Author: sectracker
Date: 2017-01-06 21:10:12 +0000 (Fri, 06 Jan 2017)
New Revision: 47796

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-01-06 21:09:19 UTC (rev 47795)
+++ data/CVE/list       2017-01-06 21:10:12 UTC (rev 47796)
@@ -1,4 +1,35 @@
+CVE-2017-5199
+       RESERVED
+CVE-2017-5198
+       RESERVED
+CVE-2017-5197
+       RESERVED
+CVE-2017-5192
+       RESERVED
+CVE-2017-5191
+       RESERVED
+CVE-2017-5190
+       RESERVED
+CVE-2017-5189
+       RESERVED
+CVE-2017-5188
+       RESERVED
+CVE-2017-5187
+       RESERVED
+CVE-2017-5186
+       RESERVED
+CVE-2017-5185
+       RESERVED
+CVE-2017-5184
+       RESERVED
+CVE-2017-5183
+       RESERVED
+CVE-2017-5182
+       RESERVED
+CVE-2017-5181
+       RESERVED
 CVE-2017-5196 [Out of bounds read in certain incomplete character sequences]
+       RESERVED
        - irssi <unfixed> (bug #850403)
        [jessie] - irssi <no-dsa> (Minor issue)
        [wheezy] - irssi <no-dsa> (Minor issue)
@@ -6,6 +37,7 @@
        NOTE: 
https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d
        NOTE: https://irssi.org/security/irssi_sa_2017_01.txt
 CVE-2017-5195 [Out of bounds read in certain incomplete control codes]
+       RESERVED
        - irssi <unfixed> (bug #850403)
        [jessie] - irssi <no-dsa> (Minor issue)
        [wheezy] - irssi <no-dsa> (Minor issue)
@@ -13,6 +45,7 @@
        NOTE: 
https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d
        NOTE: https://irssi.org/security/irssi_sa_2017_01.txt
 CVE-2017-5194 [Use after free when receiving invalid nick message]
+       RESERVED
        - irssi <unfixed> (bug #850403)
        [jessie] - irssi <no-dsa> (Minor issue)
        [wheezy] - irssi <no-dsa> (Minor issue)
@@ -20,14 +53,15 @@
        NOTE: 
https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d
        NOTE: https://irssi.org/security/irssi_sa_2017_01.txt
 CVE-2017-5193 [NULL pointer dereference in the nickcmp function]
+       RESERVED
        - irssi <unfixed> (bug #850403)
        [jessie] - irssi <no-dsa> (Minor issue)
        [wheezy] - irssi <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/2
        NOTE: 
https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d
        NOTE: https://irssi.org/security/irssi_sa_2017_01.txt
-CVE-2017-5179
-       RESERVED
+CVE-2017-5179 (Cross-site scripting (XSS) vulnerability in Tenable Nessus 
before ...)
+       TODO: check
 CVE-2017-5178
        RESERVED
 CVE-2017-5177
@@ -115,10 +149,12 @@
 CVE-2017-5136
        RESERVED
 CVE-2016-10123 [firejail: don't allow --chroot as user without seccomp support]
+       RESERVED
        - firejail 0.9.38-1
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/a23ac1bf390fa4c3db4ea31e6ee6100a9c511d59
 (0.9.38-rc1)
 CVE-2016-10122 [firejail: Environment not cleaned before root exec()]
+       RESERVED
        - firejail 0.9.44.2-1
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/3b81e1f2c331644ced87d26a943b22eed6242b8f
@@ -126,23 +162,28 @@
        NOTE: In 0.9.44-bugfixes: 
https://github.com/netblue30/firejail/commit/e847207df28e181a8f590ade825b5f06d4fadf17
 (0.9.44.2)
        NOTE: In 0.9.44-bugfixes: 
https://github.com/netblue30/firejail/commit/18f6e9dc9b304f7aca291c3edce5122562b1e36c
 (0.9.44.2)
 CVE-2016-10121 [firejail: multiple weak permissions]
+       RESERVED
        - firejail 0.9.38-1
