Name qemu-native
Version 4.2.0
Summary Fast open source processor emulator
Description QEMU is a hosted virtual machine monitor: it emulates the machine's processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it to run a variety of guest operating systems
Section base
License GPLv2 & LGPLv2.1
Homepage http://qemu.org
Recipe file recipes-devtools/qemu/qemu-native_4.2.0.bb
recipes-devtools/qemu/qemu-native.inc
recipes-devtools/qemu/qemu.inc
recipes-devtools/qemu/qemu-targets.inc
Layer openembedded-core (dunfell branch)
Inherits
  • native
  • nopackages
  • pkgconfig
  • ptest
  • relocatable
Dependencies
  • glib-2.0-native
  • pkgconfig-native
  • zlib-native
  • libaio
  • alsa-lib
  • bluez5
  • bzip2
  • ncurses
  • dtc
  • libgcrypt
  • mesa
  • gnutls
  • gtk+3
  • gettext-native
  • libcap-ng
  • curl
  • libnfs
  • eudev
  • libusb1
  • libxml2
  • lzo
  • nettle
  • nss
  • numactl
  • libsdl2
  • libseccomp
  • snappy
  • spice
  • libssh
  • usbredir
  • virglrenderer
  • libcap
  • attr
  • jpeg
  • libpng
  • cyrus-sasl
  • vte
  • gettext-native
  • xen-tools
  • xfsprogs
  • libxkbcommon
PACKAGECONFIG options
  • aio
  • alsa
  • bluez
  • brlapi
  • bzip2
  • capstone
  • curses
  • fdt
  • gcrypt
  • glusterfs
  • glx
  • gnutls
  • gtk+
  • kvm
  • libcap-ng
  • libcurl
  • libiscsi
  • libnfs
  • libudev
  • libusb
  • libxml2
  • lzo
  • nettle
  • nss
  • numa
  • rbd
  • rdma
  • sdl
  • seccomp
  • slirp
  • snappy
  • spice
  • ssh
  • usb-redir
  • vde
  • virglrenderer
  • virtfs
  • vnc-jpeg
  • vnc-png
  • vnc-sasl
  • vte
  • xen
  • xfs
  • xkbcommon

Sources

https://download.qemu.org/qemu-4.2.0.tar.xz

Patches

Patch Status
qemu/0001-qemu-Add-missing-wacom-HID-descriptor.patch Submitted
qemu/0002-Add-subpackage-ptest-which-runs-all-unit-test-cases-.patch Pending
qemu/0003-qemu-Add-addition-environment-space-to-boot-loader-q.patch Inappropriate - OE uses deep paths
qemu/0004-qemu-disable-Valgrind.patch Inappropriate
qemu/0005-qemu-native-set-ld.bfd-fix-cflags-and-set-some-envir.patch Pending
qemu/0006-chardev-connect-socket-to-a-spawned-command.patch Inappropriate [embedded specific]
qemu/0007-apic-fixup-fallthrough-to-PIC.patch Submitted [https://lists.gnu.org/archive/html/qemu-devel/2013-04/msg00878.html]
qemu/0008-linux-user-Fix-webkitgtk-hangs-on-32-bit-x86-target.patch Submitted http://lists.gnu.org/archive/html/qemu-devel/2018-01/msg04185.html
qemu/0009-Fix-webkitgtk-builds.patch Pending
qemu/0010-configure-Add-pkg-config-handling-for-libgcrypt.patch Denied [https://lists.nongnu.org/archive/html/qemu-devel/2019-08/msg06333.html]
qemu/0011-hw-i386-pc-fix-regression-in-parsing-vga-cmdline-par.patch Backport [https://git.qemu.org/?p=qemu.git;a=commitdiff;h=a88c40f02ace88f09b2a85a64831b277b2ebc88c]
qemu/0012-util-cacheinfo-fix-crash-when-compiling-with-uClibc.patch Backport
qemu/CVE-2019-15890.patch Backport
qemu/CVE-2020-1711.patch Backport [https://git.qemu.org/?p=qemu.git;a=patch;h=693fd2acdf14dd86c0bf852610f1c2cca80a74dc]
qemu/CVE-2020-7039-1.patch Backport
qemu/CVE-2020-7039-2.patch Backport
qemu/CVE-2020-7039-3.patch Backport
qemu/0001-Add-enable-disable-udev.patch Pending
qemu/CVE-2020-7211.patch Backport [https://gitlab.freedesktop.org/slirp/libslirp/-/commit/14ec36e107a8c9af7d0a80c3571fe39b291ff1d4.patch]
qemu/0001-qemu-Do-not-include-file-if-not-exists.patch Submitted [https://lists.gnu.org/archive/html/qemu-devel/2020-03/msg07188.html]
qemu/CVE-2020-11102.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=8ffb7265af64ec81748335ec8f20e7ab542c3850]
qemu/CVE-2020-11869.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=ac2071c3791b67fc7af78b8ceb320c01ca1b5df7]
qemu/CVE-2020-13361.patch Backport [https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html]
qemu/CVE-2020-10761.patch Backport [https://github.com/qemu/qemu/commit/5c4fe018c025740fef4a0a4421e8162db0c3eefd]
qemu/CVE-2020-10702.patch Backport [https://git.qemu.org/?p=qemu.git;a=patch;h=de0b1bae6461f67243282555475f88b2384a1eb9]
qemu/CVE-2020-13659.patch Backport [https://github.com/qemu/qemu/commit/77f55eac6c433e23e82a1b88b2d74f385c4c7d82]
qemu/CVE-2020-13800.patch Backport [https://github.com/qemu/qemu/commit/a98610c429d52db0937c1e48659428929835c455]
qemu/CVE-2020-13362.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=f50ab86a2620bd7e8507af865b164655ee921661]
qemu/CVE-2020-15863.patch Backport [https://git.qemu.org/?p=qemu.git;a=commitdiff;h=5519724a13664b43e225ca05351c60b4468e4555]
qemu/CVE-2020-14364.patch Backport
qemu/CVE-2020-14415.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=7a4ede0047a8613b0e3b72c9d351038f013dd357]
qemu/CVE-2020-16092.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=035e69b063835a5fd23cacabd63690a3d84532a8]
qemu/0001-target-mips-Increase-number-of-TLB-entries-on-the-34.patch Backport [https://github.com/qemu/qemu/commit/68fa519a6cb455005317bd61f95214b58b2f1e69]
qemu/CVE-2019-20175.patch Backport
qemu/CVE-2020-24352.patch Backport [ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=ca1f9cbfdce4d63b10d57de80fef89a89d92a540;hp=2ddafce7f797082ad216657c830afd4546f16e37 ]
qemu/CVE-2020-25723.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=2fdb42d840400d58f2e706ecca82c142b97bcbd6]
qemu/CVE-2021-20203.patch Unknown
qemu/CVE-2021-3392.patch Backport [ https://git.qemu.org/?p=qemu.git;a=commit;h=3791642c8d60029adf9b00bcb4e34d7d8a1aea4d ]
qemu/CVE-2020-25085.patch Backport
qemu/CVE-2020-25624_1.patch Backport
qemu/CVE-2020-25624_2.patch Backport
qemu/CVE-2020-25625.patch Backport
qemu/CVE-2020-29443.patch Backport
qemu/CVE-2021-20221.patch Backport
qemu/CVE-2021-20181.patch Backport [89fbea8737e8f7b954745a1ffc4238d377055305]
qemu/CVE-2021-3416_1.patch Backport [705df5466c98f3efdd2b68d3b31dad86858acad7]
qemu/CVE-2021-3416_2.patch Backport [1caff0340f49c93d535c6558a5138d20d475315c]
qemu/CVE-2021-3416_3.patch Backport [331d2ac9ea307c990dc86e6493e8f0c48d14bb33]
qemu/CVE-2021-3416_5.patch Backport [8c92060d3c0248bd4d515719a35922cd2391b9b4]
qemu/CVE-2021-3416_6.patch Backport [8c552542b81e56ff532dd27ec6e5328954bdda73]
qemu/CVE-2021-3416_7.patch Backport [5311fb805a4403bba024e83886fa0e7572265de4]
qemu/CVE-2021-3416_8.patch Backport [99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928]
qemu/CVE-2021-3416_9.patch Backport [e73adfbeec9d4e008630c814759052ed945c3fed]
qemu/CVE-2021-3416_10.patch Backport [37cee01784ff0df13e5209517e1b3594a5e792d1]
qemu/CVE-2021-20257.patch Backport [3de46e6fc489c52c9431a8a832ad8170a7569bd8]
qemu/CVE-2021-3544.patch Backport
qemu/CVE-2021-3544_2.patch Backport
qemu/CVE-2021-3544_3.patch Backport
qemu/CVE-2021-3544_4.patch Backport
qemu/CVE-2021-3544_5.patch Backport
qemu/CVE-2021-3545.patch Backport
qemu/CVE-2021-3546.patch Backport
qemu/CVE-2021-3527-1.patch Backport
qemu/CVE-2021-3527-2.patch Backport
qemu/CVE-2021-3582.patch Backport [284f191b4abad213aed04cb0458e1600fd18d7c4]
qemu/CVE-2021-3607.patch Backport [32e5703cfea07c91e6e84bcb0313f633bb146534]
qemu/CVE-2021-3608.patch Backport [66ae37d8cc313f89272e711174a846a229bcdbd3]
qemu/CVE-2020-12829_1.patch Backport
qemu/CVE-2020-12829_2.patch Backport
qemu/CVE-2020-12829_3.patch Backport
qemu/CVE-2020-12829_4.patch Backport
qemu/CVE-2020-12829_5.patch Backport
qemu/CVE-2020-27617.patch Unknown
qemu/CVE-2020-28916.patch Backport
qemu/CVE-2021-3682.patch Backport [5e796671e6b8d5de4b0b423dce1b3eba144a92c9]
qemu/CVE-2020-13253_1.patch Unknown
qemu/CVE-2020-13253_2.patch Unknown
qemu/CVE-2020-13253_3.patch Unknown
qemu/CVE-2020-13253_4.patch Unknown
qemu/CVE-2020-13253_5.patch Unknown
qemu/CVE-2020-13791.patch Submitted
qemu/CVE-2022-35414.patch Backport [https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c]
qemu/CVE-2020-27821.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=4bfb024bc76973d40a359476dc0291f46e435442]
qemu/CVE-2020-13754-1.patch Backport
qemu/CVE-2020-13754-2.patch Backport
qemu/CVE-2020-13754-3.patch Backport
qemu/CVE-2020-13754-4.patch Backport
qemu/CVE-2021-3713.patch Backport
qemu/CVE-2021-3748.patch Backport
qemu/CVE-2021-3930.patch Backport
qemu/CVE-2021-4206.patch Backport
qemu/CVE-2021-4207.patch Backport
qemu/CVE-2022-0216-1.patch Backport
qemu/CVE-2022-0216-2.patch Backport
qemu/CVE-2021-3750.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=b9d383ab797f54ae5fa8746117770709921dc529 && https://git.qemu.org/?p=qemu.git;a=commit;h=3ab6fdc91b72e156da22848f0003ff4225690ced && https://git.qemu.org/?p=qemu.git;a=commit;h=58e74682baf4e1ad26b064d8c02e5bc99c
qemu/CVE-2021-3638.patch Backport [https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg01682.html]
qemu/CVE-2021-20196.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/1ab95af033a419e7a64e2d58e67dd96b20af5233]
qemu/CVE-2021-3507.patch Backport [https://github.com/qemu/qemu/commit/defac5e2fbddf8423a354ff0454283a2115e1367]
qemu/hw-block-nvme-refactor-nvme_addr_read.patch Unknown
qemu/hw-block-nvme-handle-dma-errors.patch Unknown
qemu/CVE-2021-3929.patch Backport
qemu/CVE-2022-4144.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/6dbbf055148c6f1b7d8a3251a65bd6f3d1e1f622]
qemu/CVE-2020-15859.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/ubuntu/CVE-2020-15859.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/22dc8663d9fc7baa22100544c600b6285a63c7a3 ]
qemu/CVE-2020-15469-1.patch Backport [import from ubuntu
qemu/CVE-2020-15469-2.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-2.patch?h=ubuntu/focal-security Upstream Commit https://github.com/qemu/qemu/commit/4f2a5202a05fc1612954804a2482f07bff105ea2]
qemu/CVE-2020-15469-3.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-3.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/24202d2b561c3b4c48bd28383c8c34b4ac66c2bf]
