Author: carnil
Date: 2017-08-10 09:47:54 +0000 (Thu, 10 Aug 2017)
New Revision: 54524

Modified:
   data/CVE/list
Log:
Correct some upstream commit references for linux issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-08-10 09:43:03 UTC (rev 54523)
+++ data/CVE/list       2017-08-10 09:47:54 UTC (rev 54524)
@@ -5109,7 +5109,7 @@
        - linux 4.11.11-1 (low)
        [jessie] - linux <not-affected> (Vulnerable code not present)
        [wheezy] - linux <not-affected> (Vulnerable code not present)
-       NOTE: Fixed by: 
https://git.kernel.org/linux/385aee965b4e4c36551c362a334378d2985b722a
+       NOTE: Fixed by: 
https://git.kernel.org/linus/385aee965b4e4c36551c362a334378d2985b722a
 CVE-2017-10809
        RESERVED
 CVE-2017-10808
@@ -29365,7 +29365,7 @@
 CVE-2017-2634 [dccp: crash while sending ipv6 reset packet]
        RESERVED
        - linux <not-affected> (Fixed before initial rename to src:linux)
-       NOTE: Fixed by: 
https://git.kernel.org/linux/f53dc67c5e7babafe239b93a11678b0e05bead51 
(2.6.25-rc1)
+       NOTE: Fixed by: 
https://git.kernel.org/linus/f53dc67c5e7babafe239b93a11678b0e05bead51 
(2.6.25-rc1)
 CVE-2017-2633 [VNC: memory corruption due to unchecked resolution limit]
        RESERVED
        - qemu 2.1+dfsg-1
@@ -47845,7 +47845,7 @@
        - linux 4.6.1-1
        [wheezy] - linux <not-affected> (Vulnerable code not present)
        NOTE: Upstream fix: 
https://git.kernel.org/linus/9bf292bfca94694a721449e3fd752493856710f6 (v4.7-rc1)
-       NOTE: Introduced in: 
https://git.kernel.org/linux/f69bcbf3b4c4b333dcd7a48eaf868bf0c88edab5 
(v3.13-rc1)
+       NOTE: Introduced in: 
https://git.kernel.org/linus/f69bcbf3b4c4b333dcd7a48eaf868bf0c88edab5 
(v3.13-rc1)
 CVE-2015-8936 (Cross-site scripting (XSS) vulnerability in squidGuard.cgi in 
...)
        {DLA-524-1}
        - squidguard 1.5-5 (unimportant)
@@ -67036,7 +67036,7 @@
 CVE-2012-6703 (Integer overflow in the snd_compr_allocate_buffer function in 
...)
        - linux 3.8.11-1
        [wheezy] - linux <not-affected> (Vulnerable code not present)
-       NOTE: Fixed by: 
https://git.kernel.org/linux/b35cc8225845112a616e3a2266d2fde5ab13d3ab (3.7-rc1)
+       NOTE: Fixed by: 
https://git.kernel.org/linus/b35cc8225845112a616e3a2266d2fde5ab13d3ab (3.7-rc1)
 CVE-2012-6702 (Expat, when used in a parser that has not called 
XML_SetHashSalt or ...)
        {DSA-3597-1 DLA-508-1}
        - expat 2.1.1-3


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to