| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
QEMU mailing list thread is here:
https://marc.info/?l=qemu-devel&m=153229252602494&w=2
The patch is here:
https://marc.info/?l=qemu-devel&m=153230940005574&w=2
Package-Manager: Portage-2.3.43, Repoman-2.3.10
|
|
|
|
| |
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
|
|
| |
This is a custom backport of a patch being prepared for 2.12.1.
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
| |
Closes: https://github.com/gentoo/gentoo/pull/7686
|
|
|
|
| |
This reverts commit 2fc1bc6c7b1f41a3a7df74ce8e170996eb7e36d9.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The device node /dev/vfio/vfio gets created on modprobing the vfio*
modules. This happens in particular on demand when a qemu vm with PCI
passthrough is started up. The default permissios for the freshly
created device node is
crw-rw-rw- 1 root root 10, 196 Mar 27 08:44 /dev/vfio/vfio
This is terrible.
This patch adds an udev rules and makes sure that the device node has rw
permissions for user root, and group kvm (and no permissions for all).
This fixes
- startup when a qemu-kvm is started as non-root (provided the user is
in group kvm, which is our current policy for accessing /dev/kvm, etc.,
anyway).
- work around this security vulnerability, where /dev/vfio/vfio is
created with world writable permissions upon modprobe. [1]
Thanks to username234, Kash Pande, Ted Rodgers for discovery and patch!
[1] Steps to reproduce:
% ls -la /dev/vfio/vfio
crw------- 1 root root 10, 196 Mar 27 15:40 /dev/vfio/vfio
% modprobe vfio
% ls -la /dev/vfio/vfio
crw-rw-rw- 1 root root 10, 196 Mar 27 15:41 /dev/vfio/vfio
[2] I cannot find an udev rule installed by libvirt/qemu/... that
triggers these permissions.
Bug: https://bugs.gentoo.org/651668
Package-Manager: Portage-2.3.24, Repoman-2.3.6
RepoMan-Options: --force
|
|
|
|
| |
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* new binary blobs pinning
=sys-firmware/edk2-ovmf-2017_p20180211
=sys-firmware/ipxe-1.0.0_p20180211
=sys-firmware/seabios-1.11.0
=sys-firmware/sgabios-0.1_pre8-r1
=sys-firmware/vgabios-0.7a-r1
keyword ebuild
* fix include path for capstone, bug 647570
* add USE=capstone support, bug 647570
* apply patch for CVE-2018-7550
Closes: https://bugs.gentoo.org/647570
Bug: https://bugs.gentoo.org/649616
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/646814
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
|
|
|
|
|
| |
* add hppa to softmmu targets
* add aarch64_be to user targets
* update the CFLAGS patch
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
Closes: https://github.com/gentoo/gentoo/pull/7020
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Added slot operator for libnfs
- Added patch for glibc-2.27 compatibility
- Added patch for CVE-2017-16845
- Backported upstream msr / spec ctrl patches:
6cfbc54e89 i386: Add EPYC-IBPB CPU model
ac96c41354 i386: Add new -IBRS versions of Intel CPU models
1b3420e1c4 i386: Add FEAT_8000_0008_EBX CPUID feature word
a2381f0934 i386: Add spec-ctrl CPUID bit
a33a2cfe2f i386: Add support for SPEC_CTRL MSR
- CVEs addressed by bump:
CVE-2017-17381
CVE-2017-18030
CVE-2017-18043
- CVEs addressed by patchset:
CVE-2017-15124
CVE-2017-16845
CVE-2018-5683
- CVE-2018-5748 is a libvirt vulnerability, not a qemu issue...
