Author: sectracker Date: 2016-04-29 09:10:12 +0000 (Fri, 29 Apr 2016) New Revision: 41273
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-04-29 08:29:34 UTC (rev 41272) +++ data/CVE/list 2016-04-29 09:10:12 UTC (rev 41273) @@ -1,4 +1,511 @@ +CVE-2016-4341 + RESERVED +CVE-2016-4339 + RESERVED +CVE-2016-4338 + RESERVED +CVE-2016-4337 + RESERVED +CVE-2016-4336 + RESERVED +CVE-2016-4335 + RESERVED +CVE-2016-4334 + RESERVED +CVE-2016-4333 + RESERVED +CVE-2016-4332 + RESERVED +CVE-2016-4331 + RESERVED +CVE-2016-4330 + RESERVED +CVE-2016-4329 + RESERVED +CVE-2016-4328 + RESERVED +CVE-2016-4327 + RESERVED +CVE-2016-4326 + RESERVED +CVE-2016-4325 + RESERVED +CVE-2016-4324 + RESERVED +CVE-2016-4323 + RESERVED +CVE-2016-4322 + RESERVED +CVE-2016-4321 + RESERVED +CVE-2016-4320 + RESERVED +CVE-2016-4319 + RESERVED +CVE-2016-4318 + RESERVED +CVE-2016-4317 + RESERVED +CVE-2016-4316 + RESERVED +CVE-2016-4315 + RESERVED +CVE-2016-4314 + RESERVED +CVE-2016-4313 + RESERVED +CVE-2016-4312 + RESERVED +CVE-2016-4311 + RESERVED +CVE-2016-4310 + RESERVED +CVE-2016-4309 + RESERVED +CVE-2016-4308 + RESERVED +CVE-2016-4307 + RESERVED +CVE-2016-4306 + RESERVED +CVE-2016-4305 + RESERVED +CVE-2016-4304 + RESERVED +CVE-2016-4303 + RESERVED +CVE-2016-4302 + RESERVED +CVE-2016-4301 + RESERVED +CVE-2016-4300 + RESERVED +CVE-2016-4299 + RESERVED +CVE-2016-4298 + RESERVED +CVE-2016-4297 + RESERVED +CVE-2016-4296 + RESERVED +CVE-2016-4295 + RESERVED +CVE-2016-4294 + RESERVED +CVE-2016-4293 + RESERVED +CVE-2016-4292 + RESERVED +CVE-2016-4291 + RESERVED +CVE-2016-4290 + RESERVED +CVE-2016-4289 + RESERVED +CVE-2016-4288 + RESERVED +CVE-2016-4287 + RESERVED +CVE-2016-4286 + RESERVED +CVE-2016-4285 + RESERVED +CVE-2016-4284 + RESERVED +CVE-2016-4283 + RESERVED +CVE-2016-4282 + RESERVED +CVE-2016-4281 + RESERVED +CVE-2016-4280 + RESERVED +CVE-2016-4279 + RESERVED +CVE-2016-4278 + RESERVED +CVE-2016-4277 + RESERVED +CVE-2016-4276 + RESERVED +CVE-2016-4275 + RESERVED +CVE-2016-4274 + RESERVED +CVE-2016-4273 + RESERVED +CVE-2016-4272 + RESERVED +CVE-2016-4271 + RESERVED +CVE-2016-4270 + RESERVED +CVE-2016-4269 + RESERVED +CVE-2016-4268 + RESERVED +CVE-2016-4267 + RESERVED +CVE-2016-4266 + RESERVED +CVE-2016-4265 + RESERVED +CVE-2016-4264 + RESERVED +CVE-2016-4263 + RESERVED +CVE-2016-4262 + RESERVED +CVE-2016-4261 + RESERVED +CVE-2016-4260 + RESERVED +CVE-2016-4259 + RESERVED +CVE-2016-4258 + RESERVED +CVE-2016-4257 + RESERVED +CVE-2016-4256 + RESERVED +CVE-2016-4255 + RESERVED +CVE-2016-4254 + RESERVED +CVE-2016-4253 + RESERVED +CVE-2016-4252 + RESERVED +CVE-2016-4251 + RESERVED +CVE-2016-4250 + RESERVED +CVE-2016-4249 + RESERVED +CVE-2016-4248 + RESERVED +CVE-2016-4247 + RESERVED +CVE-2016-4246 + RESERVED +CVE-2016-4245 + RESERVED +CVE-2016-4244 + RESERVED +CVE-2016-4243 + RESERVED +CVE-2016-4242 + RESERVED +CVE-2016-4241 + RESERVED +CVE-2016-4240 + RESERVED +CVE-2016-4239 + RESERVED +CVE-2016-4238 + RESERVED +CVE-2016-4237 + RESERVED +CVE-2016-4236 + RESERVED +CVE-2016-4235 + RESERVED +CVE-2016-4234 + RESERVED +CVE-2016-4233 + RESERVED +CVE-2016-4232 + RESERVED +CVE-2016-4231 + RESERVED +CVE-2016-4230 + RESERVED +CVE-2016-4229 + RESERVED +CVE-2016-4228 + RESERVED +CVE-2016-4227 + RESERVED +CVE-2016-4226 + RESERVED +CVE-2016-4225 + RESERVED +CVE-2016-4224 + RESERVED +CVE-2016-4223 + RESERVED +CVE-2016-4222 + RESERVED +CVE-2016-4221 + RESERVED +CVE-2016-4220 + RESERVED +CVE-2016-4219 + RESERVED +CVE-2016-4218 + RESERVED +CVE-2016-4217 + RESERVED +CVE-2016-4216 + RESERVED +CVE-2016-4215 + RESERVED +CVE-2016-4214 + RESERVED +CVE-2016-4213 + RESERVED +CVE-2016-4212 + RESERVED +CVE-2016-4211 + RESERVED +CVE-2016-4210 + RESERVED +CVE-2016-4209 + RESERVED +CVE-2016-4208 + RESERVED +CVE-2016-4207 + RESERVED +CVE-2016-4206 + RESERVED +CVE-2016-4205 + RESERVED +CVE-2016-4204 + RESERVED +CVE-2016-4203 + RESERVED +CVE-2016-4202 + RESERVED +CVE-2016-4201 + RESERVED +CVE-2016-4200 + RESERVED +CVE-2016-4199 + RESERVED +CVE-2016-4198 + RESERVED +CVE-2016-4197 + RESERVED +CVE-2016-4196 + RESERVED +CVE-2016-4195 + RESERVED +CVE-2016-4194 + RESERVED +CVE-2016-4193 + RESERVED +CVE-2016-4192 + RESERVED +CVE-2016-4191 + RESERVED +CVE-2016-4190 + RESERVED +CVE-2016-4189 + RESERVED +CVE-2016-4188 + RESERVED +CVE-2016-4187 + RESERVED +CVE-2016-4186 + RESERVED +CVE-2016-4185 + RESERVED +CVE-2016-4184 + RESERVED +CVE-2016-4183 + RESERVED +CVE-2016-4182 + RESERVED +CVE-2016-4181 + RESERVED +CVE-2016-4180 + RESERVED +CVE-2016-4179 + RESERVED +CVE-2016-4178 + RESERVED +CVE-2016-4177 + RESERVED +CVE-2016-4176 + RESERVED +CVE-2016-4175 + RESERVED +CVE-2016-4174 + RESERVED +CVE-2016-4173 + RESERVED +CVE-2016-4172 + RESERVED +CVE-2016-4171 + RESERVED +CVE-2016-4170 + RESERVED +CVE-2016-4169 + RESERVED +CVE-2016-4168 + RESERVED +CVE-2016-4167 + RESERVED +CVE-2016-4166 + RESERVED +CVE-2016-4165 + RESERVED +CVE-2016-4164 + RESERVED +CVE-2016-4163 + RESERVED +CVE-2016-4162 + RESERVED +CVE-2016-4161 + RESERVED +CVE-2016-4160 + RESERVED +CVE-2016-4159 + RESERVED +CVE-2016-4158 + RESERVED +CVE-2016-4157 + RESERVED +CVE-2016-4156 + RESERVED +CVE-2016-4155 + RESERVED +CVE-2016-4154 + RESERVED +CVE-2016-4153 + RESERVED +CVE-2016-4152 + RESERVED +CVE-2016-4151 + RESERVED +CVE-2016-4150 + RESERVED +CVE-2016-4149 + RESERVED +CVE-2016-4148 + RESERVED +CVE-2016-4147 + RESERVED +CVE-2016-4146 + RESERVED +CVE-2016-4145 + RESERVED +CVE-2016-4144 + RESERVED +CVE-2016-4143 + RESERVED +CVE-2016-4142 + RESERVED +CVE-2016-4141 + RESERVED +CVE-2016-4140 + RESERVED +CVE-2016-4139 + RESERVED +CVE-2016-4138 + RESERVED +CVE-2016-4137 + RESERVED +CVE-2016-4136 + RESERVED +CVE-2016-4135 + RESERVED +CVE-2016-4134 + RESERVED +CVE-2016-4133 + RESERVED +CVE-2016-4132 + RESERVED +CVE-2016-4131 + RESERVED +CVE-2016-4130 + RESERVED +CVE-2016-4129 + RESERVED +CVE-2016-4128 + RESERVED +CVE-2016-4127 + RESERVED +CVE-2016-4126 + RESERVED +CVE-2016-4125 + RESERVED +CVE-2016-4124 + RESERVED +CVE-2016-4123 + RESERVED +CVE-2016-4122 + RESERVED +CVE-2016-4121 + RESERVED +CVE-2016-4120 + RESERVED +CVE-2016-4119 + RESERVED +CVE-2016-4118 + RESERVED +CVE-2016-4117 + RESERVED +CVE-2016-4116 + RESERVED +CVE-2016-4115 + RESERVED +CVE-2016-4114 + RESERVED +CVE-2016-4113 + RESERVED +CVE-2016-4112 + RESERVED +CVE-2016-4111 + RESERVED +CVE-2016-4110 + RESERVED +CVE-2016-4109 + RESERVED +CVE-2016-4108 + RESERVED +CVE-2016-4107 + RESERVED +CVE-2016-4106 + RESERVED +CVE-2016-4105 + RESERVED +CVE-2016-4104 + RESERVED +CVE-2016-4103 + RESERVED +CVE-2016-4102 + RESERVED +CVE-2016-4101 + RESERVED +CVE-2016-4100 + RESERVED +CVE-2016-4099 + RESERVED +CVE-2016-4098 + RESERVED +CVE-2016-4097 + RESERVED +CVE-2016-4096 + RESERVED +CVE-2016-4095 + RESERVED +CVE-2016-4094 + RESERVED +CVE-2016-4093 + RESERVED +CVE-2016-4092 + RESERVED +CVE-2016-4091 + RESERVED +CVE-2016-4090 + RESERVED +CVE-2016-4089 + RESERVED +CVE-2016-4088 + RESERVED CVE-2016-4340 + RESERVED - gitlab <undetermined> NOTE: https://about.gitlab.com/2016/04/28/gitlab-major-security-update-for-cve-2016-4340/ TODO: check @@ -392,16 +899,14 @@ NOTE: https://github.com/broofa/node-uuid/issues/122 NOTE: https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d NOTE: nodejs not covered by security support -CVE-2015-8844 - RESERVED +CVE-2015-8844 (The signal implementation in the Linux kernel before 4.3.5 on powerpc ...) - linux 4.4.2-1 [jessie] - linux 3.16.7-ckt25-1 [wheezy] - linux <not-affected> (Vulnerable code introduced later) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1326540 NOTE: Upstream commit: https://git.kernel.org/linus/d2b9d2a5ad5ef04ff978c9923d19730cb05efd55 (v4.4-rc3) NOTE: Introduced by: https://git.kernel.org/linus/2b0a576d15e0e14751f00f9c87e46bad27f217e7 (v3.9-rc1) -CVE-2015-8845 - RESERVED +CVE-2015-8845 (The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the ...) - linux 4.4.2-1 [jessie] - linux 3.16.7-ckt25-1 [wheezy] - linux <not-affected> (Vulnerable code introduced later) @@ -1266,8 +1771,7 @@ NOT-FOR-US: Huawei CVE-2016-3673 RESERVED -CVE-2016-3672 [Unlimiting the stack not longer disables ASLR] - RESERVED +CVE-2016-3672 (The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux ...) - linux 4.5.1-1 NOTE: http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html NOTE: Upstream fix: https://git.kernel.org/linus/8b8addf891de8a00e4d39fc32f93f7c5eb8feceb (v4.6-rc1) @@ -2469,8 +2973,7 @@ NOT-FOR-US: Drupal Block Class module CVE-2016-3143 RESERVED -CVE-2016-3156 [ipv4: Don't do expensive useless work during inetdev destroy] - RESERVED +CVE-2016-3156 (The IPv4 implementation in the Linux kernel before 4.5.2 mishandles ...) - linux 4.5.1-1 NOTE: http://www.openwall.com/lists/oss-security/2016/03/15/3 CVE-2016-3133 @@ -2715,8 +3218,7 @@ NOTE: http://seclists.org/bugtraq/2016/Mar/61 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283378 NOTE: https://marc.info/?l=linux-usb&m=145796765030590&w=2 -CVE-2016-3139 [crash on invalid USB device descriptors (wacom driver)] - RESERVED +CVE-2016-3139 (The wacom_probe function in