[Secure-testing-commits] r43468 - data/CVE

security tracker role sectracker at moszumanska.debian.org
Mon Jul 25 21:10:10 UTC 2016


Author: sectracker
Date: 2016-07-25 21:10:10 +0000 (Mon, 25 Jul 2016)
New Revision: 43468

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-07-25 21:03:45 UTC (rev 43467)
+++ data/CVE/list	2016-07-25 21:10:10 UTC (rev 43468)
@@ -1,3 +1,35 @@
+CVE-2016-6287
+	RESERVED
+CVE-2016-6286
+	RESERVED
+CVE-2016-6285
+	RESERVED
+CVE-2016-6284
+	RESERVED
+CVE-2016-6283
+	RESERVED
+CVE-2016-6282
+	RESERVED
+CVE-2016-6281
+	RESERVED
+CVE-2016-6280
+	RESERVED
+CVE-2016-6279
+	RESERVED
+CVE-2016-6278
+	RESERVED
+CVE-2016-6277
+	RESERVED
+CVE-2016-6276
+	RESERVED
+CVE-2016-6275
+	RESERVED
+CVE-2016-6274
+	RESERVED
+CVE-2016-6273
+	RESERVED
+CVE-2016-6272
+	RESERVED
 CVE-2016-XXXX [tiffcrop overflow]
 	- tiff <unfixed>
 	- tiff3 <removed>
@@ -3,4 +35,5 @@
 	NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2573
 CVE-2016-6297 [Stack-based buffer overflow vulnerability in php_stream_zip_opener]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
@@ -9,6 +42,7 @@
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=81406c0c1d45f75fcc7972ed974d2597abb0b9e9
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6296 [heap-buffer-overflow (write) simplestring_addn simplestring.c]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72606
@@ -16,38 +50,45 @@
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 	- xmlrpc-epi <unfixed>
 CVE-2016-6295 [Use After Free Vulnerability in SNMP with GC and unserialize()]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72479
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=cab1c3b3708eead315e033359d07049b23b147a3
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6294 [locale_accept_from_http out-of-bounds access]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72533
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6293 [locale_accept_from_http out-of-bounds access]
+	RESERVED
 	- icu <unfixed>
 CVE-2016-6292 [NULL Pointer Dereference in exif_process_user_comment]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72618
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=41131cd41d2fd2e0c2f332a27988df75659c42e4
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6291 [Out of bound read in exif_process_IFD_in_MAKERNOTE]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72603
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=eebcbd5de38a0f1c2876035402cb770e37476519
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6290 [Use After Free in unserialize() with Unexpected Session Deserialization]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72562
 	NOTE: http://git.php.net/?p=php-src.git;a=commit;h=3798eb6fd5dddb211b01d41495072fd9858d4e32
 	NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6289 [Stack-based buffer overflow vulnerability in virtual_file_ex]
+	RESERVED
 	- php7.0 <unfixed>
 	- php5 <unfixed>
 	NOTE: PHP Bug: https://bugs.php.net/72513
@@ -513,8 +554,8 @@
 	RESERVED
 CVE-2016-6205
 	RESERVED
-CVE-2016-6204
-	RESERVED
+CVE-2016-6204 (Cross-site scripting (XSS) vulnerability in the integrated web server ...)
+	TODO: check
 CVE-2016-6203
 	RESERVED
 CVE-2016-6202
@@ -593,8 +634,7 @@
 CVE-2016-XXXX [Write out-of-bounds]
 	- gdk-pixbuf <unfixed>
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/07/13/11
-CVE-2016-6224 [ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning on a NVMe or MMC drive]
-	RESERVED
+CVE-2016-6224 (ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap ...)
 	- ecryptfs-utils <not-affected> (Broken code not present; incomplete fix for CVE-2015-8946 not applied)
 	NOTE: Actually due to an incomplete fix of LP#1447282
 	NOTE: https://launchpad.net/bugs/1597154
@@ -604,8 +644,7 @@
 	- harfbuzz 1.2.6-1
 	[jessie] - harfbuzz <no-dsa> (Minor issue, can be fixed via a DSA)
 	NOTE: https://cgit.freedesktop.org/harfbuzz/commit/?id=f96664974774bfeb237a7274f512f64aaafb201e (1.0.5)
-CVE-2015-8946 [ecryptfs-setup-swap improperly configures encrypted swap when using GPT partitioning]
-	RESERVED
+CVE-2015-8946 (ecryptfs-setup-swap in eCryptfs before 111 does not prevent the ...)
