[Secure-testing-commits] r45692 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Oct 28 06:09:54 UTC 2016


Author: carnil
Date: 2016-10-28 06:09:54 +0000 (Fri, 28 Oct 2016)
New Revision: 45692

Modified:
   data/CVE/list
Log:
Add references for CVE-2016-7032/sudo

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-10-28 06:05:34 UTC (rev 45691)
+++ data/CVE/list	2016-10-28 06:09:54 UTC (rev 45692)
@@ -5951,6 +5951,9 @@
 	NOTE: https://www.sudo.ws/alerts/noexec_bypass.html
 	NOTE: This CVE is for the bypass via system() and popen(). The wordpexp() bypass
 	NOTE: is tracked under CVE-2016-7076.
+	NOTE: https://www.sudo.ws/devel.html#1.8.15rc1
+	NOTE: https://www.sudo.ws/repos/sudo/rev/58a5c06b5257
+	NOTE: https://www.sudo.ws/repos/sudo/rev/a826cd7787e9
 CVE-2016-7031 (The RGW code in Ceph before 10.0.1, when authenticated-read ACL is ...)
 	- ceph <unfixed> (bug #838026)
 	[jessie] - ceph <no-dsa> (Minor issue)




More information about the Secure-testing-commits mailing list