summaryrefslogtreecommitdiffstats
path: root/block
Commit message (Expand)AuthorAgeFilesLines
* qcow2: Put cache reference in error caseKevin Wolf2014-04-041-0/+1
* qcow2: Flush metadata during read-only reopenKevin Wolf2014-04-041-4/+21
* iscsi: Don't set error if already set in iscsi_do_inquiryFam Zheng2014-04-041-2/+4
* Merge remote-tracking branch 'remotes/bonzini/scsi-next' into stagingPeter Maydell2014-04-031-6/+13
|\
| * iscsi: always query max WRITE SAME lengthPaolo Bonzini2014-04-031-5/+7
| * iscsi: ignore flushes on scsi-generic devicesPaolo Bonzini2014-04-031-0/+4
| * iscsi: recognize "invalid field" ASCQ from WRITE SAME commandPaolo Bonzini2014-04-031-1/+2
* | qcow2: link all L2 meta updates in preallocate()Stefan Hajnoczi2014-04-011-1/+6
* | parallels: Sanity check for s->tracks (CVE-2014-0142)Kevin Wolf2014-04-011-1/+6
* | parallels: Fix catalog size integer overflow (CVE-2014-0143)Kevin Wolf2014-04-011-1/+6
* | qcow2: Limit snapshot table sizeKevin Wolf2014-04-012-1/+18
* | qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)Kevin Wolf2014-04-013-3/+9
* | qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)Kevin Wolf2014-04-011-1/+1
* | qcow2: Fix NULL dereference in qcow2_open() error path (CVE-2014-0146)Kevin Wolf2014-04-011-3/+4
* | qcow2: Fix copy_sectors() with VM stateKevin Wolf2014-04-011-9/+0Star
* | dmg: prevent chunk buffer overflow (CVE-2014-0145)Stefan Hajnoczi2014-04-011-6/+33
* | dmg: use uint64_t consistently for sectors and lengthsStefan Hajnoczi2014-04-011-3/+3
* | dmg: sanitize chunk length and sectorcount (CVE-2014-0145)Stefan Hajnoczi2014-04-011-0/+24
* | dmg: use appropriate types when reading chunksStefan Hajnoczi2014-04-011-1/+2
* | dmg: drop broken bdrv_pread() loopStefan Hajnoczi2014-04-011-13/+2Star
* | dmg: prevent out-of-bounds array access on terminatorStefan Hajnoczi2014-04-011-1/+1
* | dmg: coding style and indentation cleanupStefan Hajnoczi2014-04-011-104/+120
* | qcow2: Fix new L1 table size check (CVE-2014-0143)Kevin Wolf2014-04-011-1/+1
* | qcow2: Protect against some integer overflows in bdrv_checkKevin Wolf2014-04-011-9/+9
* | qcow2: Fix types in qcow2_alloc_clusters and alloc_clusters_norefKevin Wolf2014-04-012-8/+9
* | qcow2: Check new refcount table size on growthKevin Wolf2014-04-013-3/+14
* | qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)Kevin Wolf2014-04-011-1/+1
* | qcow2: Don't rely on free_cluster_index in alloc_refcount_block() (CVE-2014-0...Kevin Wolf2014-04-012-40/+43
* | qcow2: Fix backing file name length checkKevin Wolf2014-04-011-3/+6
* | qcow2: Validate active L1 table offset and size (CVE-2014-0144)Kevin Wolf2014-04-011-0/+16
* | qcow2: Validate snapshot table offset/size (CVE-2014-0144)Kevin Wolf2014-04-013-26/+47
* | qcow2: Validate refcount table offsetKevin Wolf2014-04-011-0/+33
* | qcow2: Check refcount table size (CVE-2014-0144)Kevin Wolf2014-04-012-1/+12
* | qcow2: Check backing_file_offset (CVE-2014-0144)Kevin Wolf2014-04-011-0/+6
* | qcow2: Check header_length (CVE-2014-0144)Kevin Wolf2014-04-011-9/+25
* | curl: check data size before memcpy to local buffer. (CVE-2014-0144)Fam Zheng2014-04-011-0/+5
* | vhdx: Bounds checking for block_size and logical_sector_size (CVE-2014-0148)Jeff Cody2014-04-011-2/+10
* | vdi: add bounds checks for blocks_in_image and disk_size header fields (CVE-2...Jeff Cody2014-04-011-4/+33
* | vpc: Validate block size (CVE-2014-0142)Kevin Wolf2014-04-011-0/+5
* | vpc/vhd: add bounds check for max_table_entries and block_size (CVE-2014-0144)Jeff Cody2014-04-011-4/+23
* | bochs: Fix bitmap offset calculationKevin Wolf2014-04-011-2/+3
* | bochs: Check extent_size header field (CVE-2014-0142)Kevin Wolf2014-04-011-0/+8
* | bochs: Check catalog_size header field (CVE-2014-0143)Kevin Wolf2014-04-011-0/+13
* | bochs: Use unsigned variables for offsets and sizes (CVE-2014-0147)Kevin Wolf2014-04-011-8/+8
* | bochs: Unify header structs and make them QEMU_PACKEDKevin Wolf2014-04-011-42/+25Star
* | block/cloop: fix offsets[] size off-by-oneStefan Hajnoczi2014-04-011-7/+5Star
* | block/cloop: refuse images with bogus offsets (CVE-2014-0144)Stefan Hajnoczi2014-04-011-5/+29
* | block/cloop: refuse images with huge offsets arrays (CVE-2014-0144)Stefan Hajnoczi2014-04-011-0/+9
* | block/cloop: prevent offsets_size integer overflow (CVE-2014-0143)Stefan Hajnoczi2014-04-011-0/+7
* | block/cloop: validate block_size header field (CVE-2014-0144)Stefan Hajnoczi2014-04-011-0/+23