diff options
author | Laszlo Boszormenyi (GCS) <gcs@debian.org> | 2020-06-04 08:43:07 +0200 |
---|---|---|
committer | Laszlo Boszormenyi (GCS) <gcs@debian.org> | 2020-06-04 08:43:07 +0200 |
commit | 967e04c337717f6f5f001ded4377daf1329e89ed (patch) | |
tree | 66c7697dd2433ded513bd53a6c97848c53cb7c2a /data | |
parent | a15bc8fd2ac1954359caf9c369d08b132869cc25 (diff) |
Add CVE-2020-13800/qemu
Diffstat (limited to 'data')
-rw-r--r-- | data/CVE/2020.list | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 97f93a6bb3..4aa313a11a 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -6,6 +6,10 @@ CVE-2020-XXXX [Cross-Site Scripting (XSS) vulnerability in template object 'user - roundcube 1.4.5+dfsg.1-1 (bug #962123) NOTE: 1.4.x: https://github.com/roundcube/roundcubemail/commit/4beec65d40c5e5b1f2bace935c110baf05e10ae5 NOTE: 1.3.x: https://github.com/roundcube/roundcubemail/commit/37e2bc745723ef6322f0f785aefd0b9313a40f19 +CVE-2020-13800 [ati-vga: infinite recursion in ati_mm_read/write calls may lead to DoS] + - qemu <unfixed> + NOTE: https://www.openwall.com/lists/oss-security/2020/06/04/2 + NOTE: https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg00833.html CVE-2020-13791 [ati-vga: OOB access while reading PCI configuration may lead to DoS] - qemu <unfixed> [buster] - qemu <not-affected> (Vulnerable code introduced later) |