From 124f34193a452d4bc0bd00214ed37297fbef30a2 Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Sun, 12 Aug 2018 16:34:53 -0500 Subject: [PATCH] Add QSB 42 --- security-info/security-bulletins.md | 1 + 1 file changed, 1 insertion(+) diff --git a/security-info/security-bulletins.md b/security-info/security-bulletins.md index da2186b4..6dbb6ce6 100644 --- a/security-info/security-bulletins.md +++ b/security-info/security-bulletins.md @@ -92,4 +92,5 @@ Qubes Security Bulletins are published through the [Qubes Security Pack](/securi - [Qubes Security Bulletin \#39](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-039-2018.txt) (Xen vulnerability (XSA-260) and GUI daemon issue) - [Qubes Security Bulletin \#40](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-040-2018.txt) (Information leaks due to processor speculative store bypass (XSA-263)) - [Qubes Security Bulletin \#41](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-041-2018.txt) (Speculative register leakage from lazy FPU context switching (XSA-267)) +- [Qubes Security Bulletin \#42](https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-042-2018.txt) (Linux netback driver OOB access in hash handling (XSA-270))