[Secure-testing-commits] r45577 - data/CVE

security tracker role sectracker at moszumanska.debian.org
Tue Oct 25 09:10:13 UTC 2016


Author: sectracker
Date: 2016-10-25 09:10:13 +0000 (Tue, 25 Oct 2016)
New Revision: 45577

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-10-25 09:06:01 UTC (rev 45576)
+++ data/CVE/list	2016-10-25 09:10:13 UTC (rev 45577)
@@ -530,42 +530,52 @@
 	NOTE: Corresponds to the 0020-Fix-invalid-read-in-gdImageCreateFromTiffPtr.patch patch
 CVE-2016-8703
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiplesix-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8702
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiplesix-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8701
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiplesix-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8700
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiplesix-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8699
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiplesix-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8698
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiplesix-heap-based-buffer-overflow-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8697 [AddressSanitizer: FPE on unknown address 0x508d51 in bm_new ... bitmap.h]
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-divide-by-zero-in-bm_new-bitmap-h/
 CVE-2016-8696
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiple-three-null-pointer-dereference-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8695
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiple-three-null-pointer-dereference-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8694
 	RESERVED
+	{DLA-675-1}
 	- potrace 1.13-1
 	NOTE: https://blogs.gentoo.org/ago/2016/08/08/potrace-multiple-three-null-pointer-dereference-in-bm_readbody_bmp-bitmap_io-c/
 CVE-2016-8693 [attempting double-free ... mem_close ... jas_stream.c]
@@ -1105,7 +1115,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/10/08/13
 CVE-2016-8602 [type confusion]
 	RESERVED
-	{DSA-3691-1}
+	{DSA-3691-1 DLA-674-1}
 	- ghostscript <unfixed> (bug #840451)
 	NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=697203
 	NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=f5c7555c30393e64ec1f5ab0dfae5b55b3b3fc78
@@ -1347,7 +1357,7 @@
 	RESERVED
 CVE-2016-7979 [type confusion in .initialize_dsc_parser allows remote code execution]
 	RESERVED
-	{DSA-3691-1}
+	{DSA-3691-1 DLA-674-1}
 	- ghostscript <unfixed> (bug #839846)
 	NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697190
 	NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697190#c0
@@ -1356,7 +1366,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/19
 CVE-2016-7978 [reference leak in .setdevice allows use-after-free and remote code execution]
 	RESERVED
-	{DSA-3691-1}
+	{DSA-3691-1 DLA-674-1}
 	- ghostscript <unfixed> (bug #839845)
 	NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697179
 	NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
@@ -1364,7 +1374,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
 CVE-2016-7977 [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
 	RESERVED
-	{DSA-3691-1}
+	{DSA-3691-1 DLA-674-1}
 	- ghostscript <unfixed> (high; bug #839841)
 	NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169
 	NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/29/28
@@ -1372,7 +1382,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
 CVE-2016-7976 [various userparams allow %pipe% in paths, allowing remote shell command execution]
 	RESERVED
-	{DSA-3691-1}
+	{DSA-3691-1 DLA-674-1}
 	- ghostscript <unfixed> (high; bug #839260)
 	NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178
 	NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/30/8
@@ -49478,6 +49488,7 @@
 	NOTE: libbluray is only in wheezy and later and the issue is neutered by the kernel hardening for /tmp
 	NOTE: Affected code removed in 0.7.0-1
 CVE-2013-7437 (Multiple integer overflows in potrace 1.11 allow remote attackers to ...)
+	{DLA-675-1}
 	- potrace 1.12-1 (bug #778646)
 	[squeeze] - potrace <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=955808
@@ -83745,7 +83756,7 @@
 	- serendipity <not-affected> (Spellcheck plugin not included in 1.5.x)
 CVE-2013-5653 [Ghostscript information disclosure through getenv, filenameforall]
 	RESERVED
-	{DSA-3691-1}
+	{DSA-3691-1 DLA-674-1}
 	- ghostscript <unfixed> (low; bug #839118)
 	NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=694724
 	NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8




More information about the Secure-testing-commits mailing list