Author: sectracker
Date: 2015-12-23 21:10:11 +0000 (Wed, 23 Dec 2015)
New Revision: 38503

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2015-12-23 19:20:16 UTC (rev 38502)
+++ data/CVE/list       2015-12-23 21:10:11 UTC (rev 38503)
@@ -1,3 +1,403 @@
+CVE-2016-1130
+       RESERVED
+CVE-2016-1129
+       RESERVED
+CVE-2016-1128
+       RESERVED
+CVE-2016-1127
+       RESERVED
+CVE-2016-1126
+       RESERVED
+CVE-2016-1125
+       RESERVED
+CVE-2016-1124
+       RESERVED
+CVE-2016-1123
+       RESERVED
+CVE-2016-1122
+       RESERVED
+CVE-2016-1121
+       RESERVED
+CVE-2016-1120
+       RESERVED
+CVE-2016-1119
+       RESERVED
+CVE-2016-1118
+       RESERVED
+CVE-2016-1117
+       RESERVED
+CVE-2016-1116
+       RESERVED
+CVE-2016-1115
+       RESERVED
+CVE-2016-1114
+       RESERVED
+CVE-2016-1113
+       RESERVED
+CVE-2016-1112
+       RESERVED
+CVE-2016-1111
+       RESERVED
+CVE-2016-1110
+       RESERVED
+CVE-2016-1109
+       RESERVED
+CVE-2016-1108
+       RESERVED
+CVE-2016-1107
+       RESERVED
+CVE-2016-1106
+       RESERVED
+CVE-2016-1105
+       RESERVED
+CVE-2016-1104
+       RESERVED
+CVE-2016-1103
+       RESERVED
+CVE-2016-1102
+       RESERVED
+CVE-2016-1101
+       RESERVED
+CVE-2016-1100
+       RESERVED
+CVE-2016-1099
+       RESERVED
+CVE-2016-1098
+       RESERVED
+CVE-2016-1097
+       RESERVED
+CVE-2016-1096
+       RESERVED
+CVE-2016-1095
+       RESERVED
+CVE-2016-1094
+       RESERVED
+CVE-2016-1093
+       RESERVED
+CVE-2016-1092
+       RESERVED
+CVE-2016-1091
+       RESERVED
+CVE-2016-1090
+       RESERVED
+CVE-2016-1089
+       RESERVED
+CVE-2016-1088
+       RESERVED
+CVE-2016-1087
+       RESERVED
+CVE-2016-1086
+       RESERVED
+CVE-2016-1085
+       RESERVED
+CVE-2016-1084
+       RESERVED
+CVE-2016-1083
+       RESERVED
+CVE-2016-1082
+       RESERVED
+CVE-2016-1081
+       RESERVED
+CVE-2016-1080
+       RESERVED
+CVE-2016-1079
+       RESERVED
+CVE-2016-1078
+       RESERVED
+CVE-2016-1077
+       RESERVED
+CVE-2016-1076
+       RESERVED
+CVE-2016-1075
+       RESERVED
+CVE-2016-1074
+       RESERVED
+CVE-2016-1073
+       RESERVED
+CVE-2016-1072
+       RESERVED
+CVE-2016-1071
+       RESERVED
+CVE-2016-1070
+       RESERVED
+CVE-2016-1069
+       RESERVED
+CVE-2016-1068
+       RESERVED
+CVE-2016-1067
+       RESERVED
+CVE-2016-1066
+       RESERVED
+CVE-2016-1065
+       RESERVED
+CVE-2016-1064
+       RESERVED
+CVE-2016-1063
+       RESERVED
+CVE-2016-1062
+       RESERVED
+CVE-2016-1061
+       RESERVED
+CVE-2016-1060
+       RESERVED
+CVE-2016-1059
+       RESERVED
+CVE-2016-1058
+       RESERVED
+CVE-2016-1057
+       RESERVED
+CVE-2016-1056
+       RESERVED
+CVE-2016-1055
+       RESERVED
+CVE-2016-1054
+       RESERVED
+CVE-2016-1053
+       RESERVED
+CVE-2016-1052
+       RESERVED
+CVE-2016-1051
+       RESERVED
+CVE-2016-1050
+       RESERVED
+CVE-2016-1049
+       RESERVED
+CVE-2016-1048
+       RESERVED
+CVE-2016-1047
+       RESERVED
+CVE-2016-1046
+       RESERVED
+CVE-2016-1045
+       RESERVED
+CVE-2016-1044
+       RESERVED
+CVE-2016-1043
+       RESERVED
+CVE-2016-1042
+       RESERVED
+CVE-2016-1041
+       RESERVED
+CVE-2016-1040
+       RESERVED
+CVE-2016-1039
