[Secure-testing-commits] r48577 - data/CVE

security tracker role sectracker at moszumanska.debian.org
Mon Jan 30 21:10:11 UTC 2017


Author: sectracker
Date: 2017-01-30 21:10:11 +0000 (Mon, 30 Jan 2017)
New Revision: 48577

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-01-30 21:06:19 UTC (rev 48576)
+++ data/CVE/list	2017-01-30 21:10:11 UTC (rev 48577)
@@ -1,3 +1,135 @@
+CVE-2017-5664
+	RESERVED
+CVE-2017-5663
+	RESERVED
+CVE-2017-5662
+	RESERVED
+CVE-2017-5661
+	RESERVED
+CVE-2017-5660
+	RESERVED
+CVE-2017-5659
+	RESERVED
+CVE-2017-5658
+	RESERVED
+CVE-2017-5657
+	RESERVED
+CVE-2017-5656
+	RESERVED
+CVE-2017-5655
+	RESERVED
+CVE-2017-5654
+	RESERVED
+CVE-2017-5653
+	RESERVED
+CVE-2017-5652
+	RESERVED
+CVE-2017-5651
+	RESERVED
+CVE-2017-5650
+	RESERVED
+CVE-2017-5649
+	RESERVED
+CVE-2017-5648
+	RESERVED
+CVE-2017-5647
+	RESERVED
+CVE-2017-5646
+	RESERVED
+CVE-2017-5645
+	RESERVED
+CVE-2017-5644
+	RESERVED
+CVE-2017-5643
+	RESERVED
+CVE-2017-5642
+	RESERVED
+CVE-2017-5641
+	RESERVED
+CVE-2017-5640
+	RESERVED
+CVE-2017-5639
+	RESERVED
+CVE-2017-5638
+	RESERVED
+CVE-2017-5637
+	RESERVED
+CVE-2017-5636
+	RESERVED
+CVE-2017-5635
+	RESERVED
+CVE-2017-5634
+	RESERVED
+CVE-2017-5633
+	RESERVED
+CVE-2017-5632 (An issue was discovered on the ASUS RT-N56U Wireless Router with ...)
+	TODO: check
+CVE-2017-5631
+	RESERVED
+CVE-2017-5630
+	RESERVED
+CVE-2017-5629
+	RESERVED
+CVE-2017-5626
+	RESERVED
+CVE-2017-5625
+	RESERVED
+CVE-2017-5624
+	RESERVED
+CVE-2017-5623
+	RESERVED
+CVE-2017-5622
+	RESERVED
+CVE-2017-5621
+	RESERVED
+CVE-2017-5620
+	RESERVED
+CVE-2017-5619
+	RESERVED
+CVE-2017-5609 (SQL injection vulnerability in include/functions_entries.inc.php in ...)
+	TODO: check
+CVE-2017-5607
+	RESERVED
+CVE-2017-5606
+	RESERVED
+CVE-2017-5605
+	RESERVED
+CVE-2017-5604
+	RESERVED
+CVE-2017-5603
+	RESERVED
+CVE-2017-5602
+	RESERVED
+CVE-2017-5601 (An error in the lha_read_file_header_1() function ...)
+	TODO: check
+CVE-2016-10186 (An issue was discovered on the D-Link DWR-932B router. ...)
+	TODO: check
+CVE-2016-10185 (An issue was discovered on the D-Link DWR-932B router. A secure_mode=no ...)
+	TODO: check
+CVE-2016-10184 (An issue was discovered on the D-Link DWR-932B router. qmiweb allows ...)
+	TODO: check
+CVE-2016-10183 (An issue was discovered on the D-Link DWR-932B router. qmiweb allows ...)
+	TODO: check
+CVE-2016-10182 (An issue was discovered on the D-Link DWR-932B router. qmiweb allows ...)
+	TODO: check
+CVE-2016-10181 (An issue was discovered on the D-Link DWR-932B router. qmiweb provides ...)
+	TODO: check
+CVE-2016-10180 (An issue was discovered on the D-Link DWR-932B router. WPS PIN ...)
+	TODO: check
+CVE-2016-10179 (An issue was discovered on the D-Link DWR-932B router. There is a ...)
+	TODO: check
+CVE-2016-10178 (An issue was discovered on the D-Link DWR-932B router. HELODBG on port ...)
+	TODO: check
+CVE-2016-10177 (An issue was discovered on the D-Link DWR-932B router. Undocumented ...)
+	TODO: check
+CVE-2016-10176 (The NETGEAR WNR2000v5 router allows an administrator to perform ...)
+	TODO: check
+CVE-2016-10175 (The NETGEAR WNR2000v5 router leaks its serial number when performing a ...)
+	TODO: check
+CVE-2016-10174 (The NETGEAR WNR2000v5 router contains a buffer overflow in the ...)
+	TODO: check
+CVE-2004-2778
+	RESERVED
 CVE-2017-XXXX [sd: sdhci OOB access during multi block SDMA transfer]
 	- qemu <unfixed>
 	- qemu-kvm <removed>
@@ -48,15 +180,16 @@
 	NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160
 	NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f2699449b66dd702a98925bd1b11153a6f7294bf
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2017/01/27/7
-CVE-2017-5628
+CVE-2017-5628 (An issue was discovered in Artifex Software, Inc. MuJS before ...)
 	NOT-FOR-US: MuJS
-CVE-2017-5627
+CVE-2017-5627 (An issue was discovered in Artifex Software, Inc. MuJS before ...)
 	NOT-FOR-US: MuJS
 CVE-2017-5617 [SSRF issue]
+	RESERVED
 	- svgsalamander <unfixed> (bug #853134)
 	NOTE: https://github.com/blackears/svgSalamander/issues/11
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/3
-CVE-2017-5608
+CVE-2017-5608 (Cross-site scripting (XSS) vulnerability in the image upload function ...)
 	- piwigo <removed>
 CVE-2017-5600
 	RESERVED
@@ -64,15 +197,15 @@
 	NOT-FOR-US: eClinicalWorks
 CVE-2017-5598 (An issue was discovered in eClinicalWorks healow at work 8.0 build 8. This ...)
 	NOT-FOR-US: eClinicalWorks
-CVE-2017-5612 [XSS in the posts list table]
+CVE-2017-5612 (Cross-site scripting (XSS) vulnerability in ...)
 	- wordpress 4.7.2+dfsg-1 (bug #852767)
 	NOTE: https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/2
-CVE-2017-5611 [SQL injection in WP_Query]
+CVE-2017-5611 (SQL injection vulnerability in wp-includes/class-wp-query.php in ...)
 	- wordpress 4.7.2+dfsg-1 (bug #852767)
 	NOTE: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/2
-CVE-2017-5610 [taxonomy terms in Press This is shown to users who do not have permissions to use it]
+CVE-2017-5610 (wp-admin/includes/class-wp-press-this.php in Press This in WordPress ...)
 	- wordpress 4.7.2+dfsg-1 (bug #852767)
 	NOTE: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/2
@@ -91,34 +224,42 @@
 CVE-2017-5589
 	RESERVED
 CVE-2016-10173 [directory traversal vulnerability]
+	RESERVED
+	{DLA-808-1}
 	- ruby-minitar 0.5.4-3.1 (bug #853075)
 	- ruby-archive-tar-minitar <removed> (bug #853249)
 	NOTE: https://github.com/halostatue/minitar/issues/16
 	NOTE: https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4
 	NOTE: https://bugzilla.opensuse.org/show_bug.cgi?id=1021740
 CVE-2016-10172 [heap oob read in read_new_config_info / open_utils.c]
+	RESERVED
 	- wavpack <unfixed> (bug #853076)
 	[wheezy] - wavpack <not-affected> (Vulnerable code not present)
 	NOTE: https://sourceforge.net/p/wavpack/mailman/message/35561951/
 	NOTE: Fixed by: https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc (5.1.0)
 CVE-2016-10171 [heap out of bounds read in unreorder_channels / wvunpack.c]
+	RESERVED
 	- wavpack <unfixed> (bug #853076)
 	NOTE: https://sourceforge.net/p/wavpack/mailman/message/35561939/
 	NOTE: Fixed by: https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc (5.1.0)
 CVE-2016-10170 [heap out of bounds read in WriteCaffHeader / caff.c]
+	RESERVED
 	- wavpack <unfixed> (bug #853076)
 	NOTE: https://sourceforge.net/p/wavpack/mailman/message/35561921/
 	NOTE: Fixed by: https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc (5.1.0)
 CVE-2016-10169 [global buffer overread in read_code / read_words.c]
+	RESERVED
 	- wavpack <unfixed> (bug #853076)
 	NOTE: https://sourceforge.net/p/wavpack/mailman/message/35557889/
 	NOTE: Fixed by: https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc (5.1.0)
 CVE-2016-10166 [Fix potential unsigned underflow]
+	RESERVED
 	- libgd2 2.2.4-1
 	[wheezy] - libgd2 <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/26/1
 CVE-2016-10167 [Fix DOS vulnerability in gdImageCreateFromGd2Ctx()]
+	RESERVED
 	{DLA-804-1}
 	- php7.1 7.1.1-1 (unimportant)
 	- php7.0 7.0.15-1 (unimportant)
@@ -129,6 +270,7 @@
 	NOTE: https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/26/1
 CVE-2016-10168 [Fix #354: Signed Integer Overflow gd_io.c]
+	RESERVED
 	{DLA-804-1}
 	- php7.1 7.1.1-1 (unimportant)
 	- php7.0 7.0.15-1 (unimportant)
@@ -165,6 +307,7 @@
 	NOTE: Upstream bug: https://github.com/mdadams/jasper/issues/113
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2017/01/25/9
 CVE-2017-5618 [screen privilege escalation]
+	RESERVED
 	- screen 4.5.0-3 (bug #852484)
 	[stretch] - screen <not-affected> (Vulnerable code not present/never migrated to stretch)
 	[jessie] - screen <not-affected> (Vulnerable code not present)
@@ -252,10 +395,10 @@
 	NOT-FOR-US: GenixCMS
 CVE-2017-5574 (SQL injection vulnerability in register.php in GeniXCMS before 1.0.0 ...)
 	NOT-FOR-US: GenixCMS
-CVE-2017-5573
-	RESERVED
-CVE-2017-5572
-	RESERVED
+CVE-2017-5573 (An issue was discovered in Linux Foundation xapi in Citrix XenServer ...)
+	TODO: check
+CVE-2017-5572 (An issue was discovered in Linux Foundation xapi in Citrix XenServer ...)
+	TODO: check
 CVE-2017-5571
 	RESERVED
 CVE-2017-5570 (An issue was discovered in eClinicalWorks Patient Portal 7.0 build 13. ...)
@@ -372,15 +515,19 @@
 	NOTE: Fixed by: https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e (v229)
 	NOTE: Introduced by: https://github.com/systemd/systemd/commit/ee735086f8670be1591fa9593e80dd60163a7a2f (v228)
 CVE-2017-5616 [Reflected XSS vulnerability]
+	RESERVED
 	- cgiemail <removed> (bug #852031)
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6
 CVE-2017-5615 [SEC-215 HTTP header injection]
+	RESERVED
 	- cgiemail <removed> (bug #852031)
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6
 CVE-2017-5614 [SEC-214 Open redirect]
+	RESERVED
 	- cgiemail <removed> (bug #852031)
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6
 CVE-2017-5613 [SEC-212 Format string injection]
+	RESERVED
 	- cgiemail <removed> (bug #852031)
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6
 CVE-2016-10155 [watchdog: memory leakage in virtual hardware watchdog wdt_i6300esb; CVE for the memory consumption issue, not an information disclosure issue]
@@ -548,24 +695,19 @@
 	NOTE: http://git.savannah.gnu.org/cgit/quagga.git/commit/?id=7d66284a5817a1613b1e4d64a0775ec04fdf8c01
 CVE-2017-5494 (Multiple cross-site scripting (XSS) vulnerabilities in the file types ...)
 	- b2evolution <removed>
-CVE-2017-5486 [buffer overflow in print-isoclns.c:clnp_print()]
-	RESERVED
+CVE-2017-5486 (The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5485 [buffer overflow in addrtoname.c:lookup_nsap()]
-	RESERVED
+CVE-2017-5485 (The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5484 [buffer overflow in print-atm.c:sig_print()]
-	RESERVED
+CVE-2017-5484 (The ATM parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5483 [buffer overflow in print-snmp.c:asn1_parse()]
-	RESERVED
+CVE-2017-5483 (The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5482 [buffer overflow in print-fr.c:q933_print()]
-	RESERVED
+CVE-2017-5482 (The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2017-5481
@@ -1116,12 +1258,10 @@
 	RESERVED
 CVE-2017-5343
 	RESERVED
-CVE-2017-5342 [bug in multiple protocol parsers could cause buffer overflow in print-ether.c:ether_print()]
-	RESERVED
+CVE-2017-5342 (In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5341 [buffer overflow in print-otv.c:otv_print()]
-	RESERVED
+CVE-2017-5341 (The OTV parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2016-10141 (An integer overflow vulnerability was observed in the regemit function ...)
@@ -1390,20 +1530,16 @@
 	[jessie] - libplist <no-dsa> (Minor issue)
 	NOTE: Upstream bug: https://github.com/libimobiledevice/libplist/issues/84
 	NOTE: https://github.com/libimobiledevice/libplist/commit/3a55ddd3c4c11ce75a86afbefd085d8d397ff957
-CVE-2017-5205 [buffer overflow in print-isakmp.c:ikev2_e_print()]
-	RESERVED
+CVE-2017-5205 (The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5204 [buffer overflow in print-ip6.c:ip6_print()]
-	RESERVED
+CVE-2017-5204 (The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5203 [buffer overflow in print-bootp.c:bootp_print()]
-	RESERVED
+CVE-2017-5203 (The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2017-5202 [buffer overflow in print-isoclns.c:clnp_print()]
-	RESERVED
+CVE-2017-5202 (The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2017-5201
@@ -6217,7 +6353,7 @@
 	- virtualbox 5.1.14-dfsg-1
 	[jessie] - virtualbox <end-of-life> (DSA-3699-1)
 	[wheezy] - virtualbox <end-of-life> (DSA 3454)
-CVE-2017-3315 (Vulnerability in the PeolpeSoft Enterprise HCM ePerformance component ...)
+CVE-2017-3315 (Vulnerability in the PeopleSoft Enterprise HCM ePerformance component ...)
 	NOT-FOR-US: Oracle PeopleSoft
 CVE-2017-3314 (Vulnerability in the Oracle FLEXCUBE Universal Banking component of ...)
 	NOT-FOR-US: Oracle FLEXCUBE
@@ -13356,10 +13492,10 @@
 	NOTE: http://www.openwall.com/lists/oss-security/2016/12/08/1
 	NOTE: non-issue, legitimate media file. If a server application uses libav* on untrusted media
 	NOTE: files, it needs to set resource limits
-CVE-2016-9554
-	RESERVED
-CVE-2016-9553
-	RESERVED
+CVE-2016-9554 (The Sophos Web Appliance Remote / Secure Web Gateway server (version ...)
+	TODO: check
+CVE-2016-9553 (The Sophos Web Appliance (version 4.2.1.3) is vulnerable to two Remote ...)
