Author: carnil
Date: 2016-08-01 18:40:44 +0000 (Mon, 01 Aug 2016)
New Revision: 43704

Modified:
   data/CVE/list
Log:
Add remaining CVEs for wireshark

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-08-01 18:36:38 UTC (rev 43703)
+++ data/CVE/list       2016-08-01 18:40:44 UTC (rev 43704)
@@ -29,49 +29,56 @@
        RESERVED
 CVE-2016-6484
        RESERVED
-CVE-2016-XXXX [WBXML crash (wnpa-sec-2016-49)]
+CVE-2016-6513 [WBXML crash (wnpa-sec-2016-49)]
        - wireshark <unfixed>
        NOTE: Affects 2.0.0 to 2.0.4, fixed in 2.0.5
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-49.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12663
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
-CVE-2016-XXXX [MMSE, WAP, WBXML, and WSP infinite loop (wnpa-sec-2016-48)]
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=347f071f1b9180563c28b0f3d0627b91eb456c72
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
+CVE-2016-6512 [MMSE, WAP, WBXML, and WSP infinite loop (wnpa-sec-2016-48)]
        - wireshark <unfixed>
        NOTE: Affects 2.0.0 to 2.0.4, fixed in 2.0.5.
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-48.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
-CVE-2016-XXXX [OpenFlow long loop (wnpa-sec-2016-47)]
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2193bea3212d74e2a907152055e27d409b59485e
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
+CVE-2016-6511 [OpenFlow long loop (wnpa-sec-2016-47)]
        - wireshark <unfixed>
        NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 
1.12.13.
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-47.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
-CVE-2016-XXXX [RLC dissector crash (wnpa-sec-2016-46)]
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=56706427f53cc64793870bf072c2c06248ae88f3
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
+CVE-2016-6510 [RLC dissector crash (wnpa-sec-2016-46)]
        - wireshark <unfixed>
        NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 
1.12.13.
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-46.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
-CVE-2016-XXXX [LDSS dissector crash (wnpa-sec-2016-45)]
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=47a5fa850b388fcf4ea762073806f01b459820fe
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
+CVE-2016-6509 [LDSS dissector crash (wnpa-sec-2016-45)]
        - wireshark <unfixed>
        NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 
1.12.13.
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-45.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
-CVE-2016-XXXX [RLC long loop (wnpa-sec-2016-44)]
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5a469ddc893f7c1912d0e15cc73bd3011e6cc2fb
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
+CVE-2016-6508 [RLC long loop (wnpa-sec-2016-44)]
        - wireshark <unfixed>
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-44.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=6cf9616df68a4db7e436bb77392586ff9ad84feb
        NOTE: Affects  2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 
1.12.13.
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
-CVE-2016-XXXX [MMSE infinite loop (wnpa-sec-2016-43)]
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
+CVE-2016-6507 [MMSE infinite loop (wnpa-sec-2016-43)]
        - wireshark 2.0
        NOTE: Only affects 1.12, marking 2.0 as fixed
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-43.html
        NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
+       NOTE: 
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b5a10743258bd016c07ebf6479137fda3d172a0f
        NOTE: Affects 1.12.0 to 1.12.12, fixed 1.12.13
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/07/28/3
+       NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3
 CVE-2016-6506 [WSP infinite loop (wnpa-sec-2016-42)]
        - wireshark <unfixed>
        NOTE: https://www.wireshark.org/security/wnpa-sec-2016-42.html


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to