+       RESERVED
+CVE-2016-1038
+       RESERVED
+CVE-2016-1037
+       RESERVED
+CVE-2016-1036
+       RESERVED
+CVE-2016-1035
+       RESERVED
+CVE-2016-1034
+       RESERVED
+CVE-2016-1033
+       RESERVED
+CVE-2016-1032
+       RESERVED
+CVE-2016-1031
+       RESERVED
+CVE-2016-1030
+       RESERVED
+CVE-2016-1029
+       RESERVED
+CVE-2016-1028
+       RESERVED
+CVE-2016-1027
+       RESERVED
+CVE-2016-1026
+       RESERVED
+CVE-2016-1025
+       RESERVED
+CVE-2016-1024
+       RESERVED
+CVE-2016-1023
+       RESERVED
+CVE-2016-1022
+       RESERVED
+CVE-2016-1021
+       RESERVED
+CVE-2016-1020
+       RESERVED
+CVE-2016-1019
+       RESERVED
+CVE-2016-1018
+       RESERVED
+CVE-2016-1017
+       RESERVED
+CVE-2016-1016
+       RESERVED
+CVE-2016-1015
+       RESERVED
+CVE-2016-1014
+       RESERVED
+CVE-2016-1013
+       RESERVED
+CVE-2016-1012
+       RESERVED
+CVE-2016-1011
+       RESERVED
+CVE-2016-1010
+       RESERVED
+CVE-2016-1009
+       RESERVED
+CVE-2016-1008
+       RESERVED
+CVE-2016-1007
+       RESERVED
+CVE-2016-1006
+       RESERVED
+CVE-2016-1005
+       RESERVED
+CVE-2016-1004
+       RESERVED
+CVE-2016-1003
+       RESERVED
+CVE-2016-1002
+       RESERVED
+CVE-2016-1001
+       RESERVED
+CVE-2016-1000
+       RESERVED
+CVE-2016-0999
+       RESERVED
+CVE-2016-0998
+       RESERVED
+CVE-2016-0997
+       RESERVED
+CVE-2016-0996
+       RESERVED
+CVE-2016-0995
+       RESERVED
+CVE-2016-0994
+       RESERVED
+CVE-2016-0993
+       RESERVED
+CVE-2016-0992
+       RESERVED
+CVE-2016-0991
+       RESERVED
+CVE-2016-0990
+       RESERVED
+CVE-2016-0989
+       RESERVED
+CVE-2016-0988
+       RESERVED
+CVE-2016-0987
+       RESERVED
+CVE-2016-0986
+       RESERVED
+CVE-2016-0985
+       RESERVED
+CVE-2016-0984
+       RESERVED
+CVE-2016-0983
+       RESERVED
+CVE-2016-0982
+       RESERVED
+CVE-2016-0981
+       RESERVED
+CVE-2016-0980
+       RESERVED
+CVE-2016-0979
+       RESERVED
+CVE-2016-0978
+       RESERVED
+CVE-2016-0977
+       RESERVED
+CVE-2016-0976
+       RESERVED
+CVE-2016-0975
+       RESERVED
+CVE-2016-0974
+       RESERVED
+CVE-2016-0973
+       RESERVED
+CVE-2016-0972
+       RESERVED
+CVE-2016-0971
+       RESERVED
+CVE-2016-0970
+       RESERVED
+CVE-2016-0969
+       RESERVED
+CVE-2016-0968
+       RESERVED
+CVE-2016-0967
+       RESERVED
+CVE-2016-0966
+       RESERVED
+CVE-2016-0965
+       RESERVED
+CVE-2016-0964
+       RESERVED
+CVE-2016-0963
+       RESERVED
+CVE-2016-0962
+       RESERVED
+CVE-2016-0961
+       RESERVED
+CVE-2016-0960
+       RESERVED
+CVE-2016-0959
+       RESERVED
+CVE-2016-0958
+       RESERVED
+CVE-2016-0957
+       RESERVED
+CVE-2016-0956
+       RESERVED
+CVE-2016-0955
+       RESERVED
+CVE-2016-0954
+       RESERVED
+CVE-2016-0953
+       RESERVED
+CVE-2016-0952
+       RESERVED
+CVE-2016-0951
+       RESERVED
+CVE-2016-0950
+       RESERVED
+CVE-2016-0949
+       RESERVED
+CVE-2016-0948
+       RESERVED
+CVE-2016-0947
+       RESERVED
+CVE-2016-0946
+       RESERVED
+CVE-2016-0945
+       RESERVED
+CVE-2016-0944
+       RESERVED
+CVE-2016-0943
+       RESERVED
+CVE-2016-0942
+       RESERVED
+CVE-2016-0941
+       RESERVED
+CVE-2016-0940
+       RESERVED
+CVE-2016-0939
+       RESERVED
+CVE-2016-0938
+       RESERVED
+CVE-2016-0937
+       RESERVED
+CVE-2016-0936
+       RESERVED
+CVE-2016-0935
+       RESERVED
+CVE-2016-0934
+       RESERVED
+CVE-2016-0933
+       RESERVED
+CVE-2016-0932
+       RESERVED
+CVE-2016-0931
+       RESERVED
 CVE-2015-XXXX [overlay: fix permission checking for setattr]
        - linux <unfixed>
        [jessie] - linux <not-affected> (Vulnerable code not present)
@@ -40,16 +440,19 @@
        [wheezy] - t-coffee <no-dsa> (Minor issue)
        [jessie] - t-coffee <no-dsa> (Minor issue)
 CVE-2015-8619 [hmp: stack based OOB write in hmp_sendkey routine]
+       RESERVED
        - qemu <unfixed>
        - qemu-kvm <removed>
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283926
        TODO: check affected versions
 CVE-2015-8617 [format string vulnerability]
+       RESERVED
        - php7.0 <unfixed>
        NOTE: https://bugs.php.net/bug.php?id=71105
        NOTE: 
https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e 
(php-7.0.2RC1)
 CVE-2015-8616 [Use after free in PHP Collator::sortWithSortKeys function]
+       RESERVED
        - php7.0 7.0.1-1
        NOTE: https://bugs.php.net/bug.php?id=71020
        NOTE: http://www.openwall.com/lists/oss-security/2015/12/22/4
@@ -78,6 +481,7 @@
        NOTE: http://www.openwall.com/lists/oss-security/2015/12/21/7
        TODO: check
 CVE-2015-8618 [math/big: fix carry propagation in Int.Exp Montgomery code]
+       RESERVED
        - golang <unfixed>
        [jessie] - golang <not-affected> (Introduced in 1.5 release)
        [wheezy] - golang <not-affected> (Introduced in 1.5 release)
@@ -85,6 +489,7 @@
        NOTE: Introduced in 1.5 release. Fixed in 1.5.3 upstream.
        NOTE: http://www.openwall.com/lists/oss-security/2015/12/21/6
 CVE-2015-8615 [XSA-169: ioreq handling possibly susceptible to multiple read 
issue]
+       RESERVED
        - xen <unfixed>
        [jessie] - xen <not-affected> (Only affects 4.6)
        [wheezy] - xen <not-affected> (Only affects 4.6)
@@ -2607,8 +3012,7 @@
        TODO: check
 CVE-2015-8376
        RESERVED
-CVE-2015-8373
-       RESERVED
+CVE-2015-8373 (The kea-dhcp4 and kea-dhcp6 servers 0.9.2 and 1.0.0-beta in ISC 
Kea, ...)
        - isc-kea-dhcp-server <itp> (bug #759703)
 CVE-2015-8372
        RESERVED
@@ -3076,7 +3480,7 @@
        NOTE: Introduced by: 
https://git.gnome.org/browse/libxml2/commit/?id=826bc320206f70fccd2941a77d363e95e8076898
 (v2.9.2-rc1)
        NOTE: Fixed by: 
https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2
 (v2.9.3)
 CVE-2015-8241 (The xmlNextChar function in libxml2 2.9.2 does not properly 
check the ...)
-       {DLA-355-1}
+       {DSA-3430-1 DLA-355-1}
        - libxml2 2.9.3+dfsg1-1 (bug #806384)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756263
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
@@ -3302,7 +3706,7 @@
        NOTE: Introduced by: 
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec0d215f9420564fc8286dcf93d2d068bb53a07e
 (v2.6.26-rc9)
        NOTE: Fixed by: 
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
 (v4.4-rc4)
 CVE-2015-8317 (The xmlParseXMLDecl function in parser.c in libxml2 before 
2.9.3 ...)
