Author: sectracker Date: 2016-05-12 21:10:12 +0000 (Thu, 12 May 2016) New Revision: 41689
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-05-12 20:04:42 UTC (rev 41688) +++ data/CVE/list 2016-05-12 21:10:12 UTC (rev 41689) @@ -1,3 +1,419 @@ +CVE-2016-4785 + RESERVED +CVE-2016-4784 + RESERVED +CVE-2016-4783 + RESERVED +CVE-2016-4782 + RESERVED +CVE-2016-4781 + RESERVED +CVE-2016-4780 + RESERVED +CVE-2016-4779 + RESERVED +CVE-2016-4778 + RESERVED +CVE-2016-4777 + RESERVED +CVE-2016-4776 + RESERVED +CVE-2016-4775 + RESERVED +CVE-2016-4774 + RESERVED +CVE-2016-4773 + RESERVED +CVE-2016-4772 + RESERVED +CVE-2016-4771 + RESERVED +CVE-2016-4770 + RESERVED +CVE-2016-4769 + RESERVED +CVE-2016-4768 + RESERVED +CVE-2016-4767 + RESERVED +CVE-2016-4766 + RESERVED +CVE-2016-4765 + RESERVED +CVE-2016-4764 + RESERVED +CVE-2016-4763 + RESERVED +CVE-2016-4762 + RESERVED +CVE-2016-4761 + RESERVED +CVE-2016-4760 + RESERVED +CVE-2016-4759 + RESERVED +CVE-2016-4758 + RESERVED +CVE-2016-4757 + RESERVED +CVE-2016-4756 + RESERVED +CVE-2016-4755 + RESERVED +CVE-2016-4754 + RESERVED +CVE-2016-4753 + RESERVED +CVE-2016-4752 + RESERVED +CVE-2016-4751 + RESERVED +CVE-2016-4750 + RESERVED +CVE-2016-4749 + RESERVED +CVE-2016-4748 + RESERVED +CVE-2016-4747 + RESERVED +CVE-2016-4746 + RESERVED +CVE-2016-4745 + RESERVED +CVE-2016-4744 + RESERVED +CVE-2016-4743 + RESERVED +CVE-2016-4742 + RESERVED +CVE-2016-4741 + RESERVED +CVE-2016-4740 + RESERVED +CVE-2016-4739 + RESERVED +CVE-2016-4738 + RESERVED +CVE-2016-4737 + RESERVED +CVE-2016-4736 + RESERVED +CVE-2016-4735 + RESERVED +CVE-2016-4734 + RESERVED +CVE-2016-4733 + RESERVED +CVE-2016-4732 + RESERVED +CVE-2016-4731 + RESERVED +CVE-2016-4730 + RESERVED +CVE-2016-4729 + RESERVED +CVE-2016-4728 + RESERVED +CVE-2016-4727 + RESERVED +CVE-2016-4726 + RESERVED +CVE-2016-4725 + RESERVED +CVE-2016-4724 + RESERVED +CVE-2016-4723 + RESERVED +CVE-2016-4722 + RESERVED +CVE-2016-4721 + RESERVED +CVE-2016-4720 + RESERVED +CVE-2016-4719 + RESERVED +CVE-2016-4718 + RESERVED +CVE-2016-4717 + RESERVED +CVE-2016-4716 + RESERVED +CVE-2016-4715 + RESERVED +CVE-2016-4714 + RESERVED +CVE-2016-4713 + RESERVED +CVE-2016-4712 + RESERVED +CVE-2016-4711 + RESERVED +CVE-2016-4710 + RESERVED +CVE-2016-4709 + RESERVED +CVE-2016-4708 + RESERVED +CVE-2016-4707 + RESERVED +CVE-2016-4706 + RESERVED +CVE-2016-4705 + RESERVED +CVE-2016-4704 + RESERVED +CVE-2016-4703 + RESERVED +CVE-2016-4702 + RESERVED +CVE-2016-4701 + RESERVED +CVE-2016-4700 + RESERVED +CVE-2016-4699 + RESERVED +CVE-2016-4698 + RESERVED +CVE-2016-4697 + RESERVED +CVE-2016-4696 + RESERVED +CVE-2016-4695 + RESERVED +CVE-2016-4694 + RESERVED +CVE-2016-4693 + RESERVED +CVE-2016-4692 + RESERVED +CVE-2016-4691 + RESERVED +CVE-2016-4690 + RESERVED +CVE-2016-4689 + RESERVED +CVE-2016-4688 + RESERVED +CVE-2016-4687 + RESERVED +CVE-2016-4686 + RESERVED +CVE-2016-4685 + RESERVED +CVE-2016-4684 + RESERVED +CVE-2016-4683 + RESERVED +CVE-2016-4682 + RESERVED +CVE-2016-4681 + RESERVED +CVE-2016-4680 + RESERVED +CVE-2016-4679 + RESERVED +CVE-2016-4678 + RESERVED +CVE-2016-4677 + RESERVED +CVE-2016-4676 + RESERVED +CVE-2016-4675 + RESERVED +CVE-2016-4674 + RESERVED +CVE-2016-4673 + RESERVED +CVE-2016-4672 + RESERVED +CVE-2016-4671 + RESERVED +CVE-2016-4670 + RESERVED +CVE-2016-4669 + RESERVED +CVE-2016-4668 + RESERVED +CVE-2016-4667 + RESERVED +CVE-2016-4666 + RESERVED +CVE-2016-4665 + RESERVED +CVE-2016-4664 + RESERVED +CVE-2016-4663 + RESERVED +CVE-2016-4662 + RESERVED +CVE-2016-4661 + RESERVED +CVE-2016-4660 + RESERVED +CVE-2016-4659 + RESERVED +CVE-2016-4658 + RESERVED +CVE-2016-4657 + RESERVED +CVE-2016-4656 + RESERVED +CVE-2016-4655 + RESERVED +CVE-2016-4654 + RESERVED +CVE-2016-4653 + RESERVED +CVE-2016-4652 + RESERVED +CVE-2016-4651 + RESERVED +CVE-2016-4650 + RESERVED +CVE-2016-4649 + RESERVED +CVE-2016-4648 + RESERVED +CVE-2016-4647 + RESERVED +CVE-2016-4646 + RESERVED +CVE-2016-4645 + RESERVED +CVE-2016-4644 + RESERVED +CVE-2016-4643 + RESERVED +CVE-2016-4642 + RESERVED +CVE-2016-4641 + RESERVED +CVE-2016-4640 + RESERVED +CVE-2016-4639 + RESERVED +CVE-2016-4638 + RESERVED +CVE-2016-4637 + RESERVED +CVE-2016-4636 + RESERVED +CVE-2016-4635 + RESERVED +CVE-2016-4634 + RESERVED +CVE-2016-4633 + RESERVED +CVE-2016-4632 + RESERVED +CVE-2016-4631 + RESERVED +CVE-2016-4630 + RESERVED +CVE-2016-4629 + RESERVED +CVE-2016-4628 + RESERVED +CVE-2016-4627 + RESERVED +CVE-2016-4626 + RESERVED +CVE-2016-4625 + RESERVED +CVE-2016-4624 + RESERVED +CVE-2016-4623 + RESERVED +CVE-2016-4622 + RESERVED +CVE-2016-4621 + RESERVED +CVE-2016-4620 + RESERVED +CVE-2016-4619 + RESERVED +CVE-2016-4618 + RESERVED +CVE-2016-4617 + RESERVED +CVE-2016-4616 + RESERVED +CVE-2016-4615 + RESERVED +CVE-2016-4614 + RESERVED +CVE-2016-4613 + RESERVED +CVE-2016-4612 + RESERVED +CVE-2016-4611 + RESERVED +CVE-2016-4610 + RESERVED +CVE-2016-4609 + RESERVED +CVE-2016-4608 + RESERVED +CVE-2016-4607 + RESERVED +CVE-2016-4606 + RESERVED +CVE-2016-4605 + RESERVED +CVE-2016-4604 + RESERVED +CVE-2016-4603 + RESERVED +CVE-2016-4602 + RESERVED +CVE-2016-4601 + RESERVED +CVE-2016-4600 + RESERVED +CVE-2016-4599 + RESERVED +CVE-2016-4598 + RESERVED +CVE-2016-4597 + RESERVED +CVE-2016-4596 + RESERVED +CVE-2016-4595 + RESERVED +CVE-2016-4594 + RESERVED +CVE-2016-4593 + RESERVED +CVE-2016-4592 + RESERVED +CVE-2016-4591 + RESERVED +CVE-2016-4590 + RESERVED +CVE-2016-4589 + RESERVED +CVE-2016-4588 + RESERVED +CVE-2016-4587 + RESERVED +CVE-2016-4586 + RESERVED +CVE-2016-4585 + RESERVED +CVE-2016-4584 + RESERVED +CVE-2016-4583 + RESERVED +CVE-2016-4582 + RESERVED +CVE-2016-4580 + RESERVED +CVE-2016-4577 + RESERVED +CVE-2016-4576 + RESERVED +CVE-2016-4575 + RESERVED CVE-2016-XXXX [OpenJPEG Heap Buffer Overflow in function color_cmyk_to_rgb of color.c] - openjpeg2 <unfixed> NOTE: https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 @@ -9,9 +425,11 @@ CVE-2016-4573 RESERVED CVE-2016-4581 + RESERVED - linux <unfixed> NOTE: https://git.kernel.org/linus/5ec0811d30378ae104f250bfc9b3640242d81e3f (v4.6-rc7) CVE-2016-4579 + RESERVED - libksba 1.3.4-3 NOTE: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=a7eed17a0b2a1c09ef986f3b4b323cd31cea2b64 CVE-2016-4572 @@ -24,6 +442,7 @@ NOTE: Fixed by: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=6be61daac047d8e6aa941eb103f8e71a1d4e3c75 NOTE: Introduced by: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=243d12fdec66a4360fbb3e307a046b39b5b4ffc3 CVE-2016-4578 [information leak] + RESERVED - linux <unfixed> NOTE: https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 NOTE: https://git.kernel.org/cgit/linux/kernel/git/tiwai/sound.git/commit/?h=for-next&id=e4ec8cc8039a7063e24204299b462bd1383184a5 @@ -226,14 +645,14 @@ RESERVED CVE-2016-4500 RESERVED -CVE-2016-4499 - RESERVED -CVE-2016-4498 - RESERVED -CVE-2016-4497 - RESERVED -CVE-2016-4496 - RESERVED +CVE-2016-4499 (Heap-based buffer overflow in Panasonic FPWIN Pro 5.x through 7.x ...) + TODO: check +CVE-2016-4498 (Panasonic FPWIN Pro 5.x through 7.x before 7.130 accesses an ...) + TODO: check +CVE-2016-4497 (Panasonic FPWIN Pro 5.x through 7.x before 7.130 allows local users to ...) + TODO: check +CVE-2016-4496 (Panasonic FPWIN Pro 5.x through 7.x before 7.130 allows local users to ...) + TODO: check CVE-2016-4495 RESERVED CVE-2016-4494 @@ -2439,8 +2858,7 @@ NOTE: https://sourceforge.net/p/graphicsmagick/code/ci/45998a25992d1142df201d8cf024b6c948b40748/ CVE-2016-3713 RESERVED -CVE-2016-3712 [Out-of-bounds read when creating weird vga screen surface] - RESERVED +CVE-2016-3712 (Integer overflow in the VGA module in QEMU allows local guest OS users ...) {DSA-3573-1} - qemu <unfixed> (bug #823830) [wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS) @@ -2450,8 +2868,7 @@ CVE-2016-3711 [Setting cookie containing internal IP address of a pod] RESERVED NOT-FOR-US: OpenShift -CVE-2016-3710 [incorrect banked access bounds checking in vga module] - RESERVED +CVE-2016-3710 (The VGA module in QEMU improperly performs bounds checking on banked ...) {DSA-3573-1} - qemu <unfixed> (bug #823830) [wheezy] - qemu <end-of-life> (Not supported in Wheezy LTS) @@ -2567,6 +2984,7 @@ NOTE: http://www.openwall.com/lists/oss-security/2016/03/26/1 CVE-2016-3674 [XXE vulnerability] RESERVED + {DSA-3575-1} - libxstream-java 1.4.9-1 (bug #819455) NOTE: http://x-stream.github.io/changes.html#1.4.9 CVE-2016-3671 @@ -9614,8 +10032,8 @@ RESERVED CVE-2016-1394 RESERVED -CVE-2016-1393 - RESERVED +CVE-2016-1393 (SQL injection vulnerability in Cisco Cloud Network Automation ...) + TODO: check CVE-2016-1392 (Open redirect vulnerability in Cisco Prime Collaboration Assurance ...) TODO: check CVE-2016-1391 @@ -10357,8 +10775,7 @@ RESERVED CVE-2016-1237 RESERVED -CVE-2016-1236 [XSS via directory or file in a repository containing XSS payload] - RESERVED +CVE-2016-1236 (Multiple cross-site scripting (XSS) vulnerabilities in (1) ...) {DSA-3572-1 DLA-462-1} - websvn <removed> NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/22 @@ -17119,6 +17536,7 @@ NOTE: https://quickgit.kde.org/?p=kdelibs.git&a=blobdiff&h=8c0f6401271c495c68e340e06b09239eb755ce5e&hp=45b72f0d5c3421b571e9515497352a0a9942a075&hb=cc5515ed7ce8884c9b18169158ba29ab2f7a3db7&f=kinit%2Flnusertemp.c CVE-2015-7542 [Uses outdated bundled CA certificates] RESERVED + {DLA-469-1} - libgwenhywfar 4.12.0beta-3 (bug #748955; medium) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1272503 NOTE: Debian packaging fix: http://source.lenk.info/git/pkg-libgwenhywfar.git/commitdiff/86dacaae3a233f6ca3b420e0bfdb12eb5ef40b91 @@ -29122,8 +29540,10 @@ NOTE: Referenced Bug with Details from Red Hat is currently private NOTE: Patch: https://git.centos.org/blob/rpms!spice.git/11e32f6dd156a3c4847da29d989837437e973ccc/SOURCES!0038-Avoid-race-conditions-reading-monitor-configs-from-g.patch CVE-2015-3246 (libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the ...) + {DLA-468-1} - libuser <unfixed> (bug #793465) CVE-2015-3245 (Incomplete blacklist vulnerability in the chfn function in libuser ...) + {DLA-468-1} - libuser <unfixed> (bug #793465) NOTE: initially attributed to usermode package, root-cause fixed in libuser instead CVE-2015-3244 (The Portlet Bridge for JavaServer Faces in Red Hat JBoss Portal 6.2.0, ...) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits