Author: sectracker Date: 2015-06-13 09:10:23 +0000 (Sat, 13 Jun 2015) New Revision: 34924
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2015-06-12 22:16:14 UTC (rev 34923) +++ data/CVE/list 2015-06-13 09:10:23 UTC (rev 34924) @@ -841,6 +841,7 @@ CVE-2015-4107 RESERVED CVE-2015-4106 (QEMU does not properly restrict write access to the PCI config space ...) + {DSA-3284-1} - qemu 1:2.3+dfsg-5 (bug #787547) [wheezy] - qemu <not-affected> (Vulnerable code not present) [squeeze] - qemu <not-affected> (Vulnerable code not present) @@ -850,6 +851,7 @@ NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: http://xenbits.xen.org/xsa/advisory-131.html CVE-2015-4105 (Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through ...) + {DSA-3284-1} - qemu 1:2.3+dfsg-5 (bug #787547) [wheezy] - qemu <not-affected> (Vulnerable code not present) [squeeze] - qemu <not-affected> (Vulnerable code not present) @@ -859,6 +861,7 @@ NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: http://xenbits.xen.org/xsa/advisory-130.html CVE-2015-4104 (Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI ...) + {DSA-3284-1} - qemu 1:2.3+dfsg-5 (bug #787547) [wheezy] - qemu <not-affected> (Vulnerable code not present) [squeeze] - qemu <not-affected> (Vulnerable code not present) @@ -868,6 +871,7 @@ NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: http://xenbits.xen.org/xsa/advisory-129.html CVE-2015-4103 (Xen 3.3.x through 4.5.x does not properly restrict write access to the ...) + {DSA-3284-1} - qemu 1:2.3+dfsg-5 (bug #787547) [wheezy] - qemu <not-affected> (Vulnerable code not present) [squeeze] - qemu <not-affected> (Vulnerable code not present) @@ -1057,6 +1061,7 @@ NOT-FOR-US: WordPress plugin WP Membership CVE-2015-4037 RESERVED + {DSA-3285-1 DSA-3284-1} - qemu 1:2.3+dfsg-5 [wheezy] - qemu 1.1.2+dfsg-6a+deb7u8 [squeeze] - qemu <end-of-life> (Not supported in Squeeze LTS) @@ -3286,6 +3291,7 @@ NOTE: Issue then introduced by: http://vcs.pcre.org/pcre?view=revision&revision=1361 CVE-2015-3209 [heap overflow in qemu pcnet controller allowing guest to host escape] RESERVED + {DSA-3285-1 DSA-3284-1} - qemu 1:2.3+dfsg-6 (bug #788460) [wheezy] - qemu 1.1.2+dfsg-6a+deb7u8 - qemu-kvm <removed> _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits