[Git][security-tracker-team/security-tracker][master] triagge some qemu bugs in jessie. follow secteam.

Santiago R.R. santiago at debian.org
Fri Nov 16 18:32:14 GMT 2018


Santiago R.R. pushed to branch master at Debian Security Tracker / security-tracker


Commits:
8cbbbf91 by Santiago Ruano Rincón at 2018-11-16T18:31:04Z
triagge some qemu bugs in jessie. follow secteam.

thanks secteam!

Signed-off-by: Santiago Ruano Rincón <santiagorr at riseup.net>

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1125,6 +1125,7 @@ CVE-2018-18955 [userns: also map extents in the reverse map to kernel IDs]
 CVE-2018-18954 (The pnv_lpc_do_eccb function in hw/ppc/pnv_lpc.c in Qemu before 3.1 ...)
 	- qemu <unfixed> (low)
 	[stretch] - qemu <postponed> (Minor issue, can be backported once fixed upstream)
+	[jessie] - qemu <not-affected> (Vulnerable code not present. ppc/pnv lpc was added in 2.7)
 	- qemu-kvm <removed>
 	NOTE: https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg00446.html
 CVE-2018-18953
@@ -1348,6 +1349,7 @@ CVE-2018-18849 [lsi53c895a: OOB msg buffer access leads to DoS]
 	RESERVED
 	- qemu <unfixed> (bug #912535)
 	[stretch] - qemu <postponed> (Minor issue, revisit for later update)
+	[jessie] - qemu <postponed> (Minor issue, revisit for later update)
 	- qemu-kvm <removed>
 	NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=e58ccf039650065a9442de43c9816f81e88f27f6
 	NOTE: https://www.openwall.com/lists/oss-security/2018/11/01/1
@@ -2377,6 +2379,7 @@ CVE-2018-18445 (In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x b
 CVE-2018-18438 (Qemu has integer overflows because IOReadHandler and its associated ...)
 	- qemu <unfixed> (bug #911470)
 	[stretch] - qemu <ignored> (Minor issue, too intrusive to backport)
+	[jessie] - qemu <ignored> (Minor issue, too intrusive to backport)
 	- qemu-kvm <removed>
 	NOTE: https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg02396.html
 	NOTE: https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg02402.html
@@ -3686,6 +3689,7 @@ CVE-2018-17959
 CVE-2018-17958 (Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c ...)
 	- qemu <unfixed> (bug #911499)
 	[stretch] - qemu <postponed> (Minor issue, revisit for later update)
+	[jessie] - qemu <postponed> (Minor issue, revisit for later update)
 	- qemu-kvm <removed>
 	NOTE: https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03269.html
 	NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=1a326646fef38782e5542280040ec3ea23e4a730



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/8cbbbf91354422da97f97e8d99981acb55af29b4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/8cbbbf91354422da97f97e8d99981acb55af29b4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181116/6d534906/attachment.html>


More information about the debian-security-tracker-commits mailing list