[Secure-testing-commits] r48751 - data/CVE

security tracker role sectracker at moszumanska.debian.org
Tue Feb 7 09:10:13 UTC 2017


Author: sectracker
Date: 2017-02-07 09:10:13 +0000 (Tue, 07 Feb 2017)
New Revision: 48751

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-02-07 07:47:42 UTC (rev 48750)
+++ data/CVE/list	2017-02-07 09:10:13 UTC (rev 48751)
@@ -1,4 +1,17 @@
+CVE-2017-5896
+	RESERVED
+CVE-2017-5895
+	RESERVED
+CVE-2017-5894
+	RESERVED
+CVE-2017-5893
+	RESERVED
+CVE-2017-5892
+	RESERVED
+CVE-2017-5891
+	RESERVED
 CVE-2017-5898 [Qemu: usb: integer overflow in emulated_apdu_from_guest]
+	RESERVED
 	- qemu <unfixed>
 	[jessie] - qemu <not-affected> (Vulnerable code not present)
 	- qemu-kvm <not-affected> (Vulnerable code not present)
@@ -6,6 +19,7 @@
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1419699
 	NOTE: http://git.qemu-project.org/?p=qemu.git;a=commit;h=c7dfbf322595ded4e70b626bf83158a9f3807c6a
 CVE-2017-5897
+	RESERVED
 	- linux <unfixed>
 CVE-2017-5890
 	RESERVED
@@ -868,6 +882,7 @@
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2017/01/28/1
 	TODO: check, claimed to affect all MySQL 5.5, MariaDB 10.0.29 and 10.1.21
 CVE-2017-5899 [s-nail local root privilege escalation]
+	RESERVED
 	- s-nail 14.8.16-1 (bug #852934)
 	NOTE: https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html
 	NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160
@@ -5256,8 +5271,8 @@
 	RESERVED
 CVE-2016-10072 (** DISPUTED ** WampServer 3.0.6 has two files called 'wampmanager.exe' ...)
 	NOT-FOR-US: WampServer
-CVE-2016-10044
-	RESERVED
+CVE-2016-10044 (The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 ...)
+	TODO: check
 CVE-2016-10043 (An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. The ...)
 	NOT-FOR-US: Radisys MRF Web Panel
 CVE-2016-10042
@@ -5288,8 +5303,8 @@
 	NOTE: https://framework.zend.com/security/advisory/ZF2016-04
 	NOTE: https://github.com/zendframework/zendframework/commit/7c1e89815f5a9c016f4b8088e59b07cb2bf99dc0
 	NOTE: http://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html
-CVE-2014-9914
-	RESERVED
+CVE-2014-9914 (Race condition in the ip4_datagram_release_cb function in ...)
+	TODO: check
 CVE-2016-10045 (The isMail transport in PHPMailer before 5.2.20 might allow remote ...)
 	- libphp-phpmailer <not-affected> (Incomplete fix not applied)
 	NOTE: https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html




More information about the Secure-testing-commits mailing list