Author: luciano Date: 2016-12-03 04:28:41 +0000 (Sat, 03 Dec 2016) New Revision: 46727
Modified: data/CVE/list Log: linux issues Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-12-03 03:11:19 UTC (rev 46726) +++ data/CVE/list 2016-12-03 04:28:41 UTC (rev 46727) @@ -5224,6 +5224,12 @@ RESERVED CVE-2017-0381 RESERVED +CVE-2016-9794 [Linux kernel: ALSA: use-after-free in,kill_fasync] + - linux <unfixed> + NOTE: http://seclists.org/oss-sec/2016/q4/576 +CVE-2016-9793 [Linux: signed overflows for SO_{SND|RCV}BUFFORCE] + - linux <unfixed> + NOTE: http://seclists.org/oss-sec/2016/q4/574 CVE-2016-9775 [tomcat8: privilege escalation during package removal] {DLA-729-1 DLA-728-1} - tomcat8 8.5.8-2 (bug #845385) @@ -37783,6 +37789,10 @@ NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/92cd6d7fe0d01c61cf68ac4ef65ef388ee252415/ NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/9cbca25ff7f20c432b61eb9f4cae43a946502b66/ NOTE: http://sourceforge.net/p/gdcm/gdcm/ci/e0dd1114c82d372dd905c029ddbee4e81ed01a89/ +CVE-2012-6704 [Linux: signed overflows for SO_SNDBUF and SO_RCVBUF that affects "before 3.5" kernels] + - linux 3.16.36-1+deb8u1 + NOTE: TODO + NOTE: http://seclists.org/oss-sec/2016/q4/574 CVE-2012-6703 (Integer overflow in the snd_compr_allocate_buffer function in ...) - linux 3.8.11-1 [wheezy] - linux <not-affected> (Vulnerable code not present) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits