Hi Michael,
Thanks for your quick reply.
On Thu, Nov 13, 2014 at 09:37:09PM +0300, Michael Tokarev wrote:
> 13.11.2014 20:39, Salvatore Bonaccorso wrote:
> > Source: qemu
> > Version: 1.1.2+dfsg-6a
> > Severity: important
> > Tags: security upstream
> >
> > Hi Debian QEMU team,
> >
> > the foll
13.11.2014 20:39, Salvatore Bonaccorso wrote:
> Source: qemu
> Version: 1.1.2+dfsg-6a
> Severity: important
> Tags: security upstream
>
> Hi Debian QEMU team,
>
> the following vulnerability was published for qemu, choosed important
> severity but actually might be downgraded to normal.
>
> CVE-
Source: qemu
Version: 1.1.2+dfsg-6a
Severity: important
Tags: security upstream
Hi Debian QEMU team,
the following vulnerability was published for qemu, choosed important
severity but actually might be downgraded to normal.
CVE-2014-7840[0]:
insufficient parameter validation during ram load
If
3 matches
Mail list logo