Commit Graph

  • e304b17c31
    !1064 QEMU update to version to 4.1.0-89 main openeuler-ci-bot 2025-02-21 00:52:56 +00:00
  • 9ad3d61c32 !1064 QEMU update to version 4.1.0-89 xiao-yuliang 2025-01-08 11:18:52 +08:00
  • 7ad7a05a7e
    !1006 QEMU update to version to 4.1.0-88 openeuler-ci-bot 2024-10-14 12:11:23 +00:00
  • ffa176f660 QEMU update to version 4.1.0-88: - mac_dbdma: Remove leftover dma_memory_unmap calls(CVE-2024-8612) - softmmu: Support concurrent bounce buffers(CVE-2024-8612) - qdev-properties: add size32 property type - system/physmem: Per-AddressSpace bounce buffering - system/physmem: Propagate AddressSpace to MapClient helpers Jiabo Feng 2024-10-14 19:50:32 +08:00
  • 074928c386
    !1001 QEMU update to version 4.1.0-87 openeuler-ci-bot 2024-09-18 08:55:07 +00:00
  • 3d643587ea QEMU update to version 4.1.0-87: - nbd/server: CVE-2024-7409: Avoid use-after-free when closing server Jiabo Feng 2024-09-18 15:45:18 +08:00
  • 9f9c5c8924
    !983 QEMU update to version to 4.1.0-86 openeuler-ci-bot 2024-08-13 09:29:53 +00:00
  • c4360a84fc QEMU update to version 4.1.0-86: - nbd/server: CVE-2024-7409: Close stray clients at server-stop - main-loop.h: introduce qemu_in_main_thread() - aio-wait.h: introduce AIO_WAIT_WHILE_UNLOCKED - nbd/server: CVE-2024-7409: Drop non-negotiating clients - nbd/server: CVE-2024-7409: Cap default max-connections to 100 - nbd: Add max-connections to nbd-server-start - nbd/server: Plumb in new args to nbd_client_add() - nbd: Minor style and typo fixes Jiabo Feng 2024-08-13 16:29:51 +08:00
  • fe82f9e345
    !974 QEMU update to version 4.1.0-85: openeuler-ci-bot 2024-07-12 01:23:05 +00:00
  • d0b1ef237c QEMU update to version 4.1.0-85: - block: Parse filenames only when explicitly requested (CVE-2024-4467) - block: introduce bdrv_open_file_child() helper - qcow2: Don't open data_file with BDRV_O_NO_IO (CVE-2024-4467) - qcow2: Do not reopen data_file in invalidate_cache Jiabo Feng 2024-07-11 14:38:44 +08:00
  • baecb25326
    !963 QEMU update to version 4.1.0-84: openeuler-ci-bot 2024-06-15 02:18:57 +00:00
  • 1fe98a3a7b QEMU update to version 4.1.0-84: - tests/qtest: ahci-test: add test exposing reset issue with pending callback (Fix CVE-2023-5088) - hw/ide: reset: cancel async DMA operation before resetting state (Fix CVE-2023-5088) Jiabo Feng 2024-06-15 09:54:38 +08:00
  • a57bcbf4ee
    !933 QEMU update to version 4.1.0-83 openeuler-ci-bot 2024-04-24 01:21:50 +00:00
  • 9df0eb3b5b QEMU update to version 4.1.0-83 - hw/virtio/virtio-crypto: Protect from DMA re-entrancy bugs(CVE-2024-3446) - hw/char/virtio-serial-bus: Protect from DMA re-entrancy bugs(CVE-2024-3446) - hw/display/virtio-gpu: Protect from DMA re-entrancy bugs(CVE-2024-3446) - hw/virtio: Introduce virtio_bh_new_guarded() helper - hw: replace most qemu_bh_new calls with qemu_bh_new_guarded - checkpatch: add qemu_bh_new/aio_bh_new checks - async: avoid use-after-free on re-entrancy guard - async: Add an optional reentrancy guard to the BH API - util/async: add a human-readable name to BHs for debugging - hw/sd/sdhci: Do not update TRNMOD when Command Inhibit (DAT) is set - Include sysemu/sysemu.h a lot less Jiabo Feng 2024-04-23 22:03:19 +08:00
  • 459efe6220
    !886 QEMU update to version 4.1.0-82 openeuler-ci-bot 2024-03-09 08:46:28 +00:00
  • f25d5b2eaa QEMU update to version 4.1.0-82 - hw/scsi/lsi53c895a: add missing decrement of reentrancy counter - hw/scsi/lsi53c895a: Fix reentrancy issues in the LSI controller (CVE-2023-0330) - net: Update MemReentrancyGuard for NIC - net: Provide MemReentrancyGuard * to qemu_new_nic() - memory: prevent dma-reentracy issues - softmmu/physmem: Introduce MemTxAttrs::memory field and MEMTX_ACCESS_ERROR - Fixed the early version of CVE-2022-4144 patch is not fully adapted Jiabo Feng 2024-03-09 16:12:18 +08:00
  • 0f8812948c
    !850 [sync] PR-849: QEMU update to version 4.1.0-81 openeuler-ci-bot 2023-11-30 14:18:21 +00:00
  • 8512b0ec13 QEMU update to version 4.1.0-81 - hw/pvrdma: Protect against buggy or malicious guest driver Jiabo Feng 2023-11-29 15:15:59 +08:00
  • 8fdf9772e7
    !827 QEMU update to version 4.1.0-80 openeuler-ci-bot 2023-09-12 01:10:13 +00:00
  • e4214041dc QEMU update to version 4.1.0-80 - accel/tcg: fix race in cpu_exec_step_atomic (bug 1863025) - pci: assert configuration access is within bounds - io: remove io watch if TLS channel is closed during handshake Jiabo Feng 2023-09-11 19:53:33 +08:00
  • 7d61f425f5
    !808 QEMU update to version 4.1.0-79 openeuler-ci-bot 2023-08-21 01:27:01 +00:00
  • 1ece911d20 QEMU update to version 4.1.0-79 - virtio-crypto: verify src&dst buffer length for sym request Jiabo Feng 2023-08-16 09:32:34 +08:00
  • 86ec50d591
    !794 QEMU update to version 4.1.0-78 openeuler-ci-bot 2023-07-28 03:25:32 +00:00
  • 0e9f137616 QEMU update to version 4.1.0-78 - qga/win32: Use rundll for VSS installation - qga/win32: Remove change action from MSI installer - 9pfs: prevent opening special files (CVE-2023-2861) Jiabo Feng 2023-07-26 09:34:33 +08:00
  • af9e18fe2d
    !763 hw/pvrdma: Protect against buggy or malicious guest driver (CVE-2022-1050) openeuler-ci-bot 2023-05-18 09:02:24 +00:00
  • d8da2eaa57 hw/pvrdma: Protect against buggy or malicious guest driver (CVE-2022-1050) liuxiangdong 2023-05-12 16:34:35 +08:00
  • 85af3a887e
    !692 fix CVE-2022-4144 openeuler-ci-bot 2022-12-05 13:13:52 +00:00
  • cb6a9a42d3 fix CVE-2022-4144 yezengruan 2022-12-05 20:03:27 +08:00
  • 4a62ecf36f
    !658 hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (CVE-2021-3638) openeuler-ci-bot 2022-10-08 02:08:30 +00:00
  • 3154027d5b hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (CVE-2021-3638) yezengruan 2022-09-30 19:10:07 +08:00
  • c6514f25c1
    !645 hw/usb/hcd-xhci: Fix unbounded loop in xhci_ring_chain_length() (CVE-2020-14394) openeuler-ci-bot 2022-09-08 01:33:04 +00:00
  • dd421f155f hw/usb/hcd-xhci: Fix unbounded loop in xhci_ring_chain_length() (CVE-2020-14394) yezengruan 2022-09-07 17:21:55 +08:00
  • 800d793fa7
    !639 fix CVE-2022-0216 (openeuler !333) openeuler-ci-bot 2022-09-01 09:43:17 +00:00
  • 1ff82de83b fix CVE-2022-0216 (openeuler !333) bobychen 2022-08-30 19:30:36 +08:00
  • bc80f9b7a3
    !624 Provides qemu-kvm for upgrade openeuler-ci-bot 2022-08-25 09:12:08 +00:00
  • 9fadbb45fe Provides qemu-kvm for upgrade yezengruan 2022-08-25 12:22:10 +08:00
  • 83cf98218b
    !609 Fix CVE-2022-35414 openeuler-ci-bot 2022-07-20 06:08:53 +00:00
  • e5f762ef4e fix CVE-2022-35414 yezengruan 2022-07-20 10:14:17 +08:00
  • 49549fdca2
    !586 fix CVE-2021-3507 (openeuler !308) From: @yezengruan Reviewed-by: @kevinzhu1 Signed-off-by: @kevinzhu1 openeuler-ci-bot 2022-06-06 02:11:40 +00:00
  • 3319e4bf53 fix CVE-2021-3507 (openeuler !308) yezengruan 2022-06-02 10:39:28 +08:00
  • 051651f20a
    !578 fix CVE-2021-20257/CVE-2020-13253 and fix gcc 10.3.1 compile error (openeuler !302!305) From: @sundongx Reviewed-by: @yezengruan Signed-off-by: @yezengruan openeuler-ci-bot 2022-05-30 03:27:17 +00:00
  • 63c3424617 fix CVE-2021-20257/CVE-2020-13253 and fix gcc 10.3.1 compile error Sun Dongxu 2022-05-28 15:36:32 +08:00
  • bedb54d47e
    !569 fix CVE-2021-3750 and Check that colo-compare is active (openeuler !290!297) From: @yezengruan Reviewed-by: @kevinzhu1 Signed-off-by: @kevinzhu1 openeuler-ci-bot 2022-05-23 12:37:31 +00:00
  • 3fc6a966db fix CVE-2021-3750 and Check that colo-compare is active (openeuler !290!297) yezengruan 2022-05-21 14:25:26 +08:00
  • f5bccf82f2
    !560 fix CVE-2021-20196/CVE-2021-4207/CVE-2021-4206 (openeuler !286) From: @bobychen Reviewed-by: @yezengruan Signed-off-by: @yezengruan openeuler-ci-bot 2022-05-16 10:22:26 +00:00
  • 40b9b28df1 fix CVE-2021-20196/CVE-2021-4207/CVE-2021-4206 (openeuler !286) bobychen 2022-05-10 16:27:03 +08:00
  • 2d64eecbca
    !541 fix CVE-2022-26354 and CVE-2022-26353 From: @yezengruan Reviewed-by: @kevinzhu1 Signed-off-by: @kevinzhu1 openeuler-ci-bot 2022-04-16 01:18:09 +00:00
  • 188d1bd76f fix CVE-2022-26354 and CVE-2022-26353 yezengruan 2022-04-15 16:51:47 +08:00
  • 389df97ed4
    !530 fix CVE-2021-3930/CVE-2021-3582/CVE-2021-3607/CVE-2021-3608(!268!275) From: @yezengruan Reviewed-by: @kevinzhu1 Signed-off-by: @kevinzhu1 openeuler-ci-bot 2022-04-07 08:58:02 +00:00
  • bc7b2dfda0 fix CVE-2021-3582/CVE-2021-3607/CVE-2021-3608 yezengruan 2022-04-06 14:22:15 +08:00
  • 4abcbecf94 spec: Update release version with !268 Jinhao Gao 2022-03-28 15:20:54 +08:00
  • 675ed3bcfd hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands Jinhao Gao 2022-03-28 15:25:21 +08:00
