[Secure-testing-commits] r43484 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Tue Jul 26 09:10:11 UTC 2016
Author: sectracker
Date: 2016-07-26 09:10:11 +0000 (Tue, 26 Jul 2016)
New Revision: 43484
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-07-26 09:02:45 UTC (rev 43483)
+++ data/CVE/list 2016-07-26 09:10:11 UTC (rev 43484)
@@ -8424,6 +8424,7 @@
CVE-2016-3660
RESERVED
CVE-2016-3659 (SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows ...)
+ {DLA-560-1}
- cacti 0.8.8h+ds1-1 (bug #820521)
[jessie] - cacti <no-dsa> (Minor issue)
NOTE: http://bugs.cacti.net/view.php?id=2673
@@ -10389,6 +10390,7 @@
NOTE: https://git.zx2c4.com/cgit/commit/filters/html-converters/txt2html?id=13c2d3df0440ce04273de3149631a9bd97490c6e
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/03/05/8
CVE-2016-3172 (SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier ...)
+ {DLA-560-1}
- cacti 0.8.8g+ds1-2 (bug #818647)
[jessie] - cacti <no-dsa> (Minor issue)
NOTE: http://bugs.cacti.net/view.php?id=2667
@@ -11760,7 +11762,7 @@
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-2518 [Crafted addpeer with hmode > 7 causes out-of-bounds reference]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-2517 [Remote configuration trustedkey/requestkey/controlkey values are not properly validated]
@@ -11771,7 +11773,7 @@
NOTE: cause trouble anyway
CVE-2016-2516 [Duplicate IPs on unconfig directives will cause an assertion failure]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-2514
@@ -12702,6 +12704,7 @@
NOTE: Fixed by: https://git.kernel.org/linus/67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3 (v4.5-rc1)
NOTE: Introduced by: https://git.kernel.org/linus/04b5d028f50ff05a8f9ae049ee71f8fdfcf1f5de (v2.6.30-rc2)
CVE-2016-2313 (auth_login.php in Cacti before 0.8.8g allows remote authenticated ...)
+ {DLA-560-1}
- cacti 0.8.8g+ds1-1 (bug #814353)
[jessie] - cacti <no-dsa> (Minor issue)
NOTE: http://svn.cacti.net/viewvc/cacti/tags/0.8.8g/docs/CHANGELOG?revision=7788&view=markup
@@ -15447,7 +15450,7 @@
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-1550 [Timing attack for authenticated packets]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
TODO: check
@@ -15459,13 +15462,13 @@
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
CVE-2016-1548 [Change the time of an ntpd client or deny service to an ntpd client by forcing it to change from basic client/server mode to interleaved symmetric mode.]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
TODO: check
CVE-2016-1547 [Validate crypto-NAKs]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
TODO: check
@@ -21320,7 +21323,7 @@
RESERVED
CVE-2015-8158 [Potential Infinite Loop in ntpq]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2948
@@ -21372,7 +21375,7 @@
NOTE: Mitigated in 4.2.8p6
CVE-2015-8138 [ntp: missing check for zero originate timestamp]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://www.talosintel.com/reports/TALOS-2016-0077/
NOTE: https://github.com/ntp-project/ntp/commit/880191b72409a1965712999d248d70e6f7163af8
@@ -21898,21 +21901,21 @@
NOTE: http://www.openwall.com/lists/oss-security/2015/10/27/5
CVE-2015-7979 [Off-path Denial of Service (DoS) attack on authenticated broadcast mode]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2942
NOTE: https://github.com/ntp-project/ntp/commit/fe46889f7baa75fc8e6c0fcde87706d396ce1461
CVE-2015-7978 [Stack exhaustion in recursive traversal of restriction list]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2940
NOTE: https://github.com/ntp-project/ntp/commit/8a0c765f3c47633fa262356b0818788d1cf249b1
CVE-2015-7977 [reslist NULL pointer dereference]
RESERVED
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2939
@@ -21934,7 +21937,7 @@
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2937
CVE-2015-7974 (NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer ...)
- {DSA-3629-1}
+ {DSA-3629-1 DLA-559-1}
- ntp 1:4.2.8p7+dfsg-1 (low)
NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
NOTE: http://support.ntp.org/bin/view/Main/NtpBug2936
More information about the Secure-testing-commits
mailing list