Author: jmm
Date: 2015-03-29 18:00:39 +0000 (Sun, 29 Mar 2015)
New Revision: 33242

Modified:
   data/CVE/list
Log:
one qemu issue unimportant


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2015-03-29 18:00:03 UTC (rev 33241)
+++ data/CVE/list       2015-03-29 18:00:39 UTC (rev 33242)
@@ -854,10 +854,15 @@
        NOTE: Upstream commit: 
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
 (v3.19-rc1)
        NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/11
 CVE-2015-XXXX [malicious PRDT flow from guest to host]
-       - qemu <unfixed> (bug #781250)
-       - qemu-kvm <removed>
+       - qemu <unfixed> (unimportant; bug #781250)
+       - qemu-kvm <removed> (unimportant)
        NOTE: 
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8
 (v2.2.0-rc2)
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/03/24/4
+        NOTE: Per maintainer not a security issue:
+        NOTE: Qemu either leaks memory or loops infinitely.  Memory leakage 
can be easily
+        NOTE: mitigated using some kind of resource limits in 
security-sensitive environments,
+        NOTE: and looping can trivially be done inside the virtual machine 
just fine, achieving
+        NOTE: the same effect
 CVE-2015-2686 [sys_sendto/sys_recvfrom does not validate the user provided 
ubuf pointer]
        RESERVED
        - linux <not-affected> (Introduced in 3.19, never uploaded to unstable)
@@ -2493,6 +2498,7 @@
 CVE-2015-1779 [denial of service in VNC web]
        RESERVED
        - qemu <unfixed> (bug #781250)
+       [jessie] - qemu <no-dsa> (Postponed until fixed upstream)
        [wheezy] - qemu <not-affected> (Websocket protocol support introduced 
in v1.4.0-rc0)
        - qemu-kvm <not-affected> (Websocket protocol support introduced in 
v1.4.0-rc0)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html


_______________________________________________
Secure-testing-commits mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to