  • 59cb41c78f !408 add Phytium's CPU models: FT-2000+ and Tengyun-S2500. Merge pull request !408 from imxcc/openEuler-20.03-LTS-SP3 openeuler-ci-bot 2021-12-21 12:20:55 +00:00
  • 69103ffb29 add Phytium's CPU models: FT-2000+ and Tengyun-S2500 imxcc 2021-12-21 17:44:32 +08:00
  • beadee95f6 !405 [sync] PR-400: Automatically generate code patches with openeuler !214 Merge pull request !405 from openeuler-sync-bot/sync-pr400-openEuler-20.03-LTS-Next-to-openEuler-20.03-LTS-SP3 openeuler-ci-bot 2021-12-20 12:19:21 +00:00
  • daf121cbbe spec: Update release version with !214 Chen Qun 2021-12-03 16:27:47 +08:00
  • 9c598f0304 spec: Update patch and changelog with !214 virtio-balloon: apply upstream patch. !214 Chen Qun 2021-12-03 16:27:41 +08:00
  • e899504bfe virtio-balloon: apply upstream patch. Chen Qun 2021-11-16 17:16:56 +08:00
  • 8a5b41c0d0 !395 Automatically generate code patches with openeuler !207 From: @kuhnchen18 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-10-28 01:06:49 +00:00
  • 2548877d9b spec: Update release version with !207 Chen Qun 2021-10-27 21:28:24 +08:00
  • 4f067031b1 spec: Update patch and changelog with !207 sync from SP1 !207 Chen Qun 2021-10-27 21:28:20 +08:00
  • 757fe50cbd fix cve-2020-35505 Chen Qun 2021-06-21 17:20:55 +08:00
  • 1d10eda8a7 fix cve-2020-35504 Chen Qun 2021-06-21 17:15:39 +08:00
  • 7768d6f2bb !392 sync from SP2 From: @imxcc Reviewed-by: @kevinzhu1 Signed-off-by: @kevinzhu1 openeuler-ci-bot 2021-10-21 03:04:59 +00:00
  • 2104fc99f9 fix cve-2021-3592 cve-2021-3593 cve-2021-3595 imxcc 2021-10-19 20:47:52 +08:00
  • 31cbaf0af0 Modify changelogs in spec file which are out of order that caused compile error. Zhongrui Tang 2021-10-06 17:40:22 +08:00
  • 54767b579e !382 Automatically generate code patches with openeuler !203 From: @kuhnchen18 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-09-26 09:18:06 +00:00
  • d30bb48e38 spec: Update release version with !203 Chen Qun 2021-09-26 16:28:53 +08:00
  • 815a770bd3 spec: Update patch and changelog with !203 fix CVE-2021-3748 #I4BI3F !203 Chen Qun 2021-09-26 16:28:39 +08:00
  • 724941aa3d virtio-net: fix use after unmap/free for sg Chen Qun 2021-09-02 13:44:12 +08:00
  • f1d4486abb !373 Automatically generate code patches with openeuler !197 From: @kuhnchen18 Reviewed-by: Signed-off-by: openeuler-ci-bot 2021-09-24 03:10:40 +00:00
  • 255e850459 spec: Update release version with !197 Chen Qun 2021-09-15 21:27:14 +08:00
  • 710bcb8e78 spec: Update patch and changelog with !197 fix CVE-2021-3713 #I49VTJ !197 Chen Qun 2021-09-15 21:27:12 +08:00
  • f5b4a7d1e3 uas: add stream number sanity checks. Chen Qun 2021-08-18 14:05:05 +02:00
  • 9ad3374a09 !365 bugfix: 为热插的CPU初始化PMU From: @imxcc Reviewed-by: Signed-off-by: openeuler-ci-bot 2021-09-09 09:03:32 +00:00
  • 250f805a9d hw/arm/virt: Init PMU for hotplugged vCPU imxcc 2021-08-31 17:20:42 +08:00
