[Secure-testing-commits] r43610 - data/CVE

Guido Guenther agx at moszumanska.debian.org
Fri Jul 29 14:25:17 UTC 2016


Author: agx
Date: 2016-07-29 14:25:17 +0000 (Fri, 29 Jul 2016)
New Revision: 43610

Modified:
   data/CVE/list
Log:
Remove EOL entries for qemu{,-kvm} in Wheezy

so the fixed CVE-2016-3712 CVE-2016-3710 show up correctly in the
tracker

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-07-29 14:06:12 UTC (rev 43609)
+++ data/CVE/list	2016-07-29 14:25:17 UTC (rev 43610)
@@ -8763,9 +8763,7 @@
 CVE-2016-3712 (Integer overflow in the VGA module in QEMU allows local guest OS users ...)
 	{DSA-3573-1 DLA-540-1 DLA-539-1}
 	- qemu 1:2.6+dfsg-1 (bug #823830)
-	[wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS)
 	- qemu-kvm <removed>
-	[wheezy] - qemu-kvm <end-of-life> (Not supported in Wheezy LTS)
 	- xen 4.4.0-1
 	[wheezy] - xen <no-dsa> (default configuration not vulnerable)
 	NOTE: Xen switched to qemu-system in 4.4.0-1
@@ -8776,9 +8774,7 @@
 CVE-2016-3710 (The VGA module in QEMU improperly performs bounds checking on banked ...)
 	{DSA-3573-1 DLA-540-1 DLA-539-1}
 	- qemu 1:2.6+dfsg-1 (bug #823830)
-	[wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS)
 	- qemu-kvm <removed>
-	[wheezy] - qemu-kvm <end-of-life> (Not supported in Wheezy LTS)
 	- xen 4.4.0-1
 	[wheezy] - xen <no-dsa> (default configuration not vulnerable)
 	NOTE: Xen switched to qemu-system in 4.4.0-1




More information about the Secure-testing-commits mailing list