[Secure-testing-commits] r44033 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Aug 18 04:52:17 UTC 2016


Author: carnil
Date: 2016-08-18 04:52:17 +0000 (Thu, 18 Aug 2016)
New Revision: 44033

Modified:
   data/CVE/list
Log:
CVE-2016-6834/qemu assigned

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-08-18 04:51:13 UTC (rev 44032)
+++ data/CVE/list	2016-08-18 04:52:17 UTC (rev 44033)
@@ -336,14 +336,14 @@
 	NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8
 	NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html
 	NOTE: http://www.openwall.com/lists/oss-security/2016/08/12/1
-CVE-2016-XXXX [an infinite loop during packet fragmentation]
+CVE-2016-6834 [an infinite loop during packet fragmentation]
 	- qemu <unfixed>
 	[wheezy] - qemu <not-affected> (Vulnerable code not present, packet abstraction introduced in 1.5)
 	- qemu-kvm <removed>
 	[wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, packet abstraction introduced in 1.5)
+	NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05
 	NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/08/11/8
-	TODO: check
+	NOTE: http://www.openwall.com/lists/oss-security/2016/08/11/8
 CVE-2016-6835 [buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation]
 	- qemu <unfixed>
 	[wheezy] - qemu <not-affected> (Vulnerable code not present, vmxnet3 introduced in 1.5)




More information about the Secure-testing-commits mailing list