git: ca283e012d - main - Correct CVE typo for SA-24:17.bhyve.
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 13 Nov 2024 04:10:56 UTC
The branch main has been updated by gordon: URL: https://cgit.FreeBSD.org/doc/commit/?id=ca283e012d5568d6cdb214eafae753562937653a commit ca283e012d5568d6cdb214eafae753562937653a Author: Gordon Tetlow <gordon@FreeBSD.org> AuthorDate: 2024-11-13 04:10:07 +0000 Commit: Gordon Tetlow <gordon@FreeBSD.org> CommitDate: 2024-11-13 04:10:07 +0000 Correct CVE typo for SA-24:17.bhyve. Approved by: so --- .../security/advisories/FreeBSD-SA-24:17.bhyve.asc | 30 +++++++++++----------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc b/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc index 1906b0cc8a..a81105daea 100644 --- a/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc +++ b/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc @@ -19,7 +19,7 @@ Corrected: 2024-10-19 15:42:15 UTC (stable/14, 14.1-STABLE) 2024-10-29 18:49:55 UTC (releng/13.4, 13.4-RELEASE-p2) 2024-10-29 18:53:41 UTC (releng/13.3, 13.3-RELEASE-p8) CVE Name: CVE-2024-51562, CVE-2024-51563, CVE-2024-51564, - CVE-2024-51565, CVE-2024-51565 + CVE-2024-51565, CVE-2024-51566 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the @@ -47,7 +47,7 @@ The hda driver is vulnerable to a buffer over-read from a guest-controlled value. (CVE-2024-51565) The NVMe driver queue processing is vulernable to guest-induced infinite -loops. (CVE-2024-51565) +loops. (CVE-2024-51566) III. Impact @@ -139,17 +139,17 @@ The latest revision of this advisory is available at <URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-24:17.bhyve.asc> -----BEGIN PGP SIGNATURE----- -iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmchUCUACgkQbljekB8A -Gu/RJhAA5oWfn9F1Tdmwwl5CFbvIjSmHcWdDsTbQ66DrL8HcinrNoBSdhr2xuAQK -mxsWuUI1V4Wb9Yp0EXjpNB2ZIpjDbEionVK7BEZJ2D09TCi1CFS84CiTdqBlkJ/A -2K+eQD6BAG+wKu0yRlqu2wA8RgUWob8ORZ9PFyT4XH23OT4F60WUhPJ+917cqCru -Ye7hKcSy/xaL0J95ZOG+qeuTf9RbBeQ4f+Sq2ERbtPXVRcBs3x2PEjg1ptuKNmst -Hbvg+fIsfGWf99r50EhBP2yPJ/jNZBhYJ5gX+zdJsyuXRnJwnv2P6WNxFKoh2I2n -RI4L3rJ7hJVPURhXZ3fkmiQ8qW/VxrR+2H4YxjuD2U7KQg22ZxCCFNFfN7gYI63U -8/shw6Ez5OQqVyXl/+uD0/P6pnscKsQz9zNix7kI+G9meBZLnyA1/eGB0iFQVjYg -NxepUWheMsraLX1ytURtI2lY8pr26Fd4xtY0mKpV13ohL59nQZ79fIeot50m8WMP -++zqqErJa/9mk6MSZ/xXHWUbPLmQmuNyHere4kqvd4dTLLMOe17WB7NrPJch2S23 -BCcnfZNGwP9iPY27CHRStAYI2OIj2iL7oe2Z7jnh+afpcX3r5isxqZf3R6pw7C2a -fDPHVTfKJ951yBloejhXJcPXdwgYMZ+8nd2MVafrIYD7dTZfCrU= -=BYuX +iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmc0Jk8ACgkQbljekB8A +Gu8imQ/+K7WbzZrsVpMdXLEtXwaXsPuitgX2GVHlsv+d4Vc/0Zc992yEDmLizj3s +Y4hrHDqQGLFwr/VjZy0wFZtVEwL1qLJ49N98NDwEsE+SV4wsD/fMceOAe7KNTkNP +JwihXyNCMmghRtFkf8ytoZQeo6X2dEzQRez7RhoYQG9LVsbyPo+/aJzsUTaQVE9C +yRyb5d4HFXJmMlk/c545WfQsxlYdn7E3ZFws86/VKcWJ4ZQFdeIHd2F048q/Bk69 +bbK7DRQ+frJ6ubCk1CRKTj/BrSCtjJKf8Iokl6+UCI6ufoAgbNT6qCoJleHP2fUr +FfrVRGvxHCI6O06Lhws6LlWO3l8yd0/AFpu+hu9GmFsYhWj+DAgAMlFypgm4cwqc +f4TugRUeQjz3IPfpHT0zeUqW+3q0mT54mzIbmKJcjiaiA8L12FOpZYf3IFIJg9YU ++rDpaTMSiH0aNe9WpoACsNzMC3aH/hm6hZ5CyO2Qp7w1xcr9CKB7i3D3yw2XF9+x +rNQuA14UkGxiT6jDvS51A8AZOFS/hAPhFKFPJ0C2ZEXa4dEwA45g3neKboggQlxy +g7nYfduGjYygS0l/Hq+aEauyZL673dulTRWTex5SyOs7ke88zhxxDzLO/XvILpNT +rUpyHM2y2l199HOVeqe18shrLG6Dz1rYq+QvGOg/QD3Zca7+f4g= +=9r+d -----END PGP SIGNATURE-----