From fbfd395f3b640d1ad90c1a121aa23c6383be4bfb Mon Sep 17 00:00:00 2001 From: Joanna Rutkowska Date: Wed, 10 Sep 2014 10:45:37 +0000 Subject: [PATCH] SecurityBulletins changed Added short descriptions, also added QSB11 link --- SecurityBulletins.md | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/SecurityBulletins.md b/SecurityBulletins.md index bd4f521a..b7228682 100644 --- a/SecurityBulletins.md +++ b/SecurityBulletins.md @@ -15,26 +15,27 @@ Qubes Security Bulletins 2011 ---- -- [​Qubes Security Bulletin \#1](https://groups.google.com/d/msg/qubes-devel/kRQSQircYKk/KW1lihKLFjYJ) +- [​Qubes Security Bulletin \#1](https://groups.google.com/d/msg/qubes-devel/kRQSQircYKk/KW1lihKLFjYJ) (Gui daemon bug, Intel VT-d escape on non-IR hardware) 2012 ---- -- [​Qubes Security Bulletin \#2](https://groups.google.com/d/msg/qubes-devel/JIpZoQUP6dQ/g6TvtpUHzBQJ) -- [​Qubes Security Bulletin \#3](https://groups.google.com/group/qubes-devel/msg/2dece13ed1f9ad2d) -- [​Qubes Security Bulletin \#4](https://groups.google.com/group/qubes-devel/msg/28ecafd3c73ec1b0) -- [​Qubes Security Bulletin \#5](https://groups.google.com/group/qubes-devel/msg/add1e480d8642755) +- [​Qubes Security Bulletin \#2](https://groups.google.com/d/msg/qubes-devel/JIpZoQUP6dQ/g6TvtpUHzBQJ) (Intel SYSRET bug) +- [​Qubes Security Bulletin \#3](https://groups.google.com/d/msg/qubes-devel/KM1jMCE5SZM/La350T7h7C0J) (Xen hypervisor bugs: XSA 13, others with DoS potential) +- [​Qubes Security Bulletin \#4](https://groups.google.com/d/msg/qubes-devel/0y8ikKy5l7c/sME-x9Ov7CgJ) (Qubes firewall misconfiguration: ipv6 allowed) +- [​Qubes Security Bulletin \#5](https://groups.google.com/d/msg/qubes-devel/pXADmQOMmvo/VSdk2IDk0a0J) (Xen hypervisor bugs: XSA 29, others with DoS potential) 2013 ---- -- [​Qubes Security Bulletin \#6](https://groups.google.com/group/qubes-devel/msg/9e2fb148f140e09a) -- [​Qubes Security Bulletin \#7](https://groups.google.com/d/msg/qubes-devel/KqZdbcgkTGU/YaTwNcQhcrgJ) -- [​Qubes Security Bulletin \#8](https://groups.google.com/d/msg/qubes-devel/xj9KAW5inQc/YOrhOAQ7HU0J) +- [​Qubes Security Bulletin \#6](https://groups.google.com/d/msg/qubes-devel/UirCw7R3Muo/muBA8UixL54J) (Xen hypervisor bugs: XSA 50, others with DoS potential) +- [​Qubes Security Bulletin \#7](https://groups.google.com/d/msg/qubes-devel/KqZdbcgkTGU/YaTwNcQhcrgJ) (Xen hypervisor bugs: XSA 57 potential escalation, also XSA 52-54 with potential leaks) +- [​Qubes Security Bulletin \#8](https://groups.google.com/d/msg/qubes-devel/xj9KAW5inQc/YOrhOAQ7HU0J) (Xen hypervisor bugs: XSA 45,58 potential DoS) 2014 ---- -- [​Qubes Security Bulletin \#9](https://groups.google.com/d/msg/qubes-devel/XgTo6L8-5XA/JLOadvBqnqMJ) -- [​Qubes Security Bulletin \#10](https://groups.google.com/d/msg/qubes-devel/VO1URqYWbok/8vp-VnE7iXEJ) +- [​Qubes Security Bulletin \#9](https://groups.google.com/d/msg/qubes-devel/XgTo6L8-5XA/JLOadvBqnqMJ) (Qubes qvm-open-in-[d]vm environment inter-VM leak) +- [​Qubes Security Bulletin \#10](https://groups.google.com/d/msg/qubes-devel/VO1URqYWbok/8vp-VnE7iXEJ) (Qubes pulseaudio & vchan bugs, Xen XSA 87) +- [​Qubes Security Bulletin \#11](https://groups.google.com/d/msg/qubes-devel/QHXI0qXAPhk/gSF7m4KD37QJ) (Qubes clipboard inter-VM leak)