Author: sectracker Date: 2017-03-27 21:10:11 +0000 (Mon, 27 Mar 2017) New Revision: 50104
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2017-03-27 21:04:05 UTC (rev 50103) +++ data/CVE/list 2017-03-27 21:10:11 UTC (rev 50104) @@ -1,7 +1,35 @@ -CVE-2017-7273 [HID: hid-cypress: validate length of report] +CVE-2017-7285 + RESERVED +CVE-2017-7284 + RESERVED +CVE-2017-7283 + RESERVED +CVE-2017-7282 + RESERVED +CVE-2017-7281 + RESERVED +CVE-2017-7280 + RESERVED +CVE-2017-7279 + RESERVED +CVE-2017-7278 + RESERVED +CVE-2017-7277 + RESERVED +CVE-2017-7276 + RESERVED +CVE-2017-7275 (The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows ...) + TODO: check +CVE-2017-7274 (The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in radare2 1.3.0 ...) + TODO: check +CVE-2017-7271 (Reflected Cross-site scripting (XSS) vulnerability in Yii Framework ...) + TODO: check +CVE-2017-7270 + RESERVED +CVE-2017-7273 (The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux ...) - linux 4.9.6-1 NOTE: Fixed by: https://git.kernel.org/linus/1ebb71143758f45dc0fa76e2f48429e13b16d110 -CVE-2017-7272 [Misbehavior of "fsockopen" may introduce a security threat] +CVE-2017-7272 (PHP through 7.1.3 enables potential SSRF in applications that accept an ...) - php7.1 <unfixed> - php7.0 <unfixed> - php5 <removed> @@ -333,8 +361,8 @@ - linux <unfixed> CVE-2017-7185 RESERVED -CVE-2017-7183 - RESERVED +CVE-2017-7183 (The TFTP server in ExtraPuTTY 0.30 and earlier allows remote attackers ...) + TODO: check CVE-2017-7182 RESERVED CVE-2017-7181 @@ -837,8 +865,8 @@ RESERVED CVE-2017-6958 (An XSS vulnerability in the MantisBT Source Integration Plugin (before ...) NOT-FOR-US: MantisBT Source Integration Plugin -CVE-2017-6957 - RESERVED +CVE-2017-6957 (Stack-based buffer overflow in the firmware in Broadcom Wi-Fi HardMAC ...) + TODO: check CVE-2017-6956 RESERVED CVE-2017-6955 (An issue was discovered in by-email/by-email.php in the Invite Anyone ...) @@ -1003,8 +1031,8 @@ NOT-FOR-US: Cerberus FTP Server CVE-2017-6879 RESERVED -CVE-2017-6878 - RESERVED +CVE-2017-6878 (Cross-site scripting (XSS) vulnerability in MetInfo 5.3.15 allows ...) + TODO: check CVE-2017-6877 (Cross-site scripting (XSS) vulnerability in SVG file handling in Lutim ...) NOT-FOR-US: Lutim CVE-2017-6876 @@ -1168,8 +1196,7 @@ CVE-2017-XXXX [Server certificates are not verified] - profanity <unfixed> (bug #857546) NOTE: https://github.com/boothj5/profanity/issues/280 -CVE-2017-7191 [irssi use after free condition during netjoin processing] - RESERVED +CVE-2017-7191 (The netjoin processing in Irssi 1.x before 1.0.2 allows attackers to ...) - irssi 1.0.2-1 (bug #857502) [jessie] - irssi <not-affected> (Different code path caused the netjoins to be flushed prior reaching use-after-free condition) [wheezy] - irssi <not-affected> (Different code path caused the netjoins to be flushed prior reaching use-after-free condition) @@ -1750,8 +1777,7 @@ NOT-FOR-US: wuhu CVE-2017-6543 (Tenable Nessus before 6.10.2 (as used alone or in Tenable Appliance ...) NOT-FOR-US: Nessus -CVE-2017-6542 - RESERVED +CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows remote ...) - putty 0.67-3 (bug #857642) NOTE: http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html NOTE: Fixed by: https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8 (0.68) @@ -2028,31 +2054,25 @@ NOT-FOR-US: F-Secure CVE-2017-6465 (Remote Code Execution was discovered in FTPShell Client 6.53. By ...) NOT-FOR-US: FTPShell Client -CVE-2017-6464 [Denial of Service via Malformed Config] - RESERVED +CVE-2017-6464 (NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to ...) - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3389 -CVE-2017-6463 [Authenticated DoS via Malicious Config Option] - RESERVED +CVE-2017-6463 (NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote ...) - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3387 -CVE-2017-6462 [Buffer Overflow in DPTS Clock] - RESERVED +CVE-2017-6462 (Buffer overflow in the legacy Datum Programmable Time Server (DPTS) ...) - ntp 1:4.2.8p10+dfsg-1 [wheezy] - ntp <no-dsa> (Minor issue) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3388 CVE-2017-6461 REJECTED -CVE-2017-6460 [Buffer Overflow in ntpq when fetching reslist] - RESERVED +CVE-2017-6460 (Stack-based buffer overflow in the reslist function in ntpq in NTP ...) - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3377 -CVE-2017-6459 [Windows Installer: Data Structure terminated insufficiently] - RESERVED +CVE-2017-6459 (The Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 ...) - ntp <not-affected> (NTP on Windows) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3382 -CVE-2017-6458 [Potential Overflows in ctl_put() functions] - RESERVED +CVE-2017-6458 (Multiple buffer overflows in the ctl_put* functions in NTP before ...) - ntp 1:4.2.8p10+dfsg-1 [wheezy] - ntp <no-dsa> (Minor issue) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3379 @@ -2062,20 +2082,17 @@ REJECTED CVE-2017-6456 REJECTED -CVE-2017-6455 [Windows: Privileged execution of User Library code] - RESERVED +CVE-2017-6455 (NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, allows ...) - ntp <not-affected> (NTP on Windows) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3384 CVE-2017-6454 REJECTED CVE-2017-6453 REJECTED -CVE-2017-6452 [Windows Installer: Stack Buffer Overflow from Command Line] - RESERVED +CVE-2017-6452 (Stack-based buffer overflow in the Windows installer for NTP before ...) - ntp <not-affected> (NTP on Windows) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3383 -CVE-2017-6451 [Improper use of snprintf() in mx4200_send()] - RESERVED +CVE-2017-6451 (The mx4200_send function in the legacy MX4200 refclock in NTP before ...) - ntp <not-affected> (Vulnerable code not enabled at build time) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3378 CVE-2017-6450 @@ -3450,8 +3467,7 @@ CVE-2017-5974 (Heap-based buffer overflow in the __zzip_get32 function in fetch.c in ...) - zziplib <unfixed> (bug #854727) NOTE: http://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c/ -CVE-2017-5973 [Qemu: usb: infinite loop while doing control transfer in xhci_kick_epctx] - RESERVED +CVE-2017-5973 (The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick ...) {DLA-845-1 DLA-842-1} - qemu 1:2.8+dfsg-3 (bug #855611) [jessie] - qemu <no-dsa> (Minor issue) @@ -3462,8 +3478,7 @@ - linux 4.4.2-1 [jessie] - linux <no-dsa> (Known perfomance limitation) [wheezy] - linux <no-dsa> (Known perfomance limitation) -CVE-2016-10225 - RESERVED +CVE-2016-10225 (The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and ...) NOT-FOR-US: sunxi-debug driver in Allwinner kernel CVE-2016-10224 (An issue was discovered in Sauter NovaWeb web HMI. The application uses ...) NOT-FOR-US: Sauter NovaWeb @@ -3592,15 +3607,13 @@ NOT-FOR-US: A10 CVE-2016-10212 (Radware devices use the same value for the first two GCM nonces, which ...) NOT-FOR-US: Radware devices -CVE-2017-5932 [code execution in autocompletion] - RESERVED +CVE-2017-5932 (The path autocompletion feature in Bash 4.4 allows local users to gain ...) - bash 4.4-3 [jessie] - bash <not-affected> (Introduced in 4.4) [wheezy] - bash <not-affected> (Introduced in 4.4) NOTE: https://github.com/jheyens/bash_completion_vuln/raw/master/2017-01-17.bash_completion_report.pdf NOTE: Fix http://git.savannah.gnu.org/cgit/bash.git/commit/?id=4f747edc625815f449048579f6e65869914dd715 -CVE-2017-5931 - RESERVED +CVE-2017-5931 (Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick ...) - qemu 1:2.8+dfsg-3 (bug #854730) [jessie] - qemu <not-affected> (Vulnerable code not present) [wheezy] - qemu <not-affected> (Vulnerable code not present) @@ -4188,7 +4201,7 @@ NOTE: https://github.com/libevent/libevent/issues/317 NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/17 CVE-2017-5848 (The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in ...) - {DLA-830-1} + {DSA-3818-1 DLA-830-1} - gst-plugins-bad1.0 1.10.4-1 (low) - gst-plugins-bad0.10 <unfixed> (low) [jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue) @@ -4196,7 +4209,7 @@ NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777957 NOTE: Patch: https://bugzilla.gnome.org/show_bug.cgi?id=777957#c3 CVE-2017-5847 (The gst_asf_demux_process_ext_content_desc function in ...) - {DLA-829-1} + {DSA-3821-1 DLA-829-1} - gst-plugins-ugly1.0 1.10.4-1 (low) - gst-plugins-ugly0.10 <unfixed> (low) [jessie] - gst-plugins-ugly0.10 <no-dsa> (Minor issue) @@ -4204,72 +4217,78 @@ NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777955 NOTE: https://github.com/GStreamer/gst-plugins-ugly/commit/d21017b52a585f145e8d62781bcc1c5fefc7ee37 CVE-2017-5846 (The gst_asf_demux_process_ext_stream_props function in ...) - {DLA-829-1} + {DSA-3821-1 DLA-829-1} - gst-plugins-ugly1.0 1.10.3-1 (low) - gst-plugins-ugly0.10 <unfixed> (low) [jessie] - gst-plugins-ugly0.10 <no-dsa> (Minor issue) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777937 CVE-2017-5845 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in ...) + {DSA-3820-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <not-affected> (Vulnerable code not present) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777532 CVE-2017-5844 (The gst_riff_create_audio_caps function in ...) - {DLA-827-1} + {DSA-3819-1 DLA-827-1} - gst-plugins-base1.0 1.10.3-1 (low) - gst-plugins-base0.10 <unfixed> (low) [jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777525 CVE-2017-5843 (Multiple use-after-free vulnerabilities in the (1) ...) - {DLA-830-1} + {DSA-3818-1 DLA-830-1} - gst-plugins-bad1.0 1.10.3-1 - gst-plugins-bad0.10 <unfixed> (low) [jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777503 CVE-2017-5842 (The html_context_handle_element function in gst/subparse/samiparse.c ...) + {DSA-3819-1} - gst-plugins-base1.0 1.10.3-1 - gst-plugins-base0.10 <not-affected> (Vulnerable code not present) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777502 CVE-2017-5841 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in ...) + {DSA-3820-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <not-affected> (Vulnerable code not present) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777500 CVE-2017-5840 (The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in ...) - {DLA-828-1} + {DSA-3820-1 DLA-828-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <unfixed> (low) [jessie] - gst-plugins-good0.10 <no-dsa> (Minor issue) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777469 CVE-2017-5839 (The gst_riff_create_audio_caps function in ...) + {DSA-3819-1} - gst-plugins-base1.0 1.10.3-1 - gst-plugins-base0.10 <not-affected> (Vulnerable code not present) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777265 CVE-2017-5838 (The gst_date_time_new_from_iso8601_string function in ...) + {DSA-3822-1} - gstreamer1.0 1.10.3-1 (low) - gstreamer0.10 <not-affected> (Vulnerable code not present) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777263 CVE-2017-5837 (The gst_riff_create_audio_caps function in ...) - {DLA-827-1} + {DSA-3819-1 DLA-827-1} - gst-plugins-base1.0 1.10.3-1 (low) - gst-plugins-base0.10 <unfixed> (low) [jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777262 CVE-2016-10199 (The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in ...) + {DSA-3820-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <not-affected> (Vulnerable code not present) NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775451 CVE-2016-10198 (The gst_aac_parse_sink_setcaps function in ...) - {DLA-828-1} + {DSA-3820-1 DLA-828-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <unfixed> (low) [jessie] - gst-plugins-good0.10 <no-dsa> (Minor issue) @@ -4369,8 +4388,7 @@ NOTE: http://www.openwall.com/lists/oss-security/2017/02/02/2 NOTE: Debian uses an unaffected fork: NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2654#c8 -CVE-2017-5850 - RESERVED +CVE-2017-5850 (httpd in OpenBSD allows remote attackers to cause a denial of service ...) NOT-FOR-US: OpenBSD httpd CVE-2017-5833 (Cross-site scripting (XSS) vulnerability in the invocation code ...) NOT-FOR-US: Revive Adserver @@ -4598,8 +4616,7 @@ NOTE: Upstream report: https://launchpad.net/bugs/1651728 NOTE: Upstream fix: https://github.com/kovidgoyal/calibre/commit/3a89718664cb8cce0449d1758eee585ed0d0433c NOTE: http://www.openwall.com/lists/oss-security/2017/01/29/8 -CVE-2017-5899 [s-nail local root privilege escalation] - RESERVED +CVE-2017-5899 (Directory traversal vulnerability in the setuid root helper binary in ...) - s-nail 14.8.16-1 (bug #852934) NOTE: https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160 @@ -6144,8 +6161,7 @@ [jessie] - gnutls28 <no-dsa> (Minor issue, will be fixed via point update) NOTE: https://gnutls.org/security.html#GNUTLS-SA-2017-1 NOTE: https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b -CVE-2017-5330 [unintended execution of scripts and executable files] - RESERVED +CVE-2017-5330 (ark before 16.12.1 might allow remote attackers to execute arbitrary ...) - ark 4:16.08.3-2 (bug #850874) [jessie] - ark <not-affected> (Vulnerable code introduced later) [wheezy] - ark <not-affected> (Vulnerable code introduced later) @@ -9938,8 +9954,7 @@ [wheezy] - qemu-kvm <no-dsa> (Minor issue) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05597.html NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=a4afa548fc6dd9842ed86639b4d37d4d1c4ad480 (v2.8.0-rc0) -CVE-2016-9922 [display: cirrus_vga: a divide by zero in cirrus_do_copy] - RESERVED +CVE-2016-9922 (The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka ...) {DLA-765-1 DLA-764-1} - qemu 1:2.8+dfsg-1 (bug #847960) [jessie] - qemu <no-dsa> (Minor issue) @@ -18128,7 +18143,7 @@ NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1035 CVE-2016-9601 [Heap-buffer overflow due to Integer overflow in jbig2_image_new function] RESERVED - {DSA-3817-1} + {DSA-3817-1 DLA-874-1} - jbig2dec 0.13-4 (bug #850497) NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=697457 NOTE: Patch: http://git.ghostscript.com/?p=jbig2dec.git;a=commitdiff;h=e698d5c11d27212aa1098bc5b1673a3378563092 @@ -18554,15 +18569,17 @@ [jessie] - salt <no-dsa> (Minor issue) NOTE: http://www.openwall.com/lists/oss-security/2016/11/25/2 CVE-2016-9813 (The _parse_pat function in the mpegts parser in GStreamer before ...) + {DSA-3818-1} - gst-plugins-bad1.0 1.10.2-1 (low) - gst-plugins-bad0.10 <not-affected> (Vulnerable code introduced in 1.1.1 of 1.0 series) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775120 