[Secure-testing-commits] r50104 - data/CVE
security tracker role
sectracker at moszumanska.debian.org
Mon Mar 27 21:10:11 UTC 2017
Author: sectracker
Date: 2017-03-27 21:10:11 +0000 (Mon, 27 Mar 2017)
New Revision: 50104
Modified:
data/CVE/list
Log:
automatic update
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-03-27 21:04:05 UTC (rev 50103)
+++ data/CVE/list 2017-03-27 21:10:11 UTC (rev 50104)
@@ -1,7 +1,35 @@
-CVE-2017-7273 [HID: hid-cypress: validate length of report]
+CVE-2017-7285
+ RESERVED
+CVE-2017-7284
+ RESERVED
+CVE-2017-7283
+ RESERVED
+CVE-2017-7282
+ RESERVED
+CVE-2017-7281
+ RESERVED
+CVE-2017-7280
+ RESERVED
+CVE-2017-7279
+ RESERVED
+CVE-2017-7278
+ RESERVED
+CVE-2017-7277
+ RESERVED
+CVE-2017-7276
+ RESERVED
+CVE-2017-7275 (The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows ...)
+ TODO: check
+CVE-2017-7274 (The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 ...)
+ TODO: check
+CVE-2017-7271 (Reflected Cross-site scripting (XSS) vulnerability in Yii Framework ...)
+ TODO: check
+CVE-2017-7270
+ RESERVED
+CVE-2017-7273 (The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux ...)
- linux 4.9.6-1
NOTE: Fixed by: https://git.kernel.org/linus/1ebb71143758f45dc0fa76e2f48429e13b16d110
-CVE-2017-7272 [Misbehavior of "fsockopen" may introduce a security threat]
+CVE-2017-7272 (PHP through 7.1.3 enables potential SSRF in applications that accept an ...)
- php7.1 <unfixed>
- php7.0 <unfixed>
- php5 <removed>
@@ -333,8 +361,8 @@
- linux <unfixed>
CVE-2017-7185
RESERVED
-CVE-2017-7183
- RESERVED
+CVE-2017-7183 (The TFTP server in ExtraPuTTY 0.30 and earlier allows remote attackers ...)
+ TODO: check
CVE-2017-7182
RESERVED
CVE-2017-7181
@@ -837,8 +865,8 @@
RESERVED
CVE-2017-6958 (An XSS vulnerability in the MantisBT Source Integration Plugin (before ...)
NOT-FOR-US: MantisBT Source Integration Plugin
-CVE-2017-6957
- RESERVED
+CVE-2017-6957 (Stack-based buffer overflow in the firmware in Broadcom Wi-Fi HardMAC ...)
+ TODO: check
CVE-2017-6956
RESERVED
CVE-2017-6955 (An issue was discovered in by-email/by-email.php in the Invite Anyone ...)
@@ -1003,8 +1031,8 @@
NOT-FOR-US: Cerberus FTP Server
CVE-2017-6879
RESERVED
-CVE-2017-6878
- RESERVED
+CVE-2017-6878 (Cross-site scripting (XSS) vulnerability in MetInfo 5.3.15 allows ...)
+ TODO: check
CVE-2017-6877 (Cross-site scripting (XSS) vulnerability in SVG file handling in Lutim ...)
NOT-FOR-US: Lutim
CVE-2017-6876
@@ -1168,8 +1196,7 @@
CVE-2017-XXXX [Server certificates are not verified]
- profanity <unfixed> (bug #857546)
NOTE: https://github.com/boothj5/profanity/issues/280
-CVE-2017-7191 [irssi use after free condition during netjoin processing]
- RESERVED
+CVE-2017-7191 (The netjoin processing in Irssi 1.x before 1.0.2 allows attackers to ...)
- irssi 1.0.2-1 (bug #857502)
[jessie] - irssi <not-affected> (Different code path caused the netjoins to be flushed prior reaching use-after-free condition)
[wheezy] - irssi <not-affected> (Different code path caused the netjoins to be flushed prior reaching use-after-free condition)
@@ -1750,8 +1777,7 @@
NOT-FOR-US: wuhu
CVE-2017-6543 (Tenable Nessus before 6.10.2 (as used alone or in Tenable Appliance ...)
NOT-FOR-US: Nessus
-CVE-2017-6542
- RESERVED
+CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...)
