Author: carnil
Date: 2016-08-18 04:52:17 +0000 (Thu, 18 Aug 2016)
New Revision: 44033

Modified:
   data/CVE/list
Log:
CVE-2016-6834/qemu assigned

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-08-18 04:51:13 UTC (rev 44032)
+++ data/CVE/list       2016-08-18 04:52:17 UTC (rev 44033)
@@ -336,14 +336,14 @@
        NOTE: 
http://git.qemu.org/?p=qemu.git;a=commit;h=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8
        NOTE: Upstream patch: 
https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html
        NOTE: http://www.openwall.com/lists/oss-security/2016/08/12/1
-CVE-2016-XXXX [an infinite loop during packet fragmentation]
+CVE-2016-6834 [an infinite loop during packet fragmentation]
        - qemu <unfixed>
        [wheezy] - qemu <not-affected> (Vulnerable code not present, packet 
abstraction introduced in 1.5)
        - qemu-kvm <removed>
        [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, packet 
abstraction introduced in 1.5)
+       NOTE: 
http://git.qemu.org/?p=qemu.git;a=commit;h=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05
        NOTE: Upstream patch: 
https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/08/11/8
-       TODO: check
+       NOTE: http://www.openwall.com/lists/oss-security/2016/08/11/8
 CVE-2016-6835 [buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 
device emulation]
        - qemu <unfixed>
        [wheezy] - qemu <not-affected> (Vulnerable code not present, vmxnet3 
introduced in 1.5)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to