Searched hist:ce48f2f4 (Results 1 – 5 of 5) sorted by relevance
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 080.out | ce48f2f4 Wed Mar 26 07:05:45 CDT 2014 Kevin Wolf <kwolf@redhat.com> qcow2: Validate snapshot table offset/size (CVE-2014-0144) This avoid unbounded memory allocation and fixes a potential buffer overflow on 32 bit hosts. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
|
H A D | 080 | ce48f2f4 Wed Mar 26 07:05:45 CDT 2014 Kevin Wolf <kwolf@redhat.com> qcow2: Validate snapshot table offset/size (CVE-2014-0144) This avoid unbounded memory allocation and fixes a potential buffer overflow on 32 bit hosts. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
|
/openbmc/qemu/block/ |
H A D | qcow2-snapshot.c | ce48f2f4 Wed Mar 26 07:05:45 CDT 2014 Kevin Wolf <kwolf@redhat.com> qcow2: Validate snapshot table offset/size (CVE-2014-0144) This avoid unbounded memory allocation and fixes a potential buffer overflow on 32 bit hosts. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
|
H A D | qcow2.h | ce48f2f4 Wed Mar 26 07:05:45 CDT 2014 Kevin Wolf <kwolf@redhat.com> qcow2: Validate snapshot table offset/size (CVE-2014-0144) This avoid unbounded memory allocation and fixes a potential buffer overflow on 32 bit hosts. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
|
H A D | qcow2.c | ce48f2f4 Wed Mar 26 07:05:45 CDT 2014 Kevin Wolf <kwolf@redhat.com> qcow2: Validate snapshot table offset/size (CVE-2014-0144) This avoid unbounded memory allocation and fixes a potential buffer overflow on 32 bit hosts. Signed-off-by: Kevin Wolf <kwolf@redhat.com> Reviewed-by: Max Reitz <mreitz@redhat.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
|