+	TODO: check
 CVE-2016-9552
 	RESERVED
 CVE-2016-9551
@@ -16877,12 +17013,10 @@
 	- golang-github-appc-docker2aci 0.12.3+dfsg-2 (bug #840711)
 	NOTE: https://github.com/appc/docker2aci/issues/203
 	NOTE: https://github.com/lucab/docker2aci/commit/54331ec7020e102935c31096f336d31f6400064f
-CVE-2016-8575 [buffer overflow in print-fr.c:q933_print()]
-	RESERVED
+CVE-2016-8575 (The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-8574 [buffer overflow in print-fr.c:frf15_print()]
-	RESERVED
+CVE-2016-8574 (The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2016-8573
@@ -19014,12 +19148,10 @@
 	[wheezy] - qemu <not-affected> (Vulnerable code introduced in 2.4.0-rc0)
 	- qemu-kvm <not-affected> (Vulnerable code introduced in 2.4.0-rc0)
 	NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg04129.html
-CVE-2016-7993 [buffer overflow in multiple protocol parsers]
-	RESERVED
+CVE-2016-7993 (A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7992 [buffer overflow in print-cip.c:cip_if_print()]
-	RESERVED
+CVE-2016-7992 (The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2016-7991 (On Samsung Galaxy S4 through S7 devices, the "omacp" app ignores ...)
@@ -19032,20 +19164,16 @@
 	NOT-FOR-US: Samsung
 CVE-2016-7987
 	RESERVED
-CVE-2016-7986 [buffer overflow in print-geonet.c, multiple functions]
-	RESERVED
+CVE-2016-7986 (The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7985 [buffer overflow in print-calm-fast.c:calm_fast_print()]
-	RESERVED
+CVE-2016-7985 (The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7984 [buffer overflow in print-tftp.c:tftp_print()]
-	RESERVED
+CVE-2016-7984 (The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7983 [buffer overflow in print-bootp.c:bootp_print()]
-	RESERVED
+CVE-2016-7983 (The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2016-7982 (Directory traversal vulnerability in ecrire/exec/valider_xml.php in ...)
@@ -19084,16 +19212,13 @@
 	NOTE: https://core.spip.net/projects/spip/repository/revisions/23201 (3.1)
 	NOTE: https://core.spip.net/projects/spip/repository/revisions/23202 (3.0)
 	NOTE: reproducible in Wheezy (2.1.17-1+deb7u5) and Jessie (3.0.17-2+deb8u2)
-CVE-2016-7975 [buffer overflow in print-tcp.c:tcp_print()]
-	RESERVED
+CVE-2016-7975 (The TCP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7974 [buffer overflow in print-ip.c, multiple functions]
-	RESERVED
+CVE-2016-7974 (The IP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7973 [buffer overflow in print-atalk.c, multiple functions]
-	RESERVED
+CVE-2016-7973 (The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2016-7972
@@ -19249,80 +19374,61 @@
 	NOTE: https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
 CVE-2016-7941
 	RESERVED
-CVE-2016-7940 [buffer overflow in print-stp.c, multiple functions]
-	RESERVED
+CVE-2016-7940 (The STP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7939 [buffer overflow in print-gre.c, multiple functions]
-	RESERVED
+CVE-2016-7939 (The GRE parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7938 [integer overflow in print-zeromq.c:zmtp1_print_frame()]
-	RESERVED
+CVE-2016-7938 (The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7937 [buffer overflow in print-udp.c:vat_print()]
-	RESERVED
+CVE-2016-7937 (The VAT parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7936 [buffer overflow in print-udp.c:udp_print()]
-	RESERVED
+CVE-2016-7936 (The UDP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7935 [buffer overflow in print-udp.c:rtp_print()]
-	RESERVED
+CVE-2016-7935 (The RTP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7934 [buffer overflow in print-udp.c:rtcp_print()]
-	RESERVED
+CVE-2016-7934 (The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7933 [buffer overflow in print-ppp.c:ppp_hdlc_if_print()]
-	RESERVED
+CVE-2016-7933 (The PPP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7932 [buffer overflow in print-pim.c:pimv2_check_checksum()]
