Author: benh
Date: 2016-08-26 23:45:39 +0000 (Fri, 26 Aug 2016)
New Revision: 44166

Modified:
   data/CVE/list
   data/dla-needed.txt
Log:
Triage new issues for wheezy; add notes


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-08-26 21:10:13 UTC (rev 44165)
+++ data/CVE/list       2016-08-26 23:45:39 UTC (rev 44166)
@@ -1091,86 +1091,113 @@
 CVE-2016-6632
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-55/
 CVE-2016-6631
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-54/
 CVE-2016-6630
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-53/
 CVE-2016-6629
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-52/
 CVE-2016-6628
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-51/
 CVE-2016-6627
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-50/
 CVE-2016-6626
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-49/
 CVE-2016-6625
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-48/
 CVE-2016-6624
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-47/
 CVE-2016-6623
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-46/
 CVE-2016-6622
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-45/
 CVE-2016-6621
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
 CVE-2016-6620
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-43/
 CVE-2016-6619
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-42/
 CVE-2016-6618
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-41/
 CVE-2016-6617
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
        [jessie] - phpmyadmin <not-affected> (Only affects 4.6.x)
+       [wheezy] - phpmyadmin <not-affected> (Only affects 4.6.x)
 CVE-2016-6616
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       [wheezy] - phpmyadmin <not-affected> (Only affects 4.4.x onward)
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-39/
 CVE-2016-6615
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-38/
 CVE-2016-6614
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-37/
 CVE-2016-6613
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-36/
 CVE-2016-6612
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-35/
 CVE-2016-6611
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-34/
 CVE-2016-6610
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-33/
 CVE-2016-6609
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-32/
 CVE-2016-6608
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
        [jessie] - phpmyadmin <not-affected> (Only affects 4.6.x)
+       [wheezy] - phpmyadmin <not-affected> (Only affects 4.6.x)
 CVE-2016-6607
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-30/
 CVE-2016-6606
        RESERVED
        - phpmyadmin 4:4.6.4+dfsg1-1
+       NOTE: https://www.phpmyadmin.net/security/PMASA-2016-29/
 CVE-2016-6605
        RESERVED
 CVE-2016-6604
@@ -2109,7 +2136,8 @@
 CVE-2016-XXXX [Buffer overflow processing long words]
        - cracklib2 2.9.2-3 (bug #835386)
        [jessie] - cracklib2 <no-dsa> (Minor issue)
-       NOTE: SuSE Patch: 
https://build.opensuse.org/package/view_file/Base:System/cracklib/0004-overflow-processing-long-words.patch
+       [wheezy] - cracklib2 <no-dsa> (Minor issue)
+       NOTE: SuSE patch (not a complete fix): 
https://build.opensuse.org/package/view_file/Base:System/cracklib/0004-overflow-processing-long-words.patch
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/08/23/8
 CVE-2016-6318 [Stack-based buffer overflow when parsing large GECOS field]
        RESERVED
@@ -6810,6 +6838,7 @@
        - gcc-5 <not-affected> (Uses glibc-internal SSP)
        - gcc-4.9 <not-affected> (Uses glibc-internal SSP)
        - mingw-w64 <unfixed>
+       - mingw32 <removed>
        [jessie] - mingw-w64 <no-dsa> (Minor issue)
 CVE-2016-4972 [RCE vulnerability in Openstack Murano using insecure YAML tags]
        RESERVED

Modified: data/dla-needed.txt
===================================================================
--- data/dla-needed.txt 2016-08-26 21:10:13 UTC (rev 44165)
+++ data/dla-needed.txt 2016-08-26 23:45:39 UTC (rev 44166)
@@ -13,6 +13,8 @@
 --
 chicken (Thorsten Alteholz)
 --
+eog
+--
 gnupg (Santiago R.R.)
 --
 icu (Roberto C. Sánchez)
@@ -29,6 +31,8 @@
 --
 lshell (Thorsten Alteholz)
 --
+mailman
+--
 mat
   NOTE: the fix for this issue: 
https://security-tracker.debian.org/tracker/TEMP-0826101-4D75EC
   is not available yet. It will be available in next upstream release (already
@@ -37,6 +41,10 @@
 matrixssl
   NOTE: the bignum implementation is in crypto/peersec/mpi.c
 --
+mingw-w64
+--
+mingw32
+--
 openssl
   NOTE: For CVE-2016-2177, some parts of the upstream patch do not apply
   NOTE: because the wheezy version is completely missing the checks being
@@ -53,6 +61,8 @@
 php5 (Thorsten Alteholz)
   NOTE: At least CVE-2016-4538 of the outstanding CVEs are vulnerable
 --
+phpmyadmin
+--
 roundcube
 --
 ruby-actionpack-3.2 (Guido Günther)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to