summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-04-07 17:56:01 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-04-07 17:56:01 +0200
commit4d986cb4bd66648b411f408bf69cbb1fc1c315fe (patch)
tree8566ce32fcb56e7abe7f7f3f9dff26e3431d5a93
parentdf6b44475601aa47bdb70bf9fb15a510cc25b599 (diff)
Update information for CVE-2020-11102/qemu
-rw-r--r--data/CVE/list.20205
1 files changed, 4 insertions, 1 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020
index 1a719f00e8..9294e70428 100644
--- a/data/CVE/list.2020
+++ b/data/CVE/list.2020
@@ -1023,7 +1023,10 @@ CVE-2020-11103
RESERVED
CVE-2020-11102 (hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying ...)
- qemu <unfixed>
- - qemu-kvm <removed>
+ [buster] - qemu <not-affected> (Vulnerable code/Tulip NIC emulator added later)
+ [stretch] - qemu <not-affected> (Vulnerable code/Tulip NIC emulator added later)
+ [jessie] - qemu <not-affected> (Vulnerable code/Tulip NIC emulator added later)
+ - qemu-kvm <not-affected> (Vulnerable code/Tulip NIC emulator added later)
NOTE: https://www.openwall.com/lists/oss-security/2020/04/06/1
NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=8ffb7265af64ec81748335ec8f20e7ab542c3850 (v5.0.0-rc1)
CVE-2020-11101

© 2014-2024 Faster IT GmbH | imprint | privacy policy