[Secure-testing-commits] r46370 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Sun Nov 20 21:10:12 UTC 2016
Author: sectracker
Date: 2016-11-20 21:10:12 +0000 (Sun, 20 Nov 2016)
New Revision: 46370
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-11-20 21:08:45 UTC (rev 46369)
+++ data/CVE/list 2016-11-20 21:10:12 UTC (rev 46370)
@@ -159,12 +159,14 @@
NOTE: For unstable this fix was included in the fix for TALOS-CAN-0187 / CVE-2016-5652
NOTE: and included in patches/09-CVE-2016-5652.patch
CVE-2016-9446 [gstreamer 0.10 VMNC code execution #2]
+ {DSA-3717-1 DLA-712-1}
- gst-plugins-bad0.10 <removed>
- gst-plugins-bad1.0 1.10.1-1
NOTE: http://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html
NOTE: Upstream Bug: https://bugzilla.gnome.org/show_bug.cgi?id=774533
NOTE: Fixed by: https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe
CVE-2016-9445 [gstreamer 0.10 VMNC code execution]
+ {DSA-3717-1 DLA-712-1}
- gst-plugins-bad0.10 <removed>
- gst-plugins-bad1.0 1.10.1-1
NOTE: http://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html
@@ -176,6 +178,7 @@
NOTE: https://www.drupal.org/SA-CORE-2016-005
NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8
CVE-2016-9451 [Confirmation forms allow external URLs to be injected]
+ {DSA-3718-1}
- drupal7 7.52-1
NOTE: https://www.drupal.org/SA-CORE-2016-005
NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8
@@ -185,6 +188,7 @@
NOTE: https://www.drupal.org/SA-CORE-2016-005
NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8
CVE-2016-9449 [Inconsistent name for term access query]
+ {DSA-3718-1}
- drupal8 <itp> (bug #756305)
- drupal7 7.52-1
NOTE: https://www.drupal.org/SA-CORE-2016-005
@@ -547,6 +551,7 @@
CVE-2016-9263
RESERVED
CVE-2016-9447 [gstreamer 0.10 NSF code execution]
+ {DSA-3713-1 DLA-712-1}
- gst-plugins-bad0.10 <removed>
NOTE: http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html
CVE-2016-9299 [jenkins: unauthenticated remote code execution]
More information about the Secure-testing-commits
mailing list