Author: sectracker
Date: 2017-03-27 21:10:11 +0000 (Mon, 27 Mar 2017)
New Revision: 50104

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-03-27 21:04:05 UTC (rev 50103)
+++ data/CVE/list       2017-03-27 21:10:11 UTC (rev 50104)
@@ -1,7 +1,35 @@
-CVE-2017-7273 [HID: hid-cypress: validate length of report]
+CVE-2017-7285
+       RESERVED
+CVE-2017-7284
+       RESERVED
+CVE-2017-7283
+       RESERVED
+CVE-2017-7282
+       RESERVED
+CVE-2017-7281
+       RESERVED
+CVE-2017-7280
+       RESERVED
+CVE-2017-7279
+       RESERVED
+CVE-2017-7278
+       RESERVED
+CVE-2017-7277
+       RESERVED
+CVE-2017-7276
+       RESERVED
+CVE-2017-7275 (The ReadPCXImage function in coders/pcx.c in ImageMagick 
7.0.4.9 allows ...)
+       TODO: check
+CVE-2017-7274 (The r_pkcs7_parse_cms function in libr/util/r_pkcs7.c in 
radare2 1.3.0 ...)
+       TODO: check
+CVE-2017-7271 (Reflected Cross-site scripting (XSS) vulnerability in Yii 
Framework ...)
+       TODO: check
+CVE-2017-7270
+       RESERVED
+CVE-2017-7273 (The cp_report_fixup function in drivers/hid/hid-cypress.c in 
the Linux ...)
        - linux 4.9.6-1
        NOTE: Fixed by: 
https://git.kernel.org/linus/1ebb71143758f45dc0fa76e2f48429e13b16d110
-CVE-2017-7272 [Misbehavior of "fsockopen" may introduce a security threat]
+CVE-2017-7272 (PHP through 7.1.3 enables potential SSRF in applications that 
accept an ...)
        - php7.1 <unfixed>
        - php7.0 <unfixed>
        - php5 <removed>
@@ -333,8 +361,8 @@
        - linux <unfixed>
 CVE-2017-7185
        RESERVED
-CVE-2017-7183
-       RESERVED
+CVE-2017-7183 (The TFTP server in ExtraPuTTY 0.30 and earlier allows remote 
attackers ...)
+       TODO: check
 CVE-2017-7182
        RESERVED
 CVE-2017-7181
@@ -837,8 +865,8 @@
        RESERVED
 CVE-2017-6958 (An XSS vulnerability in the MantisBT Source Integration Plugin 
(before ...)
        NOT-FOR-US: MantisBT Source Integration Plugin
-CVE-2017-6957
-       RESERVED
+CVE-2017-6957 (Stack-based buffer overflow in the firmware in Broadcom Wi-Fi 
HardMAC ...)
+       TODO: check
 CVE-2017-6956
        RESERVED
 CVE-2017-6955 (An issue was discovered in by-email/by-email.php in the Invite 
Anyone ...)
@@ -1003,8 +1031,8 @@
        NOT-FOR-US: Cerberus FTP Server
 CVE-2017-6879
        RESERVED
-CVE-2017-6878
-       RESERVED
+CVE-2017-6878 (Cross-site scripting (XSS) vulnerability in MetInfo 5.3.15 
allows ...)
+       TODO: check
 CVE-2017-6877 (Cross-site scripting (XSS) vulnerability in SVG file handling 
in Lutim ...)
        NOT-FOR-US: Lutim
 CVE-2017-6876
@@ -1168,8 +1196,7 @@
 CVE-2017-XXXX [Server certificates are not verified]
        - profanity <unfixed> (bug #857546)
        NOTE: https://github.com/boothj5/profanity/issues/280
-CVE-2017-7191 [irssi use after free condition during netjoin processing]
-       RESERVED
+CVE-2017-7191 (The netjoin processing in Irssi 1.x before 1.0.2 allows 
attackers to ...)
        - irssi 1.0.2-1 (bug #857502)
        [jessie] - irssi <not-affected> (Different code path caused the 
netjoins to be flushed prior reaching use-after-free condition)
        [wheezy] - irssi <not-affected> (Different code path caused the 
netjoins to be flushed prior reaching use-after-free condition)
@@ -1750,8 +1777,7 @@
        NOT-FOR-US: wuhu
 CVE-2017-6543 (Tenable Nessus before 6.10.2 (as used alone or in Tenable 
Appliance ...)
        NOT-FOR-US: Nessus
-CVE-2017-6542
-       RESERVED
+CVE-2017-6542 (The ssh_agent_channel_data function in PuTTY before 0.68 allows 
remote ...)
        - putty 0.67-3 (bug #857642)
        NOTE: 
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
        NOTE: Fixed by: 
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
 (0.68)
@@ -2028,31 +2054,25 @@
        NOT-FOR-US: F-Secure
 CVE-2017-6465 (Remote Code Execution was discovered in FTPShell Client 6.53. 
By ...)
        NOT-FOR-US: FTPShell Client
-CVE-2017-6464 [Denial of Service via Malformed Config]
-       RESERVED
+CVE-2017-6464 (NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote 
attackers to ...)
        - ntp 1:4.2.8p10+dfsg-1
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3389
-CVE-2017-6463 [Authenticated DoS via Malicious Config Option]
-       RESERVED
+CVE-2017-6463 (NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote ...)
        - ntp 1:4.2.8p10+dfsg-1
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3387
-CVE-2017-6462 [Buffer Overflow in DPTS Clock]
-       RESERVED
+CVE-2017-6462 (Buffer overflow in the legacy Datum Programmable Time Server 
(DPTS) ...)
        - ntp 1:4.2.8p10+dfsg-1
        [wheezy] - ntp <no-dsa> (Minor issue)
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3388
 CVE-2017-6461
        REJECTED
-CVE-2017-6460 [Buffer Overflow in ntpq when fetching reslist]
-       RESERVED
+CVE-2017-6460 (Stack-based buffer overflow in the reslist function in ntpq in 
NTP ...)
        - ntp 1:4.2.8p10+dfsg-1
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3377
-CVE-2017-6459 [Windows Installer: Data Structure terminated insufficiently]
-       RESERVED
+CVE-2017-6459 (The Windows installer for NTP before 4.2.8p10 and 4.3.x before 
4.3.94 ...)
        - ntp <not-affected> (NTP on Windows)
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3382
-CVE-2017-6458 [Potential Overflows in ctl_put() functions]
-       RESERVED
+CVE-2017-6458 (Multiple buffer overflows in the ctl_put* functions in NTP 
before ...)
        - ntp 1:4.2.8p10+dfsg-1
        [wheezy] - ntp <no-dsa> (Minor issue)
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3379
@@ -2062,20 +2082,17 @@
        REJECTED
 CVE-2017-6456
        REJECTED
-CVE-2017-6455 [Windows: Privileged execution of User Library code]
-       RESERVED
+CVE-2017-6455 (NTP before 4.2.8p10 and 4.3.x before 4.3.94, when using PPSAPI, 
allows ...)
        - ntp <not-affected> (NTP on Windows)
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3384
 CVE-2017-6454
        REJECTED
 CVE-2017-6453
        REJECTED
-CVE-2017-6452 [Windows Installer: Stack Buffer Overflow from Command Line]
-       RESERVED
+CVE-2017-6452 (Stack-based buffer overflow in the Windows installer for NTP 
before ...)
        - ntp <not-affected> (NTP on Windows)
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3383
-CVE-2017-6451 [Improper use of snprintf() in mx4200_send()]
-       RESERVED
+CVE-2017-6451 (The mx4200_send function in the legacy MX4200 refclock in NTP 
before ...)
        - ntp <not-affected> (Vulnerable code not enabled at build time)
        NOTE: http://support.ntp.org/bin/view/Main/NtpBug3378
 CVE-2017-6450
@@ -3450,8 +3467,7 @@
 CVE-2017-5974 (Heap-based buffer overflow in the __zzip_get32 function in 
fetch.c in ...)
