13.11.2014 20:39, Salvatore Bonaccorso wrote:
> Source: qemu
> Version: 1.1.2+dfsg-6a
> Severity: important
> Tags: security upstream
> 
> Hi Debian QEMU team,
> 
> the following vulnerability was published for qemu, choosed important
> severity but actually might be downgraded to normal.
> 
> CVE-2014-7840[0]:
> insufficient parameter validation during ram load

It is the same thing as #739589 (insufficient input validation during
state load) -- new and more exciting ways to exploit this are found
all the time...  (I mean, it is another issue of the same sort, not
something which has already been fixed in debian).

We decided we will not try to fix this in wheezy - either all of the
issues should be fixed or none, there's no reason to fix some but
ignore others.

We also decided this is a not very important issue, because it only
happens when you allow untrusted parties to send you guest memory
state which is rather uncommon (see comments in that bugreport).

Yes it affects wheezy version, but it is wontfix for wheezy for the
above reason.  And yes I'll fix it for jessie, the patch in question
has been applied to my local qemu git repository yesterday.

Thanks,

/mjt


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to