Author: sectracker Date: 2016-12-13 21:10:16 +0000 (Tue, 13 Dec 2016) New Revision: 47038
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-12-13 21:07:34 UTC (rev 47037) +++ data/CVE/list 2016-12-13 21:10:16 UTC (rev 47038) @@ -1,3 +1,21 @@ +CVE-2016-9948 + RESERVED +CVE-2016-9947 + RESERVED +CVE-2016-9946 + RESERVED +CVE-2016-9945 + RESERVED +CVE-2016-9944 + RESERVED +CVE-2016-9943 + RESERVED +CVE-2016-9942 + RESERVED +CVE-2016-9941 + RESERVED +CVE-2016-9940 + RESERVED CVE-2016-XXXX [Incorrect signature verification] - simplesamlphp 1.14.11-1 NOTE: https://simplesamlphp.org/security/201612-02 @@ -6,9 +24,11 @@ - game-music-emu <unfixed> (bug #848071) NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html CVE-2016-9939 [denial-of-service in ASN1 decoder] + RESERVED - libcrypto++ <unfixed> (bug #848009) NOTE: https://github.com/weidai11/cryptopp/issues/346 CVE-2016-9932 [x86 CMPXCHG8B emulation fails to ignore operand size override] + RESERVED - xen <unfixed> (bug #848081) NOTE: https://xenbits.xen.org/xsa/advisory-200.html CVE-2016-9931 @@ -26,12 +46,14 @@ CVE-2016-9924 RESERVED CVE-2016-9936 [Use After Free in PHP7 unserialize()] + RESERVED - php7.0 7.0.14-1 NOTE: Fixed in PHP 7.0.14 and 7.1.0 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72978 NOTE: Fixed by: https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17 NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9935 [Invalid read when wddx decodes empty boolean element] + RESERVED - php7.0 7.0.14-1 - php5 <unfixed> NOTE: Fixed in PHP 5.6.29 and 7.0.14 @@ -39,6 +61,8 @@ NOTE: Fixed by: https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9934 [NULL Pointer Dereference in WDDX Packet Deserialization with PDORow] + RESERVED + {DSA-3732-1} - php7.0 7.0.13-1 - php5 <unfixed> NOTE: Fixed in PHP 5.6.28, 7.0.13 and 7.1.0 @@ -46,6 +70,8 @@ NOTE: Fixed by: https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9933 [imagefilltoborder stackoverflow on truecolor images] + RESERVED + {DSA-3732-1} - libgd2 2.2.2-29-g3c2b605-1 NOTE: https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e (gd-2.2.2) NOTE: Scope of CVE is only the missing "color < 0" test in older versions. @@ -56,14 +82,14 @@ NOTE: Fixed by: https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 -CVE-2016-9937 [AST-2016-008] +CVE-2016-9937 (An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x ...) - asterisk <not-affected> (Introduced in 13.12.0 but fixed with first version to unstable based on 13.12.1) NOTE: Vulnerability introduced in 13.12.0, but the first upload to unstable NOTE: versioned as 1:13.12.1~dfsg-1 via opus.patch removed the offending NOTE: function. Thus Debian was never vulnerable. NOTE: http://downloads.asterisk.org/pub/security/AST-2016-008.html NOTE: Cf. https://bugs.debian.org/847666 -CVE-2016-9938 [AST-2016-009] +CVE-2016-9938 (An issue was discovered in Asterisk Open Source 11.x before 11.25.1, ...) - asterisk <unfixed> (bug #847668) [jessie] - asterisk <no-dsa> (Minor issue) NOTE: http://downloads.asterisk.org/pub/security/AST-2016-009.html @@ -2024,6 +2050,7 @@ NOTE: Report: https://wiki.mozilla.org/images/0/09/Zlib-report.pdf CVE-2016-9844 [zipinfo buffer overflow] RESERVED + {DLA-741-1} - unzip 6.0-21 (bug #847486) [jessie] - unzip <no-dsa> (Minor issue) NOTE: https://launchpad.net/bugs/1643750 @@ -2031,6 +2058,7 @@ NOTE: Proposed patch in http://www.openwall.com/lists/oss-security/2016/12/05/19 CVE-2014-9913 [Buffer overflow in "unzip -l" via list_files() in list.c] RESERVED + {DLA-741-1} - unzip 6.0-21 (bug #847485) [jessie] - unzip <no-dsa> (Minor issue) NOTE: Upstream bug: http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450 @@ -10732,6 +10760,7 @@ NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/11 CVE-2016-9138 [Issues from Upstream bug #73147 still unfixed in 5.6.27 and 7.0.12] RESERVED + {DSA-3732-1} - php7.0 <unfixed> - php5 <unfixed> NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147 @@ -22528,6 +22557,7 @@ NOTE: Fixed by: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/8d175c4edfe7 CVE-2016-5240 RESERVED + {DLA-547-1} - graphicsmagick 1.3.24-1 NOTE: Fixed by: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/ddc999ec896c CVE-2016-5237 @@ -34855,7 +34885,7 @@ [squeeze] - xen <end-of-life> (Unsupported in Squeeze LTS) NOTE: http://xenbits.xen.org/xsa/advisory-167.html CVE-2016-1567 (chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer ...) - {DLA-414-1} + {DLA-742-1 DLA-414-1} - chrony 2.2.1-1 (low; bug #812923) [jessie] - chrony 1.30-2+deb8u2 NOTE: http://www.talosintel.com/reports/TALOS-2016-0071/ @@ -36107,6 +36137,7 @@ RESERVED CVE-2016-1252 RESERVED + {DSA-3733-1} - apt 1.4~beta2 [wheezy] - apt <not-affected> (Issue introduced in apt >= 0.9.8) NOTE: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1647467 _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits