[Secure-testing-commits] r43459 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Jul 25 14:57:48 UTC 2016
Author: jmm
Date: 2016-07-25 14:57:48 +0000 (Mon, 25 Jul 2016)
New Revision: 43459
Modified:
data/CVE/list
Log:
remove some no-dsa tags for issues which are fixed along in upcoming update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-07-25 14:17:40 UTC (rev 43458)
+++ data/CVE/list 2016-07-25 14:57:48 UTC (rev 43459)
@@ -11719,7 +11719,6 @@
CVE-2016-2518 [Crafted addpeer with hmode > 7 causes out-of-bounds reference]
RESERVED
- ntp 1:4.2.8p7+dfsg-1
- [jessie] - ntp <no-dsa> (Minor issue)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-2517 [Remote configuration trustedkey/requestkey/controlkey values are not properly validated]
RESERVED
@@ -11730,7 +11729,6 @@
CVE-2016-2516 [Duplicate IPs on unconfig directives will cause an assertion failure]
RESERVED
- ntp 1:4.2.8p7+dfsg-1
- [jessie] - ntp <no-dsa> (Minor issue)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-2514
RESERVED
@@ -21283,7 +21281,6 @@
CVE-2015-8158 [Potential Infinite Loop in ntpq]
RESERVED
- ntp 1:4.2.8p7+dfsg-1
- [jessie] - ntp <no-dsa> (Minor issue)
[wheezy] - ntp <no-dsa> (minor issue)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2948
@@ -21861,7 +21858,6 @@
CVE-2015-7979 [Off-path Denial of Service (DoS) attack on authenticated broadcast mode]
RESERVED
- ntp 1:4.2.8p7+dfsg-1
- [jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2942
@@ -21869,7 +21865,6 @@
CVE-2015-7978 [Stack exhaustion in recursive traversal of restriction list]
RESERVED
- ntp 1:4.2.8p7+dfsg-1
- [jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2940
@@ -21877,7 +21872,6 @@
CVE-2015-7977 [reslist NULL pointer dereference]
RESERVED
- ntp 1:4.2.8p7+dfsg-1
- [jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2939
@@ -21900,7 +21894,6 @@
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2937
CVE-2015-7974 (NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer ...)
- ntp 1:4.2.8p7+dfsg-1 (low)
- [jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2936
More information about the Secure-testing-commits
mailing list