]> git.proxmox.com Git - pve-libspice-server.git/blobdiff - debian/patches/series
fix CVE-2015-3247, CVE-2015-5260, CVE-2015-5261
[pve-libspice-server.git] / debian / patches / series
index 247f05d7e17795b269977bcad800b4d9abc07fda..29d4ffeae52c3bb21ecf0a2bb2ee368fbfc61b07 100644 (file)
@@ -1 +1,21 @@
 allow-to-set-sasl-callbacks.patch
+CVE-2015-3247.patch
+CVE-2015-5260_CVE-2015-5261/0001-worker-validate-correctly-surfaces.patch
+CVE-2015-5260_CVE-2015-5261/0002-worker-avoid-double-free-or-double-create-of-surface.patch
+CVE-2015-5260_CVE-2015-5261/0003-Define-a-constant-to-limit-data-from-guest.patch
+CVE-2015-5260_CVE-2015-5261/0004-Fix-some-integer-overflow-causing-large-memory-alloc.patch
+CVE-2015-5260_CVE-2015-5261/0005-Check-properly-surface-to-be-created.patch
+CVE-2015-5260_CVE-2015-5261/0006-Fix-buffer-reading-overflow.patch
+CVE-2015-5260_CVE-2015-5261/0007-Prevent-32-bit-integer-overflow-in-bitmap_consistent.patch
+CVE-2015-5260_CVE-2015-5261/0008-Fix-race-condition-on-red_get_clip_rects.patch
+CVE-2015-5260_CVE-2015-5261/0009-Fix-race-in-red_get_image.patch
+CVE-2015-5260_CVE-2015-5261/0010-Fix-race-condition-in-red_get_string.patch
+CVE-2015-5260_CVE-2015-5261/0011-Fix-integer-overflow-computing-glyph_size-in-red_get.patch
+CVE-2015-5260_CVE-2015-5261/0012-Fix-race-condition-in-red_get_data_chunks_ptr.patch
+CVE-2015-5260_CVE-2015-5261/0013-Prevent-memory-leak-if-red_get_data_chunks_ptr-fails.patch
+CVE-2015-5260_CVE-2015-5261/0014-Prevent-DoS-from-guest-trying-to-allocate-too-much-d.patch
+CVE-2015-5260_CVE-2015-5261/0015-Fix-some-possible-overflows-in-red_get_string-for-32.patch
+CVE-2015-5260_CVE-2015-5261/0016-Make-sure-we-can-read-QXLPathSeg-structures.patch
+CVE-2015-5260_CVE-2015-5261/0017-Avoid-race-condition-copying-segments-in-red_get_pat.patch
+CVE-2015-5260_CVE-2015-5261/0018-Prevent-data_size-to-be-set-independently-from-data.patch
+CVE-2015-5260_CVE-2015-5261/0019-Prevent-leak-if-size-from-red_get_data_chunks-don-t-.patch