On Sun, May 03, 2009 at 02:38:35PM -0400, Michael S. Gilbert wrote:
> On Sat, 2 May 2009 15:37:52 +0200 Aurelien Jarno wrote:
> > This is fixed in the lenny branch of the SVN.
>
> great to hear. do you plan to work with the security team to issue a
> DSA for this one, or is it minor enough that i
On Sat, 2 May 2009 15:37:52 +0200 Aurelien Jarno wrote:
> This is fixed in the lenny branch of the SVN.
great to hear. do you plan to work with the security team to issue a
DSA for this one, or is it minor enough that it would make more sense
to do it in an spu?
--
To UNSUBSCRIBE, email to de
On Tue, Apr 28, 2009 at 03:34:32PM -0400, Michael S. Gilbert wrote:
> Package: qemu
> Severity: important
> Tags: security
> Tags: fixed 0.9.1+svn20081101-1
>
> Hi,
>
> The following CVE (Common Vulnerabilities & Exposures) id was
> published for qemu.
>
> CVE-2008-4539[0]:
> | Heap-based buffer
Package: qemu
Severity: important
Tags: security
Tags: fixed 0.9.1+svn20081101-1
Hi,
The following CVE (Common Vulnerabilities & Exposures) id was
published for qemu.
CVE-2008-4539[0]:
| Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM
| before kvm-82 and (2) QEMU on Debian
4 matches
Mail list logo