Hi Michael,
[looping in team@s.d.o as we do not automatically are CCed on security
tagged bugs, so for conext of the other team members]
On Sat, Jul 06, 2024 at 09:27:45AM +0300, Michael Tokarev wrote:
> Control: found -1
> 06.07.2024 00:35, Salvatore Bonaccorso wrote:
> ..
> > > This is fixed by
Processing control commands:
> found -1
Bug #1075824 {Done: Michael Tokarev } [src:qemu] qemu:
CVE-2024-4467
No longer marked as fixed in versions 1:9.0.1+ds-1 and reopened.
--
1075824: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1075824
Debian Bug Tracking System
Contact ow...@bugs.debia
Control: found -1
06.07.2024 00:35, Salvatore Bonaccorso wrote:
..
This is fixed by qemu uploaded earlier today.
Patches are already prepared for bookworm (for qemu 7.2.x series) and
already verified upstream and passed the tests.
Yes thanks, had only the 1:8.2.5+ds-2 initially to check.
Sur
ugs.debian.org/cgi-bin/bugreport.cgi?bug=1075824
> Debian Bug Tracking System
> Contact ow...@bugs.debian.org with problems
> From: Michael Tokarev
> User-Agent: Mozilla Thunderbird
> Date: Sat, 6 Jul 2024 00:23:36 +0300
> To: 1075824-d...@bugs.debian.org
> Subject: Re: Bu
Source: qemu
Version: 1:8.2.5+ds-2
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for qemu.
CVE-2024-4467[0]:
| A flaw was found in the QEMU disk image utility (qemu-im
5 matches
Mail list logo