[Secure-testing-commits] r39383 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Sun Jan 31 18:06:15 UTC 2016
Author: jmm
Date: 2016-01-31 18:06:15 +0000 (Sun, 31 Jan 2016)
New Revision: 39383
Modified:
data/CVE/list
Log:
add some upstream fixes to ntp
at least one rails issue EOL in wheezy
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-01-31 14:34:04 UTC (rev 39382)
+++ data/CVE/list 2016-01-31 18:06:15 UTC (rev 39383)
@@ -46,6 +46,7 @@
[jessie] - libbsd <no-dsa> (Minor issue)
[wheezy] - libbsd <not-affected> (Vulnerable code not present)
[squeeze] - libbsd <not-affected> (Vulnerable code not present)
+ NOTE: Not used anywhere in Debian according to codesearch.debian.net
NOTE: https://blog.fuzzing-project.org/36-Heap-buffer-overflow-in-fgetwln-function-of-libbsd.html
NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=93881
NOTE: Fixed by: http://cgit.freedesktop.org/libbsd/commit/?id=c8f0723d2b4520bdd6b9eb7c3e7976de726d7ff7 (0.8.2)
@@ -1062,6 +1063,8 @@
CVE-2016-1908 [Eliminate the fallback from untrusted X11-forwarding to trusted forwarding for cases when the X server disables the SECURITY extension]
RESERVED
- openssh <unfixed>
+ [jessie] - openssh <no-dsa> (Minor issue)
+ [wheezy] - openssh <no-dsa> (Minor issue)
NOTE: Upstream commit: https://anongit.mindrot.org/openssh.git/commit/?id=ed4ce82dbfa8a3a3c8ea6fa0db113c71e234416c
NOTE: which needs to be applied after: https://anongit.mindrot.org/openssh.git/commit/?id=f98a09cacff7baad8748c9aa217afd155a4d493f
NOTE: Background information on X11 SECURITY extension and SSH: https://thejh.net/written-stuff/openssh-6.8-xsecurity
@@ -3994,6 +3997,7 @@
[squeeze] - rails <end-of-life> (Not supported in Squeeze LTS)
- ruby-activerecord-3.2 <removed>
- ruby-activerecord-2.3 <removed>
+ [wheezy] - ruby-activerecord-2.3 <end-of-life>
- ruby-activesupport-3.2 <removed>
- ruby-activesupport-2.3 <removed>
- ruby-activemodel-3.2 <removed>
@@ -7516,25 +7520,26 @@
- ntp <unfixed>
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2942
- TODO: check
+ NOTE: https://github.com/ntp-project/ntp/commit/fe46889f7baa75fc8e6c0fcde87706d396ce1461
CVE-2015-7978 [Stack exhaustion in recursive traversal of restriction list]
RESERVED
- ntp <unfixed>
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2940
- TODO: check
+ NOTE: https://github.com/ntp-project/ntp/commit/8a0c765f3c47633fa262356b0818788d1cf249b1
CVE-2015-7977 [reslist NULL pointer dereference]
RESERVED
- ntp <unfixed>
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2939
- TODO: check
+ NOTE: https://github.com/ntp-project/ntp/commit/8a0c765f3c47633fa262356b0818788d1cf249b1
CVE-2015-7976 [ntpq saveconfig command allows dangerous characters in filenames]
RESERVED
- ntp <unfixed>
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2938
- TODO: check
+ NOTE: https://github.com/ntp-project/ntp/commit/3680c2e4d5f88905ce062c7b43305d610a2c9796
+ NOTE: https://github.com/ntp-project/ntp/commit/7fe04606062ed674db3b9553d32dedad29504d61
CVE-2015-7975 [nextvar() missing length check]
RESERVED
- ntp <unfixed>
More information about the Secure-testing-commits
mailing list