        - zziplib <unfixed> (bug #854727)
        NOTE: 
http://blogs.gentoo.org/ago/2017/02/09/zziplib-heap-based-buffer-overflow-in-__zzip_get32-fetch-c/
-CVE-2017-5973 [Qemu: usb: infinite loop while doing control transfer in 
xhci_kick_epctx]
-       RESERVED
+CVE-2017-5973 (The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka 
Quick ...)
        {DLA-845-1 DLA-842-1}
        - qemu 1:2.8+dfsg-3 (bug #855611)
        [jessie] - qemu <no-dsa> (Minor issue)
@@ -3462,8 +3478,7 @@
        - linux 4.4.2-1
        [jessie] - linux <no-dsa> (Known perfomance limitation)
        [wheezy] - linux <no-dsa> (Known perfomance limitation)
-CVE-2016-10225
-       RESERVED
+CVE-2016-10225 (The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, 
A83T and ...)
        NOT-FOR-US: sunxi-debug driver in Allwinner kernel
 CVE-2016-10224 (An issue was discovered in Sauter NovaWeb web HMI. The 
application uses ...)
        NOT-FOR-US: Sauter NovaWeb
@@ -3592,15 +3607,13 @@
        NOT-FOR-US: A10
 CVE-2016-10212 (Radware devices use the same value for the first two GCM 
nonces, which ...)
        NOT-FOR-US: Radware devices
-CVE-2017-5932 [code execution in autocompletion]
-       RESERVED
+CVE-2017-5932 (The path autocompletion feature in Bash 4.4 allows local users 
to gain ...)
        - bash 4.4-3
        [jessie] - bash <not-affected> (Introduced in 4.4)
        [wheezy] - bash <not-affected> (Introduced in 4.4)
        NOTE: 
https://github.com/jheyens/bash_completion_vuln/raw/master/2017-01-17.bash_completion_report.pdf
        NOTE: Fix 
http://git.savannah.gnu.org/cgit/bash.git/commit/?id=4f747edc625815f449048579f6e65869914dd715
-CVE-2017-5931
-       RESERVED
+CVE-2017-5931 (Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka 
Quick ...)
        - qemu 1:2.8+dfsg-3 (bug #854730)
        [jessie] - qemu <not-affected> (Vulnerable code not present)
        [wheezy] - qemu <not-affected> (Vulnerable code not present)
@@ -4188,7 +4201,7 @@
        NOTE: https://github.com/libevent/libevent/issues/317
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/17
 CVE-2017-5848 (The gst_ps_demux_parse_psm function in 
gst/mpegdemux/gstmpegdemux.c in ...)
-       {DLA-830-1}
+       {DSA-3818-1 DLA-830-1}
        - gst-plugins-bad1.0 1.10.4-1 (low)
        - gst-plugins-bad0.10 <unfixed> (low)
        [jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue)
@@ -4196,7 +4209,7 @@
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777957
        NOTE: Patch: https://bugzilla.gnome.org/show_bug.cgi?id=777957#c3
 CVE-2017-5847 (The gst_asf_demux_process_ext_content_desc function in ...)
-       {DLA-829-1}
+       {DSA-3821-1 DLA-829-1}
        - gst-plugins-ugly1.0 1.10.4-1 (low)
        - gst-plugins-ugly0.10 <unfixed> (low)
        [jessie] - gst-plugins-ugly0.10 <no-dsa> (Minor issue)
@@ -4204,72 +4217,78 @@
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777955
        NOTE: 
https://github.com/GStreamer/gst-plugins-ugly/commit/d21017b52a585f145e8d62781bcc1c5fefc7ee37
 CVE-2017-5846 (The gst_asf_demux_process_ext_stream_props function in ...)
-       {DLA-829-1}
+       {DSA-3821-1 DLA-829-1}
        - gst-plugins-ugly1.0 1.10.3-1 (low)
        - gst-plugins-ugly0.10 <unfixed> (low)
        [jessie] - gst-plugins-ugly0.10 <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777937
 CVE-2017-5845 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c 
in ...)
+       {DSA-3820-1}
        - gst-plugins-good1.0 1.10.3-1 (low)
        - gst-plugins-good0.10 <not-affected> (Vulnerable code not present)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777532
 CVE-2017-5844 (The gst_riff_create_audio_caps function in ...)
