[Secure-testing-commits] r42056 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Thu May 26 17:20:39 UTC 2016
Author: carnil
Date: 2016-05-26 17:20:39 +0000 (Thu, 26 May 2016)
New Revision: 42056
Modified:
data/CVE/list
Log:
CVEs assigned for php (and libgd2) issue
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-05-26 17:20:27 UTC (rev 42055)
+++ data/CVE/list 2016-05-26 17:20:39 UTC (rev 42056)
@@ -8,23 +8,29 @@
NOTE: https://github.com/roundcube/roundcubemail/issues/5240
NOTE: https://github.com/roundcube/roundcubemail/pull/5241
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/25/8
-CVE-2016-XXXX [int/size_t confusion in fread]
+CVE-2016-5096 [int/size_t confusion in fread]
- php5 5.6.22+dfsg-1
NOTE: PHP bug: https://bugs.php.net/bug.php?id=72114
NOTE: Fixed in 5.6.22, 5.5.36
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/25/3
-CVE-2016-XXXX [don't create strings with lengths outside int range]
+ NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3
+CVE-2016-5095 [don't create strings with lengths outside int range]
- php5 5.6.22+dfsg-1
NOTE: PHP bug: https://bugs.php.net/bug.php?id=72135
NOTE: Fixed in 5.6.22, 5.5.36
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/25/3
-CVE-2016-XXXX [get_icu_value_internal out-of-bounds read]
+ NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3
+ NOTE: For the additional issue reported in the "[2016-05-17 12:55 UTC]" comment
+CVE-2016-5094 [don't create strings with lengths outside int range]
+ - php5 5.6.22+dfsg-1
+ NOTE: PHP bug: https://bugs.php.net/bug.php?id=72135
+ NOTE: Fixed in 5.6.22, 5.5.36
+ NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3
+CVE-2016-5093 [get_icu_value_internal out-of-bounds read]
- php7.0 7.0.7-1
- php5 5.6.22+dfsg-1
NOTE: PHP bug: https://bugs.php.net/bug.php?id=72241
NOTE: Fixed in 7.0.7, 5.6.22, 5.5.36
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/25/3
-CVE-2013-XXXX [Fixed memory overrun bug in gdImageScaleTwoPass]
+ NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3
+CVE-2013-7456 [Fixed memory overrun bug in gdImageScaleTwoPass]
- libgd2 2.1.1-1
NOTE: https://github.com/libgd/libgd/commit/4f65a3e4eedaffa1efcf9ee1eb08f0b504fbc31a (gd-2.1.1)
- php7.0 7.0.7-1 (unimportant)
@@ -32,7 +38,7 @@
NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd
NOTE: PHP bug: https://bugs.php.net/bug.php?id=72227
NOTE: Fixed in 7.0.7, 5.6.22, 5.5.36
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/25/3
+ NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3
CVE-2016-5091
- typo3-src <removed>
CVE-2016-5044
More information about the Secure-testing-commits
mailing list