| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
Two new USE flags:
- io-uring for fast async io_uring I/O
- zstd for libzstd compression of migration traffic
Reported-by: Thomas Stein
Closes: https://bugs.gentoo.org/720138
Package-Manager: Portage-2.3.99, Repoman-2.3.22
Signed-off-by: Sergei Trofimovich <slyfox@gentoo.org>
|
|
|
|
|
| |
Package-Manager: Portage-2.3.99, Repoman-2.3.22
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/717770
Package-Manager: Portage-2.3.99, Repoman-2.3.22
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/709490
Package-Manager: Portage-2.3.93, Repoman-2.3.20
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/711334
Package-Manager: Portage-2.3.89, Repoman-2.3.20
Signed-off-by: Sergei Trofimovich <slyfox@gentoo.org>
|
|
|
|
|
|
|
|
|
|
|
| |
Two more knobs exposed:
- USE=plugins to add plugin support to qemu's TCG and logging
- USE=vhost-user-fs to support access to host's FS via VIRTIOFS FUSE protocol
Reported-by: Per Pomsel
Closes: https://bugs.gentoo.org/702036
Package-Manager: Portage-2.3.81, Repoman-2.3.20
Signed-off-by: Sergei Trofimovich <slyfox@gentoo.org>
|
|
|
|
|
|
| |
Package-Manager: Portage-2.3.76, Repoman-2.3.17
Signed-off-by: James Le Cuirot <chewi@gentoo.org>
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/686026
Package-Manager: Portage-2.3.68, Repoman-2.3.16
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Version bump to 4.0.0 (bug #684274)
- Apply mips fpu mode fix (bug #683640)
- Bug #683458: Reenable stripping. Remove old CFLAGS workaround. Let's
see how far this takes us.
Bug: https://bugs.gentoo.org/683458
Closes: https://bugs.gentoo.org/683640
Closes: https://bugs.gentoo.org/684274
Closes: https://github.com/gentoo/gentoo/pull/11719
Package-Manager: Portage-2.3.64, Repoman-2.3.12
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
| |
Package-Manager: Portage-2.3.62, Repoman-2.3.12
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
|
|
|
|
| |
CVE-2018-20815
CVE-2019-9824
Bug: https://bugs.gentoo.org/681850
Bug: https://bugs.gentoo.org/680834
Package-Manager: Portage-2.3.62, Repoman-2.3.12
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/672346
Bug: https://bugs.gentoo.org/673108
Bug: https://bugs.gentoo.org/678302
Package-Manager: Portage-2.3.60, Repoman-2.3.12
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/673458
Package-Manager: Portage-2.3.52, Repoman-2.3.12
RepoMan-Options: --force
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
| |
Package-Manager: Portage-2.3.52, Repoman-2.3.12
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- use RESTRICT=strip, bug #651422
- switch to tar.xz, bug #666726
- add missing use constraints, bug #664474
qemu_softmmu_targets_riscv32? ( fdt )
qemu_softmmu_targets_riscv64? ( fdt )
- 3.1.0 already contains patches for CVE-2018-15746
- applied patch for CVE-2018-20123
- disable bt subsystem entirely as a "workaround" for CVE-2018-19665.
Upstream deprecated the subsystem in November and states that it had
been dysfunctional for years with likely no users.
Bug: https://bugs.gentoo.org/664740
Bug: https://bugs.gentoo.org/672346
Bug: https://bugs.gentoo.org/673108
Closes: https://bugs.gentoo.org/651422
Closes: https://bugs.gentoo.org/664474
Closes: https://bugs.gentoo.org/666726
Package-Manager: Portage-2.3.52, Repoman-2.3.12
Signed-off-by: Matthias Maier <tamiko@gentoo.org>
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/663502
Package-Manager: Portage-2.3.47, Repoman-2.3.10
|
|
|
|
| |
Package-Manager: Portage-2.3.47, Repoman-2.3.10
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/664052
Package-Manager: Portage-2.3.47, Repoman-2.3.10
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/659090
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
| |
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
| |
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/656886
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
|
|
|
| |
Thanks to Arfrever for the proper patch.
Closes: https://bugs.gentoo.org/657766
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
| |
Package-Manager: Portage-2.3.40, Repoman-2.3.9
|
|
|
|
|
| |
Closes: https://bugs.gentoo.org/654174
Package-Manager: Portage-2.3.36, Repoman-2.3.9
|
|
|
|
|
|
|
|
|
|
|
| |
* desnappify
* fix ARM performance issue. Thanks to David Flogeras and Alexander Tsoy.
