[Secure-testing-commits] r39442 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Feb 4 00:35:48 UTC 2016


Author: jmm
Date: 2016-02-04 00:35:48 +0000 (Thu, 04 Feb 2016)
New Revision: 39442

Modified:
   data/CVE/list
Log:
socat CVEfied


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-02-04 00:08:33 UTC (rev 39441)
+++ data/CVE/list	2016-02-04 00:35:48 UTC (rev 39442)
@@ -274,7 +274,7 @@
 	[squeeze] - socat <no-dsa> (Minor issue)
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/01/5
 	NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv8.html
-CVE-2016-XXXX [Socat security advisory 7 - Created new 2048bit DH modulus]
+CVE-2016-2217 [Socat security advisory 7 - Created new 2048bit DH modulus]
 	- socat 1.7.3.1-1 (bug #813536)
 	[jessie] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
 	[wheezy] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0)
@@ -282,7 +282,7 @@
 	NOTE: The issues is about "In the OpenSSL address implementation the hard coded 1024 bit DH
 	NOTE: p parameter was not prime.". Upstream has generated new parametes (and made it 2048
 	NOTE: bit long.
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/01/4
+	NOTE: http://www.openwall.com/lists/oss-security/2016/02/01/4
 	NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv7.html
 CVE-2015-XXXX [Type Confusion Vulnerability in PHP_to_XMLRPC_worker()]
 	- php5 5.6.17+dfsg-1
@@ -6567,19 +6567,21 @@
 	NOT-FOR-US: Atlassian Confluence
 CVE-2015-8397 (The JPEGLSCodec::DecodeExtent function in ...)
 	- gdcm 2.6.2-1
+	[jessie] - gdcm <no-dsa> (Minor issue)
 	[wheezy] - gdcm <not-affected> (Vulerable code not present)
 	[squeeze] - gdcm <not-affected> (Vulerable code not present)
 	NOTE: http://census-labs.com/news/2016/01/11/gdcm-out-bounds-read-jpeglscodec-decodeextent/
 	NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/e547b1ded3fd21e0b0ad149f13045aa12d4b9b7c/
 CVE-2015-8396 (Integer overflow in the ImageRegionReader::ReadIntoBuffer function in ...)
 	- gdcm 2.6.2-1
+	[jessie] - gdcm <no-dsa> (Minor issue)
+	[wheezy] - gdcm <no-dsa> (Minor issue)
 	[squeeze] - gdcm <not-affected> (Vulerable code not present)
 	NOTE: http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/
 	NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/0f6f82052484774d072784f32105cecc79c45c19/
 	NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/92cd6d7fe0d01c61cf68ac4ef65ef388ee252415/
 	NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/9cbca25ff7f20c432b61eb9f4cae43a946502b66/
 	NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/e0dd1114c82d372dd905c029ddbee4e81ed01a89/
-	TODO: check older versions
 CVE-2012-6700
 	RESERVED
 	{DLA-362-1}




More information about the Secure-testing-commits mailing list