[Secure-testing-commits] r45692 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Fri Oct 28 06:09:54 UTC 2016
Author: carnil
Date: 2016-10-28 06:09:54 +0000 (Fri, 28 Oct 2016)
New Revision: 45692
Modified:
data/CVE/list
Log:
Add references for CVE-2016-7032/sudo
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-10-28 06:05:34 UTC (rev 45691)
+++ data/CVE/list 2016-10-28 06:09:54 UTC (rev 45692)
@@ -5951,6 +5951,9 @@
NOTE: https://www.sudo.ws/alerts/noexec_bypass.html
NOTE: This CVE is for the bypass via system() and popen(). The wordpexp() bypass
NOTE: is tracked under CVE-2016-7076.
+ NOTE: https://www.sudo.ws/devel.html#1.8.15rc1
+ NOTE: https://www.sudo.ws/repos/sudo/rev/58a5c06b5257
+ NOTE: https://www.sudo.ws/repos/sudo/rev/a826cd7787e9
CVE-2016-7031 (The RGW code in Ceph before 10.0.1, when authenticated-read ACL is ...)
- ceph <unfixed> (bug #838026)
[jessie] - ceph <no-dsa> (Minor issue)
More information about the Secure-testing-commits
mailing list