[Secure-testing-commits] r46801 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Mon Dec 5 21:10:14 UTC 2016
Author: sectracker
Date: 2016-12-05 21:10:13 +0000 (Mon, 05 Dec 2016)
New Revision: 46801
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-12-05 20:57:41 UTC (rev 46800)
+++ data/CVE/list 2016-12-05 21:10:13 UTC (rev 46801)
@@ -1,3 +1,533 @@
+CVE-2017-3149
+ RESERVED
+CVE-2017-3148
+ RESERVED
+CVE-2017-3147
+ RESERVED
+CVE-2017-3146
+ RESERVED
+CVE-2017-3145
+ RESERVED
+CVE-2017-3144
+ RESERVED
+CVE-2017-3143
+ RESERVED
+CVE-2017-3142
+ RESERVED
+CVE-2017-3141
+ RESERVED
+CVE-2017-3140
+ RESERVED
+CVE-2017-3139
+ RESERVED
+CVE-2017-3138
+ RESERVED
+CVE-2017-3137
+ RESERVED
+CVE-2017-3136
+ RESERVED
+CVE-2017-3135
+ RESERVED
+CVE-2017-3134
+ RESERVED
+CVE-2017-3133
+ RESERVED
+CVE-2017-3132
+ RESERVED
+CVE-2017-3131
+ RESERVED
+CVE-2017-3130
+ RESERVED
+CVE-2017-3129
+ RESERVED
+CVE-2017-3128
+ RESERVED
+CVE-2017-3127
+ RESERVED
+CVE-2017-3126
+ RESERVED
+CVE-2017-3125
+ RESERVED
+CVE-2017-3124
+ RESERVED
+CVE-2017-3123
+ RESERVED
+CVE-2017-3122
+ RESERVED
+CVE-2017-3121
+ RESERVED
+CVE-2017-3120
+ RESERVED
+CVE-2017-3119
+ RESERVED
+CVE-2017-3118
+ RESERVED
+CVE-2017-3117
+ RESERVED
+CVE-2017-3116
+ RESERVED
+CVE-2017-3115
+ RESERVED
+CVE-2017-3114
+ RESERVED
+CVE-2017-3113
+ RESERVED
+CVE-2017-3112
+ RESERVED
+CVE-2017-3111
+ RESERVED
+CVE-2017-3110
+ RESERVED
+CVE-2017-3109
+ RESERVED
+CVE-2017-3108
+ RESERVED
+CVE-2017-3107
+ RESERVED
+CVE-2017-3106
+ RESERVED
+CVE-2017-3105
+ RESERVED
+CVE-2017-3104
+ RESERVED
+CVE-2017-3103
+ RESERVED
+CVE-2017-3102
+ RESERVED
+CVE-2017-3101
+ RESERVED
+CVE-2017-3100
+ RESERVED
+CVE-2017-3099
+ RESERVED
+CVE-2017-3098
+ RESERVED
+CVE-2017-3097
+ RESERVED
+CVE-2017-3096
+ RESERVED
+CVE-2017-3095
+ RESERVED
+CVE-2017-3094
+ RESERVED
+CVE-2017-3093
+ RESERVED
+CVE-2017-3092
+ RESERVED
+CVE-2017-3091
+ RESERVED
+CVE-2017-3090
+ RESERVED
+CVE-2017-3089
+ RESERVED
+CVE-2017-3088
+ RESERVED
+CVE-2017-3087
+ RESERVED
+CVE-2017-3086
+ RESERVED
+CVE-2017-3085
+ RESERVED
+CVE-2017-3084
+ RESERVED
+CVE-2017-3083
+ RESERVED
+CVE-2017-3082
+ RESERVED
+CVE-2017-3081
+ RESERVED
+CVE-2017-3080
+ RESERVED
+CVE-2017-3079
