[Secure-testing-commits] r51370 - in data: . CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sat May 6 12:42:55 UTC 2017
Author: carnil
Date: 2017-05-06 12:42:55 +0000 (Sat, 06 May 2017)
New Revision: 51370
Modified:
data/CVE/list
data/next-point-update.txt
Log:
Add more fixed included in 8.8
The remaining ones tracked in next-point-update.txt did not made it
unfortunately to the point release, keep them for the next round (and
drop them possibly on next time if no progress)
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-05-06 12:35:04 UTC (rev 51369)
+++ data/CVE/list 2017-05-06 12:42:55 UTC (rev 51370)
@@ -16779,14 +16779,14 @@
CVE-2016-9844 (Buffer overflow in the zi_short function in zipinfo.c in Info-Zip ...)
{DLA-741-1}
- unzip 6.0-21 (bug #847486)
- [jessie] - unzip <no-dsa> (Minor issue)
+ [jessie] - unzip 6.0-16+deb8u3
NOTE: https://launchpad.net/bugs/1643750
NOTE: http://www.openwall.com/lists/oss-security/2016/12/05/13
NOTE: Proposed patch in http://www.openwall.com/lists/oss-security/2016/12/05/19
CVE-2014-9913 (Buffer overflow in the list_files function in list.c in Info-Zip UnZip ...)
{DLA-741-1}
- unzip 6.0-21 (bug #847485)
- [jessie] - unzip <no-dsa> (Minor issue)
+ [jessie] - unzip 6.0-16+deb8u3
NOTE: Upstream bug: http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
NOTE: Same reproducer as in https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
NOTE: can be used to verify a fix (which trigger the issue in unzip -l but crash
@@ -24536,7 +24536,7 @@
NOTE: https://ticketbleed.com/
CVE-2016-9243 (HKDF in cryptography before 1.5.2 returns an empty byte-string if used ...)
- python-cryptography 1.5.3-1
- [jessie] - python-cryptography <no-dsa> (Minor issue)
+ [jessie] - python-cryptography 0.6.1-1+deb8u1
NOTE: Upstream bug: https://github.com/pyca/cryptography/issues/3211
NOTE: Upstream commit: https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874
NOTE: http://www.openwall.com/lists/oss-security/2016/11/08/6
@@ -26007,7 +26007,7 @@
NOTE: https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c
CVE-2016-XXXX [sendmail: Privilege escalation from group smmsp to root]
- sendmail 8.15.2-7 (bug #841257)
- [jessie] - sendmail <no-dsa> (Minor issue)
+ [jessie] - sendmail 8.14.4-8+deb8u2
[wheezy] - sendmail <no-dsa> (Minor issue)
NOTE: no unprivileged user should be in smmsp group and there is no known vulnerability to gain smmsp group membership
CVE-2016-8885 (The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before ...)
@@ -26588,13 +26588,13 @@
CVE-2016-8606 (The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to ...)
{DLA-666-1}
- guile-2.0 2.0.13+1-1 (low; bug #840555)
- [jessie] - guile-2.0 <no-dsa> (Minor issue)
+ [jessie] - guile-2.0 2.0.11+1-9+deb8u1
- guile-1.8 <not-affected> (repl server introduced in 2.0)
NOTE: Patch: http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=08c021916dbd3a235a9f9cc33df4c418c0724e03
CVE-2016-8605 (The mkdir procedure of GNU Guile temporarily changed the process' ...)
{DLA-666-1}
- guile-2.0 2.0.13+1-1 (low; bug #840556)
- [jessie] - guile-2.0 <no-dsa> (Minor issue)
+ [jessie] - guile-2.0 2.0.11+1-9+deb8u1
- guile-1.8 <removed> (low; bug #841494)
[jessie] - guile-1.8 <no-dsa> (Minor issue)
[wheezy] - guile-1.8 <no-dsa> (Minor issue)
@@ -33244,7 +33244,7 @@
NOT-FOR-US: Citrix
CVE-2016-XXXX [bruteforcable challenge responses in unprotected logfile]
- mongodb 1:2.6.12-1 (bug #833087)
- [jessie] - mongodb <no-dsa> (Minor issue, can be fixed via point release)
+ [jessie] - mongodb 1:2.4.10-5+deb8u1
[wheezy] - mongodb 1:2.0.6-1.1+deb7u1
NOTE: Fixed in experimental 1:2.6.11-1, first version in unstable 1:2.6.12-1
NOTE: https://jira.mongodb.org/browse/SERVER-9476
@@ -33261,7 +33261,7 @@
CVE-2016-6494 (The client in MongoDB uses world-readable permissions on .dbshell ...)
{DLA-588-1}
- mongodb 1:2.6.12-3 (bug #832908)
- [jessie] - mongodb <no-dsa> (Minor issue, can be fixed via point release)
+ [jessie] - mongodb 1:2.4.10-5+deb8u1
NOTE: http://www.openwall.com/lists/oss-security/2016/07/29/4
CVE-2016-6491 (Buffer overflow in the Get8BIMProperty function in ...)
{DSA-3652-1 DLA-731-1}
Modified: data/next-point-update.txt
===================================================================
--- data/next-point-update.txt 2017-05-06 12:35:04 UTC (rev 51369)
+++ data/next-point-update.txt 2017-05-06 12:42:55 UTC (rev 51370)
@@ -32,24 +32,6 @@
[jessie] - libxrender 1:0.9.8-1+deb8u1
CVE-2016-7953
[jessie] - libxvmc 2:1.0.8-2+deb8u1
-CVE-2016-8605
- [jessie] - guile-2.0 2.0.11+1-9+deb8u1
-CVE-2016-8606
- [jessie] - guile-2.0 2.0.11+1-9+deb8u1
-CVE-2016-9243
- [jessie] - python-cryptography 0.6.1-1+deb8u1
CVE-2017-XXXX [w3m]
[jessie] - w3m 0.5.3-19+deb8u2
NOTE: For #850432
-CVE-2016-6494
- [jessie] - mongodb 1:2.4.10-5+deb8u1
-CVE-2016-XXXX [mongodb]
- [jessie] - mongodb 1:2.4.10-5+deb8u1
- NOTE: For #833087
-CVE-2016-XXXX [sendmail: Privilege escalation from group smmsp to root]
- [jessie] - sendmail 8.14.4-8+deb8u2
- NOTE: For #841257
-CVE-2014-9913
- [jessie] - unzip 6.0-16+deb8u3
-CVE-2016-9844
- [jessie] - unzip 6.0-16+deb8u3
More information about the Secure-testing-commits
mailing list