Closes: https://bugs.gentoo.org/647952
Closes: https://bugs.gentoo.org/651602
Package-Manager: Portage-2.3.28, Repoman-2.3.9
|
|
|
|
| |
Package-Manager: Portage-2.3.28, Repoman-2.3.9
|
|
|
|
| |
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* new binary blobs pinning
=sys-firmware/edk2-ovmf-2017_p20180211
=sys-firmware/ipxe-1.0.0_p20180211
=sys-firmware/seabios-1.11.0
=sys-firmware/sgabios-0.1_pre8-r1
=sys-firmware/vgabios-0.7a-r1
keyword ebuild
* fix include path for capstone, bug 647570
* add USE=capstone support, bug 647570
* apply patch for CVE-2018-7550
Closes: https://bugs.gentoo.org/647570
Bug: https://bugs.gentoo.org/649616
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
| |
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/646814
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Added slot operator for libnfs
- Added patch for glibc-2.27 compatibility
- Added patch for CVE-2017-16845
- Backported upstream msr / spec ctrl patches:
6cfbc54e89 i386: Add EPYC-IBPB CPU model
ac96c41354 i386: Add new -IBRS versions of Intel CPU models
1b3420e1c4 i386: Add FEAT_8000_0008_EBX CPUID feature word
a2381f0934 i386: Add spec-ctrl CPUID bit
a33a2cfe2f i386: Add support for SPEC_CTRL MSR
- CVEs addressed by bump:
CVE-2017-17381
CVE-2017-18030
CVE-2017-18043
- CVEs addressed by patchset:
CVE-2017-15124
CVE-2017-16845
CVE-2018-5683
- CVE-2018-5748 is a libvirt vulnerability, not a qemu issue...
Bug: https://bugs.gentoo.org/638506
Bug: https://bugs.gentoo.org/643432
Bug: https://bugs.gentoo.org/646814
Closes: https://bugs.gentoo.org/641100
Closes: https://bugs.gentoo.org/646568
Closes: https://bugs.gentoo.org/646710
Package-Manager: Portage-2.3.24, Repoman-2.3.6
|
| |
|
|
|
|
| |
Package-Manager: Portage-2.3.13, Repoman-2.3.4
|
|
|
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/630432
Bug: https://bugs.gentoo.org/633822
Bug: https://bugs.gentoo.org/634070
Bug: https://bugs.gentoo.org/634148
Package-Manager: Portage-2.3.8, Repoman-2.3.4
|
|
|
|
|
| |
Bug: https://bugs.gentoo.org/629350
Package-Manager: Portage-2.3.8, Repoman-2.3.4
|
|
|
|
|
|
|
|
|
| |
This version bump also addresses a number of security issues
CVE-2017-12809, bug #628498
CVE-2017-13673, bug #629316
CVE-2017-13711, bug #629350
Package-Manager: Portage-2.3.6, Repoman-2.3.3
|
|
|
|
| |
Package-Manager: Portage-2.3.6, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.5, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.3, Repoman-2.3.2
|
|
|
|
| |
Package-Manager: Portage-2.3.3, Repoman-2.3.1
|
| |
|
|
|
|
|
|
| |
Update the 7422 patch to match the version upstream merged.
Update the 8669-1 patch to include upstream references since it is
still not merged/fixed.
|
|
|
|
| |
Package-Manager: portage-2.3.0_p24
|
|
|
|
| |
Package-Manager: portage-2.2.28
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
3af9187fc6caaf415ab9c0c6d92c9678f65cb17f -> CVE-2016-4001, bug #579734
3a15cc0e1ee7168db0782133d2607a6bfa422d66 -> CVE-2016-4002, bug #579734
c98c6c105f66f05aa0b7c1d2a4a3f716450907ef -> CVE-2016-4439, bug #583496
6c1fef6b59563cc415f21e03f81539ed4b33ad90 -> CVE-2016-4441, bug #583496
06630554ccbdd25780aa03c3548aaff1eb56dffd -> , bug #583952
844864fbae66935951529408831c2f22367a57b6 -> CVE-2016-5337, bug #584094
b60bdd1f1ee1616b7a9aeeffb4088e1ce2710fb2 -> , bug #584102
1b85898025c4cd95dce673d15e67e60e98e91731 -> , bug #584146
521360267876d3b6518b328051a2e56bca55bef8 -> CVE-2016-4453, bug #584514
4e68a0ee17dad7b8d870df0081d4ab2e079016c2 -> CVE-2016-4454, bug #584514
a6b3167fa0e825aebb5a7cd8b437b6d41584a196 -> CVE-2016-5126, bug #584630
ff589551c8e8e9e95e211b9d8daafb4ed39f1aec -> CVE-2016-5338, bug #584918
d3cdc49138c30be1d3c2f83d18f85d9fdee95f1a -> CVE-2016-5238, bug #584918
1e7aed70144b4673fc26e73062064b6724795e5f -> , bug #589924
afd9096eb1882f23929f5b5c177898ed231bac66 -> CVE-2016-5403, bug #589928
eb700029c7836798046191d62d595363d92c84d4 -> CVE-2016-6835, bug #591244
ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05 -> CVE-2016-6834, bug #591374
6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8 -> CVE-2016-6833, bug #591380
47882fa4975bf0b58dd74474329fdd7154e8f04c -> CVE-2016-6888, bug #591678
805b5d98c649d26fc44d2d7755a97f18e62b438a
56f101ecce0eafd09e2daf1c4eeb1377d6959261
fff39a7ad09da07ef490de05c92c91f22f8002f2 -> , bug #592430
Package-Manager: portage-2.2.28
|
|
|
|
| |
Package-Manager: portage-2.2.28
|
| |
|