+ RESERVED
+CVE-2017-3078
+ RESERVED
+CVE-2017-3077
+ RESERVED
+CVE-2017-3076
+ RESERVED
+CVE-2017-3075
+ RESERVED
+CVE-2017-3074
+ RESERVED
+CVE-2017-3073
+ RESERVED
+CVE-2017-3072
+ RESERVED
+CVE-2017-3071
+ RESERVED
+CVE-2017-3070
+ RESERVED
+CVE-2017-3069
+ RESERVED
+CVE-2017-3068
+ RESERVED
+CVE-2017-3067
+ RESERVED
+CVE-2017-3066
+ RESERVED
+CVE-2017-3065
+ RESERVED
+CVE-2017-3064
+ RESERVED
+CVE-2017-3063
+ RESERVED
+CVE-2017-3062
+ RESERVED
+CVE-2017-3061
+ RESERVED
+CVE-2017-3060
+ RESERVED
+CVE-2017-3059
+ RESERVED
+CVE-2017-3058
+ RESERVED
+CVE-2017-3057
+ RESERVED
+CVE-2017-3056
+ RESERVED
+CVE-2017-3055
+ RESERVED
+CVE-2017-3054
+ RESERVED
+CVE-2017-3053
+ RESERVED
+CVE-2017-3052
+ RESERVED
+CVE-2017-3051
+ RESERVED
+CVE-2017-3050
+ RESERVED
+CVE-2017-3049
+ RESERVED
+CVE-2017-3048
+ RESERVED
+CVE-2017-3047
+ RESERVED
+CVE-2017-3046
+ RESERVED
+CVE-2017-3045
+ RESERVED
+CVE-2017-3044
+ RESERVED
+CVE-2017-3043
+ RESERVED
+CVE-2017-3042
+ RESERVED
+CVE-2017-3041
+ RESERVED
+CVE-2017-3040
+ RESERVED
+CVE-2017-3039
+ RESERVED
+CVE-2017-3038
+ RESERVED
+CVE-2017-3037
+ RESERVED
+CVE-2017-3036
+ RESERVED
+CVE-2017-3035
+ RESERVED
+CVE-2017-3034
+ RESERVED
+CVE-2017-3033
+ RESERVED
+CVE-2017-3032
+ RESERVED
+CVE-2017-3031
+ RESERVED
+CVE-2017-3030
+ RESERVED
+CVE-2017-3029
+ RESERVED
+CVE-2017-3028
+ RESERVED
+CVE-2017-3027
+ RESERVED
+CVE-2017-3026
+ RESERVED
+CVE-2017-3025
+ RESERVED
+CVE-2017-3024
+ RESERVED
+CVE-2017-3023
+ RESERVED
+CVE-2017-3022
+ RESERVED
+CVE-2017-3021
+ RESERVED
+CVE-2017-3020
+ RESERVED
+CVE-2017-3019
+ RESERVED
+CVE-2017-3018
+ RESERVED
+CVE-2017-3017
+ RESERVED
+CVE-2017-3016
+ RESERVED
+CVE-2017-3015
+ RESERVED
+CVE-2017-3014
+ RESERVED
+CVE-2017-3013
+ RESERVED
+CVE-2017-3012
+ RESERVED
+CVE-2017-3011
+ RESERVED
+CVE-2017-3010
+ RESERVED
+CVE-2017-3009
+ RESERVED
+CVE-2017-3008
+ RESERVED
+CVE-2017-3007
+ RESERVED
+CVE-2017-3006
+ RESERVED
+CVE-2017-3005
+ RESERVED
+CVE-2017-3004
+ RESERVED
+CVE-2017-3003
+ RESERVED
+CVE-2017-3002
+ RESERVED
+CVE-2017-3001
+ RESERVED
+CVE-2017-3000
+ RESERVED
+CVE-2017-2999
+ RESERVED
+CVE-2017-2998
+ RESERVED
+CVE-2017-2997
+ RESERVED
+CVE-2017-2996
+ RESERVED
+CVE-2017-2995
