[Secure-testing-commits] r44951 - in data: . CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Sat Oct 1 04:05:34 UTC 2016
Author: jmm
Date: 2016-10-01 04:05:34 +0000 (Sat, 01 Oct 2016)
New Revision: 44951
Modified:
data/CVE/list
data/next-point-update.txt
Log:
wget fixed
openjpeg2 fixed
rawtherapee fixed
darktable spu
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-10-01 04:02:48 UTC (rev 44950)
+++ data/CVE/list 2016-10-01 04:05:34 UTC (rev 44951)
@@ -2387,6 +2387,7 @@
- ffmpeg <unfixed> (unimportant)
NOTE: Non issue, will be rejected
NOTE: http://www.openwall.com/lists/oss-security/2016/09/25/2
+ NOTE: To be rejected
CVE-2016-7552
RESERVED
CVE-2016-7549 (Google Chrome before 53.0.2785.113 does not ensure that the recipient ...)
@@ -2600,10 +2601,9 @@
NOTE: Fixed by http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/6071b5820215
CVE-2016-7445 [openjpeg null ptr dereference]
RESERVED
- - openjpeg2 <unfixed> (bug #838690)
+ - openjpeg2 2.1.2-1 (bug #838690)
NOTE: https://github.com/uclouvain/openjpeg/issues/843
NOTE: PoC: https://github.com/STARLABSEC/pocs/raw/master/openjpeg-nullptr-github-issue-842.ppm
- TODO: check possibly openjpeg
CVE-2016-7443
RESERVED
CVE-2016-7442
@@ -3397,7 +3397,7 @@
NOTE: Fixed upstream in 1.1.1.
CVE-2016-7163 (Integer overflow in the opj_pi_create_decode function in pi.c in ...)
{DSA-3665-1}
- - openjpeg2 <unfixed> (bug #837604)
+ - openjpeg2 2.1.2-1 (bug #837604)
NOTE: https://github.com/uclouvain/openjpeg/commit/c16bc057ba3f125051c9966cf1f5b68a05681de4
NOTE: https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24
CVE-2016-7153 (The HTTP/2 protocol does not consider the role of the TCP congestion ...)
@@ -3694,7 +3694,7 @@
CVE-2016-7090 (The integrated web server on Siemens SCALANCE M-800 and S615 modules ...)
TODO: check
CVE-2016-7098 (Race condition in wget 1.17 and earlier, when used in recursive or ...)
- - wget <unfixed> (low; bug #836503)
+ - wget 1.18-4 (low; bug #836503)
[jessie] - wget <no-dsa> (Minor issue)
[wheezy] - wget <no-dsa> (Minor issue)
NOTE: http://git.savannah.gnu.org/cgit/wget.git/commit/?id=9ffb64ba6a8121909b01e984deddce8d096c498d
@@ -27421,7 +27421,7 @@
[jessie] - ufraw <no-dsa> (Minor issue)
[wheezy] - ufraw <not-affected> (Vulnerable code not present)
[squeeze] - ufraw <not-affected> (Vulnerable code not present)
- - rawtherapee <unfixed>
+ - rawtherapee 4.2.1241-2
[jessie] - rawtherapee <no-dsa> (Minor issue)
[wheezy] - rawtherapee <not-affected> (Vulnerable code not present)
[squeeze] - rawtherapee <not-affected> (Vulnerable code not present)
Modified: data/next-point-update.txt
===================================================================
--- data/next-point-update.txt 2016-10-01 04:02:48 UTC (rev 44950)
+++ data/next-point-update.txt 2016-10-01 04:05:34 UTC (rev 44951)
@@ -19,3 +19,5 @@
CVE-2016-XXXX [Information disclosure vulnerability in buf.pl]
[jessie] - irssi 0.8.17-1+deb8u2
NOTE: For #838762
+CVE-2015-3885
+ [jessie] - darktable 1.4.2-1+deb8u1
More information about the Secure-testing-commits
mailing list