[Secure-testing-commits] r42265 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Jun 2 19:07:25 UTC 2016


Author: carnil
Date: 2016-06-02 19:07:25 +0000 (Thu, 02 Jun 2016)
New Revision: 42265

Modified:
   data/CVE/list
Log:
CVE-2015-889{4,5,6} assigned

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-06-02 18:55:14 UTC (rev 42264)
+++ data/CVE/list	2016-06-02 19:07:25 UTC (rev 42265)
@@ -325,6 +325,37 @@
 	RESERVED
 CVE-2016-5127
 	RESERVED
+CVE-2015-8896 [integer truncation issue]
+	- imagemagick 8:6.8.9.9-7 (bug #806441)
+	[jessie] - imagemagick 8:6.8.9.9-5+deb8u1
+	[wheezy] - imagemagick 8:6.7.7.10-5+deb7u4
+	[squeeze] - imagemagick 8:6.6.0.4-3+squeeze7
+	NOTE: workaround entry for DLA-353-1 until/if CVE assigned
+	NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1448803
+	NOTE: https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
+	NOTE: http://www.openwall.com/lists/oss-security/2015/10/07/2
+	NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/4
+CVE-2015-8895 [pict/icon processing issues: Integer and Buffer overflow in coders/icon.c]
+	- imagemagick 8:6.8.9.9-7 (bug #806441)
+	[jessie] - imagemagick 8:6.8.9.9-5+deb8u1
+	[wheezy] - imagemagick 8:6.7.7.10-5+deb7u4
+	[squeeze] - imagemagick 8:6.6.0.4-3+squeeze7
+	NOTE: workaround entry for DLA-353-1 until/if CVE assigned
+	NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1459747
+	NOTE: https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
+	NOTE: http://www.openwall.com/lists/oss-security/2015/10/07/2
+	NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/4
+	NOTE: The issue is only exploitable on 32 bit architectures.
+CVE-2015-8894 [tga processing issue: double free in coders/tga.c:221]
+	- imagemagick 8:6.8.9.9-6 (bug #806442; bug #799524)
+	[jessie] - imagemagick <not-affected> (Can't reproduce crash with file)
+	[wheezy] - imagemagick <not-affected> (Can't reproduce crash with file)
+	[squeeze] - imagemagick <not-affected> (Can't reproduce crash with file)
+	NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362
+	NOTE: https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8
+	NOTE: http://www.openwall.com/lists/oss-security/2015/10/07/2
+	NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/4
+	NOTE: The problem can only be triggered with recent versions of ImageMagick (8:6.9.1.2-1 in experimental is vulnerable, 8:6.8.9.9-6 in sid is not vulnerable, older versions are not vulnerable)
 CVE-2015-8893
 	RESERVED
 CVE-2015-8892
@@ -18591,37 +18622,6 @@
 	RESERVED
 CVE-2014-9752 (Unrestricted file upload vulnerability in ...)
 	TODO: check
-CVE-2015-XXXX [Double free in coders/pict.c:2000]
-	- imagemagick 8:6.8.9.9-7 (bug #806441)
-	[jessie] - imagemagick 8:6.8.9.9-5+deb8u1
-	[wheezy] - imagemagick 8:6.7.7.10-5+deb7u4
-	[squeeze] - imagemagick 8:6.6.0.4-3+squeeze7
-	NOTE: workaround entry for DLA-353-1 until/if CVE assigned
-	NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1448803
-	NOTE: https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/07/2
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/22/4
-CVE-2015-XXXX [Double free in coders/tga.c:221]
-	- imagemagick 8:6.8.9.9-6 (bug #806442; bug #799524)
-	[jessie] - imagemagick <not-affected> (Can't reproduce crash with file)
-	[wheezy] - imagemagick <not-affected> (Can't reproduce crash with file)
-	[squeeze] - imagemagick <not-affected> (Can't reproduce crash with file)
-	NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362
-	NOTE: https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/07/2
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/22/4
-	NOTE: The problem can only be triggered with recent versions of ImageMagick (8:6.9.1.2-1 in experimental is vulnerable, 8:6.8.9.9-6 in sid is not vulnerable, older versions are not vulnerable)
-CVE-2015-XXXX [Integer and Buffer overflow in coders/icon.c]
-	- imagemagick 8:6.8.9.9-7 (bug #806441)
-	[jessie] - imagemagick 8:6.8.9.9-5+deb8u1
-	[wheezy] - imagemagick 8:6.7.7.10-5+deb7u4
-	[squeeze] - imagemagick 8:6.6.0.4-3+squeeze7
-	NOTE: workaround entry for DLA-353-1 until/if CVE assigned
-	NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1459747
-	NOTE: https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/07/2
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/22/4
-	NOTE: The issue is only exploitable on 32 bit architectures.
 CVE-2015-XXXX [EncryptedType uses static IV per key]
 	- python-sqlalchemy-utils <unfixed>
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/06/7




More information about the Secure-testing-commits mailing list