-       {DLA-355-1}
+       {DSA-3430-1 DLA-355-1}
        - libxml2 2.9.2+zdfsg1-4
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=751631
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e
@@ -3614,6 +4018,7 @@
 CVE-2015-8032
        RESERVED
 CVE-2015-8035 (The xz_decomp function in xzlib.c in libxml2 2.9.1 does not 
properly ...)
+       {DSA-3430-1}
        - libxml2 2.9.3+dfsg1-1 (bug #803942)
        [squeeze] - libxml2 <not-affected> (No LZMA/XZ support in version 2.7.8)
        NOTE: Upstream patch: 
https://git.gnome.org/browse/libxml2/commit/?id=f0709e3ca8f8947f2d91ed34e92e38a4c23eae63
 (v2.9.3)
@@ -3927,10 +4332,10 @@
        RESERVED
 CVE-2015-7937 (Stack-based buffer overflow in the GoAhead Web Server on 
Schneider ...)
        TODO: check
-CVE-2015-7936
-       RESERVED
-CVE-2015-7935
-       RESERVED
+CVE-2015-7936 (Cross-site request forgery (CSRF) vulnerability in Motorola 
Solutions ...)
+       TODO: check
+CVE-2015-7935 (Motorola Solutions MOSCAD IP Gateway allows remote attackers to 
read ...)
+       TODO: check
 CVE-2015-7934
        RESERVED
 CVE-2015-7933
@@ -3941,18 +4346,18 @@
        RESERVED
 CVE-2015-7930
        RESERVED
-CVE-2015-7929
-       RESERVED
-CVE-2015-7928
-       RESERVED
-CVE-2015-7927
-       RESERVED
-CVE-2015-7926
-       RESERVED
-CVE-2015-7925
-       RESERVED
-CVE-2015-7924
-       RESERVED
+CVE-2015-7929 (eWON devices with firmware through 10.1s0 support unspecified 
GET ...)
+       TODO: check
+CVE-2015-7928 (eWON devices with firmware before 10.1s0 do not have an off ...)
+       TODO: check
+CVE-2015-7927 (Cross-site scripting (XSS) vulnerability on eWON devices with 
firmware ...)
+       TODO: check
+CVE-2015-7926 (eWON devices with firmware before 10.1s0 omit RBAC for I/O 
server ...)
+       TODO: check
+CVE-2015-7925 (Cross-site request forgery (CSRF) vulnerability on eWON devices 
with ...)
+       TODO: check
+CVE-2015-7924 (eWON devices with firmware before 10.1s0 do not trigger the 
discarding ...)
+       TODO: check
 CVE-2015-7923
        RESERVED
 CVE-2015-7922
@@ -3965,8 +4370,8 @@
        TODO: check
 CVE-2015-7918 (Multiple buffer overflows in the F1BookView ActiveX control in 
F1 ...)
        NOT-FOR-US: F1BookView
-CVE-2015-7917
-       RESERVED
+CVE-2015-7917 (Untrusted search path vulnerability in Open Automation OPC 
Systems.NET ...)
+       TODO: check
 CVE-2015-7916
        RESERVED
 CVE-2015-7915
@@ -3977,8 +4382,8 @@
        NOT-FOR-US: AggreGate
 CVE-2015-7912 (The Ice Faces servlet in ag_server_service.exe in the AggreGate 
Server ...)
        NOT-FOR-US: AggreGate
-CVE-2015-7911
-       RESERVED
+CVE-2015-7911 (Saia Burgess PCD1.M0xx0, PCD1.M2xx0, PCD2.M5xx0, PCD3.Mxx60, 
...)
+       TODO: check
 CVE-2015-7910 (Exemys Telemetry Web Server relies on an HTTP Location header 
to ...)
        NOT-FOR-US: Exemys
 CVE-2015-7909
@@ -5220,19 +5625,23 @@
 CVE-2015-7501
        RESERVED
 CVE-2015-7500 (The xmlParseMisc function in parser.c in libxml2 before 2.9.3 
allows ...)
+       {DSA-3430-1}
        - libxml2 2.9.3+dfsg1-1
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f
 (v2.9.3)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756525 (upstream bug 
not yet open)
 CVE-2015-7499 (Heap-based buffer overflow in the xmlGROW function in parser.c 
in ...)
+       {DSA-3430-1}
        - libxml2 2.9.3+dfsg1-1
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc
 (v2.9.3)
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
 (v2.9.3)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756479 (upstream bug 
not yet open)
 CVE-2015-7498 (Heap-based buffer overflow in the xmlParseXmlDecl function in 
parser.c ...)
+       {DSA-3430-1}
        - libxml2 2.9.3+dfsg1-1
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43
 (v2.9.3)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756527 (upstream bug 
not yet open)
 CVE-2015-7497 (Heap-based buffer overflow in the xmlDictComputeFastQKey 
function in ...)
+       {DSA-3430-1}
        - libxml2 2.9.3+dfsg1-1
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
 (v2.9.3)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756528 (upstream bug 
not yet open)
@@ -6747,8 +7156,7 @@
 CVE-2015-6852
        RESERVED
        NOT-FOR-US: EMC Secure Remote Services Virtual Edition
-CVE-2015-6851
-       RESERVED
+CVE-2015-6851 (EMC RSA SecurID Web Agent before 8.0 allows physically 
proximate ...)
        NOT-FOR-US: RSA SecurID
 CVE-2015-6850
        RESERVED
@@ -7898,8 +8306,8 @@
        RESERVED
 CVE-2015-6472
        RESERVED
-CVE-2015-6471
-       RESERVED
+CVE-2015-6471 (Eaton Cooper Power Systems ProView 4.x and 5.x before 5.1 on 
Form 6 ...)
+       TODO: check
 CVE-2015-6470 (Resource Data Management Data Manager before 2.2 allows remote 
...)
        NOT-FOR-US: Resource Data Manager
 CVE-2015-6469 (The interpreter in IBC Solar ServeMaster TLP+ and Danfoss TLX 
Pro+ ...)
@@ -7978,8 +8386,8 @@
        RESERVED
 CVE-2015-6432
        RESERVED
-CVE-2015-6431
-       RESERVED
+CVE-2015-6431 (Cisco IOS XE 16.1.1 allows remote attackers to cause a denial 
of ...)
+       TODO: check
 CVE-2015-6430
        RESERVED
 CVE-2015-6429 (The IKEv1 state machine in Cisco IOS 15.4 through 15.6 and IOS 
XE 3.15 ...)
@@ -10981,6 +11389,7 @@
        NOTE: Broken by: 
https://libvirt.org/git/?p=libvirt.git;a=commit;h=c930410bebae0a45889b992a7932c663b06cbbcd
 (v1.1.0-rc1)
        NOTE: http://security.libvirt.org/2015/0004.html
 CVE-2015-5312 (The xmlStringLenDecodeEntities function in parser.c in libxml2 
before ...)
+       {DSA-3430-1}
        - libxml2 2.9.3+dfsg1-1
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e
 (v2.9.3)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756733 (upstream bug 
not yet open)
@@ -16648,14 +17057,14 @@
        NOTE: Fixed by: 
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543
        NOTE: http://www.openwall.com/lists/oss-security/2015/04/20/1
 CVE-2015-7942 (The xmlParseConditionalSections function in parser.c in libxml2 
does ...)
-       {DLA-334-1}
+       {DSA-3430-1 DLA-334-1}
        - libxml2 2.9.3+dfsg1-1 (bug #802827)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=744980#c8
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756456#c0
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=bd0526e66a56e75a18da8c15c4750db8f801c52d
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=41ac9049a27f52e7a1f3b341f8714149fc88d450
 CVE-2015-7941 (libxml2 2.9.2 does not properly stop parsing invalid input, 
which ...)
-       {DLA-266-1}
+       {DSA-3430-1 DLA-266-1}
        - libxml2 2.9.2+really2.9.1+dfsg1-0.1 (bug #783010)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=744980
        NOTE: http://www.openwall.com/lists/oss-security/2015/04/19/5
@@ -21424,7 +21833,7 @@
        NOTE: https://github.com/rest-client/rest-client/issues/369
        NOTE: Patch: https://github.com/rest-client/rest-client/pull/365.patch 
(will need new dependency to ruby-http-cookie)
 CVE-2015-1819 (The xmlreader in libxml allows remote attackers to cause a 
denial of ...)
-       {DLA-266-1}
+       {DSA-3430-1 DLA-266-1}
        - libxml2 2.9.2+really2.9.1+dfsg1-0.1 (low; bug #782782)
        NOTE: 
https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9
        NOTE: Concerns by Florian Weimer: 
https://bugzilla.gnome.org/show_bug.cgi?id=748278


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to