Author: sectracker Date: 2017-01-21 09:10:12 +0000 (Sat, 21 Jan 2017) New Revision: 48255
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2017-01-21 07:50:47 UTC (rev 48254) +++ data/CVE/list 2017-01-21 09:10:12 UTC (rev 48255) @@ -12744,11 +12744,13 @@ NOTE: https://hg.mozilla.org/projects/nss/rev/7385cd821735 CVE-2016-9573 RESERVED + {DSA-3768-1} - openjpeg2 <unfixed> (bug #851422) NOTE: https://github.com/uclouvain/openjpeg/issues/863 NOTE: https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d CVE-2016-9572 RESERVED + {DSA-3768-1} - openjpeg2 <unfixed> (bug #851422) NOTE: https://github.com/uclouvain/openjpeg/issues/863 NOTE: https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d @@ -17002,6 +17004,7 @@ CVE-2016-8333 (An exploitable stack-based buffer overflow vulnerability exists in the ...) NOT-FOR-US: Iceni Argus CVE-2016-8332 (A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution ...) + {DSA-3768-1} - openjpeg2 2.1.2-1 NOTE: http://www.talosintelligence.com/reports/TALOS-2016-0193/ NOTE: https://github.com/uclouvain/openjpeg/pull/820 @@ -28152,7 +28155,7 @@ - chromium-browser 53.0.2785.89-1 [wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy) CVE-2016-5159 (Multiple integer overflows in OpenJPEG, as used in PDFium in Google ...) - {DSA-3660-1} + {DSA-3768-1 DSA-3660-1} - openjpeg2 2.1.2-1 - chromium-browser 53.0.2785.89-1 [wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits