]> git.proxmox.com Git - pve-libspice-server.git/commit
update to 0.12.8
authorDietmar Maurer <dietmar@proxmox.com>
Thu, 14 Jul 2016 06:07:13 +0000 (08:07 +0200)
committerDietmar Maurer <dietmar@proxmox.com>
Thu, 14 Jul 2016 06:07:13 +0000 (08:07 +0200)
commit4df07ad3cf77e4f90884c94c38280af81fa31ea4
treeab8a9aad8fd1c5d87b316b312e7988a1c52a6da2
parent907c9f0e6e75dbf7315ef9c071255364194140ce
update to 0.12.8

CVE-2015-3247 ,CVE-2015-5260 and CVE-2015-5261 are fixed upstream.
26 files changed:
Makefile
debian/changelog
debian/patches/CVE-2015-3247.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0001-worker-validate-correctly-surfaces.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0002-worker-avoid-double-free-or-double-create-of-surface.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0003-Define-a-constant-to-limit-data-from-guest.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0004-Fix-some-integer-overflow-causing-large-memory-alloc.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0005-Check-properly-surface-to-be-created.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0006-Fix-buffer-reading-overflow.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0007-Prevent-32-bit-integer-overflow-in-bitmap_consistent.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0008-Fix-race-condition-on-red_get_clip_rects.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0009-Fix-race-in-red_get_image.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0010-Fix-race-condition-in-red_get_string.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0011-Fix-integer-overflow-computing-glyph_size-in-red_get.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0012-Fix-race-condition-in-red_get_data_chunks_ptr.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0013-Prevent-memory-leak-if-red_get_data_chunks_ptr-fails.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0014-Prevent-DoS-from-guest-trying-to-allocate-too-much-d.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0015-Fix-some-possible-overflows-in-red_get_string-for-32.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0016-Make-sure-we-can-read-QXLPathSeg-structures.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0017-Avoid-race-condition-copying-segments-in-red_get_pat.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0018-Prevent-data_size-to-be-set-independently-from-data.patch [deleted file]
debian/patches/CVE-2015-5260_CVE-2015-5261/0019-Prevent-leak-if-size-from-red_get_data_chunks-don-t-.patch [deleted file]
debian/patches/allow-to-set-sasl-callbacks.patch
debian/patches/series
spice-0.12.5.tar.bz2 [deleted file]
spice-0.12.8.tar.bz2 [new file with mode: 0644]