CVE-2016-9812 (The gst_mpegts_section_new function in the mpegts decoder in GStreamer ...) + {DSA-3818-1} - gst-plugins-bad1.0 1.10.2-1 (low) - gst-plugins-bad0.10 <not-affected> (Vulnerable code introduced in 1.1.1 of 1.0 series) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775048 CVE-2016-9811 (The windows_icon_typefind function in gst-plugins-base in GStreamer ...) - {DLA-735-1} + {DSA-3819-1 DLA-735-1} - gst-plugins-base1.0 1.10.2-1 - gst-plugins-base0.10 <removed> [jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue, can be fixed via point release) @@ -18575,7 +18592,7 @@ [wheezy] - gst-plugins-good0.10 0.10.31-3+nmu1+deb7u1 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774897 CVE-2016-9809 (Off-by-one error in the gst_h264_parse_set_caps function in GStreamer ...) - {DLA-736-1} + {DSA-3818-1 DLA-736-1} - gst-plugins-bad1.0 1.10.2-1 - gst-plugins-bad0.10 <removed> [jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue, can be fixed via point release) @@ -19668,8 +19685,8 @@ RESERVED CVE-2016-9253 RESERVED -CVE-2016-9252 - RESERVED +CVE-2016-9252 (The Traffic Management Microkernel (TMM) in F5 BIG-IP before 11.5.4 ...) + TODO: check CVE-2016-9251 RESERVED CVE-2016-9250 @@ -19687,8 +19704,7 @@ CVE-2016-9244 (A BIG-IP virtual server configured with a Client SSL profile that has ...) NOT-FOR-US: F5 TLS stack NOTE: https://ticketbleed.com/ -CVE-2016-9243 [HKDF might return an empty byte-string] - RESERVED +CVE-2016-9243 (HKDF in cryptography before 1.5.2 returns an empty byte-string if used ...) - python-cryptography 1.5.3-1 [jessie] - python-cryptography <no-dsa> (Minor issue) NOTE: Upstream bug: https://github.com/pyca/cryptography/issues/3211 @@ -21204,7 +21220,7 @@ [wheezy] - openssh <no-dsa> (Minor issue) NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup NOTE: Only thing the attacker could do here is self-dos own connection -CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in ...) +CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.6+dfsg-1 (bug #845634) NOTE: https://blogs.gentoo.org/ago/2016/10/17/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c/ @@ -25195,8 +25211,8 @@ RESERVED CVE-2016-7475 RESERVED -CVE-2016-7474 - RESERVED +CVE-2016-7474 (In some cases the MCPD binary cache in F5 BIG-IP devices may allow a ...) + TODO: check CVE-2016-7473 RESERVED CVE-2016-7472 @@ -29382,9 +29398,9 @@ NOT-FOR-US: Joomla extension HugeIT slideshow CVE-2016-1000117 (XSS & SQLi in HugeIT slideshow v1.0.4 ...) NOT-FOR-US: Joomla extension HugeIT slideshow -CVE-2016-1000116 (Huge-IT Portfolio Gallery manager v1.1.5 SQL Injection and XSS ...) +CVE-2016-1000116 (Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and XSS ...) NOT-FOR-US: Joomla extension Huge-IT Portfolio Gallery manager -CVE-2016-1000115 (Huge-IT Portfolio Gallery manager v1.1.5 SQL Injection and XSS ...) +CVE-2016-1000115 (Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and XSS ...) NOT-FOR-US: Joomla extension Huge-IT Portfolio Gallery manager CVE-2016-1000114 (XSS in huge IT gallery v1.1.5 for Joomla ...) NOT-FOR-US: Joomla extension huge IT gallery @@ -34736,8 +34752,7 @@ {DSA-3607-1 DLA-516-1} - linux 4.5.4-1 NOTE: Fixed by: https://git.kernel.org/linus/99d825822eade8d827a1817357cbf3f889a552d6 (v4.6) -CVE-2016-4912 - RESERVED +CVE-2016-4912 (The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows ...) - openslp-dfsg <not-affected> (Vulnerable code not present) NOTE: Issue present only in OpenSLP 2.x where the return from malloc isn't checked. CVE-2016-4911 (The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x ...) @@ -45851,16 +45866,13 @@ NOTE: https://kb.isc.org/article/AA-01348 CVE-2016-1505 (The filesystem storage backend in Radicale before 1.1 on Windows ...) - radicale <not-affected> (Only an issue on MS Windows) -CVE-2015-8764 [one byte buffer overrun] - RESERVED +CVE-2015-8764 (Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through ...) - freeradius <not-affected> (Affects 3.0 up to 3.0.8) NOTE: http://freeradius.org/security.html#eap-pwd-2015 -CVE-2015-8763 [commit/confirm message payload length is not validated] - RESERVED +CVE-2015-8763 (The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote ...) - freeradius <not-affected> (Affects 3.0 up to 3.0.8) NOTE: http://freeradius.org/security.html#eap-pwd-2015 -CVE-2015-8762 [The EAP-PWD packet length is not checked before the first byte is dereferenced] - RESERVED +CVE-2015-8762 (The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote ...) - freeradius <not-affected> (Affects 3.0 up to 3.0.8) NOTE: http://freeradius.org/security.html#eap-pwd-2015 CVE-2015-8751 @@ -46696,7 +46708,7 @@ NOT-FOR-US: Huawei CVE-2015-8680 (The Graphics driver in Huawei P8 smartphones with software GRA-TL00 ...) NOT-FOR-US: Huawei -CVE-2015-8679 (The (1) ION and (2) Maxim_smartpa_dev drivers in Huawei P8 smartphones ...) +CVE-2015-8679 (The Maxim_smartpa_dev driver in Huawei P8 smartphones with software ...) NOT-FOR-US: Huawei CVE-2015-8678 (The ION driver in Huawei P8 smartphones with software GRA-TL00 before ...) NOT-FOR-US: ION driver in Huawei P8 smartphones @@ -50757,10 +50769,10 @@ NOTE: http://rt.central.org/rt/Ticket/Display.html?id=132256 CVE-2015-8311 RESERVED -CVE-2015-8310 - RESERVED -CVE-2015-8309 - RESERVED +CVE-2015-8310 (Cross-site scripting (XSS) vulnerability in Cherry Music before 0.36.0 ...) + TODO: check +CVE-2015-8309 (Directory traversal vulnerability in Cherry Music before 0.36.0 allows ...) + TODO: check CVE-2015-8307 (The Graphics driver in Huawei P8 smartphones with software GRA-TL00 ...) NOT-FOR-US: Huawei CVE-2015-8306 (Buffer overflow in the HIFI driver in Huawei P8 phones with software ...) @@ -51845,8 +51857,7 @@ NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=16009 NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed NOTE: http://openwall.com/lists/oss-security/2015/09/08/2 -CVE-2015-8026 [Heap overflow] - RESERVED +CVE-2015-8026 (Heap-based buffer overflow in the verify_vbr_checksum function in ...) - exfat-utils 1.2.1-1 [jessie] - exfat-utils 1.1.0-2+deb8u1 [wheezy] - exfat-utils 0.9.7-2+deb7u1 @@ -51867,8 +51878,7 @@ NOTE: https://crashes.fuzzing-project.org/exfatfsck-endless-loop NOTE: https://github.com/relan/exfat/commit/35a1f77f9be2d8b21731f758baba4334935bf18b NOTE: will possibly not get a CVE, cf. http://www.openwall.com/lists/oss-security/2015/10/29/13 -CVE-2015-8010 [XSS in the Icinga Classic-UI] - RESERVED +CVE-2015-8010 (Cross-site scripting (XSS) vulnerability in the Classic-UI with the ...) - icinga 1.13.3-3 (bug #803432) [jessie] - icinga <no-dsa> (Minor issue) [wheezy] - icinga <no-dsa> (Minor issue) @@ -73202,10 +73212,10 @@ NOT-FOR-US: ZOHO ManageEngine SupportCenter Plus CVE-2015-0865 RESERVED -CVE-2015-0864 - RESERVED -CVE-2015-0863 - RESERVED +CVE-2015-0864 (Samsung Account (AKA com.osp.app.signin) before 1.6.0069 and 2.x ...) + TODO: check +CVE-2015-0863 (GALAXY Apps (aka Samsung Apps, Samsung Updates, or ...) + TODO: check CVE-2015-0862 (Multiple cross-site scripting (XSS) vulnerabilities in the management ...) - rabbitmq-server 3.4.3-1 [jessie] - rabbitmq-server <no-dsa> (Minor issue) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits