index
:
bwlp/qemu.git
block_qcow2_cluster_info
master
spice_video_codecs
Experimental fork of QEMU with video encoding patches
OpenSLX
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
block
Commit message (
Expand
)
Author
Age
Files
Lines
*
qcow2: Put cache reference in error case
Kevin Wolf
2014-04-04
1
-0
/
+1
*
qcow2: Flush metadata during read-only reopen
Kevin Wolf
2014-04-04
1
-4
/
+21
*
iscsi: Don't set error if already set in iscsi_do_inquiry
Fam Zheng
2014-04-04
1
-2
/
+4
*
Merge remote-tracking branch 'remotes/bonzini/scsi-next' into staging
Peter Maydell
2014-04-03
1
-6
/
+13
|
\
|
*
iscsi: always query max WRITE SAME length
Paolo Bonzini
2014-04-03
1
-5
/
+7
|
*
iscsi: ignore flushes on scsi-generic devices
Paolo Bonzini
2014-04-03
1
-0
/
+4
|
*
iscsi: recognize "invalid field" ASCQ from WRITE SAME command
Paolo Bonzini
2014-04-03
1
-1
/
+2
*
|
qcow2: link all L2 meta updates in preallocate()
Stefan Hajnoczi
2014-04-01
1
-1
/
+6
*
|
parallels: Sanity check for s->tracks (CVE-2014-0142)
Kevin Wolf
2014-04-01
1
-1
/
+6
*
|
parallels: Fix catalog size integer overflow (CVE-2014-0143)
Kevin Wolf
2014-04-01
1
-1
/
+6
*
|
qcow2: Limit snapshot table size
Kevin Wolf
2014-04-01
2
-1
/
+18
*
|
qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)
Kevin Wolf
2014-04-01
3
-3
/
+9
*
|
qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)
Kevin Wolf
2014-04-01
1
-1
/
+1
*
|
qcow2: Fix NULL dereference in qcow2_open() error path (CVE-2014-0146)
Kevin Wolf
2014-04-01
1
-3
/
+4
*
|
qcow2: Fix copy_sectors() with VM state
Kevin Wolf
2014-04-01
1
-9
/
+0
*
|
dmg: prevent chunk buffer overflow (CVE-2014-0145)
Stefan Hajnoczi
2014-04-01
1
-6
/
+33
*
|
dmg: use uint64_t consistently for sectors and lengths
Stefan Hajnoczi
2014-04-01
1
-3
/
+3
*
|
dmg: sanitize chunk length and sectorcount (CVE-2014-0145)
Stefan Hajnoczi
2014-04-01
1
-0
/
+24
*
|
dmg: use appropriate types when reading chunks
Stefan Hajnoczi
2014-04-01
1
-1
/
+2
*
|
dmg: drop broken bdrv_pread() loop
Stefan Hajnoczi
2014-04-01
1
-13
/
+2
*
|
dmg: prevent out-of-bounds array access on terminator
Stefan Hajnoczi
2014-04-01
1
-1
/
+1
*
|
dmg: coding style and indentation cleanup
Stefan Hajnoczi
2014-04-01
1
-104
/
+120
*
|
qcow2: Fix new L1 table size check (CVE-2014-0143)
Kevin Wolf
2014-04-01
1
-1
/
+1
*
|
qcow2: Protect against some integer overflows in bdrv_check
Kevin Wolf
2014-04-01
1
-9
/
+9
*
|
qcow2: Fix types in qcow2_alloc_clusters and alloc_clusters_noref
Kevin Wolf
2014-04-01
2
-8
/
+9
*
|
qcow2: Check new refcount table size on growth
Kevin Wolf
2014-04-01
3
-3
/
+14
*
|
qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)
Kevin Wolf
2014-04-01
1
-1
/
+1
*
|
qcow2: Don't rely on free_cluster_index in alloc_refcount_block() (CVE-2014-0...
Kevin Wolf
2014-04-01
2
-40
/
+43
*
|
qcow2: Fix backing file name length check
Kevin Wolf
2014-04-01
1
-3
/
+6
*
|
qcow2: Validate active L1 table offset and size (CVE-2014-0144)
Kevin Wolf
2014-04-01
1
-0
/
+16
*
|
qcow2: Validate snapshot table offset/size (CVE-2014-0144)
Kevin Wolf
2014-04-01
3
-26
/
+47
*
|
qcow2: Validate refcount table offset
Kevin Wolf
2014-04-01
1
-0
/
+33
*
|
qcow2: Check refcount table size (CVE-2014-0144)
Kevin Wolf
2014-04-01
2
-1
/
+12
*
|
qcow2: Check backing_file_offset (CVE-2014-0144)
Kevin Wolf
2014-04-01
1
-0
/
+6
*
|
qcow2: Check header_length (CVE-2014-0144)
Kevin Wolf
2014-04-01
1
-9
/
+25
*
|
curl: check data size before memcpy to local buffer. (CVE-2014-0144)
Fam Zheng
2014-04-01
1
-0
/
+5
*
|
vhdx: Bounds checking for block_size and logical_sector_size (CVE-2014-0148)
Jeff Cody
2014-04-01
1
-2
/
+10
*
|
vdi: add bounds checks for blocks_in_image and disk_size header fields (CVE-2...
Jeff Cody
2014-04-01
1
-4
/
+33
*
|
vpc: Validate block size (CVE-2014-0142)
Kevin Wolf
2014-04-01
1
-0
/
+5
*
|
vpc/vhd: add bounds check for max_table_entries and block_size (CVE-2014-0144)
Jeff Cody
2014-04-01
1
-4
/
+23
*
|
bochs: Fix bitmap offset calculation
Kevin Wolf
2014-04-01
1
-2
/
+3
*
|
bochs: Check extent_size header field (CVE-2014-0142)
Kevin Wolf
2014-04-01
1
-0
/
+8
*
|
bochs: Check catalog_size header field (CVE-2014-0143)
Kevin Wolf
2014-04-01
1
-0
/
+13
*
|
bochs: Use unsigned variables for offsets and sizes (CVE-2014-0147)
Kevin Wolf
2014-04-01
1
-8
/
+8
*
|
bochs: Unify header structs and make them QEMU_PACKED
Kevin Wolf
2014-04-01
1
-42
/
+25
*
|
block/cloop: fix offsets[] size off-by-one
Stefan Hajnoczi
2014-04-01
1
-7
/
+5
*
|
block/cloop: refuse images with bogus offsets (CVE-2014-0144)
Stefan Hajnoczi
2014-04-01
1
-5
/
+29
*
|
block/cloop: refuse images with huge offsets arrays (CVE-2014-0144)
Stefan Hajnoczi
2014-04-01
1
-0
/
+9
*
|
block/cloop: prevent offsets_size integer overflow (CVE-2014-0143)
Stefan Hajnoczi
2014-04-01
1
-0
/
+7
*
|
block/cloop: validate block_size header field (CVE-2014-0144)
Stefan Hajnoczi
2014-04-01
1
-0
/
+23
[next]