Author: sectracker
Date: 2017-02-07 09:10:13 +0000 (Tue, 07 Feb 2017)
New Revision: 48751

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-02-07 07:47:42 UTC (rev 48750)
+++ data/CVE/list       2017-02-07 09:10:13 UTC (rev 48751)
@@ -1,4 +1,17 @@
+CVE-2017-5896
+       RESERVED
+CVE-2017-5895
+       RESERVED
+CVE-2017-5894
+       RESERVED
+CVE-2017-5893
+       RESERVED
+CVE-2017-5892
+       RESERVED
+CVE-2017-5891
+       RESERVED
 CVE-2017-5898 [Qemu: usb: integer overflow in emulated_apdu_from_guest]
+       RESERVED
        - qemu <unfixed>
        [jessie] - qemu <not-affected> (Vulnerable code not present)
        - qemu-kvm <not-affected> (Vulnerable code not present)
@@ -6,6 +19,7 @@
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1419699
        NOTE: 
http://git.qemu-project.org/?p=qemu.git;a=commit;h=c7dfbf322595ded4e70b626bf83158a9f3807c6a
 CVE-2017-5897
+       RESERVED
        - linux <unfixed>
 CVE-2017-5890
        RESERVED
@@ -868,6 +882,7 @@
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2017/01/28/1
        TODO: check, claimed to affect all MySQL 5.5, MariaDB 10.0.29 and 
10.1.21
 CVE-2017-5899 [s-nail local root privilege escalation]
+       RESERVED
        - s-nail 14.8.16-1 (bug #852934)
        NOTE: 
https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html
        NOTE: 
https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160
@@ -5256,8 +5271,8 @@
        RESERVED
 CVE-2016-10072 (** DISPUTED ** WampServer 3.0.6 has two files called 
'wampmanager.exe' ...)
        NOT-FOR-US: WampServer
-CVE-2016-10044
-       RESERVED
+CVE-2016-10044 (The aio_mount function in fs/aio.c in the Linux kernel before 
4.7.7 ...)
+       TODO: check
 CVE-2016-10043 (An issue was discovered in Radisys MRF Web Panel (SWMS) 9.0.1. 
The ...)
        NOT-FOR-US: Radisys MRF Web Panel
 CVE-2016-10042
@@ -5288,8 +5303,8 @@
        NOTE: https://framework.zend.com/security/advisory/ZF2016-04
        NOTE: 
https://github.com/zendframework/zendframework/commit/7c1e89815f5a9c016f4b8088e59b07cb2bf99dc0
        NOTE: 
http://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html
-CVE-2014-9914
-       RESERVED
+CVE-2014-9914 (Race condition in the ip4_datagram_release_cb function in ...)
+       TODO: check
 CVE-2016-10045 (The isMail transport in PHPMailer before 5.2.20 might allow 
remote ...)
        - libphp-phpmailer <not-affected> (Incomplete fix not applied)
        NOTE: 
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to