[Secure-testing-commits] r39419 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Tue Feb 2 21:24:22 UTC 2016
Author: carnil
Date: 2016-02-02 21:24:22 +0000 (Tue, 02 Feb 2016)
New Revision: 39419
Modified:
data/CVE/list
Log:
Update information for socat issues
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-02-02 21:14:10 UTC (rev 39418)
+++ data/CVE/list 2016-02-02 21:24:22 UTC (rev 39419)
@@ -235,13 +235,14 @@
- wordpress <unfixed>
NOTE: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/
CVE-2016-XXXX [Socat security advisory 8 - Stack overflow in parser]
- - socat <unfixed>
+ - socat <unfixed> (bug #813535)
[jessie] - socat <no-dsa> (Minor issue)
[wheezy] - socat <no-dsa> (Minor issue)
[squeeze] - socat <no-dsa> (Minor issue)
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/01/5
+ NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv8.html
CVE-2016-XXXX [Socat security advisory 7 - Created new 2048bit DH modulus]
- - socat <unfixed>
+ - socat <unfixed> (bug #813536)
[jessie] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
[wheezy] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
[squeeze] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
@@ -249,6 +250,7 @@
NOTE: p parameter was not prime.". Upstream has generated new parametes (and made it 2048
NOTE: bit long.
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/01/4
+ NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv7.html
CVE-2015-XXXX [Type Confusion Vulnerability in PHP_to_XMLRPC_worker()]
- php5 5.6.17+dfsg-1
[jessie] - php5 5.6.17+dfsg-0+deb8u1
More information about the Secure-testing-commits
mailing list