- putty 0.67-3 (bug #857642)
NOTE: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
NOTE: Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8 (0.68)
@@ -2028,31 +2054,25 @@
NOT-FOR-US: F-Secure
CVE-2017-6465 (Remote Code Execution was discovered in FTPShell Client 6.53. By ...)
NOT-FOR-US: FTPShell Client
-CVE-2017-6464 [Denial of Service via Malformed Config]
- RESERVED
+CVE-2017-6464 (NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to ...)
- ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3389
-CVE-2017-6463 [Authenticated DoS via Malicious Config Option]
- RESERVED
+CVE-2017-6463 (NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote ...)
- ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3387
-CVE-2017-6462 [Buffer Overflow in DPTS Clock]
- RESERVED
+CVE-2017-6462 (Buffer overflow in the legacy Datum Programmable Time Server (DPTS) ...)
- ntp 1:4.2.8p10+dfsg-1
[wheezy] - ntp <no-dsa> (Minor issue)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3388
CVE-2017-6461
REJECTED
-CVE-2017-6460 [Buffer Overflow in ntpq when fetching reslist]
- RESERVED
+CVE-2017-6460 (Stack-based buffer overflow in the reslist function in ntpq in NTP ...)
- ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3377
-CVE-2017-6459 [Windows Installer: Data Structure terminated insufficiently]
- RESERVED
+CVE-2017-6459 (The Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 ...)
- ntp <not-affected> (NTP on Windows)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3382
-CVE-2017-6458 [Potential Overflows in ctl_put() functions]
- RESERVED
+CVE-2017-6458 (Multiple buffer overflows in the ctl_put* functions in NTP before ...)
- ntp 1:4.2.8p10+dfsg-1
[wheezy] - ntp <no-dsa> (Minor issue)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3379
@@ -2062,20 +2082,17 @@
REJECTED
CVE-2017-6456
REJECTED
-CVE-2017-6455 [Windows: Privileged execution of User Library code]
- RESERVED
+CVE-2017-6455 (NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, allows ...)
- ntp <not-affected> (NTP on Windows)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3384
CVE-2017-6454
REJECTED
CVE-2017-6453
REJECTED
-CVE-2017-6452 [Windows Installer: Stack Buffer Overflow from Command Line]
- RESERVED
+CVE-2017-6452 (Stack-based buffer overflow in the Windows installer for NTP before ...)
- ntp <not-affected> (NTP on Windows)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3383
-CVE-2017-6451 [Improper use of snprintf() in mx4200_send()]
- RESERVED
+CVE-2017-6451 (The mx4200_send function in the legacy MX4200 refclock in NTP before ...)
- ntp <not-affected> (Vulnerable code not enabled at build time)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3378
CVE-2017-6450
@@ -3450,8 +3467,7 @@
CVE-2017-5974 (Heap-based buffer overflow in the __zzip_get32 function in fetch.c in ...)
- zziplib <unfixed> (bug #854727)
NOTE: http://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c/
-CVE-2017-5973 [Qemu: usb: infinite loop while doing control transfer in xhci_kick_epctx]
- RESERVED
+CVE-2017-5973 (The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick ...)
{DLA-845-1 DLA-842-1}
- qemu 1:2.8+dfsg-3 (bug #855611)
[jessie] - qemu <no-dsa> (Minor issue)
@@ -3462,8 +3478,7 @@
- linux 4.4.2-1
[jessie] - linux <no-dsa> (Known perfomance limitation)
[wheezy] - linux <no-dsa> (Known perfomance limitation)
-CVE-2016-10225
- RESERVED
+CVE-2016-10225 (The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and ...)
NOT-FOR-US: sunxi-debug driver in Allwinner kernel
CVE-2016-10224 (An issue was discovered in Sauter NovaWeb web HMI. The application uses ...)
NOT-FOR-US: Sauter NovaWeb
@@ -3592,15 +3607,13 @@
NOT-FOR-US: A10
CVE-2016-10212 (Radware devices use the same value for the first two GCM nonces, which ...)
NOT-FOR-US: Radware devices
-CVE-2017-5932 [code execution in autocompletion]
- RESERVED
+CVE-2017-5932 (The path autocompletion feature in Bash 4.4 allows local users to gain ...)
- bash 4.4-3
[jessie] - bash <not-affected> (Introduced in 4.4)
[wheezy] - bash <not-affected> (Introduced in 4.4)
NOTE: https://github.com/jheyens/bash_completion_vuln/raw/master/2017-01-17.bash_completion_report.pdf
NOTE: Fix http://git.savannah.gnu.org/cgit/bash.git/commit/?id=4f747edc625815f449048579f6e65869914dd715
-CVE-2017-5931
- RESERVED
+CVE-2017-5931 (Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick ...)
- qemu 1:2.8+dfsg-3 (bug #854730)
[jessie] - qemu <not-affected> (Vulnerable code not present)
[wheezy] - qemu <not-affected> (Vulnerable code not present)
@@ -4188,7 +4201,7 @@
NOTE: https://github.com/libevent/libevent/issues/317
NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/17
CVE-2017-5848 (The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in ...)
- {DLA-830-1}
+ {DSA-3818-1 DLA-830-1}
- gst-plugins-bad1.0 1.10.4-1 (low)
- gst-plugins-bad0.10 <unfixed> (low)
[jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue)
@@ -4196,7 +4209,7 @@
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777957
NOTE: Patch: https://bugzilla.gnome.org/show_bug.cgi?id=777957#c3
CVE-2017-5847 (The gst_asf_demux_process_ext_content_desc function in ...)
- {DLA-829-1}
+ {DSA-3821-1 DLA-829-1}
- gst-plugins-ugly1.0 1.10.4-1 (low)
- gst-plugins-ugly0.10 <unfixed> (low)
[jessie] - gst-plugins-ugly0.10 <no-dsa> (Minor issue)
@@ -4204,72 +4217,78 @@
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777955
NOTE: https://github.com/GStreamer/gst-plugins-ugly/commit/d21017b52a585f145e8d62781bcc1c5fefc7ee37
CVE-2017-5846 (The gst_asf_demux_process_ext_stream_props function in ...)
- {DLA-829-1}
+ {DSA-3821-1 DLA-829-1}
- gst-plugins-ugly1.0 1.10.3-1 (low)
- gst-plugins-ugly0.10 <unfixed> (low)
[jessie] - gst-plugins-ugly0.10 <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777937
CVE-2017-5845 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in ...)
+ {DSA-3820-1}
- gst-plugins-good1.0 1.10.3-1 (low)
- gst-plugins-good0.10 <not-affected> (Vulnerable code not present)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777532
CVE-2017-5844 (The gst_riff_create_audio_caps function in ...)
- {DLA-827-1}
+ {DSA-3819-1 DLA-827-1}
- gst-plugins-base1.0 1.10.3-1 (low)
- gst-plugins-base0.10 <unfixed> (low)
[jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777525
CVE-2017-5843 (Multiple use-after-free vulnerabilities in the (1) ...)
- {DLA-830-1}
+ {DSA-3818-1 DLA-830-1}
- gst-plugins-bad1.0 1.10.3-1
- gst-plugins-bad0.10 <unfixed> (low)
[jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777503
CVE-2017-5842 (The html_context_handle_element function in gst/subparse/samiparse.c ...)
+ {DSA-3819-1}
- gst-plugins-base1.0 1.10.3-1
- gst-plugins-base0.10 <not-affected> (Vulnerable code not present)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777502
CVE-2017-5841 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in ...)
+ {DSA-3820-1}
- gst-plugins-good1.0 1.10.3-1 (low)
- gst-plugins-good0.10 <not-affected> (Vulnerable code not present)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777500
CVE-2017-5840 (The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in ...)
- {DLA-828-1}
+ {DSA-3820-1 DLA-828-1}
- gst-plugins-good1.0 1.10.3-1 (low)
- gst-plugins-good0.10 <unfixed> (low)
[jessie] - gst-plugins-good0.10 <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777469
CVE-2017-5839 (The gst_riff_create_audio_caps function in ...)
+ {DSA-3819-1}
- gst-plugins-base1.0 1.10.3-1
- gst-plugins-base0.10 <not-affected> (Vulnerable code not present)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777265
CVE-2017-5838 (The gst_date_time_new_from_iso8601_string function in ...)
+ {DSA-3822-1}
- gstreamer1.0 1.10.3-1 (low)
- gstreamer0.10 <not-affected> (Vulnerable code not present)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777263
CVE-2017-5837 (The gst_riff_create_audio_caps function in ...)