qemu/CVE-2020-15469-4.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-4.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/f867cebaedbc9c43189f102e4cdfdff05e88df7f]
qemu/CVE-2020-15469-5.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-5.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/b5bf601f364e1a14ca4c3276f88dfec024acf613 ]
qemu/CVE-2020-15469-6.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-6.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/921604e175b8ec06c39503310e7b3ec1e3eafe9e]
qemu/CVE-2020-15469-7.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-7.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/2c9fb3b784000c1df32231e1c2464bb2e3fc4620 ]
qemu/CVE-2020-15469-8.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-8.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/735754aaa15a6ed46db51fd731e88331c446ea54]
qemu/CVE-2020-35504.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-35504.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/0db895361b8a82e1114372ff9f4857abea605701 ]
qemu/CVE-2020-35505.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-35505.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/99545751734035b76bd372c4e7215bb337428d89 ]
qemu/CVE-2022-26354.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2022-26354.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf ]
qemu/CVE-2021-3409-1.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-1.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/b263d8f928001b5cfa2a993ea43b7a5b3a1811e8 ]
qemu/CVE-2021-3409-2.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-2.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/8be45cc947832b3c02144c9d52921f499f2d77fe ]
qemu/CVE-2021-3409-3.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-3.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/bc6f28995ff88f5d82c38afcfd65406f0ae375aa ]
qemu/CVE-2021-3409-4.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-4.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/5cd7aa3451b76bb19c0f6adc2b931f091e5d7fcd ]
qemu/CVE-2021-3409-5.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-5.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/cffb446e8fd19a14e1634c7a3a8b07be3f01d5c9 ]
qemu/hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch Backport [https://github.com/qemu/qemu/commit/61c34fc && https://gitlab.com/qemu-project/qemu/-/commit/8efec0ef8bbc1e75a7ebf6e325a35806ece9b39f]
qemu/CVE-2023-0330.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2023-0330.patch?h=ubuntu/focal-security
qemu/CVE-2023-3354.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4]
qemu/CVE-2023-3180.patch Backport from [https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980]
qemu/CVE-2020-24165.patch Backport [https://github.com/qemu/qemu/commit/886cc68943ebe8cf7e5f970be33459f95068a441 ]
qemu/CVE-2023-5088.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e]
qemu/9pfs-local-ignore-O_NOATIME-if-we-don-t-have-permiss.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/a5804fcf7b22fc7d1f9ec794dd284c7d504bd16b]
qemu/CVE-2023-2861.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/f6b0de53fb87ddefed348a39284c8e2f28dc4eda]
qemu/0012-fix-libcap-header-issue-on-some-distro.patch Pending
qemu/0013-cpus.c-Add-error-messages-when-qemi_cpu_kick_thread-.patch Inappropriate

Other branches

This recipe in other branches of openembedded-core:

Branch Recipe
master qemu-native 9.1.0
scarthgap (Yocto Project 5.0) qemu-native 8.2.3
nanbield (Yocto Project 4.3) qemu-native 8.1.4
mickledore (Yocto Project 4.2) qemu-native 7.2.0
langdale (Yocto Project 4.1) qemu-native 7.1.0
kirkstone (Yocto Project 4.0) qemu-native 6.2.0
honister (Yocto Project 3.4) qemu-native 6.0.0
hardknott (Yocto Project 3.3) qemu-native 5.2.0
gatesgarth (Yocto Project 3.2) qemu-native 5.1.0
dunfell (Yocto Project 3.1) qemu-native 4.2.0 (this recipe)
zeus (Yocto Project 3.0) qemu-native 4.1.0
warrior (Yocto Project 2.7) qemu-native 3.1.1.1