-24 22:13:14 +00:00
sthen
c2f6b945df update to qemu-3.1.0, from Brad. 2018-12-19 17:57:06 +00:00
ajacoutot
dacb48dcd8 - Add a patch for the virtio crashing issue
- Remove a patch no longer necessary

from Brad (maintainer)
2018-09-05 07:01:50 +00:00
ajacoutot
4ad21e11e1 Update to qemu-3.0.0.
from Brad (maintainer)
2018-08-17 07:18:59 +00:00
ajacoutot
62621d740c Update to qemu-2.12.0.
from Brad (maintainer)
2018-05-02 08:21:13 +00:00
ajacoutot
c6a022646c Pass MAP_STACK on allocated memory used for stack.
from semarie
ok Brad (maintainer)
2018-04-23 09:02:26 +00:00
ajacoutot
6181a69e6b Update to qemu-2.11.0.
from Brad (maintainer)
2017-12-15 16:25:31 +00:00
ajacoutot
8af48ccb88 osdep.h: Make TIME_MAX handle different time_t types
from Brad (maintainer)
2017-11-27 08:10:09 +00:00
ajacoutot
cad8dcbbdc Update to qemu-2.10.0.
from Brad (maintainer)
2017-08-31 08:32:36 +00:00
espie
503824262e let it build with clang, just need to patch tls auto-detection 2017-05-27 06:38:23 +00:00
uaa
786568238d fixed configure script to enable -curses option
ok sthen@ and brad@
2017-05-06 19:25:18 +00:00
ajacoutot
1809344e66 Update to qemu-2.9.0.
from Brad (maintainer)
2017-04-23 13:24:17 +00:00
ajacoutot
fdab93435d Update to qemu-2.8.1.
from Brad (MAINTAINER)
2017-04-10 13:13:02 +00:00
ajacoutot
87cc4d208c Fix interrupts with virtio when not using MSI.
from Brad (maintainer)
2017-02-25 11:16:25 +00:00
ajacoutot
3ad48f8e7f Update to qemu-2.8.0.
from Brad (maintainer)
2016-12-22 09:05:06 +00:00
ajacoutot
b9162f56aa Better diff to deal with the tap(4) transition. No functional change.
from Brad (maintainer)
2016-10-07 08:51:05 +00:00
ajacoutot
9fb6f52f2c Update to qemu-2.7.0.
from Brad (maintainer)
2016-09-03 15:31:07 +00:00
ajacoutot
b2a10b5261 Update to qemu-2.6.1.
from Brad (maintainer)
2016-08-21 12:04:23 +00:00
ajacoutot
e3006d696d Update to qemu-2.6.0.
from Brad (maintainer)
2016-05-13 07:20:46 +00:00
ajacoutot
eb809066a9 Tweak for CFLAGS handling. No change in resulting binary.
from Brad (maintainer)
2016-03-15 08:26:06 +00:00
ajacoutot
12142f4442 Major update to qemu-2.5.0.
Please direct any runtime fallout to Brad.

from Brad (maintainer)
2016-03-14 19:46:12 +00:00
ajacoutot
562c51d947 Fix for CVE-2016-2538.
from Brad (maintainer)
2016-03-01 10:18:25 +00:00
ajacoutot
d0d12a862e Security fix for CVE-2016-2391 and CVE-2016-2393.
from Brad (maintainer)
ok sthen@
2016-02-20 22:46:46 +00:00
sthen
e7fb0a762a Add a patch from QEMU upstream to fix CVE-2016-2198. From Brad, ok aja@
"USB Ehci emulation supports host controller capability registers.
But its mmio '.write' function was missing, which lead to a null
pointer dereference issue. Add a do nothing 'ehci_caps_write'
definition to avoid it; Do nothing because capability registers
are Read Only(RO)."
2016-02-14 11:27:32 +00:00
ajacoutot
14fc4e7dee SECURITY fix for CVE-2016-1981.
from Brad (maintainer)
2016-01-22 07:00:15 +00:00
ajacoutot
1731f561b1 SECURITY fix for CVE-2016-1714.
from Brad (maintainer)
2016-01-14 06:12:10 +00:00
ajacoutot
46b621ab9d SECURITY fixes for:
CVE-2015-8619, CVE-2015-8666, CVE-2015-8743, CVE-2015-8744, and CVE-2015-8745

from Brad (maintainer)
2016-01-05 06:56:12 +00:00
ajacoutot
0986de7918 SECURITY fix for CVE-2015-8613; from Brad (maintainer)
While here, fix path to smbd(8); reported by mlarkin@
2015-12-22 06:43:05 +00:00
ajacoutot
f1ac26cc40 SECURITY fixes for:
CVE-2015-7549, CVE-2015-8504, CVE-2015-8558, CVE-2015-8567 and CVE-2015-8568

from Brad (maintainer)
2015-12-16 06:41:06 +00:00
ajacoutot
b8cd4fd2ab SECURITY fixes for CVE-2015-7504, CVE-2015-7512, CVE-2015-8345.
from Brad (maintainer)
2015-12-08 06:55:13 +00:00
sthen
6f8fbf707d Remove malloc tracing from QEMU, this was removed in newer glib and results
in annoying messages:

