X-Git-Url: https://git.proxmox.com/?a=blobdiff_plain;f=debian%2Fpatches%2Fseries;h=77fe977b251b09eda3155d0162568577dab9d7dd;hb=3f5d3e7d5a2114a5894acaaead4e0cff50ca02f1;hp=bec105af2b6bbc25e2fa5d0215f44559b5e06cc8;hpb=af0d302f59465d174c009b2746001dd536bf830d;p=pve-qemu-kvm.git diff --git a/debian/patches/series b/debian/patches/series index bec105a..77fe977 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -1,8 +1,10 @@ +xsa138-qemuu-1.patch +xsa138-qemuu-2.patch +xsa138-qemuu-3.patch fr-ca-keymap-corrections.diff adjust-path.diff fairsched.diff -# TODO adopt patches for qemu 2.0 -#keymap.diff +keymap.diff pve-auth.patch vencrypt-auth-plain.patch fix-qemu-img-snapshot-removal.patch @@ -15,14 +17,59 @@ modify-query-spice.patch spice-use-pve-certs.patch backup-add-vma-binary.patch backup-add-vma-verify-command.patch -#backup-vma-add-dump-config.patch -#backup-vma-restore-tolerate-a-size-difference-up-to-4M.patch -#backup-modify-job-api.patch -#backup-add-pve-monitor-commands.patch -#backup-add-dir-format.patch -#backup-do-not-return-errors-in-dump-callback.patch -#backup-vma-correctly-propagate-error.patch -#backup-vma-remove-async-queue.patch -#internal-snapshot-async.patch -#disable-efi-enable-pxe-roms.patch -#backup-vma-allow-empty-backups.patch +backup-vma-add-dump-config.patch +backup-vma-restore-tolerate-a-size-difference-up-to-4M.patch +backup-modify-job-api.patch +backup-add-pve-monitor-commands.patch +backup-add-dir-format.patch +backup-do-not-return-errors-in-dump-callback.patch +backup-vma-correctly-propagate-error.patch +backup-vma-remove-async-queue.patch +backup-run-flush-inside-coroutine.patch +backup-do-not-use-bdrv-drain-all.patch +internal-snapshot-async.patch +disable-efi-enable-pxe-roms.patch +backup-vma-allow-empty-backups.patch +glusterfs-daemonize.patch +gluster-backupserver.patch +virtio-balloon-dimmfix1.patch +virtio-balloon-dimmfix2.patch +virtio-balloon-dimmfix3.patch +add-qmp-get-link-status.patch +virtio-scsi_fix_assert.patch +0001-fdc-force-the-fifo-access-to-be-in-bounds-of-the-all.patch +net-add-checks-to-validate-ring-buffer-pointers.patch +CVE-2015-1779-incrementally-decode-websocket-frames.patch +CVE-2015-1779-limit-size-of-HTTP-headers-from-websockets-clients.patch +0001-ui-vnc-avoid-floating-point-exception.patch +CVE-2015-7549-msix-pba-write-ro.patch +CVE-2015-8558-ehci_make_idt_processing_more_robust.patch +vmxnet3-host-memory-leakage.patch +CVE-2015-8613-scsi-initialize-info-object.patch +CVE-2015-8666-acpi-fix-buffer-overrun-on-migration.patch +CVE-2015-8743-ne2000-ioport-bounds-check.patch +CVE-2015-8744-vmxnet3-refine-l2-header-validation.patch +CVE-2015-8745-vmxnet3-support-reading-imr-registers.patch +CVE-2015-8619-hmp-sendkey-oob-fix.patch +CVE-2016-1714-fw_cfg-add-check-to-validate-current-entry.patch +CVE-2016-1922-i386-avoid-null-pointer-dereference.patch +CVE-2016-1981-e1000-eliminate-infinite-loop.patch +CVE-2016-1568-ide-ahci-reset-ncq-object.patch +CVE-2015-3209-pcnet-oob.patch +CVE-2015-7504-pcnet-validate-size.patch +CVE-2015-7512-pcnet-rx-buffer-overflow.patch +CVE-2015-7295-virtio-introduce-virtqueue_unmap_sg.patch +CVE-2016-2391-usb-ohci-avoid-multiple-eof-timers.patch +CVE-2016-2392-check-USB-configuration-descriptor-object.patch +CVE-2016-2538-usb-check-RNDIS-message-length.patch +CVE-2015-8817-exec-Respect-as_tranlsate_internal-length-clamp.patch +0002-exec-do-not-clamp-accesses-to-MMIO-regions.patch +CVE-2015-8818-exec-skip-MMIO-regions-correctly-in-cpu_physical_mem.patch +0004-exec-clamp-accesses-against-the-MemoryRegionSection.patch +CVE-2016-2841-net-ne2000-check-ring-buffer-control-registers.patch +CVE-2016-2857-net-check-packet-payload-length.patch +0001-rng-remove-the-unused-request-cancellation-code.patch +0002-rng-move-request-queue-from-RngEgd-to-RngBackend.patch +0003-rng-move-request-queue-cleanup-from-RngEgd-to-RngBac.patch +0005-virtio-rng-ask-for-more-data-if-queue-is-not-fully-d.patch +CVE-2016-2858-0004-rng-add-request-queue-support-to-rng-random.patch