index
:
riscv-gnu-toolchain/qemu.git
block
master
stable-0.10
stable-0.11
stable-0.12
stable-0.13
stable-0.14
stable-0.15
stable-1.0
stable-1.1
stable-1.2
stable-1.3
stable-1.4
stable-1.5
stable-1.6
stable-1.7
stable-2.0
stable-2.1
stable-2.10
stable-2.11
stable-2.12
stable-2.2
stable-2.3
stable-2.4
stable-2.5
stable-2.6
stable-2.7
stable-2.8
stable-2.9
stable-3.0
stable-3.1
stable-4.0
stable-4.1
stable-4.2
stable-5.0
stable-6.0
stable-6.1
stable-7.2
stable-8.0
stable-8.1
stable-8.2
stable-9.0
stable-9.1
stable-9.2
staging
staging-7.2
staging-8.0
staging-8.1
staging-8.2
staging-9.0
staging-9.1
staging-9.2
Unnamed repository; edit this file 'description' to name the repository.
root
about
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Age
Commit message (
Expand
)
Author
Files
Lines
2014-04-01
Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request' into ...
Peter Maydell
38
-303
/
+1565
2014-04-01
Merge remote-tracking branch 'remotes/kraxel/tags/pull-input-7' into staging
Peter Maydell
2
-6
/
+15
2014-04-01
qcow2: link all L2 meta updates in preallocate()
Stefan Hajnoczi
1
-1
/
+6
2014-04-01
parallels: Sanity check for s->tracks (CVE-2014-0142)
Kevin Wolf
3
-1
/
+17
2014-04-01
parallels: Fix catalog size integer overflow (CVE-2014-0143)
Kevin Wolf
6
-1
/
+97
2014-04-01
qcow2: Limit snapshot table size
Kevin Wolf
2
-1
/
+18
2014-04-01
qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)
Kevin Wolf
5
-4
/
+29
2014-04-01
qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)
Kevin Wolf
3
-2
/
+22
2014-04-01
qcow2: Fix NULL dereference in qcow2_open() error path (CVE-2014-0146)
Kevin Wolf
3
-3
/
+15
2014-04-01
qcow2: Fix copy_sectors() with VM state
Kevin Wolf
3
-11
/
+33
2014-04-01
block: Limit request size (CVE-2014-0143)
Kevin Wolf
1
-0
/
+4
2014-04-01
block: vdi bounds check qemu-io tests
Jeff Cody
3
-0
/
+138
2014-04-01
dmg: prevent chunk buffer overflow (CVE-2014-0145)
Stefan Hajnoczi
1
-6
/
+33
2014-04-01
dmg: use uint64_t consistently for sectors and lengths
Stefan Hajnoczi
1
-3
/
+3
2014-04-01
dmg: sanitize chunk length and sectorcount (CVE-2014-0145)
Stefan Hajnoczi
1
-0
/
+24
2014-04-01
dmg: use appropriate types when reading chunks
Stefan Hajnoczi
1
-1
/
+2
2014-04-01
dmg: drop broken bdrv_pread() loop
Stefan Hajnoczi
1
-13
/
+2
2014-04-01
dmg: prevent out-of-bounds array access on terminator
Stefan Hajnoczi
1
-1
/
+1
2014-04-01
dmg: coding style and indentation cleanup
Stefan Hajnoczi
1
-104
/
+120
2014-04-01
qcow2: Fix new L1 table size check (CVE-2014-0143)
Kevin Wolf
1
-1
/
+1
2014-04-01
qcow2: Protect against some integer overflows in bdrv_check
Kevin Wolf
1
-9
/
+9
2014-04-01
qcow2: Fix types in qcow2_alloc_clusters and alloc_clusters_noref
Kevin Wolf
2
-8
/
+9
2014-04-01
qcow2: Check new refcount table size on growth
Kevin Wolf
3
-3
/
+14
2014-04-01
qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)
Kevin Wolf
1
-1
/
+1
2014-04-01
qcow2: Don't rely on free_cluster_index in alloc_refcount_block() (CVE-2014-0...
Kevin Wolf
6
-44
/
+65
2014-04-01
qcow2: Fix backing file name length check
Kevin Wolf
3
-3
/
+19
2014-04-01
qcow2: Validate active L1 table offset and size (CVE-2014-0144)
Kevin Wolf
3
-0
/
+45
2014-04-01
qcow2: Validate snapshot table offset/size (CVE-2014-0144)
Kevin Wolf
5
-26
/
+91
2014-04-01
qcow2: Validate refcount table offset
Kevin Wolf
3
-0
/
+56
2014-04-01
qcow2: Check refcount table size (CVE-2014-0144)
Kevin Wolf
4
-1
/
+29
2014-04-01
qcow2: Check backing_file_offset (CVE-2014-0144)
Kevin Wolf
3
-0
/
+25
2014-04-01
qcow2: Check header_length (CVE-2014-0144)
Kevin Wolf
4
-9
/
+96
2014-04-01
curl: check data size before memcpy to local buffer. (CVE-2014-0144)
Fam Zheng
1
-0
/
+5
2014-04-01
vhdx: Bounds checking for block_size and logical_sector_size (CVE-2014-0148)
Jeff Cody
1
-2
/
+10
2014-04-01
vdi: add bounds checks for blocks_in_image and disk_size header fields (CVE-2...
Jeff Cody
1
-4
/
+33
2014-04-01
vpc: Validate block size (CVE-2014-0142)
Kevin Wolf
4
-0
/
+87
2014-04-01
vpc/vhd: add bounds check for max_table_entries and block_size (CVE-2014-0144)
Jeff Cody
1
-4
/
+23
2014-04-01
bochs: Fix bitmap offset calculation
Kevin Wolf
1
-2
/
+3
2014-04-01
bochs: Check extent_size header field (CVE-2014-0142)
Kevin Wolf
3
-0
/
+29
2014-04-01
bochs: Check catalog_size header field (CVE-2014-0143)
Kevin Wolf
3
-1
/
+35
2014-04-01
bochs: Use unsigned variables for offsets and sizes (CVE-2014-0147)
Kevin Wolf
3
-8
/
+20
2014-04-01
bochs: Unify header structs and make them QEMU_PACKED
Kevin Wolf
1
-42
/
+25
2014-04-01
qemu-iotests: Support for bochs format
Kevin Wolf
5
-0
/
+67
2014-04-01
block/cloop: fix offsets[] size off-by-one
Stefan Hajnoczi
3
-7
/
+14
2014-04-01
block/cloop: refuse images with bogus offsets (CVE-2014-0144)
Stefan Hajnoczi
3
-5
/
+52
2014-04-01
block/cloop: refuse images with huge offsets arrays (CVE-2014-0144)
Stefan Hajnoczi
3
-0
/
+19
2014-04-01
block/cloop: prevent offsets_size integer overflow (CVE-2014-0143)
Stefan Hajnoczi
3
-0
/
+18
2014-04-01
block/cloop: validate block_size header field (CVE-2014-0144)
Stefan Hajnoczi
3
-0
/
+55
2014-04-01
qemu-iotests: add cloop input validation tests
Stefan Hajnoczi
4
-0
/
+60
2014-04-01
qemu-iotests: add ./check -cloop support
Stefan Hajnoczi
2
-0
/
+10
[next]