 	- ecryptfs-utils 111-1
 	[wheezy] - ecryptfs-utils <no-dsa> (Only happens if using systemd v207 onward)
 	NOTE: https://launchpad.net/bugs/1447282
@@ -721,6 +760,7 @@
 	[wheezy] - trn <no-dsa> (non-free not supported)
 CVE-2016-6185
 	RESERVED
+	{DSA-3628-1}
 	- perl 5.22.2-2 (bug #829578)
 CVE-2016-6175
 	RESERVED
@@ -1433,8 +1473,8 @@
 	NOTE: https://marc.info/?l=oss-security&m=146726894625359&w=2
 	NOTE: but is not yet REJECTED by MITRE.
 	NOTE: Reproducer http://bugs.fi/media/afl/libtiff/CVE-2016-5875.tif
-CVE-2016-5874
-	RESERVED
+CVE-2016-5874 (Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers ...)
+	TODO: check
 CVE-2016-5872
 	RESERVED
 CVE-2016-5871
@@ -1816,10 +1856,10 @@
 	RESERVED
 	- libical <unfixed>
 	TODO: check
-CVE-2016-5744
-	RESERVED
-CVE-2016-5743
-	RESERVED
+CVE-2016-5744 (Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers ...)
+	TODO: check
+CVE-2016-5743 (Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, ...)
+	TODO: check
 CVE-2016-5839 (WordPress before 4.5.3 allows remote attackers to bypass the ...)
 	- wordpress 4.5.3+dfsg-1
 	NOTE: https://wordpress.org/news/2016/06/wordpress-4-5-3/
@@ -3801,50 +3841,39 @@
 	RESERVED
 CVE-2016-5138
 	RESERVED
-CVE-2016-5137
-	RESERVED
+CVE-2016-5137 (The CSPSource::schemeMatches function in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5136
-	RESERVED
+CVE-2016-5136 (Use-after-free vulnerability in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5135
-	RESERVED
+CVE-2016-5135 (WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp in Blink, as ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5134
-	RESERVED
+CVE-2016-5134 (net/proxy/proxy_service.cc in the Proxy Auto-Config (PAC) feature in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5133
-	RESERVED
+CVE-2016-5133 (Google Chrome before 52.0.2743.82 mishandles origin information during ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5132
-	RESERVED
+CVE-2016-5132 (The Service Workers subsystem in Google Chrome before 52.0.2743.82 ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5131
-	RESERVED
+CVE-2016-5131 (Use-after-free vulnerability in libxml2 through 2.9.4, as used in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
 	- libxml2 <undetermined>
 	TODO: check libxml2
-CVE-2016-5130
-	RESERVED
+CVE-2016-5130 (content/renderer/history_controller.cc in Google Chrome before ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5129
-	RESERVED
+CVE-2016-5129 (Google V8 before 5.2.361.32, as used in Google Chrome before ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5128
-	RESERVED
+CVE-2016-5128 (objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-5127
-	RESERVED
+CVE-2016-5127 (Use-after-free vulnerability in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
 CVE-2015-8899 (Dnsmasq before 2.76 allows remote servers to cause a denial of service ...)
@@ -7439,9 +7468,9 @@
 	NOT-FOR-US: McAfee
 CVE-2016-3983 (McAfee Advanced Threat Defense (ATD) before 3.4.8.178 might allow ...)
 	NOT-FOR-US: McAfee
-CVE-2016-3980 (The Java Startup Framework (aka jstart) in SAP JAVA AS 7.4 allows ...)
+CVE-2016-3980 (The Java Startup Framework (aka jstart) in SAP JAVA AS 7.2 through 7.4 ...)
