[Secure-testing-commits] r48751 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Tue Feb 7 09:10:13 UTC 2017
Author: sectracker
Date: 2017-02-07 09:10:13 +0000 (Tue, 07 Feb 2017)
New Revision: 48751
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-02-07 07:47:42 UTC (rev 48750)
+++ data/CVE/list 2017-02-07 09:10:13 UTC (rev 48751)
@@ -1,4 +1,17 @@
+CVE-2017-5896
+ RESERVED
+CVE-2017-5895
+ RESERVED
+CVE-2017-5894
+ RESERVED
+CVE-2017-5893
+ RESERVED
+CVE-2017-5892
+ RESERVED
+CVE-2017-5891
+ RESERVED
CVE-2017-5898 [Qemu: usb: integer overflow in emulated_apdu_from_guest]
+ RESERVED
- qemu <unfixed>
[jessie] - qemu <not-affected> (Vulnerable code not present)
- qemu-kvm <not-affected> (Vulnerable code not present)
@@ -6,6 +19,7 @@
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1419699
NOTE: http://git.qemu-project.org/?p=qemu.git;a=commit;h=c7dfbf322595ded4e70b626bf83158a9f3807c6a
CVE-2017-5897
+ RESERVED
- linux <unfixed>
CVE-2017-5890
RESERVED
@@ -868,6 +882,7 @@
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2017/01/28/1
TODO: check, claimed to affect all MySQL 5.5, MariaDB 10.0.29 and 10.1.21
CVE-2017-5899 [s-nail local root privilege escalation]
+ RESERVED
- s-nail 14.8.16-1 (bug #852934)
NOTE: https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html
NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160
@@ -5256,8 +5271,8 @@
RESERVED
CVE-2016-10072 (** DISPUTED ** WampServer 3.0.6 has two files called 'wampmanager.exe' ...)
NOT-FOR-US: WampServer
-CVE-2016-10044
- RESERVED
+CVE-2016-10044 (The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 ...)
+ TODO: check
CVE-2016-10043 (An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The ...)
NOT-FOR-US: Radisys MRF Web Panel
CVE-2016-10042
@@ -5288,8 +5303,8 @@
NOTE: https://framework.zend.com/security/advisory/ZF2016-04
NOTE: https://github.com/zendframework/zendframework/commit/7c1e89815f5a9c016f4b8088e59b07cb2bf99dc0
NOTE: http://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html
-CVE-2014-9914
- RESERVED
+CVE-2014-9914 (Race condition in the ip4_datagram_release_cb function in ...)
+ TODO: check
CVE-2016-10045 (The isMail transport in PHPMailer before 5.2.20 might allow remote ...)
- libphp-phpmailer <not-affected> (Incomplete fix not applied)
NOTE: https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
More information about the Secure-testing-commits
mailing list