Name qemu
Version 4.2.0
Summary Fast open source processor emulator
Description QEMU is a hosted virtual machine monitor: it emulates the machine's processor through dynamic binary translation and provides a set of different hardware and device models for the machine, enabling it to run a variety of guest operating systems
Section base
License GPLv2 & LGPLv2.1
Homepage http://qemu.org
Recipe file recipes-devtools/qemu/qemu_4.2.0.bb
recipes-devtools/qemu/qemu.inc
recipes-devtools/qemu/qemu-targets.inc
Layer openembedded-core (dunfell branch)
Inherits
  • pkgconfig
  • ptest
Dependencies
  • alsa-lib
  • bison-native
  • dtc
  • glib-2.0
  • libsdl2
  • pixman
  • pkgconfig-native
  • virtual/i686-oe-linux-compilerlibs
  • virtual/i686-oe-linux-gcc
  • virtual/libc
  • zlib
  • libaio
  • alsa-lib
  • bluez5
  • bzip2
  • ncurses
  • dtc
  • libgcrypt
  • mesa
  • gnutls
  • gtk+3
  • gettext-native
  • libcap-ng
  • curl
  • libnfs
  • eudev
  • libusb1
  • libxml2
  • lzo
  • nettle
  • nss
  • numactl
  • libsdl2
  • libseccomp
  • snappy
  • spice
  • libssh
  • usbredir
  • virglrenderer
  • libcap
  • attr
  • jpeg
  • libpng
  • cyrus-sasl
  • vte
  • gettext-native
  • xen-tools
  • xfsprogs
  • libxkbcommon
PACKAGECONFIG options
  • aio
  • alsa
  • bluez
  • brlapi
  • bzip2
  • capstone
  • curses
  • fdt
  • gcrypt
  • glusterfs
  • glx
  • gnutls
  • gtk+
  • kvm
  • libcap-ng
  • libcurl
  • libiscsi
  • libnfs
  • libudev
  • libusb
  • libxml2
  • lzo
  • nettle
  • nss
  • numa
  • rbd
  • rdma
  • sdl
  • seccomp
  • slirp
  • snappy
  • spice
  • ssh
  • usb-redir
  • vde
  • virglrenderer
  • virtfs
  • vnc-jpeg
  • vnc-png
  • vnc-sasl
  • vte
  • xen
  • xfs
  • xkbcommon

Sources

https://download.qemu.org/qemu-4.2.0.tar.xz

Patches

Patch Status
qemu/0001-qemu-Add-missing-wacom-HID-descriptor.patch Submitted
qemu/0002-Add-subpackage-ptest-which-runs-all-unit-test-cases-.patch Pending
qemu/0003-qemu-Add-addition-environment-space-to-boot-loader-q.patch Inappropriate - OE uses deep paths
qemu/0004-qemu-disable-Valgrind.patch Inappropriate
qemu/0005-qemu-native-set-ld.bfd-fix-cflags-and-set-some-envir.patch Pending
qemu/0006-chardev-connect-socket-to-a-spawned-command.patch Inappropriate [embedded specific]
qemu/0007-apic-fixup-fallthrough-to-PIC.patch Submitted [https://lists.gnu.org/archive/html/qemu-devel/2013-04/msg00878.html]
qemu/0008-linux-user-Fix-webkitgtk-hangs-on-32-bit-x86-target.patch Submitted http://lists.gnu.org/archive/html/qemu-devel/2018-01/msg04185.html
qemu/0009-Fix-webkitgtk-builds.patch Pending
qemu/0010-configure-Add-pkg-config-handling-for-libgcrypt.patch Denied [https://lists.nongnu.org/archive/html/qemu-devel/2019-08/msg06333.html]
qemu/0011-hw-i386-pc-fix-regression-in-parsing-vga-cmdline-par.patch Backport [https://git.qemu.org/?p=qemu.git;a=commitdiff;h=a88c40f02ace88f09b2a85a64831b277b2ebc88c]
qemu/0012-util-cacheinfo-fix-crash-when-compiling-with-uClibc.patch Backport
qemu/CVE-2019-15890.patch Backport
qemu/CVE-2020-1711.patch Backport [https://git.qemu.org/?p=qemu.git;a=patch;h=693fd2acdf14dd86c0bf852610f1c2cca80a74dc]
qemu/CVE-2020-7039-1.patch Backport
qemu/CVE-2020-7039-2.patch Backport
qemu/CVE-2020-7039-3.patch Backport
qemu/0001-Add-enable-disable-udev.patch Pending
qemu/CVE-2020-7211.patch Backport [https://gitlab.freedesktop.org/slirp/libslirp/-/commit/14ec36e107a8c9af7d0a80c3571fe39b291ff1d4.patch]
qemu/0001-qemu-Do-not-include-file-if-not-exists.patch Submitted [https://lists.gnu.org/archive/html/qemu-devel/2020-03/msg07188.html]
qemu/CVE-2020-11102.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=8ffb7265af64ec81748335ec8f20e7ab542c3850]
qemu/CVE-2020-11869.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=ac2071c3791b67fc7af78b8ceb320c01ca1b5df7]
qemu/CVE-2020-13361.patch Backport [https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg03983.html]
qemu/CVE-2020-10761.patch Backport [https://github.com/qemu/qemu/commit/5c4fe018c025740fef4a0a4421e8162db0c3eefd]
qemu/CVE-2020-10702.patch Backport [https://git.qemu.org/?p=qemu.git;a=patch;h=de0b1bae6461f67243282555475f88b2384a1eb9]
qemu/CVE-2020-13659.patch Backport [https://github.com/qemu/qemu/commit/77f55eac6c433e23e82a1b88b2d74f385c4c7d82]
qemu/CVE-2020-13800.patch Backport [https://github.com/qemu/qemu/commit/a98610c429d52db0937c1e48659428929835c455]
qemu/CVE-2020-13362.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=f50ab86a2620bd7e8507af865b164655ee921661]
qemu/CVE-2020-15863.patch Backport [https://git.qemu.org/?p=qemu.git;a=commitdiff;h=5519724a13664b43e225ca05351c60b4468e4555]
qemu/CVE-2020-14364.patch Backport
qemu/CVE-2020-14415.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=7a4ede0047a8613b0e3b72c9d351038f013dd357]
qemu/CVE-2020-16092.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=035e69b063835a5fd23cacabd63690a3d84532a8]
qemu/0001-target-mips-Increase-number-of-TLB-entries-on-the-34.patch Backport [https://github.com/qemu/qemu/commit/68fa519a6cb455005317bd61f95214b58b2f1e69]
qemu/CVE-2019-20175.patch Backport
qemu/CVE-2020-24352.patch Backport [ https://git.qemu.org/?p=qemu.git;a=commitdiff;h=ca1f9cbfdce4d63b10d57de80fef89a89d92a540;hp=2ddafce7f797082ad216657c830afd4546f16e37 ]
qemu/CVE-2020-25723.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=2fdb42d840400d58f2e706ecca82c142b97bcbd6]
qemu/CVE-2021-20203.patch Unknown
qemu/CVE-2021-3392.patch Backport [ https://git.qemu.org/?p=qemu.git;a=commit;h=3791642c8d60029adf9b00bcb4e34d7d8a1aea4d ]
qemu/CVE-2020-25085.patch Backport
qemu/CVE-2020-25624_1.patch Backport
qemu/CVE-2020-25624_2.patch Backport
qemu/CVE-2020-25625.patch Backport
qemu/CVE-2020-29443.patch Backport
qemu/CVE-2021-20221.patch Backport
qemu/CVE-2021-20181.patch Backport [89fbea8737e8f7b954745a1ffc4238d377055305]
qemu/CVE-2021-3416_1.patch Backport [705df5466c98f3efdd2b68d3b31dad86858acad7]
qemu/CVE-2021-3416_2.patch Backport [1caff0340f49c93d535c6558a5138d20d475315c]
qemu/CVE-2021-3416_3.patch Backport [331d2ac9ea307c990dc86e6493e8f0c48d14bb33]
qemu/CVE-2021-3416_5.patch Backport [8c92060d3c0248bd4d515719a35922cd2391b9b4]
qemu/CVE-2021-3416_6.patch Backport [8c552542b81e56ff532dd27ec6e5328954bdda73]
qemu/CVE-2021-3416_7.patch Backport [5311fb805a4403bba024e83886fa0e7572265de4]
qemu/CVE-2021-3416_8.patch Backport [99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928]
qemu/CVE-2021-3416_9.patch Backport [e73adfbeec9d4e008630c814759052ed945c3fed]
qemu/CVE-2021-3416_10.patch Backport [37cee01784ff0df13e5209517e1b3594a5e792d1]
qemu/CVE-2021-20257.patch Backport [3de46e6fc489c52c9431a8a832ad8170a7569bd8]
qemu/CVE-2021-3544.patch Backport
qemu/CVE-2021-3544_2.patch Backport
qemu/CVE-2021-3544_3.patch Backport
qemu/CVE-2021-3544_4.patch Backport
qemu/CVE-2021-3544_5.patch Backport
qemu/CVE-2021-3545.patch Backport
qemu/CVE-2021-3546.patch Backport
qemu/CVE-2021-3527-1.patch Backport
qemu/CVE-2021-3527-2.patch Backport
qemu/CVE-2021-3582.patch Backport [284f191b4abad213aed04cb0458e1600fd18d7c4]
qemu/CVE-2021-3607.patch Backport [32e5703cfea07c91e6e84bcb0313f633bb146534]
qemu/CVE-2021-3608.patch Backport [66ae37d8cc313f89272e711174a846a229bcdbd3]
qemu/CVE-2020-12829_1.patch Backport
qemu/CVE-2020-12829_2.patch Backport
qemu/CVE-2020-12829_3.patch Backport
qemu/CVE-2020-12829_4.patch Backport
qemu/CVE-2020-12829_5.patch Backport
qemu/CVE-2020-27617.patch Unknown
qemu/CVE-2020-28916.patch Backport
qemu/CVE-2021-3682.patch Backport [5e796671e6b8d5de4b0b423dce1b3eba144a92c9]
qemu/CVE-2020-13253_1.patch Unknown
qemu/CVE-2020-13253_2.patch Unknown
qemu/CVE-2020-13253_3.patch Unknown
qemu/CVE-2020-13253_4.patch Unknown
qemu/CVE-2020-13253_5.patch Unknown
qemu/CVE-2020-13791.patch Submitted
qemu/CVE-2022-35414.patch Backport [https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c]
qemu/CVE-2020-27821.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=4bfb024bc76973d40a359476dc0291f46e435442]
qemu/CVE-2020-13754-1.patch Backport
qemu/CVE-2020-13754-2.patch Backport
qemu/CVE-2020-13754-3.patch Backport
qemu/CVE-2020-13754-4.patch Backport
qemu/CVE-2021-3713.patch Backport
qemu/CVE-2021-3748.patch Backport
qemu/CVE-2021-3930.patch Backport
qemu/CVE-2021-4206.patch Backport
qemu/CVE-2021-4207.patch Backport
qemu/CVE-2022-0216-1.patch Backport
qemu/CVE-2022-0216-2.patch Backport
qemu/CVE-2021-3750.patch Backport [https://git.qemu.org/?p=qemu.git;a=commit;h=b9d383ab797f54ae5fa8746117770709921dc529 && https://git.qemu.org/?p=qemu.git;a=commit;h=3ab6fdc91b72e156da22848f0003ff4225690ced && https://git.qemu.org/?p=qemu.git;a=commit;h=58e74682baf4e1ad26b064d8c02e5bc99c
qemu/CVE-2021-3638.patch Backport [https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg01682.html]
qemu/CVE-2021-20196.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/1ab95af033a419e7a64e2d58e67dd96b20af5233]
qemu/CVE-2021-3507.patch Backport [https://github.com/qemu/qemu/commit/defac5e2fbddf8423a354ff0454283a2115e1367]
qemu/hw-block-nvme-refactor-nvme_addr_read.patch Unknown
qemu/hw-block-nvme-handle-dma-errors.patch Unknown
qemu/CVE-2021-3929.patch Backport
qemu/CVE-2022-4144.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/6dbbf055148c6f1b7d8a3251a65bd6f3d1e1f622]
qemu/CVE-2020-15859.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/ubuntu/CVE-2020-15859.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/22dc8663d9fc7baa22100544c600b6285a63c7a3 ]
qemu/CVE-2020-15469-1.patch Backport [import from ubuntu
qemu/CVE-2020-15469-2.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-2.patch?h=ubuntu/focal-security Upstream Commit https://github.com/qemu/qemu/commit/4f2a5202a05fc1612954804a2482f07bff105ea2]
qemu/CVE-2020-15469-3.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-3.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/24202d2b561c3b4c48bd28383c8c34b4ac66c2bf]
qemu/CVE-2020-15469-4.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-4.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/f867cebaedbc9c43189f102e4cdfdff05e88df7f]
qemu/CVE-2020-15469-5.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-5.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/b5bf601f364e1a14ca4c3276f88dfec024acf613 ]
qemu/CVE-2020-15469-6.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-6.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/921604e175b8ec06c39503310e7b3ec1e3eafe9e]
qemu/CVE-2020-15469-7.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-7.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/2c9fb3b784000c1df32231e1c2464bb2e3fc4620 ]
qemu/CVE-2020-15469-8.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-15469-8.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/735754aaa15a6ed46db51fd731e88331c446ea54]
qemu/CVE-2020-35504.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-35504.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/0db895361b8a82e1114372ff9f4857abea605701 ]
qemu/CVE-2020-35505.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2020-35505.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/99545751734035b76bd372c4e7215bb337428d89 ]
qemu/CVE-2022-26354.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2022-26354.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf ]
qemu/CVE-2021-3409-1.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-1.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/b263d8f928001b5cfa2a993ea43b7a5b3a1811e8 ]
qemu/CVE-2021-3409-2.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-2.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/8be45cc947832b3c02144c9d52921f499f2d77fe ]
qemu/CVE-2021-3409-3.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-3.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/bc6f28995ff88f5d82c38afcfd65406f0ae375aa ]
qemu/CVE-2021-3409-4.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-4.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/5cd7aa3451b76bb19c0f6adc2b931f091e5d7fcd ]
qemu/CVE-2021-3409-5.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2021-3409-5.patch?h=ubuntu/focal-security Upstream commit https://github.com/qemu/qemu/commit/cffb446e8fd19a14e1634c7a3a8b07be3f01d5c9 ]
qemu/hw-display-qxl-Pass-requested-buffer-size-to-qxl_phy.patch Backport [https://github.com/qemu/qemu/commit/61c34fc && https://gitlab.com/qemu-project/qemu/-/commit/8efec0ef8bbc1e75a7ebf6e325a35806ece9b39f]
qemu/CVE-2023-0330.patch Backport [import from ubuntu https://git.launchpad.net/ubuntu/+source/qemu/tree/debian/patches/CVE-2023-0330.patch?h=ubuntu/focal-security
qemu/CVE-2023-3354.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4]
qemu/CVE-2023-3180.patch Backport from [https://gitlab.com/qemu-project/qemu/-/commit/9d38a8434721a6479fe03fb5afb150ca793d3980]
qemu/CVE-2020-24165.patch Backport [https://github.com/qemu/qemu/commit/886cc68943ebe8cf7e5f970be33459f95068a441 ]
qemu/CVE-2023-5088.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/7d7512019fc40c577e2bdd61f114f31a9eb84a8e]
qemu/9pfs-local-ignore-O_NOATIME-if-we-don-t-have-permiss.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/a5804fcf7b22fc7d1f9ec794dd284c7d504bd16b]
qemu/CVE-2023-2861.patch Backport [https://gitlab.com/qemu-project/qemu/-/commit/f6b0de53fb87ddefed348a39284c8e2f28dc4eda]