 	NOT-FOR-US: SAP
-CVE-2016-3979 (Internet Communication Manager (aka ICMAN or ICM) in SAP JAVA AS 7.4 ...)
+CVE-2016-3979 (Internet Communication Manager (aka ICMAN or ICM) in SAP JAVA AS 7.2 ...)
 	NOT-FOR-US: SAP
 CVE-2016-3978 (The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x ...)
 	NOT-FOR-US: FortiOS
@@ -7527,13 +7556,13 @@
 	NOTE: https://gist.github.com/smalyshev/d8355c96a657cc5dba70
 	NOTE: https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
 	NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/7
-CVE-2016-3976 (Directory traversal vulnerability in SAP NetWeaver AS Java 7.4 allows ...)
+CVE-2016-3976 (Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through ...)
 	NOT-FOR-US: SAP
-CVE-2016-3975 (Cross-site scripting (XSS) vulnerability in SAP NetWeaver AS Java 7.4 ...)
+CVE-2016-3975 (Cross-site scripting (XSS) vulnerability in SAP NetWeaver AS Java 7.1 ...)
 	NOT-FOR-US: SAP
 CVE-2016-3974 (XML external entity (XXE) vulnerability in the Configuration Wizard in ...)
 	NOT-FOR-US: SAP
-CVE-2016-3973 (The chat feature in the Real-Time Collaboration (RTC) services in SAP ...)
+CVE-2016-3973 (The chat feature in the Real-Time Collaboration (RTC) services 7.3 and ...)
 	NOT-FOR-US: SAP
 CVE-2016-3972 (Directory traversal vulnerability in the dotTailLogServlet in dotCMS ...)
 	NOT-FOR-US: dotCMS
@@ -9577,6 +9606,7 @@
 	- hhvm 3.12.1+dfsg-1
 	NOTE: https://github.com/facebook/hhvm/commit/fd456ffad5d164c1563dc8bd97bcc2f200ff6f69
 CVE-2016-6288 [php_url_parse_ex() buffer overflow read]
+	RESERVED
 	{DLA-533-1}
 	- hhvm 3.12.1+dfsg-1
 	- php5 5.6.15+dfsg-1
@@ -11718,6 +11748,7 @@
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-2518 [Crafted addpeer with hmode > 7 causes out-of-bounds reference]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-2517 [Remote configuration trustedkey/requestkey/controlkey values are not properly validated]
@@ -11728,6 +11759,7 @@
 	NOTE: cause trouble anyway
 CVE-2016-2516 [Duplicate IPs on unconfig directives will cause an assertion failure]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-2514
@@ -14739,31 +14771,24 @@
 	NOTE: https://github.com/roundcube/roundcubemail/commit/10e5192a2b1bc90ec137f5e69d0aa072c1210d6d
 CVE-2015-8769 (SQL injection vulnerability in Joomla! 3.x before 3.4.7 allows ...)
 	- joomla <itp> (bug #571794)
-CVE-2016-1711
-	RESERVED
+CVE-2016-1711 (WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-1710
-	RESERVED
+CVE-2016-1710 (The ChromeClientImpl::createWindow method in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-1709
-	RESERVED
+CVE-2016-1709 (Heap-based buffer overflow in the ByteArray::Get method in ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-1708
-	RESERVED
+CVE-2016-1708 (The Chrome Web Store inline-installation implementation in the ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-1707
-	RESERVED
+CVE-2016-1707 (ios/web/web_state/ui/crw_web_controller.mm in Google Chrome before ...)
 	- chromium-browser <not-affected> (Only affects chromium-browser on iOS)
-CVE-2016-1706
-	RESERVED
+CVE-2016-1706 (The PPAPI implementation in Google Chrome before 52.0.2743.82 does not ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
-CVE-2016-1705
-	RESERVED
+CVE-2016-1705 (Multiple unspecified vulnerabilities in Google Chrome before ...)
 	- chromium-browser 52.0.2743.82-1
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
 CVE-2016-1704 (Multiple unspecified vulnerabilities in Google Chrome before ...)
