Author: sectracker
Date: 2016-06-07 21:10:12 +0000 (Tue, 07 Jun 2016)
New Revision: 42385

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-06-07 20:33:42 UTC (rev 42384)
+++ data/CVE/list       2016-06-07 21:10:12 UTC (rev 42385)
@@ -1,3 +1,93 @@
+CVE-2016-5324
+       RESERVED
+CVE-2016-5323
+       RESERVED
+CVE-2016-5322
+       RESERVED
+CVE-2016-5321
+       RESERVED
+CVE-2016-5320
+       RESERVED
+CVE-2016-5317
+       RESERVED
+CVE-2016-5316
+       RESERVED
+CVE-2016-5315
+       RESERVED
+CVE-2016-5314
+       RESERVED
+CVE-2016-5313
+       RESERVED
+CVE-2016-5312
+       RESERVED
+CVE-2016-5311
+       RESERVED
+CVE-2016-5310
+       RESERVED
+CVE-2016-5309
+       RESERVED
+CVE-2016-5308
+       RESERVED
+CVE-2016-5307
+       RESERVED
+CVE-2016-5306
+       RESERVED
+CVE-2016-5305
+       RESERVED
+CVE-2016-5304
+       RESERVED
+CVE-2016-5303
+       RESERVED
+CVE-2016-5302
+       RESERVED
+CVE-2015-8913
+       RESERVED
+CVE-2015-8912
+       RESERVED
+CVE-2015-8911
+       RESERVED
+CVE-2015-8910
+       RESERVED
+CVE-2015-8909
+       RESERVED
+CVE-2015-8908
+       RESERVED
+CVE-2015-8907
+       RESERVED
+CVE-2015-8906
+       RESERVED
+CVE-2015-8905
+       RESERVED
+CVE-2015-8904
+       RESERVED
+CVE-2015-1000013
+       RESERVED
+CVE-2015-1000012
+       RESERVED
+CVE-2015-1000011
+       RESERVED
+CVE-2015-1000010
+       RESERVED
+CVE-2015-1000009
+       RESERVED
+CVE-2015-1000008
+       RESERVED
+CVE-2015-1000007
+       RESERVED
+CVE-2015-1000006
+       RESERVED
+CVE-2015-1000005
+       RESERVED
+CVE-2015-1000004
+       RESERVED
+CVE-2015-1000003
+       RESERVED
+CVE-2015-1000002
+       RESERVED
+CVE-2015-1000001
+       RESERVED
+CVE-2015-1000000
+       RESERVED
 CVE-2016-5299
        RESERVED
 CVE-2016-5298
@@ -109,6 +199,7 @@
 CVE-2016-5245
        RESERVED
 CVE-2016-4456 [GNUTLS-SA-2016-1]
+       RESERVED
        - gnutls28 3.4.13-1
        [jessie] - gnutls28 <not-affected> (Introduced in 3.4.12)
        NOTE: http://gnutls.org/security.html#GNUTLS-SA-2016-1
@@ -130,9 +221,11 @@
 CVE-2014-9855
        RESERVED
 CVE-2016-5319 [bmp2tiff: PackBitsEncode heap buffer overflow]
+       RESERVED
        - tiff <unfixed>
        - tiff3 <removed>
 CVE-2016-5318 [thumbnail: stack buffer overflow in _TIFFVGetField function]
+       RESERVED
        - tiff <unfixed>
        - tiff3 <removed>
        NOTE: Upstream will remove thumbnail from 4.0.7 release
@@ -143,6 +236,7 @@
        NOTE: https://github.com/arvidn/libtorrent/pull/782
 CVE-2016-5300 [use of too little entropy]
        RESERVED
+       {DSA-3597-1}
        - expat 2.1.1-3
 CVE-2016-5244 [rds: fix an infoleak in rds_inc_info_copy]
        RESERVED
@@ -152,8 +246,7 @@
        RESERVED
        - linux <unfixed>
        NOTE: https://patchwork.ozlabs.org/patch/629100/
-CVE-2016-5242 [arm: Host crash caused by VMID exhaustion]
-       RESERVED
+CVE-2016-5242 (The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x 
through 4.6.x ...)
        - xen <unfixed>
        [jessie] - xen <no-dsa> (Minor issue, can be fixed along in a future 
DSA)
        NOTE: http://xenbits.xen.org/xsa/advisory-181.html
@@ -795,6 +888,7 @@
        RESERVED
 CVE-2016-5108 [crash and potential code execution when processing QuickTime 
IMA files]
        RESERVED
+       {DSA-3598-1}
        - vlc 2.2.3-2 (bug #825728)
        [wheezy] - vlc <end-of-life> (Unsupported in wheezy-lts)
        NOTE: Details: http://www.openwall.com/lists/oss-security/2016/05/27/3
@@ -1214,13 +1308,11 @@
        - onionshare 0.8.1-2 (unimportant)
        [jessie] - onionshare <not-affected> (Vulnerable code not present)
        NOTE: Neutralised by kernel hardening (also contrib and non-free not 
supported)
-CVE-2016-4963 [Unsanitised driver domain input in libxl device handling]
-       RESERVED
+CVE-2016-4963 (The libxl device-handling in Xen through 4.6.x allows local OS 
guest ...)
