diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-25 21:23:06 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-11-25 21:23:06 +0100 |
commit | bca4737976603148157e6a4faf033cfe2af6c49f (patch) | |
tree | 6078b04d485d88345dc112ea8d5281fc21e1df7e /data/CVE/2016.list | |
parent | 4da1b2a558121f92e0dc7aa69e05a7a121bb9e43 (diff) |
Cleanup some additional whitespaces
Diffstat (limited to 'data/CVE/2016.list')
-rw-r--r-- | data/CVE/2016.list | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/data/CVE/2016.list b/data/CVE/2016.list index a4aa168a30..3e6f99b8d6 100644 --- a/data/CVE/2016.list +++ b/data/CVE/2016.list @@ -343,7 +343,7 @@ CVE-2016-10937 (IMAPFilter through 2.6.12 does not validate the hostname in an S [buster] - imapfilter <no-dsa> (Minor issue) [stretch] - imapfilter <no-dsa> (Minor issue) NOTE: https://github.com/lefcha/imapfilter/issues/142 - NOTE: Patch for support for hostname validation (requrires OpenSSL 1.1.0 and later): + NOTE: Patch for support for hostname validation (requrires OpenSSL 1.1.0 and later): NOTE: https://github.com/lefcha/imapfilter/commit/bf2515da752eddd54973adb0853c6aa289e921b6 NOTE: Patch for support for hostname validation (for OpenSSL 1.0.2 and later): NOTE: https://github.com/lefcha/imapfilter/commit/3daa2692e37fc52ce630e39a3fb6faf270c054b1 @@ -4781,7 +4781,7 @@ CVE-2016-9480 (libdwarf 2016-10-21 allows context-dependent attackers to obtain NOTE: https://sourceforge.net/p/libdwarf/bugs/5/ NOTE: https://sourceforge.net/p/libdwarf/code/ci/5dd64de047cd5ec479fb11fe7ff2692fd819e5e5/ NOTE: The code has substantially changed in libdwarf/dwarf_util.c from older - NOTE: versions, but there seem to be still back then an unchecked dereference + NOTE: versions, but there seem to be still back then an unchecked dereference NOTE: of val_ptr. CVE-2016-9479 (The "lost password" functionality in b2evolution before 6.7.9 allows r ...) - b2evolution <removed> @@ -12939,7 +12939,7 @@ CVE-2016-6662 (Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x thro NOTE: https://bugzilla.suse.com/show_bug.cgi?id=998309 NOTE: Fixed in upstream Oracle MySQL 5.5.52, 5.6.33 and 5.7.15 NOTE: MariaDB: https://jira.mariadb.org/browse/MDEV-10465 - NOTE: Fixed in upstream MariaDB 5.5.51, 10.0.27, 10.1.17 + NOTE: Fixed in upstream MariaDB 5.5.51, 10.0.27, 10.1.17 NOTE: PerconaDB: https://www.percona.com/blog/2016/09/12/database-affected-cve-2016-6662/ NOTE: Although Oracle mentions this CVE only to be fixed in 5.5.53 this is not NOTE: true for src:mysql-5.5 as in Debian and other Linux distributions, so @@ -13691,7 +13691,7 @@ CVE-2016-6508 (epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1. NOTE: https://www.wireshark.org/security/wnpa-sec-2016-44.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=6cf9616df68a4db7e436bb77392586ff9ad84feb - NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13. + NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13. NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6507 (epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12. ...) {DSA-3648-1 DLA-595-1} @@ -23486,7 +23486,7 @@ CVE-2016-3159 (The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not p NOTE: http://xenbits.xen.org/xsa/advisory-172.html NOTE: CVE-2016-3159 is for the code change which is applicable for later NOTE: versions only, but which must always be combined with the code change - NOTE: for CVE-2016-3158. Ie for the first hunk in xsa172.patch, which + NOTE: for CVE-2016-3158. Ie for the first hunk in xsa172.patch, which NOTE: patches the function fpu_fxrstor. CVE-2016-3158 (The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly ...) {DSA-3554-1 DLA-571-1} @@ -23494,7 +23494,7 @@ CVE-2016-3158 (The xrstor function in arch/x86/xstate.c in Xen 4.x does not prop NOTE: http://xenbits.xen.org/xsa/advisory-172.html NOTE: CVE-2016-3158 is for the code change which is required for all NOTE: versions (but which is sufficient only on Xen 4.3.x, and insufficient - NOTE: on later versions). Ie for the second hunk in xsa172.patch (the only + NOTE: on later versions). Ie for the second hunk in xsa172.patch (the only NOTE: hunk in xsa172-4.3.patch), which patches the function xrstor. CVE-2016-3157 (The __switch_to function in arch/x86/kernel/process_64.c in the Linux ...) {DSA-3607-1 DLA-516-1} |