use-fixed-data-path.patch
microvm-default-machine-type.patch
build-most-modules-statically-hack.diff
skip-meson-pc-bios.diff
linux-user-binfmt-P.diff
#
openbios-address-of-packet-member.patch
openbios-use-source_date_epoch-in-makefile.patch
seabios-hppa-use-consistent-date-and-remove-hostname.patch
slof-remove-user-and-host-from-release-version.patch
slof-ensure-ld-is-called-with-C-locale.patch
spelling.diff
pc-bios-descriptors-fix-paths-in-json-files.patch
i386-acpi-restore-device-paths-for-pre-5.1-vms.patch
linux-user-elfload-fix-address-calculation-in-fallback-scenario.patch
memory-clamp-cached-translation-if-points-to-MMIO-region-CVE-2020-27821.patch
configure-replace-enable-disable-git-update-with-wit.patch
arm_gic-fix-interrupt-ID-in-GICD_SGIR-CVE-2021-20221.patch
9pfs-Fully-restart-unreclaim-loop-CVE-2021-20181.patch
virtiofsd-extract-lo_do_open-from-lo_open.patch
virtiofsd-optionally-return-inode-pointer-from-lo_do_lookup.patch
virtiofsd-prevent-opening-of-special-files-CVE-2020-35517.patch
virtiofsd-save-error-code-early-at-the-failure-callsite.patch
virtiofsd-drop-remapped-security.capability-xattr-as-needed-CVE-2021-20263.patch
# CVE-2021-3416
net-qemu_receive_packet-for-loopback-introduce.patch
net-qemu_receive_packet-for-loopback-cadence_gem.patch
net-qemu_receive_packet-for-loopback-dp8393x.patch
net-qemu_receive_packet-for-loopback-e1000.patch
net-qemu_receive_packet-for-loopback-lan9118.patch
net-qemu_receive_packet-for-loopback-msf2.patch
net-qemu_receive_packet-for-loopback-pcnet.patch
net-qemu_receive_packet-for-loopback-rtl8139.patch
net-qemu_receive_packet-for-loopback-sungem.patch
net-qemu_receive_packet-for-loopback-tx_pkt-iov.patch
net-e1000-fail-early-for-evil-descriptor-CVE-2021-20257.patch
# sd/sdhci fixes: CVE-2020-17380 CVE-2020-25085 CVE-2021-3409
sdhci/dont-transfer-any-data-when-command-time-out.patch
sdhci/dont-write-to-SDHC_SYSAD-register-when-transfer-is-in-progress.patch
sdhci/correctly-set-the-controller-status-for-ADMA.patch
sdhci/limit-block-size-only-when-SDHC_BLKSIZE-register-is-writable.patch
sdhci/reset-the-data-pointer-of-s-fifo_buffer-when-a-different-block-size-is-programmed.patch
mptsas-remove-unused-MPTSASState.pending-CVE-2021-3392.patch
pvrdma-fix-possible-mremap-overflow-in-pvrdma-device-CVE-2021-3582.patch
pvrdma-ensure-correct-input-on-ring-init-CVE-2021-3607.patch
pvrdma-fix-the-ring-init-error-flow-CVE-2021-3608.patch
ide-atapi-check-logical-block-address-and-read-size-CVE-2020-29443.patch
usb-limit-combined-packets-to-1-MiB-CVE-2021-3527.patch
usb-redir-avoid-dynamic-stack-allocation-CVE-2021-3527.patch
usbredir-fix-free-call-CVE-2021-3682.patch
uas-add-stream-number-sanity-checks-CVE-2021-3713.patch
virtio-net-fix-use-after-unmap-free-for-sg-CVE-2021-3748.patch
virtio-net-fix-map-leaking-on-error-during-receive-CVE-2022-26353.patch
ati_2d-fix-buffer-overflow-in-ati_2d_blt-CVE-2021-3638.patch
vhost-user-gpu/fix-memory-disclosure-in-virgl_cmd_get_capset_info-CVE-2021-3545.patch
vhost-user-gpu/fix-resource-leak-in-vg_resource_create_2d-CVE-2021-3544.patch
vhost-user-gpu/fix-memory-leak-in-vg_resource_attach_backing-CVE-2021-3544.patch
vhost-user-gpu/fix-memory-leak-while-calling-vg_resource_unref-CVE-2021-3544.patch
vhost-user-gpu/fix-memory-leak-in-virgl_cmd_resource_unref-CVE-2021-3544.patch
vhost-user-gpu/fix-memory-leak-in-virgl_resource_attach_backing-CVE-2021-3544.patch
vhost-user-gpu/fix-OOB-write-in-virgl_cmd_get_capset-CVE-2021-3546.patch
ui-cursor-fix-integer-overflow-in-cursor_alloc-CVE-2021-4206.patch
display-qxl-render-fix-race-condition-in-qxl_cursor-CVE-2021-4207.patch
virtiofsd-drop-membership-of-all-supplementary-group-CVE-2022-0358.patch
vhost-vsock-detach-the-virqueue-element-on-error-CVE-2022-26354.patch
CVE-2023-0330.patch
CVE-2023-1544.patch
CVE-2023-3354.patch
CVE-2021-3930.patch
CVE-2023-3180.patch
CVE-2021-20203.patch
CVE-2021-3507.patch
CVE-2020-14394.patch
CVE-2023-3301.patch
CVE-2022-0216.patch
CVE-2021-20196.patch
CVE-2023-1544-0001-hw-pvrdma-Protect-against-buggy-or-malicious-guest-d.patch
CVE-2023-3019_0001-net-Update-MemReentrancyGuard-for-NIC.patch
CVE-2023-3019-pre1.patch
CVE-2023-3019-2.patch
CVE-2023-5088_0003-hw-ide-reset-cancel-async-DMA-operation-before-reset.patch
CVE-2023-6693_0001-virtio-net-correctly-copy-vnet-header-when-flushing-.patch
CVE-2024-3447_0001-hw-sd-sdhci-Do-not-update-TRNMOD-when-Command-Inhibi.patch
CVE-2024-7409/kvm-nbd-server-Plumb-in-new-args-to-nbd_client_add.patch
CVE-2024-7409/kvm-nbd-server-CVE-2024-7409-Cap-default-max-connections.patch
CVE-2024-7409/kvm-nbd-server-CVE-2024-7409-Close-stray-clients-at-serv.patch
CVE-2024-7409/kvm-nbd-server-Favor-qemu_aio_context-over-iohandler-con.patch
CVE-2024-7409/kvm-iotests-test-NBD-TLS-iothread.patch
CVE-2024-7409/kvm-nbd-server-CVE-2024-7409-Avoid-use-after-free-when-c.patch