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/1cab02f5ae3c90c01fae4d1c16381820b757a3a6
 (0.9.38)
 CVE-2016-10120 [firejail /dev, /dev/shm, /var/tmp, /var/lock was mounted 0777]
+       RESERVED
        - firejail 0.9.38-1
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/cd0ecfc7a7b30abde20db6dea505cd8c58e7c046
 (0.9.38-rc1)
 CVE-2016-10119 [firejail /tmp,/var/tmp was mounted tmpfs 0777]
+       RESERVED
        - firejail 0.9.38-1
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/aa28ac9e09557b833f194f594e2940919d940d1f
 (0.9.38)
 CVE-2016-10118 [firejail allows truncation of /etc/resolv.conf]
+       RESERVED
        - firejail 0.9.44.2-1 (low)
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/6144229605177764b7f3f3450c1a47f56595dc9e
        NOTE: In 0.9.44-bugfixes: 
https://github.com/netblue30/firejail/commit/8b5b444c766b8d0592346decc6ed4a6d345e4f67
 (0.9.44.2)
 CVE-2016-10117 [firejail allows unrestricted mount of tmpfs]
+       RESERVED
        - firejail 0.9.38-1
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4
        NOTE: 
https://github.com/netblue30/firejail/commit/678cd1495457318dad39178bb646ba1b96332ddb
 (0.9.38-rc1)
@@ -161,6 +202,7 @@
 CVE-2016-10110
        RESERVED
 CVE-2017-5180 [firejail local root exploit]
+       RESERVED
        - firejail 0.9.44.2-3 (bug #850160)
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/04/1
        NOTE: https://github.com/netblue30/firejail/issues/1020
@@ -456,7 +498,7 @@
        NOTE: https://bugs.php.net/bug.php?id=73832
 CVE-2016-10109 [pcsc-lite use-after-free]
        RESERVED
-       {DSA-3752-1}
+       {DSA-3752-1 DLA-778-1}
        - pcsc-lite 1.8.20-1
        NOTE: 
https://anonscm.debian.org/cgit/pcsclite/PCSC.git/commit/?id=697fe05967af7ea215bcd5d5774be587780c9e22
        NOTE: 
https://anonscm.debian.org/cgit/pcsclite/PCSC.git/commit/?id=3aaab9d998b5deb16a246cc7517e44144d281d3b
@@ -2810,8 +2852,8 @@
        RESERVED
 CVE-2016-10031 (** DISPUTED ** WampServer 3.0.6 installs two services called 
...)
        TODO: check
-CVE-2016-10030
-       RESERVED
+CVE-2016-10030 (The _prolog_error function in slurmd/req.c in Slurm before 
15.08.13, ...)
+       TODO: check
 CVE-2017-3894
        RESERVED
 CVE-2017-3893
@@ -3301,29 +3343,25 @@
        RESERVED
        - xen 4.8.0-1 (bug #848713)
        NOTE: https://xenbits.xen.org/xsa/advisory-204.html
-CVE-2016-10012 [sshd(8): shared memory manager bounds checks that could be 
elided by some optimising compilers potentially allow attacks against the 
privileged monitor process from the sandboxed privilege-separation process]
-       RESERVED
+CVE-2016-10012 (The shared memory manager (associated with pre-authentication 
...)
        - openssh 1:7.4p1-1 (low; bug #848717)
        [jessie] - openssh <no-dsa> (Minor issue)
        [wheezy] - openssh <no-dsa> (Minor issue)
        NOTE: Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4
        NOTE: 
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/monitor.c.diff?r1=1.165&r2=1.166
        NOTE: 
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/monitor.h.diff?r1=1.19&r2=1.20
-CVE-2016-10011 [sshd(8): theoretical leak of host private key material to 
privilege-separated child processes via realloc()]
-       RESERVED
+CVE-2016-10011 (authfile.c in sshd in OpenSSH before 7.4 does not properly 
consider ...)
        - openssh 1:7.4p1-1 (low; bug #848716)
        [jessie] - openssh <no-dsa> (Minor issue)
        [wheezy] - openssh <no-dsa> (Minor issue)
        NOTE: Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4
        NOTE: 
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/authfile.c.diff?r1=1.121&r2=1.122
-CVE-2016-10010 [sshd(8): When privilege separation is disabled, forwarded 
Unix-domain sockets would be created by sshd(8) with the privileges of 'root']
-       RESERVED
+CVE-2016-10010 (sshd in OpenSSH before 7.4, when privilege separation is not 
used, ...)
        - openssh 1:7.4p1-1 (unimportant; bug #848715)
        NOTE: Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4
        NOTE: 
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/serverloop.c.diff?r1=1.188&r2=1.189
        NOTE: Privilege separation is enabled in the Debian package
-CVE-2016-10009 [ssh-agent(1): load PKCS#11 modules from paths outside a 
trusted whitelist]
-       RESERVED
+CVE-2016-10009 (Untrusted search path vulnerability in ssh-agent.c in 
ssh-agent in ...)
        - openssh 1:7.4p1-1 (low; bug #848714)
        [jessie] - openssh <no-dsa> (Minor issue)
        [wheezy] - openssh <no-dsa> (Minor issue)
@@ -3499,15 +3537,13 @@
        RESERVED
 CVE-2016-9924
        RESERVED
-CVE-2016-9936 [Use After Free in PHP7 unserialize()]
-       RESERVED
+CVE-2016-9936 (The unserialize implementation in ext/standard/var.c in PHP 7.x 
before ...)
        - php7.0 7.0.14-1
        NOTE: Fixed in PHP 7.0.14 and 7.1.0
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72978
        NOTE: Fixed by: 
https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
        NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
-CVE-2016-9935 [Invalid read when wddx decodes empty boolean element]
-       RESERVED
+CVE-2016-9935 (The php_wddx_push_element function in ext/wddx/wddx.c in PHP 
before ...)
        {DSA-3737-1}
        - php7.0 7.0.14-1
        - php5 <unfixed>
@@ -3515,8 +3551,7 @@
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73631
        NOTE: Fixed by: 
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
        NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
-CVE-2016-9934 [NULL Pointer Dereference in WDDX Packet Deserialization with 
PDORow]
-       RESERVED
+CVE-2016-9934 (ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 
allows ...)
        {DSA-3732-1}
        - php7.0 7.0.13-1
        - php5 <unfixed>
@@ -3524,8 +3559,7 @@
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73331
        NOTE: Fixed by: 
https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d
        NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2
-CVE-2016-9933 [imagefilltoborder stackoverflow on truecolor images]
-       RESERVED
+CVE-2016-9933 (Stack consumption vulnerability in the gdImageFillToBorder 
function in ...)
        {DSA-3751-1 DSA-3732-1 DLA-758-1}
        - libgd2 2.2.2-29-g3c2b605-1 (bug #849038)
        NOTE: This problem could be seen as a programmer fault but the fix is 
easy and
@@ -9829,8 +9863,7 @@
        RESERVED
 CVE-2017-0881
        RESERVED
-CVE-2016-9754 [Integer overflow in ring_buffer_resize()]
-       RESERVED
+CVE-2016-9754 (The ring_buffer_resize function in kernel/trace/ring_buffer.c 
in the ...)
        - linux 4.6.1-1
        [wheezy] - linux <not-affected> (Vulnerable code introduced later)
        NOTE: Fixed by: 
https://git.kernel.org/linus/59643d1535eb220668692a5359de22545af579f6 (v4.7-rc1)
@@ -11684,8 +11717,7 @@
        RESERVED
 CVE-2016-9482
        RESERVED
-CVE-2014-9912 [stack buffer overflow in locale_get_display_name]
-       RESERVED
+CVE-2014-9912 (The get_icu_disp_value_src_php function in ...)
        - php5 5.6.0+dfsg-1
        [wheezy] - php5 5.4.34-0+deb7u1
        NOTE: Fixed in 5.6.0, 5.5.14, 5.4.30, 5.3.29
@@ -11776,8 +11808,7 @@
        - phpmyadmin 4:4.6.5.1-1 (unimportant)
        NOTE: https://www.phpmyadmin.net/security/PMASA-2016-71/
        NOTE: unlikely PHP configuration required, unclear impact
-CVE-2014-9911
-       RESERVED
+CVE-2014-9911 (Stack-based buffer overflow in the ures_getByKeyWithFallback 
function ...)
