[Secure-testing-commits] r33739 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Tue Apr 21 16:54:25 UTC 2015
Author: carnil
Date: 2015-04-21 16:54:25 +0000 (Tue, 21 Apr 2015)
New Revision: 33739
Modified:
data/CVE/list
Log:
CVE-2014-9718 assigned for qemu
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2015-04-21 13:53:22 UTC (rev 33738)
+++ data/CVE/list 2015-04-21 16:54:25 UTC (rev 33739)
@@ -2359,11 +2359,11 @@
- linux-2.6 <removed>
NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 (v3.19-rc1)
NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/11
-CVE-2015-XXXX [malicious PRDT flow from guest to host]
+CVE-2014-9718 [malicious PRDT flow from guest to host]
- qemu <unfixed> (unimportant; bug #781250)
- qemu-kvm <removed> (unimportant)
NOTE: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8 (v2.2.0-rc2)
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/24/4
+ NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/4
NOTE: Per maintainer not a security issue:
NOTE: Qemu either leaks memory or loops infinitely. Memory leakage can be easily
NOTE: mitigated using some kind of resource limits in security-sensitive environments,
More information about the Secure-testing-commits
mailing list