Author: carnil
Date: 2015-05-20 14:15:24 +0000 (Wed, 20 May 2015)
New Revision: 34368

Modified:
   data/CVE/list
Log:
CVEs assigned for php5

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2015-05-20 14:06:15 UTC (rev 34367)
+++ data/CVE/list       2015-05-20 14:15:24 UTC (rev 34368)
@@ -5,14 +5,8 @@
        RESERVED
 CVE-2015-4025
        RESERVED
-CVE-2015-4024
-       RESERVED
 CVE-2015-4023
        RESERVED
-CVE-2015-4022
-       RESERVED
-CVE-2015-4021
-       RESERVED
 CVE-2015-4020
        RESERVED
 CVE-2015-4019
@@ -101,21 +95,21 @@
        NOTE: https://bugs.php.net/bug.php?id=68598
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/05/18/2
        TODO: check
-CVE-2015-XXXX [DoS possibility due to ineffective parsing of form data]
+CVE-2015-4024 [DoS possibility due to ineffective parsing of form data]
        - php5 <unfixed>
        NOTE: https://bugs.php.net/bug.php?id=69364
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/05/18/2
+       NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/2
        TODO: check
-CVE-2015-XXXX [integer overflow on reading FTP server data leading to heap 
overflow]
+CVE-2015-4022 [integer overflow on reading FTP server data leading to heap 
overflow]
        - php5 <unfixed>
        NOTE: https://bugs.php.net/bug.php?id=69545
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/05/18/2
+       NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/2
        TODO: check
-CVE-2015-XXXX [Memory Corruption in phar_parse_tarfile when entry filename 
starts with null]
+CVE-2015-4021 [Memory Corruption in phar_parse_tarfile when entry filename 
starts with null]
        - php5 <unfixed>
        NOTE: https://bugs.php.net/bug.php?id=69453
        NOTE: 
http://git.php.net/?p=php-src.git;a=commit;h=c27f012b7a447e59d4a704688971cbfa7dddaa74
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/05/17/2 and 
http://www.openwall.com/lists/oss-security/2015/05/18/2
+       NOTE: http://www.openwall.com/lists/oss-security/2015/05/17/2 and 
http://www.openwall.com/lists/oss-security/2015/05/18/2
        TODO: check
 CVE-2015-3987 (Multiple unquoted Windows search path vulnerabilities in the 
(1) ...)
        TODO: check


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to