[Secure-testing-commits] r47038 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Tue Dec 13 21:10:16 UTC 2016
Author: sectracker
Date: 2016-12-13 21:10:16 +0000 (Tue, 13 Dec 2016)
New Revision: 47038
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-12-13 21:07:34 UTC (rev 47037)
+++ data/CVE/list 2016-12-13 21:10:16 UTC (rev 47038)
@@ -1,3 +1,21 @@
+CVE-2016-9948
+ RESERVED
+CVE-2016-9947
+ RESERVED
+CVE-2016-9946
+ RESERVED
+CVE-2016-9945
+ RESERVED
+CVE-2016-9944
+ RESERVED
+CVE-2016-9943
+ RESERVED
+CVE-2016-9942
+ RESERVED
+CVE-2016-9941
+ RESERVED
+CVE-2016-9940
+ RESERVED
CVE-2016-XXXX [Incorrect signature verification]
- simplesamlphp 1.14.11-1
NOTE: https://simplesamlphp.org/security/201612-02
@@ -6,9 +24,11 @@
- game-music-emu <unfixed> (bug #848071)
NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html
CVE-2016-9939 [denial-of-service in ASN1 decoder]
+ RESERVED
- libcrypto++ <unfixed> (bug #848009)
NOTE: https://github.com/weidai11/cryptopp/issues/346
CVE-2016-9932 [x86 CMPXCHG8B emulation fails to ignore operand size override]
+ RESERVED
- xen <unfixed> (bug #848081)
NOTE: https://xenbits.xen.org/xsa/advisory-200.html
CVE-2016-9931
@@ -26,12 +46,14 @@
CVE-2016-9924
RESERVED
CVE-2016-9936 [Use After Free in PHP7 unserialize()]
+ RESERVED
- php7.0 7.0.14-1
NOTE: Fixed in PHP 7.0.14 and 7.1.0
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72978
NOTE: Fixed by: https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
CVE-2016-9935 [Invalid read when wddx decodes empty boolean element]
+ RESERVED
- php7.0 7.0.14-1
- php5 <unfixed>
NOTE: Fixed in PHP 5.6.29 and 7.0.14
@@ -39,6 +61,8 @@
NOTE: Fixed by: https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
CVE-2016-9934 [NULL Pointer Dereference in WDDX Packet Deserialization with PDORow]
+ RESERVED
+ {DSA-3732-1}
- php7.0 7.0.13-1
- php5 <unfixed>
NOTE: Fixed in PHP 5.6.28, 7.0.13 and 7.1.0
@@ -46,6 +70,8 @@
NOTE: Fixed by: https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
CVE-2016-9933 [imagefilltoborder stackoverflow on truecolor images]
+ RESERVED
+ {DSA-3732-1}
- libgd2 2.2.2-29-g3c2b605-1
NOTE: https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e (gd-2.2.2)
NOTE: Scope of CVE is only the missing "color < 0" test in older versions.
@@ -56,14 +82,14 @@
NOTE: Fixed by: https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1
NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd
NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
-CVE-2016-9937 [AST-2016-008]
+CVE-2016-9937 (An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x ...)
- asterisk <not-affected> (Introduced in 13.12.0 but fixed with first version to unstable based on 13.12.1)
NOTE: Vulnerability introduced in 13.12.0, but the first upload to unstable
NOTE: versioned as 1:13.12.1~dfsg-1 via opus.patch removed the offending
NOTE: function. Thus Debian was never vulnerable.
NOTE: http://downloads.asterisk.org/pub/security/AST-2016-008.html
NOTE: Cf. https://bugs.debian.org/847666
-CVE-2016-9938 [AST-2016-009]
+CVE-2016-9938 (An issue was discovered in Asterisk Open Source 11.x before 11.25.1, ...)
- asterisk <unfixed> (bug #847668)
[jessie] - asterisk <no-dsa> (Minor issue)
NOTE: http://downloads.asterisk.org/pub/security/AST-2016-009.html
@@ -2024,6 +2050,7 @@
NOTE: Report: https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
CVE-2016-9844 [zipinfo buffer overflow]
RESERVED
+ {DLA-741-1}
- unzip 6.0-21 (bug #847486)
[jessie] - unzip <no-dsa> (Minor issue)
NOTE: https://launchpad.net/bugs/1643750
@@ -2031,6 +2058,7 @@
NOTE: Proposed patch in http://www.openwall.com/lists/oss-security/2016/12/05/19
CVE-2014-9913 [Buffer overflow in "unzip -l" via list_files() in list.c]
RESERVED
+ {DLA-741-1}
- unzip 6.0-21 (bug #847485)
[jessie] - unzip <no-dsa> (Minor issue)
NOTE: Upstream bug: http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
@@ -10732,6 +10760,7 @@
NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/11
CVE-2016-9138 [Issues from Upstream bug #73147 still unfixed in 5.6.27 and 7.0.12]
RESERVED
+ {DSA-3732-1}
- php7.0 <unfixed>
- php5 <unfixed>
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147
@@ -22528,6 +22557,7 @@
NOTE: Fixed by: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/8d175c4edfe7
CVE-2016-5240
RESERVED
+ {DLA-547-1}
- graphicsmagick 1.3.24-1
NOTE: Fixed by: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/ddc999ec896c
CVE-2016-5237
@@ -34855,7 +34885,7 @@
[squeeze] - xen <end-of-life> (Unsupported in Squeeze LTS)
NOTE: http://xenbits.xen.org/xsa/advisory-167.html
CVE-2016-1567 (chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer ...)
- {DLA-414-1}
+ {DLA-742-1 DLA-414-1}
- chrony 2.2.1-1 (low; bug #812923)
[jessie] - chrony 1.30-2+deb8u2
NOTE: http://www.talosintel.com/reports/TALOS-2016-0071/
@@ -36107,6 +36137,7 @@
RESERVED
CVE-2016-1252
RESERVED
+ {DSA-3733-1}
- apt 1.4~beta2
[wheezy] - apt <not-affected> (Issue introduced in apt >= 0.9.8)
NOTE: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467
More information about the Secure-testing-commits
mailing list