[Secure-testing-commits] r45657 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Thu Oct 27 09:10:13 UTC 2016
Author: sectracker
Date: 2016-10-27 09:10:13 +0000 (Thu, 27 Oct 2016)
New Revision: 45657
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-10-27 07:23:20 UTC (rev 45656)
+++ data/CVE/list 2016-10-27 09:10:13 UTC (rev 45657)
@@ -1351,16 +1351,19 @@
NOTE: https://blogs.gentoo.org/ago/2016/08/29/potrace-invalid-memory-access-in-findnext-decompose-c/
CVE-2016-8684 [memory allocation failure in MagickMalloc (memory.c)]
RESERVED
+ {DLA-683-1}
- graphicsmagick 1.3.25-5
NOTE: https://blogs.gentoo.org/ago/2016/09/15/graphicsmagick-memory-allocation-failure-in-magickmalloc-memory-c/
NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/c53725cb5449
CVE-2016-8683 [memory allocation failure in ReadPCXImage (pcx.c)]
RESERVED
+ {DLA-683-1}
- graphicsmagick 1.3.25-5
NOTE: https://blogs.gentoo.org/ago/2016/09/15/graphicsmagick-memory-allocation-failure-in-readpcximage-pcx-c/
NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/b9edafd479b9
CVE-2016-8682 [stack-based buffer overflow in ReadSCTImage (sct.c)]
RESERVED
+ {DLA-683-1}
- graphicsmagick 1.3.25-5
NOTE: https://blogs.gentoo.org/ago/2016/09/15/graphicsmagick-stack-based-buffer-overflow-in-readsctimage-sct-c/
NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/0a0dfa81906d
@@ -3220,10 +3223,12 @@
NOTE: https://core.spip.net/projects/spip/repository/revisions/23192
CVE-2016-7997 [denial of service via a crash due to an assertion]
RESERVED
+ {DLA-683-1}
- graphicsmagick 1.3.25-4
NOTE: patch for this and CVE-2016-7996 at: http://openwall.com/lists/oss-security/2016/10/07/4
CVE-2016-7996 [missing check that the provided colormap is not larger than 256 entries resulting in potential heap overflow]
RESERVED
+ {DLA-683-1}
- graphicsmagick 1.3.21-2
NOTE: The patch addressing CVE-2016-7996 applied is in 1.3.25-4, but in
NOTE: the experimental upload 1.3.20-4 and later uploaded to unstable as
@@ -3384,11 +3389,13 @@
NOTE: https://cgit.freedesktop.org/xorg/lib/libXvMC/commit/?id=2cd95e7da8367cccdcdd5c9b160012d1dec5cbdb
CVE-2016-7952 [for all of the other mishandling of the reply data]
RESERVED
+ {DLA-686-1}
- libxtst <unfixed> (low; bug #840444)
[jessie] - libxtst <no-dsa> (Minor issue, will be fixed in a point release)
NOTE: https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
CVE-2016-7951 [for all of the integer overflows]
RESERVED
+ {DLA-686-1}
- libxtst <unfixed> (low; bug #840444)
[jessie] - libxtst <no-dsa> (Minor issue, will be fixed in a point release)
NOTE: https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
@@ -3418,12 +3425,14 @@
NOTE: https://cgit.freedesktop.org/xorg/lib/libXrandr/commit/?id=a0df3e1c7728205e5c7650b2e6dce684139254a6
CVE-2016-7946 [for all of the other mishandling of the reply data]
RESERVED
+ {DLA-685-1}
- libxi <unfixed> (low; bug #840440)
[jessie] - libxi <no-dsa> (Minor issue, will be fixed in a point release)
NOTE: https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
NOTE: Regression: https://bugs.freedesktop.org/98204
CVE-2016-7945 [or all of the integer overflows]
RESERVED
+ {DLA-685-1}
- libxi <unfixed> (low; bug #840440)
[jessie] - libxi <no-dsa> (Minor issue, will be fixed in a point release)
NOTE: https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
@@ -3436,11 +3445,13 @@
NOTE: https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e
CVE-2016-7943
RESERVED
+ {DLA-684-1}
- libx11 <unfixed> (low; bug #840439)
[jessie] - libx11 <no-dsa> (Minor issue, will be fixed in a point release)
NOTE: https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
CVE-2016-7942
RESERVED
+ {DLA-684-1}
- libx11 <unfixed> (low; bug #840439)
[jessie] - libx11 <no-dsa> (Minor issue, will be fixed in a point release)
NOTE: https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
@@ -4513,6 +4524,7 @@
NOTE: Fixed by http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/eb58028dacf5
CVE-2016-7448 [Utah RLE: Reject truncated/absurd files which caused huge memory allocations and/or consumed huge CPU]
RESERVED
+ {DLA-683-1}
- graphicsmagick 1.3.25-1
NOTE: Fixed by http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/30043afadb10
NOTE: Fixed by http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d972c761b55d
More information about the Secure-testing-commits
mailing list