        {DSA-3725-1 DLA-744-1}
        - icu 55.1-3
        NOTE: http://bugs.icu-project.org/trac/ticket/10891
@@ -14504,23 +14535,20 @@
        NOTE: this CVE make sure to fix it completely to not open up 
CVE-2016-8866.
        NOTE: The "incomplete fix" though is not a real problem, cf. 
https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30908#p140255
        NOTE: http://www.openwall.com/lists/oss-security/2016/10/17/4
-CVE-2016-8860 [tor DoS]
-       RESERVED
+CVE-2016-8860 (Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had 
internal ...)
        {DSA-3694-1 DLA-663-1}
        - tor 0.2.8.9-1
        NOTE: https://trac.torproject.org/projects/tor/ticket/20384
        NOTE: https://blog.torproject.org/blog/tor-0289-released-important-fixes
        NOTE: 
https://github.com/torproject/tor/commit/3cea86eb2fbb65949673eb4ba8ebb695c87a57ce
        NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/11
-CVE-2016-9138 [Issues from Upstream bug #73147 still unfixed in 5.6.27 and 
7.0.12]
-       RESERVED
+CVE-2016-9138 (PHP through 5.6.27 and 7.x through 7.0.12 mishandles property 
...)
        {DSA-3732-1}
        - php7.0 <unfixed>
        - php5 <unfixed>
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147
        NOTE: http://www.openwall.com/lists/oss-security/2016/11/01/7
-CVE-2016-9137 [Use After Free in unserialize()]
-       RESERVED
+CVE-2016-9137 (Use-after-free vulnerability in the CURLFile implementation in 
...)
        {DSA-3698-1}
        - php7.0 7.0.12-1
        - php5 <unfixed>
@@ -14691,8 +14719,7 @@
        NOTE: Fixed by: 
http://git.ghostscript.com/?p=mupdf.git;h=1e03c06456d997435019fb3526fa2d4be7dbc6ec
        NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=697015
        NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=697019
-CVE-2016-8670 [Stack Buffer Overflow in GD dynamicGetbuf]
-       RESERVED
+CVE-2016-8670 (Integer signedness error in the dynamicGetbuf function in 
gd_io_dp.c ...)
        {DSA-3693-1 DLA-665-1}
        - libgd2 2.2.3-87-gd0fec80-1 (bug #840805)
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73280
@@ -17183,8 +17210,8 @@
        RESERVED
 CVE-2016-8007
        RESERVED
-CVE-2016-8006
-       RESERVED
+CVE-2016-8006 (Authentication bypass vulnerability in Enterprise Security 
Manager ...)
+       TODO: check
 CVE-2016-8005
        RESERVED
 CVE-2016-8004
@@ -17577,13 +17604,11 @@
        NOTE: 
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/622ccbd8ab894e3ac6cdf607e3d4f39e406786e9
 (n3.1.4)
 CVE-2016-7904
        RESERVED
-CVE-2016-7903 [Password Reset Address Spoof]
-       RESERVED
+CVE-2016-7903 (Dotclear before 2.10.3, when the Host header is not part of the 
web ...)
        - dotclear <removed>
        [jessie] - dotclear <no-dsa> (Minor issue)
        NOTE: Fixed by: https://hg.dotclear.org/dotclear/rev/bb06343f4247
-CVE-2016-7902 [fileUnzip->unzip() method not properly verifying the extension 
of files in zip archive.]
-       RESERVED
+CVE-2016-7902 (Unrestricted file upload vulnerability in the 
fileUnzip-&gt;unzip method ...)