-       {DLA-827-1}
+       {DSA-3819-1 DLA-827-1}
        - gst-plugins-base1.0 1.10.3-1 (low)
        - gst-plugins-base0.10 <unfixed> (low)
        [jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777525
 CVE-2017-5843 (Multiple use-after-free vulnerabilities in the (1) ...)
-       {DLA-830-1}
+       {DSA-3818-1 DLA-830-1}
        - gst-plugins-bad1.0 1.10.3-1
        - gst-plugins-bad0.10 <unfixed> (low)
        [jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777503
 CVE-2017-5842 (The html_context_handle_element function in 
gst/subparse/samiparse.c ...)
+       {DSA-3819-1}
        - gst-plugins-base1.0 1.10.3-1
        - gst-plugins-base0.10 <not-affected> (Vulnerable code not present)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777502
 CVE-2017-5841 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c 
in ...)
+       {DSA-3820-1}
        - gst-plugins-good1.0 1.10.3-1 (low)
        - gst-plugins-good0.10 <not-affected> (Vulnerable code not present)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777500
 CVE-2017-5840 (The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in 
...)
-       {DLA-828-1}
+       {DSA-3820-1 DLA-828-1}
        - gst-plugins-good1.0 1.10.3-1 (low)
        - gst-plugins-good0.10 <unfixed> (low)
        [jessie] - gst-plugins-good0.10 <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777469
 CVE-2017-5839 (The gst_riff_create_audio_caps function in ...)
+       {DSA-3819-1}
        - gst-plugins-base1.0 1.10.3-1
        - gst-plugins-base0.10 <not-affected> (Vulnerable code not present)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777265
 CVE-2017-5838 (The gst_date_time_new_from_iso8601_string function in ...)
+       {DSA-3822-1}
        - gstreamer1.0 1.10.3-1 (low)
        - gstreamer0.10 <not-affected> (Vulnerable code not present)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777263
 CVE-2017-5837 (The gst_riff_create_audio_caps function in ...)
-       {DLA-827-1}
+       {DSA-3819-1 DLA-827-1}
        - gst-plugins-base1.0 1.10.3-1 (low)
        - gst-plugins-base0.10 <unfixed> (low)
        [jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777262
 CVE-2016-10199 (The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c 
in ...)
+       {DSA-3820-1}
        - gst-plugins-good1.0 1.10.3-1 (low)
        - gst-plugins-good0.10 <not-affected> (Vulnerable code not present)
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775451
 CVE-2016-10198 (The gst_aac_parse_sink_setcaps function in ...)
-       {DLA-828-1}
+       {DSA-3820-1 DLA-828-1}
        - gst-plugins-good1.0 1.10.3-1 (low)
        - gst-plugins-good0.10 <unfixed> (low)
        [jessie] - gst-plugins-good0.10 <no-dsa> (Minor issue)
@@ -4369,8 +4388,7 @@
        NOTE: http://www.openwall.com/lists/oss-security/2017/02/02/2
        NOTE: Debian uses an unaffected fork:
        NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2654#c8
-CVE-2017-5850
-       RESERVED
+CVE-2017-5850 (httpd in OpenBSD allows remote attackers to cause a denial of 
service ...)
        NOT-FOR-US: OpenBSD httpd
 CVE-2017-5833 (Cross-site scripting (XSS) vulnerability in the invocation code 
...)
        NOT-FOR-US: Revive Adserver
@@ -4598,8 +4616,7 @@
        NOTE: Upstream report: https://launchpad.net/bugs/1651728
        NOTE: Upstream fix: 
https://github.com/kovidgoyal/calibre/commit/3a89718664cb8cce0449d1758eee585ed0d0433c
        NOTE: http://www.openwall.com/lists/oss-security/2017/01/29/8
-CVE-2017-5899 [s-nail local root privilege escalation]
-       RESERVED
+CVE-2017-5899 (Directory traversal vulnerability in the setuid root helper 
binary in ...)
        - s-nail 14.8.16-1 (bug #852934)
        NOTE: 
https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html
        NOTE: 
https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160
@@ -6144,8 +6161,7 @@
        [jessie] - gnutls28 <no-dsa> (Minor issue, will be fixed via point 
update)
        NOTE: https://gnutls.org/security.html#GNUTLS-SA-2017-1
        NOTE: 
https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
-CVE-2017-5330 [unintended execution of scripts and executable files]
-       RESERVED
+CVE-2017-5330 (ark before 16.12.1 might allow remote attackers to execute 
arbitrary ...)
        - ark 4:16.08.3-2 (bug #850874)
        [jessie] - ark <not-affected> (Vulnerable code introduced later)
        [wheezy] - ark <not-affected> (Vulnerable code introduced later)
@@ -9938,8 +9954,7 @@
        [wheezy] - qemu-kvm <no-dsa> (Minor issue)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05597.html
        NOTE: Fixed by: 
http://git.qemu.org/?p=qemu.git;a=commit;h=a4afa548fc6dd9842ed86639b4d37d4d1c4ad480
 (v2.8.0-rc0)
-CVE-2016-9922 [display: cirrus_vga: a divide by zero in cirrus_do_copy]
-       RESERVED
+CVE-2016-9922 (The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU 
(aka ...)
        {DLA-765-1 DLA-764-1}
        - qemu 1:2.8+dfsg-1 (bug #847960)
        [jessie] - qemu <no-dsa> (Minor issue)
@@ -18128,7 +18143,7 @@
        NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1035
 CVE-2016-9601 [Heap-buffer overflow due to Integer overflow in jbig2_image_new 
function]
        RESERVED
-       {DSA-3817-1}
+       {DSA-3817-1 DLA-874-1}
        - jbig2dec 0.13-4 (bug #850497)
        NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=697457
        NOTE: Patch: 
http://git.ghostscript.com/?p=jbig2dec.git;a=commitdiff;h=e698d5c11d27212aa1098bc5b1673a3378563092
@@ -18554,15 +18569,17 @@
        [jessie] - salt <no-dsa> (Minor issue)
        NOTE: http://www.openwall.com/lists/oss-security/2016/11/25/2
 CVE-2016-9813 (The _parse_pat function in the mpegts parser in GStreamer 
before ...)
+       {DSA-3818-1}
        - gst-plugins-bad1.0 1.10.2-1 (low)
        - gst-plugins-bad0.10 <not-affected> (Vulnerable code introduced in 
1.1.1 of 1.0 series)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775120
 CVE-2016-9812 (The gst_mpegts_section_new function in the mpegts decoder in 
GStreamer ...)
+       {DSA-3818-1}
        - gst-plugins-bad1.0 1.10.2-1 (low)
        - gst-plugins-bad0.10 <not-affected> (Vulnerable code introduced in 
1.1.1 of 1.0 series)
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775048
 CVE-2016-9811 (The windows_icon_typefind function in gst-plugins-base in 
GStreamer ...)
-       {DLA-735-1}
+       {DSA-3819-1 DLA-735-1}
        - gst-plugins-base1.0 1.10.2-1
        - gst-plugins-base0.10 <removed>
        [jessie] - gst-plugins-base0.10 <no-dsa> (Minor issue, can be fixed via 
point release)
@@ -18575,7 +18592,7 @@
        [wheezy] - gst-plugins-good0.10 0.10.31-3+nmu1+deb7u1
        NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774897
 CVE-2016-9809 (Off-by-one error in the gst_h264_parse_set_caps function in 
GStreamer ...)
-       {DLA-736-1}
+       {DSA-3818-1 DLA-736-1}
        - gst-plugins-bad1.0 1.10.2-1
        - gst-plugins-bad0.10 <removed>
        [jessie] - gst-plugins-bad0.10 <no-dsa> (Minor issue, can be fixed via 
point release)
@@ -19668,8 +19685,8 @@
        RESERVED
 CVE-2016-9253
        RESERVED
-CVE-2016-9252
-       RESERVED
+CVE-2016-9252 (The Traffic Management Microkernel (TMM) in F5 BIG-IP before 
11.5.4 ...)
+       TODO: check
 CVE-2016-9251
        RESERVED
 CVE-2016-9250
@@ -19687,8 +19704,7 @@
 CVE-2016-9244 (A BIG-IP virtual server configured with a Client SSL profile 
that has ...)
        NOT-FOR-US: F5 TLS stack
        NOTE: https://ticketbleed.com/
-CVE-2016-9243 [HKDF might return an empty byte-string]
-       RESERVED
+CVE-2016-9243 (HKDF in cryptography before 1.5.2 returns an empty byte-string 
if used ...)
        - python-cryptography 1.5.3-1
        [jessie] - python-cryptography <no-dsa> (Minor issue)
        NOTE: Upstream bug: https://github.com/pyca/cryptography/issues/3211
@@ -21204,7 +21220,7 @@
        [wheezy] - openssh <no-dsa> (Minor issue)
        NOTE: 
http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup
        NOTE: Only thing the attacker could do here is self-dos own connection
-CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in ...)
+CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in 
ImageMagick ...)
        {DSA-3726-1 DLA-756-1}
        - imagemagick 8:6.9.6.6+dfsg-1 (bug #845634)
        NOTE: 
https://blogs.gentoo.org/ago/2016/10/17/imagemagick-memory-allocation-failure-in-acquiremagickmemory-memory-c/
@@ -25195,8 +25211,8 @@
        RESERVED
 CVE-2016-7475
        RESERVED
-CVE-2016-7474
-       RESERVED
+CVE-2016-7474 (In some cases the MCPD binary cache in F5 BIG-IP devices may 
allow a ...)
+       TODO: check
 CVE-2016-7473
        RESERVED
 CVE-2016-7472
@@ -29382,9 +29398,9 @@
        NOT-FOR-US: Joomla extension HugeIT slideshow
 CVE-2016-1000117 (XSS &amp; SQLi in HugeIT slideshow v1.0.4 ...)
        NOT-FOR-US: Joomla extension HugeIT slideshow
-CVE-2016-1000116 (Huge-IT Portfolio Gallery manager v1.1.5 SQL Injection and 
XSS ...)
+CVE-2016-1000116 (Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and 
XSS ...)
        NOT-FOR-US: Joomla extension Huge-IT Portfolio Gallery manager
-CVE-2016-1000115 (Huge-IT Portfolio Gallery manager v1.1.5 SQL Injection and 
XSS ...)
+CVE-2016-1000115 (Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and 
XSS ...)
        NOT-FOR-US: Joomla extension Huge-IT Portfolio Gallery manager
 CVE-2016-1000114 (XSS in huge IT gallery v1.1.5 for Joomla ...)
        NOT-FOR-US: Joomla extension huge IT gallery
@@ -34736,8 +34752,7 @@
        {DSA-3607-1 DLA-516-1}
        - linux 4.5.4-1
        NOTE: Fixed by: 
https://git.kernel.org/linus/99d825822eade8d827a1817357cbf3f889a552d6 (v4.6)
-CVE-2016-4912
-       RESERVED
+CVE-2016-4912 (The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 
allows ...)
        - openslp-dfsg <not-affected> (Vulnerable code not present)
        NOTE: Issue present only in OpenSLP 2.x where the return from malloc 
isn't checked.
 CVE-2016-4911 (The Fernet Token Provider in OpenStack Identity (Keystone) 
9.0.x ...)
@@ -45851,16 +45866,13 @@
        NOTE: https://kb.isc.org/article/AA-01348
 CVE-2016-1505 (The filesystem storage backend in Radicale before 1.1 on 
Windows ...)
        - radicale <not-affected> (Only an issue on MS Windows)
-CVE-2015-8764 [one byte buffer overrun]
-       RESERVED
+CVE-2015-8764 (Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 
through ...)
        - freeradius <not-affected> (Affects 3.0 up to 3.0.8)
        NOTE: http://freeradius.org/security.html#eap-pwd-2015
-CVE-2015-8763 [commit/confirm message payload length is not validated]
-       RESERVED
+CVE-2015-8763 (The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows 
remote ...)
        - freeradius <not-affected> (Affects 3.0 up to 3.0.8)
        NOTE: http://freeradius.org/security.html#eap-pwd-2015
-CVE-2015-8762 [The EAP-PWD packet length is not checked before the first byte 
is dereferenced]
-       RESERVED
+CVE-2015-8762 (The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows 
remote ...)
        - freeradius <not-affected> (Affects 3.0 up to 3.0.8)
        NOTE: http://freeradius.org/security.html#eap-pwd-2015
 CVE-2015-8751
@@ -46696,7 +46708,7 @@
        NOT-FOR-US: Huawei
 CVE-2015-8680 (The Graphics driver in Huawei P8 smartphones with software 
GRA-TL00 ...)
        NOT-FOR-US: Huawei
-CVE-2015-8679 (The (1) ION and (2) Maxim_smartpa_dev drivers in Huawei P8 
smartphones ...)
+CVE-2015-8679 (The Maxim_smartpa_dev driver in Huawei P8 smartphones with 
software ...)
        NOT-FOR-US: Huawei
 CVE-2015-8678 (The ION driver in Huawei P8 smartphones with software GRA-TL00 
before ...)
        NOT-FOR-US: ION driver in Huawei P8 smartphones
@@ -50757,10 +50769,10 @@
        NOTE: http://rt.central.org/rt/Ticket/Display.html?id=132256
 CVE-2015-8311
        RESERVED
-CVE-2015-8310
-       RESERVED
-CVE-2015-8309
-       RESERVED
+CVE-2015-8310 (Cross-site scripting (XSS) vulnerability in Cherry Music before 
0.36.0 ...)
+       TODO: check
+CVE-2015-8309 (Directory traversal vulnerability in Cherry Music before 0.36.0 
allows ...)
+       TODO: check
 CVE-2015-8307 (The Graphics driver in Huawei P8 smartphones with software 
GRA-TL00 ...)
        NOT-FOR-US: Huawei
 CVE-2015-8306 (Buffer overflow in the HIFI driver in Huawei P8 phones with 
software ...)
@@ -51845,8 +51857,7 @@
        NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=16009
        NOTE: 
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
        NOTE: http://openwall.com/lists/oss-security/2015/09/08/2
-CVE-2015-8026 [Heap overflow]
-       RESERVED
+CVE-2015-8026 (Heap-based buffer overflow in the verify_vbr_checksum function 
in ...)
        - exfat-utils 1.2.1-1
        [jessie] - exfat-utils 1.1.0-2+deb8u1
        [wheezy] - exfat-utils 0.9.7-2+deb7u1
@@ -51867,8 +51878,7 @@
        NOTE: https://crashes.fuzzing-project.org/exfatfsck-endless-loop
        NOTE: 
https://github.com/relan/exfat/commit/35a1f77f9be2d8b21731f758baba4334935bf18b
        NOTE: will possibly not get a CVE, cf. 
http://www.openwall.com/lists/oss-security/2015/10/29/13
-CVE-2015-8010 [XSS in the Icinga Classic-UI]
-       RESERVED
+CVE-2015-8010 (Cross-site scripting (XSS) vulnerability in the Classic-UI with 
the ...)
        - icinga 1.13.3-3 (bug #803432)
        [jessie] - icinga <no-dsa> (Minor issue)
        [wheezy] - icinga <no-dsa> (Minor issue)
@@ -73202,10 +73212,10 @@
        NOT-FOR-US: ZOHO ManageEngine SupportCenter Plus
 CVE-2015-0865
        RESERVED
-CVE-2015-0864
-       RESERVED
-CVE-2015-0863
-       RESERVED
+CVE-2015-0864 (Samsung Account (AKA com.osp.app.signin) before 1.6.0069 and 
2.x ...)
+       TODO: check
+CVE-2015-0863 (GALAXY Apps (aka Samsung Apps, Samsung Updates, or ...)
+       TODO: check
 CVE-2015-0862 (Multiple cross-site scripting (XSS) vulnerabilities in the 
management ...)
        - rabbitmq-server 3.4.3-1
        [jessie] - rabbitmq-server <no-dsa> (Minor issue)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to