[Secure-testing-commits] r43459 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Jul 25 14:57:48 UTC 2016


Author: jmm
Date: 2016-07-25 14:57:48 +0000 (Mon, 25 Jul 2016)
New Revision: 43459

Modified:
   data/CVE/list
Log:
remove some no-dsa tags for issues which are fixed along in upcoming update


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-07-25 14:17:40 UTC (rev 43458)
+++ data/CVE/list	2016-07-25 14:57:48 UTC (rev 43459)
@@ -11719,7 +11719,6 @@
 CVE-2016-2518 [Crafted addpeer with hmode > 7 causes out-of-bounds reference]
 	RESERVED
 	- ntp 1:4.2.8p7+dfsg-1
-	[jessie] - ntp <no-dsa> (Minor issue)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-2517 [Remote configuration trustedkey/requestkey/controlkey values are not properly validated]
 	RESERVED
@@ -11730,7 +11729,6 @@
 CVE-2016-2516 [Duplicate IPs on unconfig directives will cause an assertion failure]
 	RESERVED
 	- ntp 1:4.2.8p7+dfsg-1
-	[jessie] - ntp <no-dsa> (Minor issue)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-2514
 	RESERVED
@@ -21283,7 +21281,6 @@
 CVE-2015-8158 [Potential Infinite Loop in ntpq]
 	RESERVED
 	- ntp 1:4.2.8p7+dfsg-1
-	[jessie] - ntp <no-dsa> (Minor issue)
 	[wheezy] - ntp <no-dsa> (minor issue)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2948
@@ -21861,7 +21858,6 @@
 CVE-2015-7979 [Off-path Denial of Service (DoS) attack on authenticated broadcast mode]
 	RESERVED
 	- ntp 1:4.2.8p7+dfsg-1
-	[jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2942
@@ -21869,7 +21865,6 @@
 CVE-2015-7978 [Stack exhaustion in recursive traversal of restriction list]
 	RESERVED
 	- ntp 1:4.2.8p7+dfsg-1
-	[jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2940
@@ -21877,7 +21872,6 @@
 CVE-2015-7977 [reslist NULL pointer dereference]
 	RESERVED
 	- ntp 1:4.2.8p7+dfsg-1
-	[jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2939
@@ -21900,7 +21894,6 @@
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2937
 CVE-2015-7974 (NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer ...)
 	- ntp 1:4.2.8p7+dfsg-1 (low)
-	[jessie] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	[wheezy] - ntp <no-dsa> (Minor issue, can be fixed along in a future update)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2936




More information about the Secure-testing-commits mailing list