]> git.proxmox.com Git - pve-libspice-server.git/commit
fix CVE-2015-3247, CVE-2015-5260, CVE-2015-5261
authorDietmar Maurer <dietmar@proxmox.com>
Fri, 16 Oct 2015 08:22:12 +0000 (10:22 +0200)
committerDietmar Maurer <dietmar@proxmox.com>
Fri, 16 Oct 2015 08:22:12 +0000 (10:22 +0200)
commit907c9f0e6e75dbf7315ef9c071255364194140ce
treeb25a4dce1dd58c4251dfab67a97373097ade9cd7
parentb2db756556f72dc6fc082233b953b0ec695b9a48
fix CVE-2015-3247, CVE-2015-5260, CVE-2015-5261

copied patches from original debian package spice 0.12.5-1+deb8u2
23 files changed:
Makefile
debian/changelog
debian/patches/CVE-2015-3247.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0001-worker-validate-correctly-surfaces.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0002-worker-avoid-double-free-or-double-create-of-surface.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0003-Define-a-constant-to-limit-data-from-guest.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0004-Fix-some-integer-overflow-causing-large-memory-alloc.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0005-Check-properly-surface-to-be-created.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0006-Fix-buffer-reading-overflow.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0007-Prevent-32-bit-integer-overflow-in-bitmap_consistent.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0008-Fix-race-condition-on-red_get_clip_rects.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0009-Fix-race-in-red_get_image.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0010-Fix-race-condition-in-red_get_string.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0011-Fix-integer-overflow-computing-glyph_size-in-red_get.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0012-Fix-race-condition-in-red_get_data_chunks_ptr.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0013-Prevent-memory-leak-if-red_get_data_chunks_ptr-fails.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0014-Prevent-DoS-from-guest-trying-to-allocate-too-much-d.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0015-Fix-some-possible-overflows-in-red_get_string-for-32.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0016-Make-sure-we-can-read-QXLPathSeg-structures.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0017-Avoid-race-condition-copying-segments-in-red_get_pat.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0018-Prevent-data_size-to-be-set-independently-from-data.patch [new file with mode: 0644]
debian/patches/CVE-2015-5260_CVE-2015-5261/0019-Prevent-leak-if-size-from-red_get_data_chunks-don-t-.patch [new file with mode: 0644]
debian/patches/series