c3f268000e
While receiving packets via e1000e_write_packet_to_guest an infinite loop could be triggered if the receive descriptor had a NULL buffer address. A privileged guest user could use this to induce a DoS Scenario. Fixes: CVE-2020-28916
191 lines
7.1 KiB
Nix
191 lines
7.1 KiB
Nix
{ stdenv, fetchurl, fetchpatch, python, zlib, pkgconfig, glib
|
||
, perl, pixman, vde2, alsaLib, texinfo, flex
|
||
, bison, lzo, snappy, libaio, gnutls, nettle, curl
|
||
, makeWrapper
|
||
, attr, libcap, libcap_ng
|
||
, CoreServices, Cocoa, Hypervisor, rez, setfile
|
||
, numaSupport ? stdenv.isLinux && !stdenv.isAarch32, numactl
|
||
, seccompSupport ? stdenv.isLinux, libseccomp
|
||
, alsaSupport ? stdenv.lib.hasSuffix "linux" stdenv.hostPlatform.system && !nixosTestRunner
|
||
, pulseSupport ? !stdenv.isDarwin && !nixosTestRunner, libpulseaudio
|
||
, sdlSupport ? !stdenv.isDarwin && !nixosTestRunner, SDL2
|
||
, gtkSupport ? !stdenv.isDarwin && !xenSupport && !nixosTestRunner, gtk3, gettext, vte, wrapGAppsHook
|
||
, vncSupport ? !nixosTestRunner, libjpeg, libpng
|
||
, smartcardSupport ? !nixosTestRunner, libcacard
|
||
, spiceSupport ? !stdenv.isDarwin && !nixosTestRunner, spice, spice-protocol
|
||
, ncursesSupport ? !nixosTestRunner, ncurses
|
||
, usbredirSupport ? spiceSupport, usbredir
|
||
, xenSupport ? false, xen
|
||
, cephSupport ? false, ceph
|
||
, openGLSupport ? sdlSupport, mesa, epoxy, libdrm
|
||
, virglSupport ? openGLSupport, virglrenderer
|
||
, smbdSupport ? false, samba
|
||
, tpmSupport ? true
|
||
, hostCpuOnly ? false
|
||
, hostCpuTargets ? (if hostCpuOnly
|
||
then (stdenv.lib.optional stdenv.isx86_64 "i386-softmmu"
|
||
++ ["${stdenv.hostPlatform.qemuArch}-softmmu"])
|
||
else null)
|
||
, nixosTestRunner ? false
|
||
}:
|
||
|
||
with stdenv.lib;
|
||
let
|
||
audio = optionalString alsaSupport "alsa,"
|
||
+ optionalString pulseSupport "pa,"
|
||
+ optionalString sdlSupport "sdl,";
|
||
|
||
in
|
||
|
||
stdenv.mkDerivation rec {
|
||
version = "5.1.0";
|
||
pname = "qemu"
|
||
+ stdenv.lib.optionalString xenSupport "-xen"
|
||
+ stdenv.lib.optionalString hostCpuOnly "-host-cpu-only"
|
||
+ stdenv.lib.optionalString nixosTestRunner "-for-vm-tests";
|
||
|
||
src = fetchurl {
|
||
url= "https://download.qemu.org/qemu-${version}.tar.xz";
|
||
sha256 = "1rd41wwlvp0vpialjp2czs6i3lsc338xc72l3zkbb7ixjfslw5y9";
|
||
};
|
||
|
||
nativeBuildInputs = [ python python.pkgs.sphinx pkgconfig flex bison ]
|
||
++ optionals gtkSupport [ wrapGAppsHook ];
|
||
buildInputs =
|
||
[ zlib glib perl pixman
|
||
vde2 texinfo makeWrapper lzo snappy
|
||
gnutls nettle curl
|
||
]
|
||
++ optionals ncursesSupport [ ncurses ]
|
||
++ optionals stdenv.isDarwin [ CoreServices Cocoa Hypervisor rez setfile ]
|
||
++ optionals seccompSupport [ libseccomp ]
|
||
++ optionals numaSupport [ numactl ]
|
||
++ optionals pulseSupport [ libpulseaudio ]
|
||
++ optionals sdlSupport [ SDL2 ]
|
||
++ optionals gtkSupport [ gtk3 gettext vte ]
|
||
++ optionals vncSupport [ libjpeg libpng ]
|
||
++ optionals smartcardSupport [ libcacard ]
|
||
++ optionals spiceSupport [ spice-protocol spice ]
|
||
++ optionals usbredirSupport [ usbredir ]
|
||
++ optionals stdenv.isLinux [ alsaLib libaio libcap_ng libcap attr ]
|
||
++ optionals xenSupport [ xen ]
|
||
++ optionals cephSupport [ ceph ]
|
||
++ optionals openGLSupport [ mesa epoxy libdrm ]
|
||
++ optionals virglSupport [ virglrenderer ]
|
||
++ optionals smbdSupport [ samba ];
|
||
|
||
enableParallelBuilding = true;
|
||
|
||
outputs = [ "out" "ga" ];
|
||
|
||
patches = [
|
||
./no-etc-install.patch
|
||
./fix-qemu-ga.patch
|
||
./9p-ignore-noatime.patch
|
||
./CVE-2020-27617.patch
|
||
(fetchpatch {
|
||
# e1000e: infinite loop scenario in case of null packet descriptor, remove for QEMU >= 5.2.0-rc3
|
||
name = "CVE-2020-28916.patch";
|
||
url = "https://git.qemu.org/?p=qemu.git;a=patch;h=c2cb511634012344e3d0fe49a037a33b12d8a98a";
