git: ca283e012d - main - Correct CVE typo for SA-24:17.bhyve.
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 13 Nov 2024 04:10:56 UTC
The branch main has been updated by gordon:
URL: https://cgit.FreeBSD.org/doc/commit/?id=ca283e012d5568d6cdb214eafae753562937653a
commit ca283e012d5568d6cdb214eafae753562937653a
Author: Gordon Tetlow <gordon@FreeBSD.org>
AuthorDate: 2024-11-13 04:10:07 +0000
Commit: Gordon Tetlow <gordon@FreeBSD.org>
CommitDate: 2024-11-13 04:10:07 +0000
Correct CVE typo for SA-24:17.bhyve.
Approved by: so
---
.../security/advisories/FreeBSD-SA-24:17.bhyve.asc | 30 +++++++++++-----------
1 file changed, 15 insertions(+), 15 deletions(-)
diff --git a/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc b/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc
index 1906b0cc8a..a81105daea 100644
--- a/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc
+++ b/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc
@@ -19,7 +19,7 @@ Corrected: 2024-10-19 15:42:15 UTC (stable/14, 14.1-STABLE)
2024-10-29 18:49:55 UTC (releng/13.4, 13.4-RELEASE-p2)
2024-10-29 18:53:41 UTC (releng/13.3, 13.3-RELEASE-p8)
CVE Name: CVE-2024-51562, CVE-2024-51563, CVE-2024-51564,
- CVE-2024-51565, CVE-2024-51565
+ CVE-2024-51565, CVE-2024-51566
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
@@ -47,7 +47,7 @@ The hda driver is vulnerable to a buffer over-read from a guest-controlled
value. (CVE-2024-51565)
The NVMe driver queue processing is vulernable to guest-induced infinite
-loops. (CVE-2024-51565)
+loops. (CVE-2024-51566)
III. Impact
@@ -139,17 +139,17 @@ The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-24:17.bhyve.asc>
-----BEGIN PGP SIGNATURE-----
-iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmchUCUACgkQbljekB8A
-Gu/RJhAA5oWfn9F1Tdmwwl5CFbvIjSmHcWdDsTbQ66DrL8HcinrNoBSdhr2xuAQK
-mxsWuUI1V4Wb9Yp0EXjpNB2ZIpjDbEionVK7BEZJ2D09TCi1CFS84CiTdqBlkJ/A
-2K+eQD6BAG+wKu0yRlqu2wA8RgUWob8ORZ9PFyT4XH23OT4F60WUhPJ+917cqCru
-Ye7hKcSy/xaL0J95ZOG+qeuTf9RbBeQ4f+Sq2ERbtPXVRcBs3x2PEjg1ptuKNmst
-Hbvg+fIsfGWf99r50EhBP2yPJ/jNZBhYJ5gX+zdJsyuXRnJwnv2P6WNxFKoh2I2n
-RI4L3rJ7hJVPURhXZ3fkmiQ8qW/VxrR+2H4YxjuD2U7KQg22ZxCCFNFfN7gYI63U
-8/shw6Ez5OQqVyXl/+uD0/P6pnscKsQz9zNix7kI+G9meBZLnyA1/eGB0iFQVjYg
-NxepUWheMsraLX1ytURtI2lY8pr26Fd4xtY0mKpV13ohL59nQZ79fIeot50m8WMP
-++zqqErJa/9mk6MSZ/xXHWUbPLmQmuNyHere4kqvd4dTLLMOe17WB7NrPJch2S23
-BCcnfZNGwP9iPY27CHRStAYI2OIj2iL7oe2Z7jnh+afpcX3r5isxqZf3R6pw7C2a
-fDPHVTfKJ951yBloejhXJcPXdwgYMZ+8nd2MVafrIYD7dTZfCrU=
-=BYuX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+=9r+d
-----END PGP SIGNATURE-----