[Secure-testing-commits] r42951 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Fri Jul 1 09:10:13 UTC 2016
Author: sectracker
Date: 2016-07-01 09:10:13 +0000 (Fri, 01 Jul 2016)
New Revision: 42951
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-07-01 08:58:18 UTC (rev 42950)
+++ data/CVE/list 2016-07-01 09:10:13 UTC (rev 42951)
@@ -1922,6 +1922,7 @@
NOTE: https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/
CVE-2016-5359 [wnpa-sec-2016-38]
RESERVED
+ {DLA-538-1}
- wireshark 2.0
NOTE: Only affects 1.12, marking 2.0 as fixed
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-38.html
@@ -1937,6 +1938,7 @@
NOTE: https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7
CVE-2016-5357 [wnpa-sec-2016-36]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-36.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
@@ -1944,6 +1946,7 @@
NOTE: https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78
CVE-2016-5356 [wnpa-sec-2016-35]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-35.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
@@ -1951,6 +1954,7 @@
NOTE: https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500
CVE-2016-5355 [wnpa-sec-2016-34]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-34.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
@@ -1958,12 +1962,14 @@
NOTE: https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b
CVE-2016-5354 [wnpa-sec-2016-33]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-33.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
NOTE: https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6
CVE-2016-5353 [wnpa-sec-2016-32]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-32.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
@@ -1978,12 +1984,14 @@
NOTE: https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185
CVE-2016-5351 [wnpa-sec-2016-30]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-30.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
NOTE: https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4
CVE-2016-5350 [wnpa-sec-2016-29]
RESERVED
+ {DLA-538-1}
- wireshark 2.0.4+gdd7746e-1
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-29.html
NOTE: https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b
@@ -3161,6 +3169,7 @@
TODO: check
CVE-2016-5008 [libvirt: Setting empty VNC password allows access to unauthorized users]
RESERVED
+ {DLA-541-1}
- libvirt <unfixed>
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1180092
TODO: check
@@ -7113,7 +7122,7 @@
NOTE: Introduced by: https://git.kernel.org/linus/910a6aae4e2e45855efc4a268e43eed2d8445575 (v4.2-rc1)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1332139
CVE-2016-3712 (Integer overflow in the VGA module in QEMU allows local guest OS users ...)
- {DSA-3573-1}
+ {DSA-3573-1 DLA-540-1 DLA-539-1}
- qemu 1:2.6+dfsg-1 (bug #823830)
[wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS)
- qemu-kvm <removed>
@@ -7126,7 +7135,7 @@
CVE-2016-3711 (HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin ...)
NOT-FOR-US: OpenShift
CVE-2016-3710 (The VGA module in QEMU improperly performs bounds checking on banked ...)
- {DSA-3573-1}
+ {DSA-3573-1 DLA-540-1 DLA-539-1}
- qemu 1:2.6+dfsg-1 (bug #823830)
[wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS)
- qemu-kvm <removed>
More information about the Secure-testing-commits
mailing list