[Secure-testing-commits] r44446 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Fri Sep 9 09:10:12 UTC 2016
Author: sectracker
Date: 2016-09-09 09:10:12 +0000 (Fri, 09 Sep 2016)
New Revision: 44446
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-09-09 07:43:59 UTC (rev 44445)
+++ data/CVE/list 2016-09-09 09:10:12 UTC (rev 44446)
@@ -39,7 +39,6 @@
NOTE: Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=698554
NOTE: Introduced by: https://git.gnome.org/browse/file-roller/commit/?id=34b64f3a897c4b4e8e180c028f326bc921eb08ec (3.5.4)
NOTE: Fixed by: https://git.gnome.org/browse/file-roller/commit/?id=f70be1f41688859ec8dbe266df35a1839ceb96c5 (3.20.3)
-
CVE-2016-7161
RESERVED
CVE-2016-7160
@@ -57,6 +56,7 @@
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/09/07/8
CVE-2016-7154 [use after free in FIFO event channel code]
RESERVED
+ {DSA-3663-1}
- xen 4.6.0-1
[wheezy] - xen <not-affected> (Versions 4.3 and earlier are not vulnerable)
NOTE: http://xenbits.xen.org/xsa/advisory-188.html
@@ -353,7 +353,7 @@
NOTE: https://github.com/jquery/api.jqueryui.com/issues/281
CVE-2016-7094 [x86 HVM: Overflow of sh_ctxt->seg_reg[]]
RESERVED
- {DLA-614-1}
+ {DSA-3663-1 DLA-614-1}
- xen <unfixed>
NOTE: http://xenbits.xen.org/xsa/advisory-187.html
CVE-2016-7093 [x86: Mishandling of instruction pointer truncation during emulation]
@@ -362,7 +362,7 @@
NOTE: http://xenbits.xen.org/xsa/advisory-186.html
CVE-2016-7092 [Disallow L3 recursive pagetable for 32-bit PV guests]
RESERVED
- {DLA-614-1}
+ {DSA-3663-1 DLA-614-1}
- xen <unfixed>
NOTE: http://xenbits.xen.org/xsa/advisory-185.html
CVE-2016-7090
More information about the Secure-testing-commits
mailing list