diff options
author | Juergen Lock <nox@FreeBSD.org> | 2007-05-01 22:49:39 +0000 |
---|---|---|
committer | Juergen Lock <nox@FreeBSD.org> | 2007-05-01 22:49:39 +0000 |
commit | 1c19bc62ddcf91ed7ba4fafa9fb31b3b5e4a46fb (patch) | |
tree | 5852a09e00d92399aa80060ccfda416c7bee975d /security/vuxml/vuln.xml | |
parent | 209746404a911e7da2e8d83e72d90121fb79d0e4 (diff) |
Notes
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r-- | security/vuxml/vuln.xml | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index ebf2fab4b811..7f666c7ee595 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,59 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0ac89b39-f829-11db-b55c-000e0c6d38a9"> + <topic>qemu: several vulnerabilities</topic> + <affects> + <package> + <name>qemu</name> + <name>qemu-devel</name> + <range><lt>0.9.0_1</lt></range> + <range><ge>0.9.0s.20070101*</ge><lt>0.9.0s.20070405_3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>debian-security-announce@lists.debian.org reports:</p> + <blockquote cite="http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00040.html"> + <p>Several vulnerabilities have been discovered in the QEMU + processor emulator, which may lead to the execution of arbitrary + code or denial of service. The Common Vulnerabilities and Exposures + project identifies the following problems:</p> + <p>CVE-2007-1320<br/>Tavis Ormandy discovered that a memory + management routine of the Cirrus video driver performs insufficient + bounds checking, which might allow the execution of arbitrary code + through a heap overflow.</p> + <p>CVE-2007-1321<br/>Tavis Ormandy discovered that the NE2000 + network driver and the socket code perform insufficient input + validation, which might allow the execution of arbitrary code + through a heap overflow.</p> + <p>CVE-2007-1322<br/>Tavis Ormandy discovered that the "icebp" + instruction can be abused to terminate the emulation, resulting + in denial of service.</p> + <p>CVE-2007-1323<br/>Tavis Ormandy discovered that the NE2000 + network driver and the socket code perform insufficient input + validation, which might allow the execution of arbitrary code + through a heap overflow.</p> + <p>CVE-2007-1366<br/>Tavis Ormandy discovered that the "aam" + instruction can be abused to crash qemu through a division by + zero, resulting in denial of service.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-1320</cvename> + <cvename>CVE-2007-1321</cvename> + <cvename>CVE-2007-1322</cvename> + <cvename>CVE-2007-1323</cvename> + <cvename>CVE-2007-1366</cvename> + <mlist msgid="20070501100313.GA4074@galadriel.inutil.org">http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00040.html</mlist> + </references> + <dates> + <discovery>2007-05-01</discovery> + <entry>2007-05-01</entry> + </dates> + </vuln> + <vuln vid="632c98be-aad2-4af2-849f-41a6862afd6a"> <topic>p5-Imager - possibly exploitable buffer overflow</topic> <affects> |