[Secure-testing-commits] r38953 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Fri Jan 15 18:44:01 UTC 2016
Author: carnil
Date: 2016-01-15 18:44:01 +0000 (Fri, 15 Jan 2016)
New Revision: 38953
Modified:
data/CVE/list
Log:
CVE-2016-1908/openssh assigned, expand comments, add TODO item
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-01-15 17:12:11 UTC (rev 38952)
+++ data/CVE/list 2016-01-15 18:44:01 UTC (rev 38953)
@@ -388,11 +388,14 @@
RESERVED
CVE-2016-1716
RESERVED
-CVE-2016-XXXX [Eliminate the fallback from untrusted X11-forwarding to trusted forwarding for cases when the X server disables the SECURITY extension]
+CVE-2016-1908 [Eliminate the fallback from untrusted X11-forwarding to trusted forwarding for cases when the X server disables the SECURITY extension]
- openssh <unfixed>
- NOTE: https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
+ NOTE: Upstream commit: https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
+ NOTE: which needs to be applied after: https://anongit.mindrot.org/openssh.git/commit/?id=f98a09cacff7baad8748c9aa217afd155a4d493f
NOTE: Background information on X11 SECURITY extension and SSH: https://thejh.net/written-stuff/openssh-6.8-xsecurity
NOTE: https://lists.mindrot.org/pipermail/openssh-unix-dev/2016-January/034684.html
+ NOTE: Red Hat Bugzilla entry: https://bugzilla.redhat.com/show_bug.cgi?id=1298741
+ TODO: check
CVE-2016-1907 [Fix an out of-bound read access in the packet handling code]
- openssh 1:7.1p2-1
[squeeze] - openssh <not-affected> (Issue introduced in OpenSSH 6.8)
More information about the Secure-testing-commits
mailing list