  • 6f849eef65 !356 【SP1分支同步】block_curl: add bolck_curl package From: @lijiajie128 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-08-20 02:29:02 +00:00
  • 0ff9050fca block_curl: add bolck_curl package Jiajie Li 2021-08-19 13:42:00 +08:00
  • abc1406e45 !352 Automatically generate code patches with openeuler !184 From: @kuhnchen18 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-08-16 10:45:30 +00:00
  • e98f83ffa3 spec: Update release version with !184 Chen Qun 2021-08-16 16:27:29 +08:00
  • 51a6e68cb5 spec: Update patch and changelog with !184 fix CVE-2021-3682 #I45H4H !184 Chen Qun 2021-08-16 16:27:29 +08:00
  • c837e689ec usbredir: fix free call Chen Qun 2021-07-22 09:27:56 +02:00
  • 0bacd5ae13 !327 Automatically generate code patches with openeuler !158 From: @kuhnchen18 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-07-19 11:17:15 +00:00
  • d2b9019f32 spec: Update release version with !158 Chen Qun 2021-07-16 16:27:06 +08:00
  • fe9a52eade spec: Update patch and changelog with !158 [feature]add support for AVX512_BF16 and new CPU model Cooperlake !158 Chen Qun 2021-07-16 16:27:03 +08:00
  • 2640c73b51 target/i386: Export TAA_NO bit to guests Chen Qun 2019-11-18 23:23:27 -08:00
  • 1f3e64d6ef target/i386: add PSCHANGE_NO bit for the ARCH_CAPABILITIES MSR Chen Qun 2019-11-13 15:54:35 +01:00
  • 777bd4cc19 target/i386: Add missed security features to Cooperlake CPU model Chen Qun 2021-07-09 11:17:19 +08:00
  • 6af78a0fd4 target/i386: Add new bit definitions of MSR_IA32_ARCH_CAPABILITIES Chen Qun 2019-12-25 14:30:17 +08:00
  • 7b770e279d i386: Add new CPU model Cooperlake Chen Qun 2019-10-22 15:35:28 +08:00
  • 570b7ec727 i386: Add macro for stibp Chen Qun 2019-10-22 15:35:27 +08:00
  • b0d43e51f0 i386: Add MSR feature bit for MDS-NO Chen Qun 2019-10-22 15:35:26 +08:00
  • 5c53cc20b8 x86: Intel AVX512_BF16 feature enabling Chen Qun 2019-07-25 14:14:16 +08:00
  • 2d6f58e3d2 !324 Automatically generate code patches with openeuler !155 From: @kuhnchen18 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-07-14 02:22:41 +00:00
  • b0ff231b14 spec: Update release version with !155 Chen Qun 2021-07-13 11:46:46 +08:00
  • 051ed0f96d spec: Update patch and changelog with !155 hw/net/rocker_of_dpa: fix double free bug of rocker device !155 Chen Qun 2021-07-13 11:46:29 +08:00
  • a4efdbff92 hw/net/rocker_of_dpa: fix double free bug of rocker device Chen Qun 2021-07-12 17:30:45 +08:00
  • 0ab601cd2f !313 Automatically generate code patches with openeuler !149 From: @kuhnchen18 Reviewed-by: @imxcc Signed-off-by: @imxcc openeuler-ci-bot 2021-06-21 10:37:44 +00:00
  • cefa4454f7 spec: Update release version with !149 Chen Qun 2021-06-21 16:27:40 +08:00
  • 707acdc80c spec: Update patch and changelog with !149 fix CVE-2021-3527 #I3U9T9 && CVE-2019-12067#I3VG5H && CVE-2021-20221 #I3UFOP !149 Chen Qun 2021-06-21 16:27:23 +08:00