[Secure-testing-commits] r39419 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Tue Feb 2 21:24:22 UTC 2016


Author: carnil
Date: 2016-02-02 21:24:22 +0000 (Tue, 02 Feb 2016)
New Revision: 39419

Modified:
   data/CVE/list
Log:
Update information for socat issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-02-02 21:14:10 UTC (rev 39418)
+++ data/CVE/list	2016-02-02 21:24:22 UTC (rev 39419)
@@ -235,13 +235,14 @@
 	- wordpress <unfixed>
 	NOTE: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
 CVE-2016-XXXX [Socat security advisory 8 - Stack overflow in parser]
-	- socat <unfixed>
+	- socat <unfixed> (bug #813535)
 	[jessie] - socat <no-dsa> (Minor issue)
 	[wheezy] - socat <no-dsa> (Minor issue)
 	[squeeze] - socat <no-dsa> (Minor issue)
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/01/5
+	NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv8.html
 CVE-2016-XXXX [Socat security advisory 7 - Created new 2048bit DH modulus]
-	- socat <unfixed>
+	- socat <unfixed> (bug #813536)
 	[jessie] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
 	[wheezy] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
 	[squeeze] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
@@ -249,6 +250,7 @@
 	NOTE: p parameter was not prime.". Upstream has generated new parametes (and made it 2048
 	NOTE: bit long.
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/01/4
+	NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv7.html
 CVE-2015-XXXX [Type Confusion Vulnerability in PHP_to_XMLRPC_worker()]
 	- php5 5.6.17+dfsg-1
 	[jessie] - php5 5.6.17+dfsg-0+deb8u1




More information about the Secure-testing-commits mailing list