[Secure-testing-commits] r44446 - data/CVE

security tracker role sectracker at moszumanska.debian.org
Fri Sep 9 09:10:12 UTC 2016


Author: sectracker
Date: 2016-09-09 09:10:12 +0000 (Fri, 09 Sep 2016)
New Revision: 44446

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-09-09 07:43:59 UTC (rev 44445)
+++ data/CVE/list	2016-09-09 09:10:12 UTC (rev 44446)
@@ -39,7 +39,6 @@
 	NOTE: Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=698554
 	NOTE: Introduced by: https://git.gnome.org/browse/file-roller/commit/?id=34b64f3a897c4b4e8e180c028f326bc921eb08ec (3.5.4)
 	NOTE: Fixed by: https://git.gnome.org/browse/file-roller/commit/?id=f70be1f41688859ec8dbe266df35a1839ceb96c5 (3.20.3)
-
 CVE-2016-7161
 	RESERVED
 CVE-2016-7160
@@ -57,6 +56,7 @@
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/09/07/8
 CVE-2016-7154 [use after free in FIFO event channel code]
 	RESERVED
+	{DSA-3663-1}
 	- xen 4.6.0-1
 	[wheezy] - xen <not-affected> (Versions 4.3 and earlier are not vulnerable)
 	NOTE: http://xenbits.xen.org/xsa/advisory-188.html
@@ -353,7 +353,7 @@
 	NOTE: https://github.com/jquery/api.jqueryui.com/issues/281
 CVE-2016-7094 [x86 HVM: Overflow of sh_ctxt->seg_reg[]]
 	RESERVED
-	{DLA-614-1}
+	{DSA-3663-1 DLA-614-1}
 	- xen <unfixed>
 	NOTE:  http://xenbits.xen.org/xsa/advisory-187.html
 CVE-2016-7093 [x86: Mishandling of instruction pointer truncation during emulation]
@@ -362,7 +362,7 @@
 	NOTE: http://xenbits.xen.org/xsa/advisory-186.html
 CVE-2016-7092 [Disallow L3 recursive pagetable for 32-bit PV guests]
 	RESERVED
-	{DLA-614-1}
+	{DSA-3663-1 DLA-614-1}
 	- xen <unfixed>
 	NOTE: http://xenbits.xen.org/xsa/advisory-185.html
 CVE-2016-7090




More information about the Secure-testing-commits mailing list