summaryrefslogtreecommitdiffstats
path: root/data
diff options
context:
space:
mode:
authorLaszlo Boszormenyi (GCS) <gcs@debian.org>2020-06-04 08:43:07 +0200
committerLaszlo Boszormenyi (GCS) <gcs@debian.org>2020-06-04 08:43:07 +0200
commit967e04c337717f6f5f001ded4377daf1329e89ed (patch)
tree66c7697dd2433ded513bd53a6c97848c53cb7c2a /data
parenta15bc8fd2ac1954359caf9c369d08b132869cc25 (diff)
Add CVE-2020-13800/qemu
Diffstat (limited to 'data')
-rw-r--r--data/CVE/2020.list4
1 files changed, 4 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list
index 97f93a6bb3..4aa313a11a 100644
--- a/data/CVE/2020.list
+++ b/data/CVE/2020.list
@@ -6,6 +6,10 @@ CVE-2020-XXXX [Cross-Site Scripting (XSS) vulnerability in template object 'user
- roundcube 1.4.5+dfsg.1-1 (bug #962123)
NOTE: 1.4.x: https://github.com/roundcube/roundcubemail/commit/4beec65d40c5e5b1f2bace935c110baf05e10ae5
NOTE: 1.3.x: https://github.com/roundcube/roundcubemail/commit/37e2bc745723ef6322f0f785aefd0b9313a40f19
+CVE-2020-13800 [ati-vga: infinite recursion in ati_mm_read/write calls may lead to DoS]
+ - qemu <unfixed>
+ NOTE: https://www.openwall.com/lists/oss-security/2020/06/04/2
+ NOTE: https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00833.html
CVE-2020-13791 [ati-vga: OOB access while reading PCI configuration may lead to DoS]
- qemu <unfixed>
[buster] - qemu <not-affected> (Vulnerable code introduced later)

© 2014-2024 Faster IT GmbH | imprint | privacy policy