+ RESERVED
+CVE-2017-2994
+ RESERVED
+CVE-2017-2993
+ RESERVED
+CVE-2017-2992
+ RESERVED
+CVE-2017-2991
+ RESERVED
+CVE-2017-2990
+ RESERVED
+CVE-2017-2989
+ RESERVED
+CVE-2017-2988
+ RESERVED
+CVE-2017-2987
+ RESERVED
+CVE-2017-2986
+ RESERVED
+CVE-2017-2985
+ RESERVED
+CVE-2017-2984
+ RESERVED
+CVE-2017-2983
+ RESERVED
+CVE-2017-2982
+ RESERVED
+CVE-2017-2981
+ RESERVED
+CVE-2017-2980
+ RESERVED
+CVE-2017-2979
+ RESERVED
+CVE-2017-2978
+ RESERVED
+CVE-2017-2977
+ RESERVED
+CVE-2017-2976
+ RESERVED
+CVE-2017-2975
+ RESERVED
+CVE-2017-2974
+ RESERVED
+CVE-2017-2973
+ RESERVED
+CVE-2017-2972
+ RESERVED
+CVE-2017-2971
+ RESERVED
+CVE-2017-2970
+ RESERVED
+CVE-2017-2969
+ RESERVED
+CVE-2017-2968
+ RESERVED
+CVE-2017-2967
+ RESERVED
+CVE-2017-2966
+ RESERVED
+CVE-2017-2965
+ RESERVED
+CVE-2017-2964
+ RESERVED
+CVE-2017-2963
+ RESERVED
+CVE-2017-2962
+ RESERVED
+CVE-2017-2961
+ RESERVED
+CVE-2017-2960
+ RESERVED
+CVE-2017-2959
+ RESERVED
+CVE-2017-2958
+ RESERVED
+CVE-2017-2957
+ RESERVED
+CVE-2017-2956
+ RESERVED
+CVE-2017-2955
+ RESERVED
+CVE-2017-2954
+ RESERVED
+CVE-2017-2953
+ RESERVED
+CVE-2017-2952
+ RESERVED
+CVE-2017-2951
+ RESERVED
+CVE-2017-2950
+ RESERVED
+CVE-2017-2949
+ RESERVED
+CVE-2017-2948
+ RESERVED
+CVE-2017-2947
+ RESERVED
+CVE-2017-2946
+ RESERVED
+CVE-2017-2945
+ RESERVED
+CVE-2017-2944
+ RESERVED
+CVE-2017-2943
+ RESERVED
+CVE-2017-2942
+ RESERVED
+CVE-2017-2941
+ RESERVED
+CVE-2017-2940
+ RESERVED
+CVE-2017-2939
+ RESERVED
+CVE-2017-2938
+ RESERVED
+CVE-2017-2937
+ RESERVED
+CVE-2017-2936
+ RESERVED
+CVE-2017-2935
+ RESERVED
+CVE-2017-2934
+ RESERVED
+CVE-2017-2933
+ RESERVED
+CVE-2017-2932
+ RESERVED
+CVE-2017-2931
+ RESERVED
+CVE-2017-2930
+ RESERVED
+CVE-2017-2929
+ RESERVED
+CVE-2017-2928
+ RESERVED
+CVE-2017-2927
+ RESERVED
+CVE-2017-2926
+ RESERVED
+CVE-2017-2925
+ RESERVED
+CVE-2016-9838
+ RESERVED
+CVE-2016-9837
+ RESERVED
+CVE-2016-9836
+ RESERVED
+CVE-2016-9835 (Directory traversal vulnerability in file "jcss.php" in Zikula 1.3.x ...)
+ TODO: check
+CVE-2016-9834
+ RESERVED
+CVE-2016-9833
+ RESERVED
+CVE-2016-9832
+ RESERVED
+CVE-2016-9805
+ RESERVED
+CVE-2016-9796 (Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs ...)
