[Git][security-tracker-team/security-tracker][master] 3 commits: mark CVE-2020-25707 as postponed for Stretch
Thorsten Alteholz
alteholz at debian.org
Thu Nov 26 15:05:56 GMT 2020
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
fd13fe2b by Thorsten Alteholz at 2020-11-26T15:32:37+01:00
mark CVE-2020-25707 as postponed for Stretch
- - - - -
d852d1d0 by Thorsten Alteholz at 2020-11-26T15:48:08+01:00
add Fixed by: for CVE-2020-25624
- - - - -
d7a2bad3 by Thorsten Alteholz at 2020-11-26T16:05:35+01:00
add Fixed by: for CVE-2020-25085
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -10897,6 +10897,7 @@ CVE-2020-25707 [infinite loop in e1000e_write_packet_to_guest() in hw/net/e1000e
RESERVED
- qemu <unfixed> (bug #974687)
[buster] - qemu <postponed> (Fix along in future DSA)
+ [stretch] - qemu <postponed> (Minor issue; reconsider when fixed upstream)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1893895
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg03552.html
CVE-2020-25706 (A cross-site scripting (XSS) vulnerability exists in templates_import. ...)
@@ -11243,6 +11244,7 @@ CVE-2020-25624 [hcd-ohci: out-of-bound access issue while processing transfer de
[buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
[stretch] - qemu <postponed> (Fix along in future DLA)
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05492.html
+ NOTE: Fixed by: https://git.qemu.org/?p=qemu.git;a=commit;h=1328fe0c32d5474604105b8105310e944976b058
CVE-2020-25623 (Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Director ...)
- erlang 1:23.1+dfsg-1
[buster] - erlang <not-affected> (Vulnerable code introduced later)
@@ -12453,6 +12455,7 @@ CVE-2020-25085 (QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_con
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.html
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01439.html
NOTE: https://www.openwall.com/lists/oss-security/2020/09/16/6
+ NOTE: Fixed by: https://git.qemu.org/?p=qemu.git;a=patch;h=dfba99f17feb6d4a129da19d38df1bcd8579d1c3
CVE-2020-25084 (QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_p ...)
- qemu <unfixed> (bug #970539)
[buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1e48691798d93298d2c20529d0618a74b1a1956f...d7a2bad31fae638f0a43dfd07460fdb1ba700511
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1e48691798d93298d2c20529d0618a74b1a1956f...d7a2bad31fae638f0a43dfd07460fdb1ba700511
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201126/a080e844/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list