- {DLA-827-1}
+ {DSA-3819-1 DLA-827-1}
- gst-plugins-base1.0 1.10.3-1 (low)
- gst-plugins-base0.10 <unfixed> (low)
[jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777262
CVE-2016-10199 (The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in ...)
+ {DSA-3820-1}
- gst-plugins-good1.0 1.10.3-1 (low)
- gst-plugins-good0.10 <not-affected> (Vulnerable code not present)
NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775451
CVE-2016-10198 (The gst_aac_parse_sink_setcaps function in ...)
- {DLA-828-1}
+ {DSA-3820-1 DLA-828-1}
- gst-plugins-good1.0 1.10.3-1 (low)
- gst-plugins-good0.10 <unfixed> (low)
[jessie] - gst-plugins-good0.10 <no-dsa> (Minor issue)
@@ -4369,8 +4388,7 @@
NOTE: http://www.openwall.com/lists/oss-security/2017/02/02/2
NOTE: Debian uses an unaffected fork:
NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2654#c8
-CVE-2017-5850
- RESERVED
+CVE-2017-5850 (httpd in OpenBSD allows remote attackers to cause a denial of service ...)
NOT-FOR-US: OpenBSD httpd
CVE-2017-5833 (Cross-site scripting (XSS) vulnerability in the invocation code ...)
NOT-FOR-US: Revive Adserver
@@ -4598,8 +4616,7 @@
NOTE: Upstream report: https://launchpad.net/bugs/1651728
NOTE: Upstream fix: https://github.com/kovidgoyal/calibre/commit/3a89718664cb8cce0449d1758eee585ed0d0433c
NOTE: http://www.openwall.com/lists/oss-security/2017/01/29/8
-CVE-2017-5899 [s-nail local root privilege escalation]
- RESERVED
+CVE-2017-5899 (Directory traversal vulnerability in the setuid root helper binary in ...)
- s-nail 14.8.16-1 (bug #852934)
NOTE: https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html
NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160
@@ -6144,8 +6161,7 @@
[jessie] - gnutls28 <no-dsa> (Minor issue, will be fixed via point update)
NOTE: https://gnutls.org/security.html#GNUTLS-SA-2017-1
NOTE: https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
-CVE-2017-5330 [unintended execution of scripts and executable files]
- RESERVED
+CVE-2017-5330 (ark before 16.12.1 might allow remote attackers to execute arbitrary ...)
- ark 4:16.08.3-2 (bug #850874)
[jessie] - ark <not-affected> (Vulnerable code introduced later)
[wheezy] - ark <not-affected> (Vulnerable code introduced later)
@@ -9938,8 +9954,7 @@
[wheezy] - qemu-kvm <no-dsa> (Minor issue)
NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05597.html
NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=a4afa548fc6dd9842ed86639b4d37d4d1c4ad480 (v2.8.0-rc0)
-CVE-2016-9922 [display: cirrus_vga: a divide by zero in cirrus_do_copy]
- RESERVED
+CVE-2016-9922 (The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka ...)
{DLA-765-1 DLA-764-1}
- qemu 1:2.8+dfsg-1 (bug #847960)
[jessie] - qemu <no-dsa> (Minor issue)
@@ -18128,7 +18143,7 @@
NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1035
CVE-2016-9601 [Heap-buffer overflow due to Integer overflow in jbig2_image_new function]
RESERVED
- {DSA-3817-1}
+ {DSA-3817-1 DLA-874-1}
- jbig2dec 0.13-4 (bug #850497)
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=697457
NOTE: Patch: http://git.ghostscript.com/?p=jbig2dec.git;a=commitdiff;h=e698d5c11d27212aa1098bc5b1673a3378563092
@@ -18554,15 +18569,17 @@
[jessie] - salt <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2016/11/25/2
CVE-2016-9813 (The _parse_pat function in the mpegts parser in GStreamer before ...)
+ {DSA-3818-1}
- gst-plugins-bad1.0 1.10.2-1 (low)
- gst-plugins-bad0.10 <not-affected> (Vulnerable code introduced in 1.1.1 of 1.0 series)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775120
CVE-2016-9812 (The gst_mpegts_section_new function in the mpegts decoder in GStreamer ...)
+ {DSA-3818-1}
- gst-plugins-bad1.0 1.10.2-1 (low)
- gst-plugins-bad0.10 <not-affected> (Vulnerable code introduced in 1.1.1 of 1.0 series)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775048
CVE-2016-9811 (The windows_icon_typefind function in gst-plugins-base in GStreamer ...)