bbappends

This recipe is appended by:

meta-luneos qemu_%.bbappend
meta-cube qemu_4.%.bbappend
meta-virtualization qemu_%.bbappend
meta-openstack qemu_4.%.bbappend
meta-webosose qemu_%.bbappend
meta-zephyr qemu_4.2.%.bbappend

Other branches

This recipe in other branches of openembedded-core:

Branch Recipe
master qemu 9.1.0
scarthgap (Yocto Project 5.0) qemu 8.2.3
nanbield (Yocto Project 4.3) qemu 8.1.4
mickledore (Yocto Project 4.2) qemu 7.2.0
langdale (Yocto Project 4.1) qemu 7.1.0
kirkstone (Yocto Project 4.0) qemu 6.2.0
honister (Yocto Project 3.4) qemu 6.0.0
hardknott (Yocto Project 3.3) qemu 5.2.0
gatesgarth (Yocto Project 3.2) qemu 5.1.0
dunfell (Yocto Project 3.1) qemu 4.2.0 (this recipe)
zeus (Yocto Project 3.0) qemu 4.1.0
warrior (Yocto Project 2.7) qemu 3.1.1.1
thud (Yocto Project 2.6) qemu 3.0.0
sumo (Yocto Project 2.5) qemu 2.11.1
rocko (Yocto Project 2.4) qemu 2.10.0
pyro (Yocto Project 2.3) qemu 2.8.0
morty (Yocto Project 2.2) qemu 2.7.0
krogoth (Yocto Project 2.1) qemu 2.5.0
jethro (Yocto Project 2.0) qemu 2.4.0
fido (Yocto Project 1.8) qemu 2.2.0
fido (Yocto Project 1.8) qemu 1.3.0+gitX
dizzy (Yocto Project 1.7) qemu 2.1.0
dizzy (Yocto Project 1.7) qemu 1.3.0+gitX
daisy (Yocto Project 1.6) qemu 1.7.0
daisy (Yocto Project 1.6) qemu 1.3.0+gitX
dora (Yocto Project 1.5) qemu 1.3.0+gitX
dora (Yocto Project 1.5) qemu 1.5.0
dylan (Yocto Project 1.4) qemu 1.3.0+gitX
dylan (Yocto Project 1.4) qemu 1.4.0
danny (Yocto Project 1.3) qemu 1.2+git
danny (Yocto Project 1.3) qemu 1.2.0