        - xen <unfixed>
        [jessie] - xen <no-dsa> (Minor issue, too intrusive to backport)
        NOTE: http://xenbits.xen.org/xsa/advisory-178.html
-CVE-2016-4962 [Unsanitised guest input in libxl device handling code]
-       RESERVED
+CVE-2016-4962 (The libxl device-handling in Xen 4.6.x and earlier allows local 
OS ...)
        - xen <unfixed>
        [jessie] - xen <no-dsa> (Minor issue, can be fixed along in a future 
DSA)
        NOTE: http://xenbits.xen.org/xsa/advisory-175.html
@@ -2619,8 +2711,7 @@
 CVE-2016-4451
        RESERVED
        - foreman <itp> (bug #663101)
-CVE-2016-4450
-       RESERVED
+CVE-2016-4450 (os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 
1.11.1 ...)
        {DSA-3592-1}
        - nginx 1.10.1-1 (bug #825960)
        [wheezy] - nginx <not-affected> (Introduced in 1.3.9)
@@ -2680,8 +2771,7 @@
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1337502
 CVE-2016-4438
        RESERVED
-CVE-2016-4437 [information disclosure]
-       RESERVED
+CVE-2016-4437 (Apache Shiro before 1.2.5, when a cipher key has not been 
configured ...)
        - shiro <unfixed> (bug #826653)
        [jessie] - shiro <no-dsa> (Minor issue)
 CVE-2016-4436
@@ -8535,8 +8625,7 @@
        RESERVED
 CVE-2016-2336
        RESERVED
-CVE-2016-2335 [Out-of-bounds read vuilerability]
-       RESERVED
+CVE-2016-2335 (The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 
7zip ...)
        - p7zip 15.14.1+dfsg-2 (bug #824160)
        NOTE: http://www.talosintel.com/reports/TALOS-2016-0094/
 CVE-2016-2334 [Heap-buffer-overflow vulnerability]
@@ -8613,7 +8702,7 @@
        - librsvg 2.40.12-1
        NOTE: 
https://git.gnome.org/browse/librsvg/commit/?id=d1c9191949747f6dcfd207831d15dd4ba00e31f2
 (2.40.12)
 CVE-2016-4347
-       RESERVED
+       REJECTED
        NOTE: Will be rejected
 CVE-2016-4346 (Integer overflow in the str_pad function in 
ext/standard/string.c in ...)
        - php7.0 7.0.4-1
@@ -16693,6 +16782,7 @@
        NOTE: 
http://sourceforge.net/p/gdcm/gdcm/ci/e0dd1114c82d372dd905c029ddbee4e81ed01a89/
 CVE-2012-6702 [unanticipated internal calls to srand]
        RESERVED
+       {DSA-3597-1}
        - expat 2.1.1-3
 CVE-2012-6701 (Integer overflow in fs/aio.c in the Linux kernel before 3.4.1 
allows ...)
        - linux <not-affected> (Fixed in v3.2.19; which was before src:linux 
rename)
@@ -26451,8 +26541,7 @@
        NOT-FOR-US: IBM Security Guardium
 CVE-2015-5042 (IBM Emptoris Contract Management 9.5.0.x before 9.5.0.6 iFix15, 
...)
        TODO: check
-CVE-2015-5041
-       RESERVED
+CVE-2015-5041 (The J9 JVM in IBM SDK, Java Technology Edition 6 before SR16 
FP20, 6 ...)
        NOT-FOR-US: IBM JDK
 CVE-2015-5040 (Buffer overflow in IBM Domino 8.5.1 through 8.5.3 before 8.5.3 
FP6 ...)
        NOT-FOR-US: IBM Domino
@@ -29335,7 +29424,7 @@
        NOTE: https://lkml.org/lkml/2015/5/13/744
        NOTE: Not enabled in Debian kernels; staging drivers are not supported
 CVE-2015-4000 (The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite 
is ...)
-       {DSA-3339-1 DSA-3324-1 DSA-3316-1 DSA-3300-1 DSA-3287-1 DLA-303-1 
DLA-247-1}
+       {DSA-3339-1 DSA-3324-1 DSA-3316-1 DSA-3300-1 DSA-3287-1 DLA-507-1 
DLA-303-1 DLA-247-1}
        - openssl 1.0.2b-1
        - nss 2:3.19.1-1
        [squeeze] - nss <no-dsa> (no point in switching min key size so close 
to EOL)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to