- {DLA-735-1}
+ {DSA-3819-1 DLA-735-1}
- gst-plugins-base1.0 1.10.2-1
- gst-plugins-base0.10 <removed>
[jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue, can be fixed via point release)
@@ -18575,7 +18592,7 @@
[wheezy] - gst-plugins-good0.10 0.10.31-3+nmu1+deb7u1
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774897
CVE-2016-9809 (Off-by-one error in the gst_h264_parse_set_caps function in GStreamer ...)
- {DLA-736-1}
+ {DSA-3818-1 DLA-736-1}
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
[jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue, can be fixed via point release)
@@ -19668,8 +19685,8 @@
RESERVED
CVE-2016-9253
RESERVED
-CVE-2016-9252
- RESERVED
+CVE-2016-9252 (The Traffic Management Microkernel (TMM) in F5 BIG-IP before 11.5.4 ...)
+ TODO: check
CVE-2016-9251
RESERVED
CVE-2016-9250
@@ -19687,8 +19704,7 @@
CVE-2016-9244 (A BIG-IP virtual server configured with a Client SSL profile that has ...)
NOT-FOR-US: F5 TLS stack
NOTE: https://ticketbleed.com/
-CVE-2016-9243 [HKDF might return an empty byte-string]
- RESERVED
+CVE-2016-9243 (HKDF in cryptography before 1.5.2 returns an empty byte-string if used ...)
- python-cryptography 1.5.3-1
[jessie] - python-cryptography <no-dsa> (Minor issue)
NOTE: Upstream bug: https://github.com/pyca/cryptography/issues/3211
@@ -21204,7 +21220,7 @@
[wheezy] - openssh <no-dsa> (Minor issue)
NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
NOTE: Only thing the attacker could do here is self-dos own connection
-CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in ...)
+CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick ...)
{DSA-3726-1 DLA-756-1}
- imagemagick 8:6.9.6.6+dfsg-1 (bug #845634)
NOTE: https://blogs.gentoo.org/ago/2016/10/17/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c/
@@ -25195,8 +25211,8 @@
RESERVED
CVE-2016-7475
RESERVED
-CVE-2016-7474
- RESERVED
+CVE-2016-7474 (In some cases the MCPD binary cache in F5 BIG-IP devices may allow a ...)
+ TODO: check
CVE-2016-7473
RESERVED
CVE-2016-7472
@@ -29382,9 +29398,9 @@
NOT-FOR-US: Joomla extension HugeIT slideshow
CVE-2016-1000117 (XSS & SQLi in HugeIT slideshow v1.0.4 ...)
NOT-FOR-US: Joomla extension HugeIT slideshow
-CVE-2016-1000116 (Huge-IT Portfolio Gallery manager v1.1.5 SQL Injection and XSS ...)
+CVE-2016-1000116 (Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and XSS ...)
NOT-FOR-US: Joomla extension Huge-IT Portfolio Gallery manager
-CVE-2016-1000115 (Huge-IT Portfolio Gallery manager v1.1.5 SQL Injection and XSS ...)
+CVE-2016-1000115 (Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and XSS ...)
NOT-FOR-US: Joomla extension Huge-IT Portfolio Gallery manager
CVE-2016-1000114 (XSS in huge IT gallery v1.1.5 for Joomla ...)
NOT-FOR-US: Joomla extension huge IT gallery
@@ -34736,8 +34752,7 @@
{DSA-3607-1 DLA-516-1}
- linux 4.5.4-1
NOTE: Fixed by: https://git.kernel.org/linus/99d825822eade8d827a1817357cbf3f889a552d6 (v4.6)
-CVE-2016-4912
- RESERVED
+CVE-2016-4912 (The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows ...)
- openslp-dfsg <not-affected> (Vulnerable code not present)
NOTE: Issue present only in OpenSLP 2.x where the return from malloc isn't checked.
CVE-2016-4911 (The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x ...)
@@ -45851,16 +45866,13 @@
NOTE: https://kb.isc.org/article/AA-01348
CVE-2016-1505 (The filesystem storage backend in Radicale before 1.1 on Windows ...)
- radicale <not-affected> (Only an issue on MS Windows)
-CVE-2015-8764 [one byte buffer overrun]
- RESERVED
+CVE-2015-8764 (Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through ...)
- freeradius <not-affected> (Affects 3.0 up to 3.0.8)
NOTE: http://freeradius.org/security.html#eap-pwd-2015
-CVE-2015-8763 [commit/confirm message payload length is not validated]
- RESERVED
+CVE-2015-8763 (The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote ...)
- freeradius <not-affected> (Affects 3.0 up to 3.0.8)
NOTE: http://freeradius.org/security.html#eap-pwd-2015
-CVE-2015-8762 [The EAP-PWD packet length is not checked before the first byte is dereferenced]
- RESERVED
+CVE-2015-8762 (The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote ...)
- freeradius <not-affected> (Affects 3.0 up to 3.0.8)
NOTE: http://freeradius.org/security.html#eap-pwd-2015
CVE-2015-8751
@@ -46696,7 +46708,7 @@
NOT-FOR-US: Huawei
CVE-2015-8680 (The Graphics driver in Huawei P8 smartphones with software GRA-TL00 ...)
NOT-FOR-US: Huawei
-CVE-2015-8679 (The (1) ION and (2) Maxim_smartpa_dev drivers in Huawei P8 smartphones ...)
+CVE-2015-8679 (The Maxim_smartpa_dev driver in Huawei P8 smartphones with software ...)
NOT-FOR-US: Huawei
CVE-2015-8678 (The ION driver in Huawei P8 smartphones with software GRA-TL00 before ...)
NOT-FOR-US: ION driver in Huawei P8 smartphones
@@ -50757,10 +50769,10 @@
NOTE: http://rt.central.org/rt/Ticket/Display.html?id=132256
CVE-2015-8311
RESERVED
-CVE-2015-8310
- RESERVED
-CVE-2015-8309
- RESERVED
+CVE-2015-8310 (Cross-site scripting (XSS) vulnerability in Cherry Music before 0.36.0 ...)
+ TODO: check
+CVE-2015-8309 (Directory traversal vulnerability in Cherry Music before 0.36.0 allows ...)
+ TODO: check
CVE-2015-8307 (The Graphics driver in Huawei P8 smartphones with software GRA-TL00 ...)
NOT-FOR-US: Huawei
CVE-2015-8306 (Buffer overflow in the HIFI driver in Huawei P8 phones with software ...)
@@ -51845,8 +51857,7 @@
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=16009
NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
NOTE: http://openwall.com/lists/oss-security/2015/09/08/2
-CVE-2015-8026 [Heap overflow]
- RESERVED
+CVE-2015-8026 (Heap-based buffer overflow in the verify_vbr_checksum function in ...)
- exfat-utils 1.2.1-1
[jessie] - exfat-utils 1.1.0-2+deb8u1
[wheezy] - exfat-utils 0.9.7-2+deb7u1
@@ -51867,8 +51878,7 @@
NOTE: https://crashes.fuzzing-project.org/exfatfsck-endless-loop
NOTE: https://github.com/relan/exfat/commit/35a1f77f9be2d8b21731f758baba4334935bf18b
NOTE: will possibly not get a CVE, cf. http://www.openwall.com/lists/oss-security/2015/10/29/13
-CVE-2015-8010 [XSS in the Icinga Classic-UI]
- RESERVED
+CVE-2015-8010 (Cross-site scripting (XSS) vulnerability in the Classic-UI with the ...)
- icinga 1.13.3-3 (bug #803432)
[jessie] - icinga <no-dsa> (Minor issue)
[wheezy] - icinga <no-dsa> (Minor issue)
@@ -73202,10 +73212,10 @@
NOT-FOR-US: ZOHO ManageEngine SupportCenter Plus
CVE-2015-0865
RESERVED
-CVE-2015-0864
- RESERVED
-CVE-2015-0863
- RESERVED
+CVE-2015-0864 (Samsung Account (AKA com.osp.app.signin) before 1.6.0069 and 2.x ...)
+ TODO: check
+CVE-2015-0863 (GALAXY Apps (aka Samsung Apps, Samsung Updates, or ...)
+ TODO: check
CVE-2015-0862 (Multiple cross-site scripting (XSS) vulnerabilities in the management ...)
- rabbitmq-server 3.4.3-1
[jessie] - rabbitmq-server <no-dsa> (Minor issue)
More information about the Secure-testing-commits
mailing list