summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
* Update version for v2.0.0-rc1 releasePeter Maydell2014-04-031-1/+1
* Merge remote-tracking branch 'remotes/riku/for-2.0' into stagingPeter Maydell2014-04-031-2/+5
|\
| * linux-user: pass correct host flags to accept4()Petar Jovanovic2014-04-011-2/+5
* | bswap: Fix build on FreeBSD 10.0Andreas Färber2014-04-031-0/+2
* | PPC: openpic_kvm: Filter memory events properlyAlexander Graf2014-04-031-0/+10
* | Merge remote-tracking branch 'remotes/bonzini/scsi-next' into stagingPeter Maydell2014-04-032-7/+13
|\ \
| * | iscsi: always query max WRITE SAME lengthPaolo Bonzini2014-04-031-5/+7
| * | iscsi: ignore flushes on scsi-generic devicesPaolo Bonzini2014-04-031-0/+4
| * | iscsi: recognize "invalid field" ASCQ from WRITE SAME commandPaolo Bonzini2014-04-031-1/+2
| * | scsi-bus: remove bogus assertionPaolo Bonzini2014-04-021-1/+0
| |/
* | MAINTAINERS: Update Peter Crosthwaite's emailPeter Crosthwaite2014-04-031-5/+5
* | Merge remote-tracking branch 'remotes/stefanha/tags/tracing-pull-request' int...Peter Maydell2014-04-011-1/+6
|\ \
| * | trace: add workaround for SystemTap PR13296Frank Ch. Eigler2014-04-011-1/+6
| |/
* | Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request' into ...Peter Maydell2014-04-0138-303/+1565
|\ \
| * | qcow2: link all L2 meta updates in preallocate()Stefan Hajnoczi2014-04-011-1/+6
| * | parallels: Sanity check for s->tracks (CVE-2014-0142)Kevin Wolf2014-04-013-1/+17
| * | parallels: Fix catalog size integer overflow (CVE-2014-0143)Kevin Wolf2014-04-016-1/+97
| * | qcow2: Limit snapshot table sizeKevin Wolf2014-04-012-1/+18
| * | qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)Kevin Wolf2014-04-015-4/+29
| * | qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)Kevin Wolf2014-04-013-2/+22
| * | qcow2: Fix NULL dereference in qcow2_open() error path (CVE-2014-0146)Kevin Wolf2014-04-013-3/+15
| * | qcow2: Fix copy_sectors() with VM stateKevin Wolf2014-04-013-11/+33
| * | block: Limit request size (CVE-2014-0143)Kevin Wolf2014-04-011-0/+4
| * | block: vdi bounds check qemu-io testsJeff Cody2014-04-013-0/+138
| * | dmg: prevent chunk buffer overflow (CVE-2014-0145)Stefan Hajnoczi2014-04-011-6/+33
| * | dmg: use uint64_t consistently for sectors and lengthsStefan Hajnoczi2014-04-011-3/+3
| * | dmg: sanitize chunk length and sectorcount (CVE-2014-0145)Stefan Hajnoczi2014-04-011-0/+24
| * | dmg: use appropriate types when reading chunksStefan Hajnoczi2014-04-011-1/+2
| * | dmg: drop broken bdrv_pread() loopStefan Hajnoczi2014-04-011-13/+2
| * | dmg: prevent out-of-bounds array access on terminatorStefan Hajnoczi2014-04-011-1/+1
| * | dmg: coding style and indentation cleanupStefan Hajnoczi2014-04-011-104/+120
| * | qcow2: Fix new L1 table size check (CVE-2014-0143)Kevin Wolf2014-04-011-1/+1
| * | qcow2: Protect against some integer overflows in bdrv_checkKevin Wolf2014-04-011-9/+9
| * | qcow2: Fix types in qcow2_alloc_clusters and alloc_clusters_norefKevin Wolf2014-04-012-8/+9
| * | qcow2: Check new refcount table size on growthKevin Wolf2014-04-013-3/+14
| * | qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)Kevin Wolf2014-04-011-1/+1
| * | qcow2: Don't rely on free_cluster_index in alloc_refcount_block() (CVE-2014-0...Kevin Wolf2014-04-016-44/+65
| * | qcow2: Fix backing file name length checkKevin Wolf2014-04-013-3/+19
| * | qcow2: Validate active L1 table offset and size (CVE-2014-0144)Kevin Wolf2014-04-013-0/+45
| * | qcow2: Validate snapshot table offset/size (CVE-2014-0144)Kevin Wolf2014-04-015-26/+91
| * | qcow2: Validate refcount table offsetKevin Wolf2014-04-013-0/+56
| * | qcow2: Check refcount table size (CVE-2014-0144)Kevin Wolf2014-04-014-1/+29
| * | qcow2: Check backing_file_offset (CVE-2014-0144)Kevin Wolf2014-04-013-0/+25
| * | qcow2: Check header_length (CVE-2014-0144)Kevin Wolf2014-04-014-9/+96
| * | curl: check data size before memcpy to local buffer. (CVE-2014-0144)Fam Zheng2014-04-011-0/+5
| * | vhdx: Bounds checking for block_size and logical_sector_size (CVE-2014-0148)Jeff Cody2014-04-011-2/+10
| * | vdi: add bounds checks for blocks_in_image and disk_size header fields (CVE-2...Jeff Cody2014-04-011-4/+33
| * | vpc: Validate block size (CVE-2014-0142)Kevin Wolf2014-04-014-0/+87
| * | vpc/vhd: add bounds check for max_table_entries and block_size (CVE-2014-0144)Jeff Cody2014-04-011-4/+23
| * | bochs: Fix bitmap offset calculationKevin Wolf2014-04-011-2/+3
OpenPOWER on IntegriCloud