+ TODO: check
+CVE-2016-9795
+ RESERVED
+CVE-2016-9792
+ RESERVED
+CVE-2016-9791
+ RESERVED
+CVE-2016-9790
+ RESERVED
+CVE-2016-9789
+ RESERVED
+CVE-2016-9788
+ RESERVED
+CVE-2016-9787
+ RESERVED
+CVE-2016-9786
+ RESERVED
+CVE-2016-9785
+ RESERVED
+CVE-2016-9784
+ RESERVED
+CVE-2016-9783
+ RESERVED
+CVE-2016-9782
+ RESERVED
+CVE-2016-9781
+ RESERVED
+CVE-2016-9780
+ RESERVED
+CVE-2016-9779
+ RESERVED
+CVE-2016-9778
+ RESERVED
+CVE-2016-9771
+ RESERVED
+CVE-2016-9770
+ RESERVED
+CVE-2016-9769
+ RESERVED
+CVE-2016-9768
+ RESERVED
+CVE-2016-9767
+ RESERVED
+CVE-2016-9766
+ RESERVED
+CVE-2016-9765
+ RESERVED
+CVE-2016-9764
+ RESERVED
+CVE-2016-9763
+ RESERVED
+CVE-2016-9762
+ RESERVED
+CVE-2016-9761
+ RESERVED
+CVE-2016-9760
+ RESERVED
+CVE-2016-9759
+ RESERVED
+CVE-2016-9758
+ RESERVED
+CVE-2016-9757
+ RESERVED
CVE-2016-XXXX [zipinfo buffer overflow]
- unzip <unfixed>
NOTE: https://launchpad.net/bugs/1643750
@@ -10,74 +540,92 @@
[jessie] - tiff <no-dsa> (Minor issue)
NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2619
CVE-2016-9831 [listswf: heap-based buffer overflow in parseSWF_RGBA (parser.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_rgba-parser-c
CVE-2016-9830 [memory allocation failure in MagickRealloc]
+ RESERVED
- graphicsmagick <unfixed> (bug #847055)
NOTE: https://blogs.gentoo.org/ago/2016/12/01/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c
CVE-2016-9829 [listswf: heap-based buffer overflow in parseSWF_DEFINEFONT (parser.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_definefont-parser-c
CVE-2016-9828 [listswf: NULL pointer dereference in dumpBuffer (read.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-null-pointer-dereference-in-dumpbuffer-read-c
CVE-2016-9827 [listswf: heap-based buffer overflow in _iprintf (outputtxt.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c
CVE-2016-9826
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00041-libav-leftshift-ituh263dec_c
CVE-2016-9825
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00040-libav-leftshift-utils_c
CVE-2016-9824
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00039-libav-signedintoverflow-swscale_c
CVE-2016-9823
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00038-libav-uint8_t64-outofbounds-mpegvideo
CVE-2016-9822
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00037-libav-signedintoverflow-mpegvideo_parser
CVE-2016-9821
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00037-libav-signedintoverflow-mpegvideo_parser
CVE-2016-9820
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00036-libav-leftshift-mpegvideo
CVE-2016-9819
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00036-libav-leftshift-mpegvideo
CVE-2016-9818
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-4.patch
CVE-2016-9817
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-3.patch
NOTE: or https://xenbits.xen.org/xsa/xsa201-3-4.7.patch
CVE-2016-9816
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-2.patch
CVE-2016-9815
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-1.patch
CVE-2016-9814 [simplesamlphp signature validation SSPSA 201612-01]
+ RESERVED
- simplesamlphp 1.14.10-1 (low)
[jessie] - simplesamlphp <no-dsa> (Minor issue)
[wheezy] - simplesamlphp <no-dsa> (Minor issue)
@@ -5314,39 +5862,42 @@
RESERVED
CVE-2017-0381
RESERVED
-CVE-2016-9804 [buffer overflow in commands_dump()]
+CVE-2016-9804 (In BlueZ 5.42, a buffer overflow was observed in "commands_dump" ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9803 [out-of-bounds read in le_meta_ev_dump()]
+CVE-2016-9803 (In BlueZ 5.42, an out-of-bounds read was observed in "le_meta_ev_dump" ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9802 [buffer over-read in l2cap_packet()]
+CVE-2016-9802 (In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68898.html
-CVE-2016-9801 [buffer overflow in set_ext_ctrl()]
+CVE-2016-9801 (In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9800 [buffer overflow in pin_code_reply_dump()]
+CVE-2016-9800 (In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9799 [buffer overflow in pklg_read_hci()]
+CVE-2016-9799 (In BlueZ 5.42, a buffer overflow was observed in "pklg_read_hci" ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68898.html
-CVE-2016-9798 [use-after-free in conf_opt()]
+CVE-2016-9798 (In BlueZ 5.42, a use-after-free was identified in "conf_opt" function ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9797 [bluez: buffer over-read in l2cap_dump()]
