summaryrefslogtreecommitdiffstats
path: root/data/CVE/2016.list
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-11-25 21:23:06 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-11-25 21:23:06 +0100
commitbca4737976603148157e6a4faf033cfe2af6c49f (patch)
tree6078b04d485d88345dc112ea8d5281fc21e1df7e /data/CVE/2016.list
parent4da1b2a558121f92e0dc7aa69e05a7a121bb9e43 (diff)
Cleanup some additional whitespaces
Diffstat (limited to 'data/CVE/2016.list')
-rw-r--r--data/CVE/2016.list12
1 files changed, 6 insertions, 6 deletions
diff --git a/data/CVE/2016.list b/data/CVE/2016.list
index a4aa168a30..3e6f99b8d6 100644
--- a/data/CVE/2016.list
+++ b/data/CVE/2016.list
@@ -343,7 +343,7 @@ CVE-2016-10937 (IMAPFilter through 2.6.12 does not validate the hostname in an S
[buster] - imapfilter <no-dsa> (Minor issue)
[stretch] - imapfilter <no-dsa> (Minor issue)
NOTE: https://github.com/lefcha/imapfilter/issues/142
- NOTE: Patch for support for hostname validation (requrires OpenSSL 1.1.0 and later):
+ NOTE: Patch for support for hostname validation (requrires OpenSSL 1.1.0 and later):
NOTE: https://github.com/lefcha/imapfilter/commit/bf2515da752eddd54973adb0853c6aa289e921b6
NOTE: Patch for support for hostname validation (for OpenSSL 1.0.2 and later):
NOTE: https://github.com/lefcha/imapfilter/commit/3daa2692e37fc52ce630e39a3fb6faf270c054b1
@@ -4781,7 +4781,7 @@ CVE-2016-9480 (libdwarf 2016-10-21 allows context-dependent attackers to obtain
NOTE: https://sourceforge.net/p/libdwarf/bugs/5/
NOTE: https://sourceforge.net/p/libdwarf/code/ci/5dd64de047cd5ec479fb11fe7ff2692fd819e5e5/
NOTE: The code has substantially changed in libdwarf/dwarf_util.c from older
- NOTE: versions, but there seem to be still back then an unchecked dereference
+ NOTE: versions, but there seem to be still back then an unchecked dereference
NOTE: of val_ptr.
CVE-2016-9479 (The "lost password" functionality in b2evolution before 6.7.9 allows r ...)
- b2evolution <removed>
@@ -12939,7 +12939,7 @@ CVE-2016-6662 (Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x thro
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=998309
NOTE: Fixed in upstream Oracle MySQL 5.5.52, 5.6.33 and 5.7.15
NOTE: MariaDB: https://jira.mariadb.org/browse/MDEV-10465
- NOTE: Fixed in upstream MariaDB 5.5.51, 10.0.27, 10.1.17
+ NOTE: Fixed in upstream MariaDB 5.5.51, 10.0.27, 10.1.17
NOTE: PerconaDB: https://www.percona.com/blog/2016/09/12/database-affected-cve-2016-6662/
NOTE: Although Oracle mentions this CVE only to be fixed in 5.5.53 this is not
NOTE: true for src:mysql-5.5 as in Debian and other Linux distributions, so
@@ -13691,7 +13691,7 @@ CVE-2016-6508 (epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.
NOTE: https://www.wireshark.org/security/wnpa-sec-2016-44.html
NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=6cf9616df68a4db7e436bb77392586ff9ad84feb
- NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13.
+ NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13.
NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3
CVE-2016-6507 (epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12. ...)
{DSA-3648-1 DLA-595-1}
@@ -23486,7 +23486,7 @@ CVE-2016-3159 (The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not p
NOTE: http://xenbits.xen.org/xsa/advisory-172.html
NOTE: CVE-2016-3159 is for the code change which is applicable for later
NOTE: versions only, but which must always be combined with the code change
- NOTE: for CVE-2016-3158. Ie for the first hunk in xsa172.patch, which
+ NOTE: for CVE-2016-3158. Ie for the first hunk in xsa172.patch, which
NOTE: patches the function fpu_fxrstor.
CVE-2016-3158 (The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly ...)
{DSA-3554-1 DLA-571-1}
@@ -23494,7 +23494,7 @@ CVE-2016-3158 (The xrstor function in arch/x86/xstate.c in Xen 4.x does not prop
NOTE: http://xenbits.xen.org/xsa/advisory-172.html
NOTE: CVE-2016-3158 is for the code change which is required for all
NOTE: versions (but which is sufficient only on Xen 4.3.x, and insufficient
- NOTE: on later versions). Ie for the second hunk in xsa172.patch (the only
+ NOTE: on later versions). Ie for the second hunk in xsa172.patch (the only
NOTE: hunk in xsa172-4.3.patch), which patches the function xrstor.
CVE-2016-3157 (The __switch_to function in arch/x86/kernel/process_64.c in the Linux ...)
{DSA-3607-1 DLA-516-1}

© 2014-2024 Faster IT GmbH | imprint | privacy policy