Author: carnil
Date: 2016-01-20 08:10:33 +0000 (Wed, 20 Jan 2016)
New Revision: 39033

Modified:
   data/CVE/list
   data/DLA/list
   data/next-oldstable-point-update.txt
   data/next-point-update.txt
Log:
CVE-2015-8777 assigned for glibc

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-01-20 08:07:11 UTC (rev 39032)
+++ data/CVE/list       2016-01-20 08:10:33 UTC (rev 39033)
@@ -9980,16 +9980,15 @@
        RESERVED
        - ruby-devise-two-factor 2.0.0-1 (bug #798466)
        NOTE: http://www.openwall.com/lists/oss-security/2015/09/06/2
-CVE-2015-XXXX [Glibc Pointer guarding weakness]
+CVE-2015-8777 [Glibc Pointer guarding weakness]
        - glibc 2.21-1 (bug #798316; bug #801691)
        [jessie] - glibc <no-dsa> (Minor issue)
        - eglibc <removed>
        [wheezy] - eglibc <no-dsa> (Minor issue)
        [squeeze] - eglibc 2.11.3-4+deb6u7
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/09/05/8
+       NOTE: http://www.openwall.com/lists/oss-security/2015/09/05/8
        NOTE: Upstream bug https://sourceware.org/bugzilla/show_bug.cgi?id=18928
        NOTE: 
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a014cecd82b71b70a6a843e250e06b541ad524f7
-       NOTE: Added workaround entry for DLA-316-1 until CVE assigned.
 CVE-2015-6815 [Qemu: net: e1000 infinite loop issue]
        RESERVED
        {DSA-3362-1 DSA-3361-1}

Modified: data/DLA/list
===================================================================
--- data/DLA/list       2016-01-20 08:07:11 UTC (rev 39032)
+++ data/DLA/list       2016-01-20 08:10:33 UTC (rev 39033)
@@ -237,7 +237,7 @@
        {CVE-2014-9638 CVE-2014-9639 CVE-2014-9640 CVE-2015-6749}
        [squeeze] - vorbis-tools 1.4.0-1+deb6u1
 [27 Sep 2015] DLA-316-1 eglibc - security update
-       {CVE-2014-8121}
+       {CVE-2014-8121 CVE-2015-8777}
        [squeeze] - eglibc 2.11.3-4+deb6u7
 [26 Sep 2015] DLA-315-1 nss - security update
        {CVE-2015-2721 CVE-2015-2730}

Modified: data/next-oldstable-point-update.txt
===================================================================
--- data/next-oldstable-point-update.txt        2016-01-20 08:07:11 UTC (rev 
39032)
+++ data/next-oldstable-point-update.txt        2016-01-20 08:10:33 UTC (rev 
39033)
@@ -27,7 +27,7 @@
        [wheezy] - postgresql-9.1 9.1.19-0+deb7u1
 CVE-2015-XXXX [multiple overflows in strxfrm()]
        [wheezy] - eglibc 2.13-38+deb7u9
-CVE-2015-XXXX [Glibc Pointer guarding weakness]
+CVE-2015-8777 [Glibc Pointer guarding weakness]
        [wheezy] - eglibc 2.13-38+deb7u9
 CVE-2015-XXXX [potential application crash due to overread in fnmatch]
        [wheezy] - eglibc 2.13-38+deb7u9

Modified: data/next-point-update.txt
===================================================================
--- data/next-point-update.txt  2016-01-20 08:07:11 UTC (rev 39032)
+++ data/next-point-update.txt  2016-01-20 08:10:33 UTC (rev 39033)
@@ -83,7 +83,7 @@
        [jessie] - glibc 2.19-18+deb8u2
 CVE-2014-8121
        [jessie] - glibc 2.19-18+deb8u2
-CVE-2015-XXXX [Glibc Pointer guarding weakness]
+CVE-2015-8777 [Glibc Pointer guarding weakness]
        [jessie] - glibc 2.19-18+deb8u2
 CVE-2015-XXXX [multiple overflows in strxfrm()]
        [jessie] - glibc 2.19-18+deb8u2


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to