@@ -15410,6 +15435,7 @@
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-1550 [Timing attack for authenticated packets]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 	TODO: check
@@ -15421,11 +15447,13 @@
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 CVE-2016-1548 [Change the time of an ntpd client or deny service to an ntpd client by forcing it to change from basic client/server mode to interleaved symmetric mode.]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 	TODO: check
 CVE-2016-1547 [Validate crypto-NAKs]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
 	TODO: check
@@ -16569,6 +16597,7 @@
 	NOTE: https://anonscm.debian.org/cgit/collab-maint/duck.git/commit/?id=b43b5bbf07973c54b8f1c581a941f4facc97177a (0.10)
 CVE-2016-1238 [unsafe module load path flaw]
 	RESERVED
+	{DSA-3628-1}
 	- perl 5.22.2-3
 	- libsys-syslog-perl <removed>
 	[jessie] - libsys-syslog-perl 0.33-1+deb8u1
@@ -21279,6 +21308,7 @@
 	RESERVED
 CVE-2015-8158 [Potential Infinite Loop in ntpq]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2948
@@ -21330,6 +21360,7 @@
 	NOTE: Mitigated in 4.2.8p6
 CVE-2015-8138 [ntp: missing check for zero originate timestamp]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://www.talosintel.com/reports/TALOS-2016-0077/
 	NOTE: https://github.com/ntp-project/ntp/commit/880191b72409a1965712999d248d70e6f7163af8
@@ -21855,18 +21886,21 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2015/10/27/5
 CVE-2015-7979 [Off-path Denial of Service (DoS) attack on authenticated broadcast mode]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2942
 	NOTE: https://github.com/ntp-project/ntp/commit/fe46889f7baa75fc8e6c0fcde87706d396ce1461
 CVE-2015-7978 [Stack exhaustion in recursive traversal of restriction list]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2940
 	NOTE: https://github.com/ntp-project/ntp/commit/8a0c765f3c47633fa262356b0818788d1cf249b1
 CVE-2015-7977 [reslist NULL pointer dereference]
 	RESERVED
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2939
@@ -21888,6 +21922,7 @@
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2937
 CVE-2015-7974 (NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer ...)
+	{DSA-3629-1}
 	- ntp 1:4.2.8p7+dfsg-1 (low)
 	NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
 	NOTE: http://support.ntp.org/bin/view/Main/NtpBug2936
@@ -39676,7 +39711,7 @@
 	NOT-FOR-US: abrt is Red Hat / Fedora specific
 CVE-2015-1861
 	RESERVED
-CVE-2015-1860 (Multiple buffer overflows in the QtBase module in Qt before 4.8.7 and ...)
+CVE-2015-1860 (Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase ...)
 	{DLA-210-1}
 	- qt4-x11 4:4.8.6+git155-g716fbae+dfsg-2 (bug #783133)
 	[jessie] - qt4-x11 4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
@@ -39684,7 +39719,7 @@
 	- qtbase-opensource-src 5.3.2+dfsg-5 (bug #783134)
 	[jessie] - qtbase-opensource-src 5.3.2+dfsg-4+deb8u1
 	NOTE: http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
-CVE-2015-1859 (Multiple buffer overflows in the QtBase module in Qt before 4.8.7 and ...)
+CVE-2015-1859 (Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp ...)
 	{DLA-210-1}
 	- qt4-x11 4:4.8.6+git155-g716fbae+dfsg-2 (bug #783133)
 	[jessie] - qt4-x11 4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1
@@ -39692,7 +39727,7 @@
 	- qtbase-opensource-src 5.3.2+dfsg-5 (bug #783134)
 	[jessie] - qtbase-opensource-src 5.3.2+dfsg-4+deb8u1
 	NOTE: http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
-CVE-2015-1858 (Multiple buffer overflows in the QtBase module in Qt before 4.8.7 and ...)
+CVE-2015-1858 (Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase ...)
 	{DLA-210-1}
 	- qt4-x11 4:4.8.6+git155-g716fbae+dfsg-2 (bug #783133)
 	[jessie] - qt4-x11 4:4.8.6+git64-g5dc8b2b+dfsg-3+deb8u1




More information about the Secure-testing-commits mailing list