[Secure-testing-commits] r43610 - data/CVE
Guido Guenther
agx at moszumanska.debian.org
Fri Jul 29 14:25:17 UTC 2016
Author: agx
Date: 2016-07-29 14:25:17 +0000 (Fri, 29 Jul 2016)
New Revision: 43610
Modified:
data/CVE/list
Log:
Remove EOL entries for qemu{,-kvm} in Wheezy
so the fixed CVE-2016-3712 CVE-2016-3710 show up correctly in the
tracker
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-07-29 14:06:12 UTC (rev 43609)
+++ data/CVE/list 2016-07-29 14:25:17 UTC (rev 43610)
@@ -8763,9 +8763,7 @@
CVE-2016-3712 (Integer overflow in the VGA module in QEMU allows local guest OS users ...)
{DSA-3573-1 DLA-540-1 DLA-539-1}
- qemu 1:2.6+dfsg-1 (bug #823830)
- [wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS)
- qemu-kvm <removed>
- [wheezy] - qemu-kvm <end-of-life> (Not supported in Wheezy LTS)
- xen 4.4.0-1
[wheezy] - xen <no-dsa> (default configuration not vulnerable)
NOTE: Xen switched to qemu-system in 4.4.0-1
@@ -8776,9 +8774,7 @@
CVE-2016-3710 (The VGA module in QEMU improperly performs bounds checking on banked ...)
{DSA-3573-1 DLA-540-1 DLA-539-1}
- qemu 1:2.6+dfsg-1 (bug #823830)
- [wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS)
- qemu-kvm <removed>
- [wheezy] - qemu-kvm <end-of-life> (Not supported in Wheezy LTS)
- xen 4.4.0-1
[wheezy] - xen <no-dsa> (default configuration not vulnerable)
NOTE: Xen switched to qemu-system in 4.4.0-1
More information about the Secure-testing-commits
mailing list