[Secure-testing-commits] r33739 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Tue Apr 21 16:54:25 UTC 2015


Author: carnil
Date: 2015-04-21 16:54:25 +0000 (Tue, 21 Apr 2015)
New Revision: 33739

Modified:
   data/CVE/list
Log:
CVE-2014-9718 assigned for qemu

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-04-21 13:53:22 UTC (rev 33738)
+++ data/CVE/list	2015-04-21 16:54:25 UTC (rev 33739)
@@ -2359,11 +2359,11 @@
 	- linux-2.6 <removed>
 	NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 (v3.19-rc1)
 	NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/11
-CVE-2015-XXXX [malicious PRDT flow from guest to host]
+CVE-2014-9718 [malicious PRDT flow from guest to host]
 	- qemu <unfixed> (unimportant; bug #781250)
 	- qemu-kvm <removed> (unimportant)
 	NOTE: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8 (v2.2.0-rc2)
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/24/4
+	NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/4
 	NOTE: Per maintainer not a security issue:
 	NOTE: Qemu either leaks memory or loops infinitely.  Memory leakage can be easily
 	NOTE: mitigated using some kind of resource limits in security-sensitive environments,




More information about the Secure-testing-commits mailing list