(process:23283): GLib-WARNING **: gmem.c:482: custom memory allocation vtable not supported

From Brad.
2015-11-03 16:25:24 +00:00
sthen
ac0240b63f Adjust Qemu following the split of tun(4)'s "link0" mode into tap(4). 2015-10-23 15:15:28 +00:00
ajacoutot
15b06e762f SECURITY: CVE-2015-5278, CVE-2015-5279, CVE-2015-6815
Some more fixes, mostly security related.

from Brad (maintainer)
2015-09-16 09:18:13 +00:00
ajacoutot
1fe8b1ca1f SECURITY: CVE-2015-5745
virtio-serial: fix ANY_LAYOUT
Don't assume a specific layout for control messages.
Required by virtio 1.

from Brad (maintainer)
2015-09-16 07:08:41 +00:00
ajacoutot
e6c71023c7 SECURITY: vnc, fix memory corruption (CVE-2015-5225).
from Brad (maintainer)
2015-09-04 14:20:29 +00:00
sthen
de389f3209 Backport SECURITY fixes for qemu, from Brad.
ide/atapi: Fix START STOP UNIT command completion
rtl8139: avoid nested ifs in IP header parsing (CVE-2015-5165)
rtl8139: drop tautologous if (ip) {...} statement (CVE-2015-5165)
rtl8139: skip offload on short Ethernet/IP header (CVE-2015-5165)
rtl8139: check IP Header Length field (CVE-2015-5165)
rtl8139: check IP Total Length field (CVE-2015-5165)
rtl8139: skip offload on short TCP header (CVE-2015-5165)
rtl8139: check TCP Data Offset field (CVE-2015-5165)
scsi: fix buffer overflow in scsi_req_parse_cdb (CVE-2015-5158)
slirp: use less predictable directory name in /tmp for smb config (CVE-2015-4037)
i8254: fix out-of-bounds memory access in pit_ioport_read() (CVE-2015-3214)
incrementally decode websocket frames (CVE-2015-1779)
limit size of HTTP headers from websockets clients (CVE-2015-1779)
2015-08-11 21:28:53 +00:00
sthen
3c9b0fc32d add security fix for qemu CVE-2015-5154, from brad:
ide: Check array bounds before writing to io_buffer
2015-07-28 09:51:20 +00:00
sthen
78402cc18f Security fixes for qemu, from brad:
CVE-2015-3456  fdc: force the fifo access to be in bounds of the allocated buffer

During processing of certain commands such as FD_CMD_READ_ID and
FD_CMD_DRIVE_SPECIFICATION_COMMAND the fifo memory access could
get out of bounds leading to memory corruption with values coming
from the guest.

Fix this by making sure that the index is always bounded by the
allocated memory.


CVE-2015-3209  pcnet: force the buffer access to be in bounds during tx

4096 is the maximum length per TMD and it is also currently the size of
the relay buffer pcnet driver uses for sending the packet data to QEMU
for further processing. With packet spanning multiple TMDs it can
happen that the overall packet size will be bigger than sizeof(buffer),
which results in memory corruption.

Fix this by only allowing to queue maximum sizeof(buffer) bytes.
2015-07-18 20:36:56 +00:00
brad
6abaf2e78d Update to QEMU 2.2.0.
ok rpe@
2014-12-15 18:19:51 +00:00
brad
c0d02750eb Update to QEMU 2.1.1.
ok bcallah@
2014-09-20 03:03:19 +00:00
brad
fce588d812 Update to QEMU 2.1.0
ok bcallah@ rpe@
2014-08-14 01:05:03 +00:00
brad
33fe61d150 Update to QEMU 2.0.0
ok bcallah@ gsoares@ rpe@
2014-04-25 20:59:43 +00:00
brad
ffdba50c3d Update to QEMU 1.7.1.
ok gsoares@
2014-03-26 14:14:47 +00:00
brad
990f95de44 - Sync PIE bits with what was commited upstream
- Use stack protector strong instead of all

ok sthen@
2014-03-09 22:50:17 +00:00