[Secure-testing-commits] r44684 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sat Sep 17 14:55:44 UTC 2016


Author: carnil
Date: 2016-09-17 14:55:44 +0000 (Sat, 17 Sep 2016)
New Revision: 44684

Modified:
   data/CVE/list
Log:
More fixes from point release synced

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-09-17 14:43:47 UTC (rev 44683)
+++ data/CVE/list	2016-09-17 14:55:44 UTC (rev 44684)
@@ -4258,6 +4258,7 @@
 	RESERVED
 	{DSA-3666-1 DLA-624-1}
 	- mariadb-10.0 10.0.27-1
+	[jessie] - mariadb-10.0 10.0.27-0+deb8u1
 	- mysql-5.6 <unfixed>
 	- mysql-5.5 <removed>
 	NOTE: This will likely be split by MITRE, unclear what precisely maps to CVE-2016-6662
@@ -7891,7 +7892,7 @@
 	- python3.4 3.4.4~rc1-1
 	[jessie] - python3.4 <no-dsa> (Will be fixed via a point release)
 	- python2.7 2.7.10~rc1-1
-	[jessie] - python2.7 <no-dsa> (Will be fixed via a point release)
+	[jessie] - python2.7 2.7.9-2+deb8u1
 	NOTE: https://bugs.python.org/issue22928
 	NOTE: Fixed in 3.4 / 3.5: revision 94952: https://hg.python.org/cpython/rev/bf3e1c9b80e9
 	NOTE: Fixed in 2.7: revision 94951: https://hg.python.org/cpython/rev/1c45047c5102
@@ -8332,7 +8333,7 @@
 	- python3.4 <removed>
 	[jessie] - python3.4 <no-dsa> (Will be fixed via a point release)
 	- python2.7 2.7.12~rc1-1
-	[jessie] - python2.7 <no-dsa> (Will be fixed via a point release)
+	[jessie] - python2.7 2.7.9-2+deb8u1
 	NOTE: https://bugs.python.org/issue26171
 CVE-2016-5433 (Citrix iOS Receiver before 7.0 allows attackers to cause TLS ...)
 	NOT-FOR-US: Citrix
@@ -12370,7 +12371,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/05/01/2
 CVE-2016-4414 (The onReadyRead function in core/coreauthhandler.cpp in Quassel before ...)
 	- quassel 1:0.12.4-2 (bug #826402)
-	[jessie] - quassel <no-dsa> (Minor issue)
+	[jessie] - quassel 1:0.10.0-2.3+deb8u3
 	[wheezy] - quassel <not-affected> (Vulnerable code introduced with 0.10.0)
 	NOTE: https://github.com/quassel/quassel/blob/f64ac93/src/core/coreauthhandler.cpp#L100
 	NOTE: Introduced by: https://github.com/quassel/quassel/commit/d1bf207 (0.10.0)
@@ -24061,7 +24062,7 @@
 	- python3.4 <removed>
 	[jessie] - python3.4 <no-dsa> (Will be fixed via a point release)
 	- python2.7 2.7.12~rc1-1
-	[jessie] - python2.7 <no-dsa> (Will be fixed via a point release)
+	[jessie] - python2.7 2.7.9-2+deb8u1
 	NOTE: 3.4 branch: https://hg.python.org/cpython/rev/d590114c2394
 	NOTE: 2.7 branch: https://hg.python.org/cpython/rev/b3ce713fb9be
 	TODO: check other versions
@@ -24570,7 +24571,7 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/1
 CVE-2015-XXXX [remotely triggerable crash]
 	- ruby-eventmachine 1.0.7-1 (bug #678512; bug #696015)
-	[jessie] - ruby-eventmachine <no-dsa> (Issue can be fixed in point release)
+	[jessie] - ruby-eventmachine 1.0.3-6+deb8u1
 	[wheezy] - ruby-eventmachine 0.12.10-3+deb7u1
 	NOTE: Workaround entry for DLA-549-1 until CVE assigned
 	NOTE: https://github.com/eventmachine/eventmachine/issues/501#issuecomment-37307556
@@ -29382,7 +29383,7 @@
 	[squeeze] - ruby1.9.1 <not-affected> (DL already fixed with CVE-2009-5147, Fiddle does not have vulnerable code)
 	- ruby2.0 <removed>
 	- ruby2.1 <removed> (bug #796344)
-	[jessie] - ruby2.1 <no-dsa> (Minor issue)
+	[jessie] - ruby2.1 2.1.5-2+deb8u3
 	- ruby2.2 2.2.4-1 (bug #796551)
 	NOTE: https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
 	TODO: check correctness for CVE-2009-5147/CVE-2015-7551 record since affects multiple ruby versions
@@ -44548,7 +44549,7 @@
 	[wheezy] - ruby1.9.1 <no-dsa> (Minor issue)
 	- ruby2.0 <removed>
 	- ruby2.1 <removed> (bug #796344)
-	[jessie] - ruby2.1 <no-dsa> (Minor issue)
+	[jessie] - ruby2.1 2.1.5-2+deb8u3
 	- ruby2.2 <not-affected> (Does not contain DL, cf note and corresponding CVE-2015-7551)
 	NOTE: https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
 	NOTE: Although the is upstream commit mentioned, the corresponding change does not




More information about the Secure-testing-commits mailing list