Author: carnil Date: 2016-08-18 04:52:17 +0000 (Thu, 18 Aug 2016) New Revision: 44033
Modified: data/CVE/list Log: CVE-2016-6834/qemu assigned Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-08-18 04:51:13 UTC (rev 44032) +++ data/CVE/list 2016-08-18 04:52:17 UTC (rev 44033) @@ -336,14 +336,14 @@ NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8 NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html NOTE: http://www.openwall.com/lists/oss-security/2016/08/12/1 -CVE-2016-XXXX [an infinite loop during packet fragmentation] +CVE-2016-6834 [an infinite loop during packet fragmentation] - qemu <unfixed> [wheezy] - qemu <not-affected> (Vulnerable code not present, packet abstraction introduced in 1.5) - qemu-kvm <removed> [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, packet abstraction introduced in 1.5) + NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05 NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/08/11/8 - TODO: check + NOTE: http://www.openwall.com/lists/oss-security/2016/08/11/8 CVE-2016-6835 [buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation] - qemu <unfixed> [wheezy] - qemu <not-affected> (Vulnerable code not present, vmxnet3 introduced in 1.5) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits