[Secure-testing-commits] r45270 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Wed Oct 12 21:10:13 UTC 2016
Author: sectracker
Date: 2016-10-12 21:10:13 +0000 (Wed, 12 Oct 2016)
New Revision: 45270
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-10-12 19:55:40 UTC (rev 45269)
+++ data/CVE/list 2016-10-12 21:10:13 UTC (rev 45270)
@@ -232,6 +232,7 @@
- dwarfutils <unfixed>
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/08/13
CVE-2016-8602 [type confusion]
+ {DSA-3691-1}
- ghostscript <unfixed> (bug #840451)
NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=697203
NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=f5c7555c30393e64ec1f5ab0dfae5b55b3b3fc78
@@ -469,6 +470,7 @@
RESERVED
CVE-2016-7979 [type confusion in .initialize_dsc_parser allows remote code execution]
RESERVED
+ {DSA-3691-1}
- ghostscript <unfixed> (bug #839846)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697190
NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697190#c0
@@ -477,6 +479,7 @@
NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/19
CVE-2016-7978 [reference leak in .setdevice allows use-after-free and remote code execution]
RESERVED
+ {DSA-3691-1}
- ghostscript <unfixed> (bug #839845)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697179
NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
@@ -484,6 +487,7 @@
NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
CVE-2016-7977 [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
RESERVED
+ {DSA-3691-1}
- ghostscript <unfixed> (high; bug #839841)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169
NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/29/28
@@ -491,6 +495,7 @@
NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
CVE-2016-7976 [various userparams allow %pipe% in paths, allowing remote shell command execution]
RESERVED
+ {DSA-3691-1}
- ghostscript <unfixed> (high; bug #839260)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178
NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/30/8
@@ -82664,6 +82669,7 @@
- serendipity <not-affected> (Spellcheck plugin not included in 1.5.x)
CVE-2013-5653 [Ghostscript information disclosure through getenv, filenameforall]
RESERVED
+ {DSA-3691-1}
- ghostscript <unfixed> (low; bug #839118)
NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=694724
NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8
More information about the Secure-testing-commits
mailing list