nixpkgs/pkgs/applications/virtualization/qemu
Martin Weinelt 0c54b757e9
qemu: apply patch for CVE-2020-27617
An assert(3) failure issue was found in the networking helper functions of QEMU. It could occur in the eth_get_gso_type() routine, if a packet does not have a valid networking L3 protocol (ex. IPv4, IPv6) value. A guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

Fixes: CVE-2020-27617
2020-11-02 14:01:01 +01:00
..
9p-ignore-noatime.patch qemu: Apply interim fix for overlayfs + O_NOATIME 2019-03-18 13:34:30 +01:00
CVE-2020-27617.patch qemu: apply patch for CVE-2020-27617 2020-11-02 14:01:01 +01:00
default.nix qemu: apply patch for CVE-2020-27617 2020-11-02 14:01:01 +01:00
fix-qemu-ga.patch qemu: 4.2.0 -> 5.0.0 2020-05-19 21:51:33 +02:00
force-uid0-on-9p.patch qemu_test: Rebase force-uid0-on-9p.patch 2017-03-11 15:16:49 +01:00
no-etc-install.patch qemu: 4.1.0 -> 4.2.0 2019-12-18 22:00:49 +00:00
sigrtminmax.patch qemu: port musl patch to new version (#46449) 2018-09-10 08:14:37 +02:00
utils.nix qemu-utils: install man pages 2020-08-11 21:02:49 +00:00