Author: carnil
Date: 2016-07-21 14:30:23 +0000 (Thu, 21 Jul 2016)
New Revision: 43338

Modified:
   data/CVE/list
Log:
Add upstream tag information for libidn issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-07-21 14:26:34 UTC (rev 43337)
+++ data/CVE/list       2016-07-21 14:30:23 UTC (rev 43338)
@@ -1,21 +1,21 @@
 CVE-2016-6263 [stringprep_utf8_nfkc_normalize reject invalid UTF-8]
        - libidn <unfixed>
        NOTE: 
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
-       NOTE: Test / Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
+       NOTE: Test / Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
 (libidn-1-33)
        NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
 CVE-2015-8948 [Solve out-of-bounds-read when reading one zero byte as input]
        - libidn <unfixed>
-       NOTE: Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
+       NOTE: Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
 (libidn-1-33)
 CVE-2016-6262 [Solve out-of-bounds-read when reading one zero byte as input]
        - libidn <unfixed>
-       NOTE: Follow-up fix for CVE-2015-8948: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
+       NOTE: Follow-up fix for CVE-2015-8948: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
 (libidn-1-33)
        NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
 CVE-2016-6261 [out-of-bounds stack read in idna_to_ascii_4i]
        - libidn <unfixed>
        NOTE: 
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
-       NOTE: Test: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=9a1a7e15d0706634971364493fbb06e77e74726c
-       NOTE: Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
-       NOTE: Follow-up memory leak fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
+       NOTE: Test: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=9a1a7e15d0706634971364493fbb06e77e74726c
 (libidn-1-33)
+       NOTE: Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
 (libidn-1-33)
+       NOTE: Follow-up memory leak fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
 (libidn-1-33)
        NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
 CVE-2016-6249
        RESERVED


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to