+CVE-2016-9797 (In BlueZ 5.42, a buffer over-read was observed in "l2cap_dump" function ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
CVE-2016-9794 [Linux kernel: ALSA: use-after-free in,kill_fasync]
+ RESERVED
- linux 4.7.2-1
NOTE: https://patchwork.kernel.org/patch/8752621/
NOTE: Fixed by: https://git.kernel.org/linus/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4 (v4.7-rc1)
NOTE: http://seclists.org/oss-sec/2016/q4/576
CVE-2016-9793 [Linux: signed overflows for SO_{SND|RCV}BUFFORCE]
+ RESERVED
- linux <unfixed>
NOTE: Fixed by: https://git.kernel.org/linus/b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
CVE-2016-9775 [tomcat8: privilege escalation during package removal]
+ RESERVED
{DLA-729-1 DLA-728-1}
- tomcat8 8.5.8-2 (bug #845385)
- tomcat7 7.0.72-3
@@ -5355,6 +5906,7 @@
NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie
NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/5
CVE-2016-9774 [tomcat8: privilege escalation during package upgrade]
+ RESERVED
- tomcat8 <unfixed> (bug #845393)
- tomcat7 7.0.72-3
NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API
@@ -5362,6 +5914,7 @@
NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie
NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/5
CVE-2016-9777 [kvm: out of bounds memory access via vcpu_id]
+ RESERVED
- linux <unfixed>
[jessie] - linux <not-affected> (Vulnerable code introduced later)
[wheezy] - linux <not-affected> (Vulnerable code introduced later)
@@ -5370,6 +5923,7 @@
NOTE: Introduced in: https://git.kernel.org/linus/af1bae5497b98cb99d6b0492e6981f060420a00c (v4.8-rc1)
NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/2
CVE-2016-9776 [net: mcf_fec: infinite loop while receiving data in mcf_fec_receive]
+ RESERVED
- qemu <unfixed> (bug #846797)
[jessie] - qemu <no-dsa> (Minor issue)
[wheezy] - qemu <no-dsa> (Minor issue)
@@ -5514,6 +6068,7 @@
CVE-2017-0356
RESERVED
CVE-2016-9772 [OPENAFS-SA-2016-003 - directory information leaks]
+ RESERVED
{DLA-733-1}
- openafs 1.6.20-1 (bug #846922)
[jessie] - openafs <no-dsa> (Minor issue; can be fixed in point release)
@@ -5643,8 +6198,8 @@
RESERVED
CVE-2017-0306
RESERVED
-CVE-2016-9638
- RESERVED
+CVE-2016-9638 (In BMC Patrol before 9.13.10.02, the binary "listguests64" is ...)
+ TODO: check
CVE-2016-9637
RESERVED
CVE-2016-9620
@@ -5975,18 +6530,22 @@
- salt 2016.3.0+ds-1
NOTE: http://www.openwall.com/lists/oss-security/2016/11/25/2
CVE-2016-9813 [null pointer deref (segfault) in mpegts decoder / _parse_pat]
+ RESERVED
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775120
CVE-2016-9812 [2 byte heap out of bounds read in gst_mpegts_section_new]
+ RESERVED
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775048
CVE-2016-9811 [4 byte heap out of bounds read in windows_icon_typefind]
+ RESERVED
- gst-plugins-base1.0 1.10.2-1
- gst-plugins-base0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774902
CVE-2016-9810 [Invalid memory read in glib caused by one invalid unref call in the flxdec decoder]
+ RESERVED
- gst-plugins-good1.0 1.10.1-2
[jessie] - gst-plugins-good1.0 1.4.4-2+deb8u2
- gst-plugins-good0.10 <removed>
@@ -5994,10 +6553,12 @@
[wheezy] - gst-plugins-good0.10 0.10.31-3+nmu1+deb7u1
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774897
CVE-2016-9809 [h264: one byte heap off by one read in gst_h264_parse_set_caps]
+ RESERVED
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774896
CVE-2016-9808
+ RESERVED
- gst-plugins-good1.0 1.10.1-2
[jessie] - gst-plugins-good1.0 1.4.4-2+deb8u2
- gst-plugins-good0.10 <removed>
@@ -6007,6 +6568,7 @@
NOTE: https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=153a8ae752c90d07190ef45803422a4f71ea8bff
NOTE: https://scarybeastsecurity.blogspot.dk/2016/11/0day-poc-incorrect-fix-for-gstreamer.html
CVE-2016-9807
+ RESERVED
- gst-plugins-good1.0 1.10.1-2
[jessie] - gst-plugins-good1.0 1.4.4-2+deb8u2
- gst-plugins-good0.10 <removed>
@@ -6015,6 +6577,7 @@
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774859
NOTE: https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=153a8ae752c90d07190ef45803422a4f71ea8bff
CVE-2016-9806 [double free in netlink_dump]
+ RESERVED
- linux 4.6.3-1
NOTE: Fixed by: https://git.kernel.org/linus/92964c79b357efd980812c4de5c1fd2ec8bb5520 (v4.7-rc1)
CVE-2016-9636
@@ -6158,8 +6721,8 @@
NOTE: The code has substantially changed in libdwarf/dwarf_util.c from older
NOTE: versions, but there seem to be still back then an unchecked dereference
NOTE: of val_ptr.
-CVE-2016-9479
- RESERVED
+CVE-2016-9479 (The "lost password" functionality in b2evolution before 6.7.9 allows ...)
+ TODO: check
CVE-2016-9478
RESERVED
CVE-2016-9477
@@ -6253,6 +6816,7 @@
NOTE: https://github.com/ImageMagick/ImageMagick/commit/b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b (master)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/298
CVE-2016-9773 [Incomplete fix for CVE-2016-9556]
+ RESERVED
- imagemagick <undetermined>
NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3
NOTE: https://blogs.gentoo.org/ago/2016/12/01/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h-incomplete-fix-for-cve-2016-9556/
@@ -7317,10 +7881,10 @@
RESERVED
CVE-2016-9158
RESERVED
-CVE-2016-9157
- RESERVED
-CVE-2016-9156
- RESERVED
+CVE-2016-9157 (A vulnerability in Siemens SICAM PAS (all versions including V8.08) ...)
+ TODO: check
+CVE-2016-9156 (A vulnerability in Siemens SICAM PAS (all versions including V8.08) ...)
+ TODO: check
CVE-2016-9155 (The following SIEMENS branded IP Camera Models CCMW3025, CVMW3025-IR, ...)
NOT-FOR-US: Siemens
CVE-2016-9154
@@ -8370,9 +8934,9 @@
CVE-2016-8740
RESERVED
- apache2 <unfixed> (bug #847124)
- [jessie] - apache2 <not-affected> (Vulnerable code not present)
- [wheezy] - apache2 <not-affected> (Vulnerable code not present)
- NOTE: HTTP/2 support introduced in 2.4.17
+ [jessie] - apache2 <not-affected> (Vulnerable code not present)
+ [wheezy] - apache2 <not-affected> (Vulnerable code not present)
+ NOTE: HTTP/2 support introduced in 2.4.17
CVE-2016-8739
RESERVED
CVE-2016-8738
@@ -38046,6 +38610,7 @@
NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/9cbca25ff7f20c432b61eb9f4cae43a946502b66/
NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/e0dd1114c82d372dd905c029ddbee4e81ed01a89/
CVE-2012-6704 [Linux: signed overflows for SO_SNDBUF and SO_RCVBUF that affects "before 3.5" kernels]
+ RESERVED
- linux 3.8.11-1
NOTE: Fixed by: https://git.kernel.org/linus/82981930125abfd39d7c8378a9cfdf5e1be2002b (v3.5-rc1)
CVE-2012-6703 (Integer overflow in the snd_compr_allocate_buffer function in ...)
@@ -214802,7 +215367,7 @@
NOT-FOR-US: EKINboard
CVE-2006-1129 (SQL injection vulnerability in config.php in EKINboard 1.0.3 allows ...)
NOT-FOR-US: EKINboard
-CVE-2005-4729 (SQL injection vulnerabilitiy in show.php in VBZooM Forum allows remote ...)
+CVE-2005-4729 (SQL injection vulnerability in show.php in VBZooM Forum allows remote ...)
NOT-FOR-US: VBZooM
CVE-2006-1166 (Monotone 0.25 and earlier, when a user creates a file in a directory ...)
- monotone 0.26pre1-0.1 (low)
More information about the Secure-testing-commits
mailing list