Bug: https://bugs.gentoo.org/638506
Bug: https://bugs.gentoo.org/643432
Bug: https://bugs.gentoo.org/646814
Closes: https://bugs.gentoo.org/641100
Closes: https://bugs.gentoo.org/646568
Closes: https://bugs.gentoo.org/646710
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
| |
Closes: https://github.com/gentoo/gentoo/pull/6419
|
|
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/630432
Bug: https://bugs.gentoo.org/633822
Bug: https://bugs.gentoo.org/634070
Bug: https://bugs.gentoo.org/634148
Package-Manager: Portage-2.3.8, Repoman-2.3.4
|
|
|
|
| |
Package-Manager: Portage-2.3.8, Repoman-2.3.4
|
|
|
|
|
|
|
|
|
| |
This version bump also addresses a number of security issues
CVE-2017-12809, bug #628498
CVE-2017-13673, bug #629316
CVE-2017-13711, bug #629350
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
| |
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
| |
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
|
|
|
|
| |
CVE-2017-7539, bug #625850
CVE-2017-10664, bug #623016
CVE-2017-10806, bug #624088
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
| |
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
|
|
|
|
|
| |
CVE-2017-11334, bug #621292
CVE-2017-11434, bug #625614
CVE-2017-9503, bug #621184
CVE-2017-9524, bug #621292
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
| |
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
|
|
|
|
|
|
|
|
| |
bug 616636, CVE-2017-8112
bug 616870 [1]
bug 616872 [2]
bug 616874 [1]
[1] minor change, queued upstream, no CVE assigned yet
[2] queued upstream, no CVE assigned yet
Package-Manager: Portage-2.3.3, Repoman-2.3.2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2017-7471, bug #616484
CVE-2017-7718, bug #616482
already applied on stable-2.8 as 3328c14e63f08fb07e8c6dec779c9d365e9e9864
CVE-2017-7980, bug #616462
already applied on stable-2.8 as a290442234fa214fcb7f45fc91d802bcb8d05c4b
031700e4527b9e05798f7040dccdf638da27aee2
CVE-2017-8086, bug #616460
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
|
|
| |
CVE-2017-6505, bug #612220
Package-Manager: Portage-2.3.3, Repoman-2.3.2
|
|
|
|
| |
Bug: 611234
|
|
|
|
|
|
|
|
|
|
|
| |
This commit applies a number of patches fixing
CVE-2017-2620 #609206
CVE-2017-2630 #609396
CVE-2017-5973 #609334
CVE-2017-5987 #609398
CVE-2017-6058 #609638
Package-Manager: Portage-2.3.3, Repoman-2.3.1
|
|
|
|
|
|
|
| |
Add an additional udev rule that grants access to /dev/vhost-net to the kvm
user.
Package-Manager: Portage-2.3.3, Repoman-2.3.1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This commit applies upstream patches to 2.8.0 for the following CVEs
CVE-2016-10155 #606720
CVE-2017-2615 #608034
CVE-2017-5525 #606264
CVE-2017-5552 #606722
CVE-2017-5578 #607000
CVE-2017-5579 #607100
CVE-2017-5667 #607766
CVE-2017-5856 #608036
CVE-2017-5857 #608038
CVE-2017-5898 #608520
CVE-2017-5931 #608728
Package-Manager: Portage-2.3.3, Repoman-2.3.1
|
|
|
|
| |
Package-Manager: Portage-2.3.3, Repoman-2.3.1
|
| |
|
| |
|
|
|
|
|
|
| |
Update the 7422 patch to match the version upstream merged.
Update the 8669-1 patch to include upstream references since it is
still not merged/fixed.
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-9102, bug #598328
CVE-2016-9103, bug #598328
CVE-2016-9104, bug #598328
CVE-2016-9105, bug #598328
CVE-2016-9106, bug #598772
Package-Manager: portage-2.3.0
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2016-7466, bug 594520
CVE-2016-7907, bug 596048
CVE-2016-7908, bug 596049
CVE-2016-7909, bug 596048
CVE-2016-7994, bug 596738
CVE-2016-7994, bug 596738
CVE-2016-8576, bug 596752
CVE-2016-8577, bug 596776
CVE-2016-8578, bug 596774
CVE-2016-8668, bug 597110
CVE-2016-8669, bug 597108
CVE-2016-8669, bug 597108
CVE-2016-8909, bug 598044
CVE-2016-8910, bug 598046
Package-Manager: portage-2.3.0
|
|
|
|
|
|
|
| |
CVE-2016-7466.patch # bug 594520
CVE-2016-7423.patch # bug 594368
Package-Manager: portage-2.3.0
|
|
|
|
|
|
|
|
|
| |
bug 593956: CVE-2016-7422
bug 593950: CVE-2016-7421
bug 590230: missing use depend opengl? ( media-libs/mesa[...,gbm] )
bug 575326: update to readme.gentoo-r1 eclass
Package-Manager: portage-2.2.28
|
|
|
|
| |
Package-Manager: portage-2.2.28
|
|
|
|
|
|
|
|
|
|
|
|
| |
This commit resolves
bug #591202
bug #593024
bug #593034 CVE-2016-7155
bug #593036 CVE-2016-7156
bug #593038 CVE-2016-7157
Package-Manager: portage-2.2.28
|
|
|
|
| |
Package-Manager: portage-2.2.28
|
|
|
|
| |
Package-Manager: portage-2.2.28
|
|
|
|
| |
Package-Manager: portage-2.2.28
|
|
|
|
|
|
| |
Unbreak using qemu-user with current stage3.
Package-Manager: portage-2.3.0
|
|
|
|
|
|
| |
The check code could trigger recent compiler warnings.
Package-Manager: portage-2.2.26
|
| |
|
| |
|
|
|
|
|
|
| |
Add upstream patch to workaround some combinations of xfsprogs & linux
headers so we don't have to worry about stable breakage anymore. This
fix is already in upstream & unstable versions.
|
| |
|
| |
|