|
||
sha256 = "1kvm6wl4vry0npiisxsn76h8nf1iv5fmqsyjvb46203f1yyg5pis";
|
||
})
|
||
] ++ optional nixosTestRunner ./force-uid0-on-9p.patch
|
||
++ optionals stdenv.hostPlatform.isMusl [
|
||
(fetchpatch {
|
||
url = "https://raw.githubusercontent.com/alpinelinux/aports/2bb133986e8fa90e2e76d53369f03861a87a74ef/main/qemu/xattr_size_max.patch";
|
||
sha256 = "1xfdjs1jlvs99hpf670yianb8c3qz2ars8syzyz8f2c2cp5y4bxb";
|
||
})
|
||
(fetchpatch {
|
||
url = "https://raw.githubusercontent.com/alpinelinux/aports/2bb133986e8fa90e2e76d53369f03861a87a74ef/main/qemu/musl-F_SHLCK-and-F_EXLCK.patch";
|
||
sha256 = "1gm67v41gw6apzgz7jr3zv9z80wvkv0jaxd2w4d16hmipa8bhs0k";
|
||
})
|
||
./sigrtminmax.patch
|
||
(fetchpatch {
|
||
url = "https://raw.githubusercontent.com/alpinelinux/aports/2bb133986e8fa90e2e76d53369f03861a87a74ef/main/qemu/fix-sigevent-and-sigval_t.patch";
|
||
sha256 = "0wk0rrcqywhrw9hygy6ap0lfg314m9z1wr2hn8338r5gfcw75mav";
|
||
})
|
||
];
|
||
|
||
# Remove CVE-2020-{29129,29130} for QEMU >5.1.0
|
||
postPatch = ''
|
||
(cd slirp && patch -p1 < ${fetchpatch {
|
||
name = "CVE-2020-29129_CVE-2020-29130.patch";
|
||
url = "https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2e1dcbc0c2af64fcb17009eaf2ceedd81be2b27f.patch";
|
||
sha256 = "01vbjqgnc0kp881l5p6b31cyyirhwhavm6x36hlgkymswvl3wh9w";
|
||
}})
|
||
'';
|
||
|
||
hardeningDisable = [ "stackprotector" ];
|
||
|
||
preConfigure = ''
|
||
unset CPP # intereferes with dependency calculation
|
||
'' + optionalString stdenv.hostPlatform.isMusl ''
|
||
NIX_CFLAGS_COMPILE+=" -D_LINUX_SYSINFO_H"
|
||
'';
|
||
|
||
configureFlags =
|
||
[ "--audio-drv-list=${audio}"
|
||
"--sysconfdir=/etc"
|
||
"--localstatedir=/var"
|
||
"--enable-docs"
|
||
"--enable-tools"
|
||
"--enable-guest-agent"
|
||
]
|
||
# disable sysctl check on darwin.
|
||
++ optional stdenv.isDarwin "--cpu=x86_64"
|
||
++ optional numaSupport "--enable-numa"
|
||
++ optional seccompSupport "--enable-seccomp"
|
||
++ optional smartcardSupport "--enable-smartcard"
|
||
++ optional spiceSupport "--enable-spice"
|
||
++ optional usbredirSupport "--enable-usb-redir"
|
||
++ optional (hostCpuTargets != null) "--target-list=${stdenv.lib.concatStringsSep "," hostCpuTargets}"
|
||
++ optional stdenv.isDarwin "--enable-cocoa"
|
||
++ optional stdenv.isDarwin "--enable-hvf"
|
||
++ optional stdenv.isLinux "--enable-linux-aio"
|
||
++ optional gtkSupport "--enable-gtk"
|
||
++ optional xenSupport "--enable-xen"
|
||
++ optional cephSupport "--enable-rbd"
|
||
++ optional openGLSupport "--enable-opengl"
|
||
++ optional virglSupport "--enable-virglrenderer"
|
||
++ optional tpmSupport "--enable-tpm"
|
||
++ optional smbdSupport "--smbd=${samba}/bin/smbd";
|
||
|
||
doCheck = false; # tries to access /dev
|
||
dontWrapGApps = true;
|
||
|
||
postFixup = ''
|
||
# the .desktop is both invalid and pointless
|
||
rm $out/share/applications/qemu.desktop
|
||
|
||
# copy qemu-ga (guest agent) to separate output
|
||
mkdir -p $ga/bin
|
||
cp $out/bin/qemu-ga $ga/bin/
|
||
'' + optionalString gtkSupport ''
|
||
# wrap GTK Binaries
|
||
for f in $out/bin/qemu-system-*; do
|
||
wrapGApp $f
|
||
done
|
||
'';
|
||
|
||
# Add a ‘qemu-kvm’ wrapper for compatibility/convenience.
|
||
postInstall = ''
|
||
if [ -x $out/bin/qemu-system-${stdenv.hostPlatform.qemuArch} ]; then
|
||
makeWrapper $out/bin/qemu-system-${stdenv.hostPlatform.qemuArch} \
|
||
$out/bin/qemu-kvm \
|
||
--add-flags "\$([ -e /dev/kvm ] && echo -enable-kvm)"
|
||
fi
|
||
'';
|
||
|
||
passthru = {
|
||
qemu-system-i386 = "bin/qemu-system-i386";
|
||
};
|
||
|
||
meta = with stdenv.lib; {
|
||
homepage = "http://www.qemu.org/";
|
||
description = "A generic and open source machine emulator and virtualizer";
|
||
license = licenses.gpl2Plus;
|
||
maintainers = with maintainers; [ eelco ];
|
||
platforms = platforms.linux ++ platforms.darwin;
|
||
};
|
||
}
|