-	RESERVED
+CVE-2016-7932 (The PIM parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7931 [buffer overflow in print-mpls.c:mpls_print()]
-	RESERVED
+CVE-2016-7931 (The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7930 [buffer overflow in print-llc.c:llc_print()]
-	RESERVED
+CVE-2016-7930 (The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7929 [buffer overflow in print-juniper.c:juniper_parse_header()]
-	RESERVED
+CVE-2016-7929 (The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7928 [buffer overflow in print-ipcomp.c:ipcomp_print()]
-	RESERVED
+CVE-2016-7928 (The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7927 [buffer overflow in print-802_11.c:ieee802_11_radio_print()]
-	RESERVED
+CVE-2016-7927 (The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7926 [buffer overflow in print-ether.c:ethertype_print()]
-	RESERVED
+CVE-2016-7926 (The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7925 [buffer overflow in print-sl.c:sl_if_print()]
-	RESERVED
+CVE-2016-7925 (The compressed SLIP parser in tcpdump before 4.9.0 has a buffer ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7924 [buffer overflow in print-atm.c:oam_print()]
-	RESERVED
+CVE-2016-7924 (The ATM parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7923 [buffer overflow in print-arp.c:arp_print()]
-	RESERVED
+CVE-2016-7923 (The ARP parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
-CVE-2016-7922 [buffer overflow in print-ah.c:ah_print()]
-	RESERVED
+CVE-2016-7922 (The AH parser in tcpdump before 4.9.0 has a buffer overflow in ...)
 	{DSA-3775-1}
 	- tcpdump 4.9.0-1
 CVE-2016-7920
@@ -26150,32 +26256,27 @@
 	[wheezy] - linux <not-affected> (Introduced in v3.10-rc1)
 	NOTE: https://patchwork.ozlabs.org/patch/636776/
 	NOTE: Introduced in https://git.kernel.org/linus/bc2a9408fa65195288b41751016c36fd00a75a85 (v3.10-rc1)
-CVE-2016-5827 [Heap overread in libical icalparser_parse_string -> icaltime_from_string function]
-	RESERVED
+CVE-2016-5827 (The icaltime_from_string function in libical 0.47 and 1.0 allows ...)
 	- libical <unfixed>
 	[wheezy] - libical <no-dsa> (Low prio according to upstream)
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1281043
 	TODO: check
-CVE-2016-5826 [Heap overread in libical icalparser_parse_string -> parser_get_next_char]
-	RESERVED
+CVE-2016-5826 (The parser_get_next_char function in libical 0.47 and 1.0 allows ...)
 	- libical <unfixed>
 	[wheezy] - libical <no-dsa> (Low prio according to upstream)
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1281041
 	TODO: check
-CVE-2016-5825 [Heap buffer overread in libical (icalparser_parse_string function)]
-	RESERVED
+CVE-2016-5825 (The icalparser_parse_string function in libical 0.47 and 1.0 allows ...)
 	- libical <unfixed>
 	[wheezy] - libical <no-dsa> (Low prio according to upstream)
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1280832
-CVE-2016-5824 [Handful use-after-free crashes in libical (used in Thunderbird)]
-	RESERVED
+CVE-2016-5824 (libical 1.0 allows remote attackers to cause a denial of service ...)
 	- libical <unfixed>
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1275400
 	NOTE: Reproducer: https://bugzilla.mozilla.org/attachment.cgi?id=8757553
 	NOTE: Upstream ticket: https://github.com/libical/libical/issues/286
 	NOTE: Upstream ticket: https://github.com/libical/libical/issues/251
-CVE-2016-5823 [Libical attempting free on address which was not malloc()-ed]
-	RESERVED
+CVE-2016-5823 (The icalproperty_new_clone function in libical 0.47 and 1.0 allows ...)
 	- libical 1.0-1
 	[wheezy] - libical <no-dsa> (Only possible denial of service, not severe enough to solve)
 	NOTE: possibly correct upstream bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1275787




More information about the Secure-testing-commits mailing list