drivers/input/tablet/wacom_sys.c in the ...) - linux <unfixed> (low) NOTE: http://seclists.org/bugtraq/2016/Mar/60 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283375 @@ -3194,8 +3696,7 @@ NOTE: Portable OpenSSH 7.2p2 contains a fix for this vulnerability. NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/8 NOTE: Upstream fix: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&sortby=date&f=h -CVE-2016-3134 [netfilter IPT_SO_SET_REPLACE memory corruption] - RESERVED +CVE-2016-3134 (The netfilter subsystem in the Linux kernel through 4.5.2 does not ...) - linux 4.5.1-1 NOTE: https://code.google.com/p/google-security-research/issues/detail?id=758 NOTE: https://patchwork.ozlabs.org/patch/595575/ @@ -3203,8 +3704,7 @@ NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/4 NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/7 NOTE: Non-privileged user namespaces disabled by default, only vulnerable with sysctl kernel.unprivileged_userns_clone=1 -CVE-2016-3135 [unsigned integer overflow on 32bit kernels] - RESERVED +CVE-2016-3135 (Integer overflow in the xt_alloc_table_info function in ...) - linux 4.4.6-1 [jessie] - linux <not-affected> (Vulnerable code not present) [wheezy] - linux <not-affected> (Vulnerable code not present) @@ -4121,8 +4621,7 @@ NOTE: https://github.com/moment/moment/pull/2939 NOTE: https://nodesecurity.io/advisories/55 NOTE: nodejs not covered by security support -CVE-2016-2782 - RESERVED +CVE-2016-2782 (The treo_attach function in drivers/usb/serial/visor.c in the Linux ...) - linux 4.4.2-1 [jessie] - linux 3.16.7-ckt25-1 [wheezy] - linux 3.2.78-1 @@ -4330,8 +4829,7 @@ RESERVED CVE-2016-2539 RESERVED -CVE-2016-2550 [unix: correctly track in-flight fds in sending process user_struct] - RESERVED +CVE-2016-2550 (The Linux kernel before 4.5 allows local users to bypass ...) {DSA-3503-1} - linux 4.4.4-1 - linux-2.6 <removed> @@ -4339,44 +4837,37 @@ NOTE: Introduced by: https://git.kernel.org/linus/712f4aad406bb1ed67f3f98d04c044191f0ff593 (v4.5-rc1) NOTE: Technically wheezy-security and squeeze-lts are not affected by this CVE since the fix for NOTE: addressing CVE-2013-4312 was not applied. -CVE-2016-2549 [ALSA: hrtimer: Fix stall by hrtimer_cancel()] - RESERVED +CVE-2016-2549 (sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2ba1fe7a06d3624f9a7586d672b55f08f7c670f3 (v4.5-rc1) -CVE-2016-2548 - RESERVED +CVE-2016-2548 (sound/core/timer.c in the Linux kernel before 4.4.1 retains certain ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5a663aa426f4884c71cd8580adae73f33570f0d (v4.5-rc1) -CVE-2016-2547 - RESERVED +CVE-2016-2547 (sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b5a663aa426f4884c71cd8580adae73f33570f0d (v4.5-rc1) -CVE-2016-2546 [ALSA: timer: Fix race among timer ioctls] - RESERVED +CVE-2016-2546 (sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af368027a49a751d6ff4ee9e3f9961f35bb4fede (v4.5-rc1) -CVE-2016-2545 [ALSA: timer: Fix double unlink of active_list] - RESERVED +CVE-2016-2545 (The snd_timer_interrupt function in sound/core/timer.c in the Linux ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee8413b01045c74340aa13ad5bdf905de32be736 (v4.5-rc1) -CVE-2016-2544 [ALSA: seq: Fix race at timer setup and close] - RESERVED +CVE-2016-2544 (Race condition in the queue_delete function in ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3 (v4.5-rc1) -CVE-2016-2543 [ALSA: seq: Fix missing NULL check at remove_events ioctl] - RESERVED +CVE-2016-2543 (The snd_seq_ioctl_remove_events function in ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> @@ -4874,8 +5365,7 @@ [jessie] - linux 3.16.7-ckt20-1+deb8u4 [wheezy] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/4c185ce06dca14f5cea192f5a2c981ef50663f2b (v4.1-rc1) -CVE-2015-8816 [USB hub invalid memory access in hub_activate()] - RESERVED +CVE-2015-8816 (The hub_activate function in drivers/usb/core/hub.c in the Linux ...) {DSA-3503-1} - linux 4.4.2-1 - linux-2.6 <removed> @@ -5029,16 +5519,14 @@ - kamailio 4.3.4-2 (bug #815178) NOTE: https://github.com/kamailio/kamailio/commit/f50c9c853e7809810099c970780c30b0765b0643 NOTE: https://census-labs.com/news/2016/03/30/kamailio-seas-heap-overflow/ -CVE-2016-2384 [Double-free in snd-usbmidi-lib triggered by invalid USB descriptor] - RESERVED +CVE-2016-2384 (Double free vulnerability in the snd_usbmidi_create function in ...) {DSA-3503-1 DLA-439-1} - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Fixed by: https://git.kernel.org/linus/07d86ca93db7e5cdf4743564d98292042ec21af7 (v4.5-rc4) NOTE: http://www.openwall.com/lists/oss-security/2016/02/14/2 NOTE: https://xairy.github.io/blog/2016/cve-2016-2384 -CVE-2016-2383 [Incorrect branch fixups for eBPF allow arbitrary read] - RESERVED +CVE-2016-2383 (The adjust_branches function in kernel/bpf/verifier.c in the Linux ...) - linux 4.4.2-1 [jessie] - linux <not-affected> (Vulnerable code not present) [wheezy] - linux <not-affected> (Vulnerable code not present) @@ -5364,8 +5852,7 @@ CVE-2015-8813 RESERVED NOT-FOR-US: Umbraco -CVE-2015-8812 [Flaw in CXGB3 driver] - RESERVED +CVE-2015-8812 (drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 ...) {DSA-3503-1 DLA-439-1} - linux 4.4.2-1 - linux-2.6 <removed> @@ -5637,8 +6124,7 @@ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1317014 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283362 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283363 -CVE-2016-2184 [Kernel panic on invalid USB device descriptor (snd_usb_audio driver)] - RESERVED +CVE-2016-2184 (The create_fixed_stream_quirk function in sound/usb/quirks.c in the ...) - linux 4.5.1-1 (low) [jessie] - linux <no-dsa> (Minor issue) [wheezy] - linux <no-dsa> (Minor issue) @@ -5756,8 +6242,7 @@ [jessie] - libapache2-mod-auth-mellon <no-dsa> (Minor issue) CVE-2016-2144 REJECTED -CVE-2016-2143 [s390/mm: page table corruption] - RESERVED +CVE-2016-2143 (The fork implementation in the Linux kernel before 4.5 on s390 ...) - linux 4.4.6-1 NOTE: Fixed by: https://git.kernel.org/linus/3446c13b268af86391d06611327006b059b8bab1 (v4.5) NOTE: Introduced in: https://git.kernel.org/linus/6252d702c5311ce916caf75ed82e5c8245171c92 (v2.6.25-rc1) @@ -6104,8 +6589,7 @@ {DSA-3508-1} - jasper <unfixed> (bug #812978) [squeeze] - jasper <no-dsa> (Minor issue) -CVE-2016-2085 [Timing side-channel in EVM] - RESERVED +CVE-2016-2085 (The evm_verify_hmac function in security/integrity/evm/evm_main.c in ...) - linux 4.4.2-1 (unimportant) [jessie] - linux 3.16.7-ckt25-1 - linux-2.6 <removed> (unimportant) @@ -6279,8 +6763,7 @@ RESERVED CVE-2015-8780 RESERVED -CVE-2016-2069 [x86 Linux TLB flush bug] - RESERVED +CVE-2016-2069 (Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 ...) {DSA-3503-1 DLA-412-1} - linux 4.3.5-1 - linux-2.6 <removed> @@ -9111,8 +9594,8 @@ RESERVED CVE-2016-1206 RESERVED -CVE-2016-1205 - RESERVED +CVE-2016-1205 (Cross-site scripting (XSS) vulnerability in the shiro8 (1) ...) + TODO: check CVE-2016-1204 RESERVED CVE-2016-1203 @@ -10417,8 +10900,7 @@ - python-imaging <removed> [wheezy] - python-imaging 1.1.7-4+deb7u2 NOTE: https://github.com/python-pillow/Pillow/commit/bcaaf97f4ff25b3b5b9e8efeda364e17e80858ec (3.1.1) -CVE-2016-0774 [Incomplete fix for CVE-2015-1805 for kernel versions < 3.16] - RESERVED +CVE-2016-0774 (The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in a ...) {DLA-439-1} - linux 3.16.2-2 [wheezy] - linux 3.2.73-2+deb7u3 @@ -12169,8 +12651,8 @@ NOT-FOR-US: IBM CVE-2016-0212 (Stack-based buffer overflow in IBM Tivoli Storage Manager FastBack 5.5 ...) NOT-FOR-US: IBM -CVE-2016-0211 - RESERVED +CVE-2016-0211 (IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 ...) + TODO: check CVE-2016-0210 RESERVED CVE-2016-0209 (Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 8.5.0 ...) @@ -15851,8 +16333,7 @@ CVE-2015-7516 RESERVED NOT-FOR-US: Onos -CVE-2015-7515 [aiptek Nullpointer Dereference] - RESERVED +CVE-2015-7515 (The aiptek_probe function in drivers/input/tablet/aiptek.c in the ...) - linux 4.4.2-1 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1285326 NOTE: https://os-s.net/advisories/OSS-2016-05_aiptek.pdf @@ -33904,8 +34385,7 @@ RESERVED CVE-2015-1340 RESERVED -CVE-2015-1339 [memory exhaustion via CUSE driver] - RESERVED +CVE-2015-1339 (Memory leak in the cuse_channel_release function in fs/fuse/cuse.c in ...) - linux 4.4.2-1 [jessie] - linux <not-affected> (Vulnerable code introduced in v4.2-rc1) [wheezy] - linux <not-affected> (Vulnerable code introduced in v4.2-rc1) @@ -71189,8 +71669,7 @@ CVE-2013-4313 (Moodle through 2.2.11, 2.3.x before 2.3.9, 2.4.x before 2.4.6, and ...) - moodle 2.5.2-1 [squeeze] - moodle <not-affected> -CVE-2016-2847 [pipe: limit the per-user amount of pages allocated in pipes] - RESERVED +CVE-2016-2847 (fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of ...) {DSA-3503-1} - linux 4.3.5-1 NOTE: https://git.kernel.org/linus/759c01142a5d0f364a462346168a56de28a80f52 (v4.5-rc1) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits