[Secure-testing-commits] r43338 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Jul 21 14:30:23 UTC 2016


Author: carnil
Date: 2016-07-21 14:30:23 +0000 (Thu, 21 Jul 2016)
New Revision: 43338

Modified:
   data/CVE/list
Log:
Add upstream tag information for libidn issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-07-21 14:26:34 UTC (rev 43337)
+++ data/CVE/list	2016-07-21 14:30:23 UTC (rev 43338)
@@ -1,21 +1,21 @@
 CVE-2016-6263 [stringprep_utf8_nfkc_normalize reject invalid UTF-8]
 	- libidn <unfixed>
 	NOTE: https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
-	NOTE: Test / Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
+	NOTE: Test / Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555 (libidn-1-33)
 	NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
 CVE-2015-8948 [Solve out-of-bounds-read when reading one zero byte as input]
 	- libidn <unfixed>
-	NOTE: Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
+	NOTE: Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041 (libidn-1-33)
 CVE-2016-6262 [Solve out-of-bounds-read when reading one zero byte as input]
 	- libidn <unfixed>
-	NOTE: Follow-up fix for CVE-2015-8948: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
+	NOTE: Follow-up fix for CVE-2015-8948: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 (libidn-1-33)
 	NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
 CVE-2016-6261 [out-of-bounds stack read in idna_to_ascii_4i]
 	- libidn <unfixed>
 	NOTE: https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
-	NOTE: Test: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=9a1a7e15d0706634971364493fbb06e77e74726c
-	NOTE: Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
-	NOTE: Follow-up memory leak fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
+	NOTE: Test: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=9a1a7e15d0706634971364493fbb06e77e74726c (libidn-1-33)
+	NOTE: Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d (libidn-1-33)
+	NOTE: Follow-up memory leak fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4 (libidn-1-33)
 	NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
 CVE-2016-6249
 	RESERVED




More information about the Secure-testing-commits mailing list