Author: sectracker Date: 2016-07-01 09:10:13 +0000 (Fri, 01 Jul 2016) New Revision: 42951
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-07-01 08:58:18 UTC (rev 42950) +++ data/CVE/list 2016-07-01 09:10:13 UTC (rev 42951) @@ -1922,6 +1922,7 @@ NOTE: https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/ CVE-2016-5359 [wnpa-sec-2016-38] RESERVED + {DLA-538-1} - wireshark 2.0 NOTE: Only affects 1.12, marking 2.0 as fixed NOTE: https://www.wireshark.org/security/wnpa-sec-2016-38.html @@ -1937,6 +1938,7 @@ NOTE: https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7 CVE-2016-5357 [wnpa-sec-2016-36] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-36.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396 @@ -1944,6 +1946,7 @@ NOTE: https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78 CVE-2016-5356 [wnpa-sec-2016-35] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-35.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395 @@ -1951,6 +1954,7 @@ NOTE: https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500 CVE-2016-5355 [wnpa-sec-2016-34] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-34.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394 @@ -1958,12 +1962,14 @@ NOTE: https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b CVE-2016-5354 [wnpa-sec-2016-33] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-33.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356 NOTE: https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6 CVE-2016-5353 [wnpa-sec-2016-32] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-32.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191 @@ -1978,12 +1984,14 @@ NOTE: https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185 CVE-2016-5351 [wnpa-sec-2016-30] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-30.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585 NOTE: https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4 CVE-2016-5350 [wnpa-sec-2016-29] RESERVED + {DLA-538-1} - wireshark 2.0.4+gdd7746e-1 NOTE: https://www.wireshark.org/security/wnpa-sec-2016-29.html NOTE: https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b @@ -3161,6 +3169,7 @@ TODO: check CVE-2016-5008 [libvirt: Setting empty VNC password allows access to unauthorized users] RESERVED + {DLA-541-1} - libvirt <unfixed> NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1180092 TODO: check @@ -7113,7 +7122,7 @@ NOTE: Introduced by: https://git.kernel.org/linus/910a6aae4e2e45855efc4a268e43eed2d8445575 (v4.2-rc1) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1332139 CVE-2016-3712 (Integer overflow in the VGA module in QEMU allows local guest OS users ...) - {DSA-3573-1} + {DSA-3573-1 DLA-540-1 DLA-539-1} - qemu 1:2.6+dfsg-1 (bug #823830) [wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS) - qemu-kvm <removed> @@ -7126,7 +7135,7 @@ CVE-2016-3711 (HAproxy in Red Hat OpenShift Enterprise 3.2 and OpenShift Origin ...) NOT-FOR-US: OpenShift CVE-2016-3710 (The VGA module in QEMU improperly performs bounds checking on banked ...) - {DSA-3573-1} + {DSA-3573-1 DLA-540-1 DLA-539-1} - qemu 1:2.6+dfsg-1 (bug #823830) [wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS) - qemu-kvm <removed> _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits