[Secure-testing-commits] r48028 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sat Jan 14 13:19:50 UTC 2017
Author: carnil
Date: 2017-01-14 13:19:50 +0000 (Sat, 14 Jan 2017)
New Revision: 48028
Modified:
data/CVE/list
Log:
More fixes from 8.7 recorded
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-01-14 13:08:28 UTC (rev 48027)
+++ data/CVE/list 2017-01-14 13:19:50 UTC (rev 48028)
@@ -15772,7 +15772,7 @@
RESERVED
CVE-2016-XXXX [dbus format string vulnerability]
- dbus 1.10.12-1
- [jessie] - dbus <no-dsa> (Minor issue)
+ [jessie] - dbus 1.8.22-0+deb8u1
[wheezy] - dbus <no-dsa> (Minor issue)
NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=98157
NOTE: Versions affected: dbus >= 1.4.0
@@ -16138,7 +16138,7 @@
CVE-2016-1000247 [mpg123 memory overread]
{DLA-655-1}
- mpg123 1.23.8-1 (low; bug #838960)
- [jessie] - mpg123 <no-dsa> (Minor issue)
+ [jessie] - mpg123 1.20.1-2+deb8u1
NOTE: http://mpg123.org/bugs/240
CVE-2016-XXXX [nspr, nss: unprotected environment variables]
- nspr 2:4.12-1 (low)
@@ -16412,7 +16412,7 @@
RESERVED
{DLA-722-1}
- irssi 0.8.20-2 (bug #838762)
- [jessie] - irssi <no-dsa> (Can be fixed in point release, minor issue)
+ [jessie] - irssi 0.8.17-1+deb8u2
NOTE: Fixed by: https://github.com/irssi/scripts.irssi.org/commit/f1b1eb154baa684fad5d65bf4dff79c8ded8b65a
NOTE: https://irssi.org/2016/09/22/buf.pl-update/
NOTE: http://www.openwall.com/lists/oss-security/2016/09/24/1
@@ -16672,7 +16672,7 @@
RESERVED
CVE-2016-7444 (The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS ...)
- gnutls28 3.5.3-4
- [jessie] - gnutls28 <no-dsa> (Minor issue)
+ [jessie] - gnutls28 3.3.8-6+deb8u4
NOTE: https://gnutls.org/security.html#GNUTLS-SA-2016-3
NOTE: http://lists.gnutls.org/pipermail/gnutls-devel/2016-September/008146.html
NOTE: Upstream fix: https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
@@ -18857,7 +18857,7 @@
RESERVED
{DLA-680-1}
- bash 4.4-1
- [jessie] - bash <no-dsa> (Minor issue)
+ [jessie] - bash 4.3-11+deb8u1
NOTE: http://www.openwall.com/lists/oss-security/2016/09/26/9
NOTE: Default shell is dash which is not vulnerable, but bash in Jessie and
NOTE: Wheezy are affected.
@@ -34133,14 +34133,14 @@
RESERVED
{DLA-454-1}
- minissdpd 1.2.20130907-3.2 (bug #816759)
- [jessie] - minissdpd <no-dsa> (Minor issue, local DoS, can be fixed via point release)
+ [jessie] - minissdpd 1.2.20130907-3+deb8u1
NOTE: https://speirofr.appspot.com/files/advisory/SPADV-2016-02.md
NOTE: https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47
CVE-2016-3179
RESERVED
{DLA-454-1}
- minissdpd 1.2.20130907-3.2 (bug #816759)
- [jessie] - minissdpd <no-dsa> (Minor issue, local DoS, can be fixed via point release)
+ [jessie] - minissdpd 1.2.20130907-3+deb8u1
NOTE: https://speirofr.appspot.com/files/advisory/SPADV-2016-02.md
NOTE: https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a
CVE-2016-2842 (The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 ...)
@@ -42576,6 +42576,7 @@
CVE-2016-0634 [bash prompt expanding return value from gethostname()]
RESERVED
- bash 4.4-1 (unimportant)
+ [jessie] - bash 4.3-11+deb8u1
NOTE: http://www.openwall.com/lists/oss-security/2016/09/16/8
NOTE: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025
NOTE: Fixed bin Bash upstream bash-4.4
@@ -44469,7 +44470,7 @@
[wheezy] - ufraw <not-affected> (Vulnerable code not present)
[squeeze] - ufraw <not-affected> (Vulnerable code not present)
- rawtherapee 4.2.1241-2
- [jessie] - rawtherapee <no-dsa> (Minor issue)
+ [jessie] - rawtherapee 4.2-1+deb8u2
[wheezy] - rawtherapee <not-affected> (Vulnerable code not present)
[squeeze] - rawtherapee <not-affected> (Vulnerable code not present)
- exactimage 0.9.1-13
@@ -57860,7 +57861,7 @@
[wheezy] - freeimage <no-dsa> (Minor issue)
[squeeze] - freeimage <no-dsa> (Minor issue)
- darktable 1.6.7-1 (bug #786792)
- [jessie] - darktable <no-dsa> (Minor issue)
+ [jessie] - darktable 1.4.2-1+deb8u1
[wheezy] - darktable <no-dsa> (Minor issue)
NOTE: http://www.ocert.org/advisories/ocert-2015-006.html
NOTE: https://codesearch.debian.net/results/int%20CLASS%20ljpeg_start
More information about the Secure-testing-commits
mailing list