        - dotclear <removed>
        [jessie] - dotclear <no-dsa> (Minor issue)
        NOTE: Fixed by: https://hg.dotclear.org/dotclear/rev/a9db771a5a70
@@ -18799,8 +18824,7 @@
 CVE-2016-7400
        RESERVED
        NOT-FOR-US: Exponent CMS
-CVE-2016-7399
-       RESERVED
+CVE-2016-7399 (scripts/license.pl in Veritas NetBackup Appliance 2.6.0.x 
through ...)
        NOT-FOR-US: Veritas NetBackup Applianc
 CVE-2016-7398
        RESERVED
@@ -19363,15 +19387,13 @@
        NOTE: Xen switched to qemu-system in 4.4.0-1
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg01764.html
        NOTE: 
http://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db
-CVE-2016-7169 [a path traversal vulnerability in the upgrade package uploader]
-       RESERVED
+CVE-2016-7169 (Directory traversal vulnerability in the File_Upload_Upgrader 
class in ...)
        {DSA-3681-1 DLA-633-1}
        - wordpress 4.6.1+dfsg-1
        NOTE: 
https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
        NOTE: Fixed in 4.6.1 release upstream
        NOTE: Fixed by: https://core.trac.wordpress.org/changeset/38524
-CVE-2016-7168 [a cross-site scripting vulnerability via image filename]
-       RESERVED
+CVE-2016-7168 (Cross-site scripting (XSS) vulnerability in the 
media_handle_upload ...)
        {DSA-3681-1 DLA-633-1}
        - wordpress 4.6.1+dfsg-1
        NOTE: 
https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/
@@ -20282,21 +20304,17 @@
        NOT-FOR-US: Huawei FusionServer
 CVE-2016-6895
        REJECTED
-CVE-2016-6894
-       RESERVED
+CVE-2016-6894 (Arista EOS 4.15 before 4.15.8M, 4.16 before 4.16.7M, and 4.17 
before ...)
        NOT-FOR-US: Arista EOS
-CVE-2016-6892 [Free of Memory not on the Heap]
-       RESERVED
+CVE-2016-6892 (The x509FreeExtensions function in MatrixSSL before 3.8.6 
allows ...)
        - matrixssl <removed>
        [wheezy] - matrixssl <end-of-life> (not supported in Wheezy)
        NOTE: https://www.kb.cert.org/vuls/id/396440
-CVE-2016-6891 [Improper Restriction of Operations within the Bounds of a 
Memory Buffer]
-       RESERVED
+CVE-2016-6891 (MatrixSSL before 3.8.6 allows remote attackers to cause a 
denial of ...)
        - matrixssl <removed>
        [wheezy] - matrixssl <end-of-life> (not supported in Wheezy)
        NOTE: https://www.kb.cert.org/vuls/id/396440
-CVE-2016-6890 [Heap-based Buffer Overflow]
-       RESERVED
+CVE-2016-6890 (Heap-based buffer overflow in MatrixSSL before 3.8.6 allows 
remote ...)
        - matrixssl <removed>
        [wheezy] - matrixssl <end-of-life> (not supported in Wheezy)
        NOTE: https://www.kb.cert.org/vuls/id/396440
@@ -21690,8 +21708,7 @@
        RESERVED
        NOT-FOR-US: Samsung
        NOTE: http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016
-CVE-2016-6595 [DoS via repeatedly joining and quitting swarm cluster as a node]
-       RESERVED
+CVE-2016-6595 (** DISPUTED ** The SwarmKit toolkit 1.12.0 for Docker allows 
remote ...)
        - docker.io <not-affected> (Only affects Docker 1.12)
        NOTE: http://seclists.org/oss-sec/2016/q3/198
 CVE-2016-6581 [HPACK Bomb]
@@ -58178,8 +58195,8 @@
        NOT-FOR-US: Thycotic Secret Server
 CVE-2015-3442
        RESERVED
-CVE-2015-3441
-       RESERVED
+CVE-2015-3441 (The Parental Control panel in Genexis devices with DRGOS before 
1.14.1 ...)
+       TODO: check
 CVE-2015-3437
        RESERVED
 CVE-2015-3436 (provider/server/ECServer.cpp in Zarafa Collaboration Platform 
(ZCP) ...)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to