Author: sectracker
Date: 2016-09-08 21:10:12 +0000 (Thu, 08 Sep 2016)
New Revision: 44427

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-09-08 20:20:13 UTC (rev 44426)
+++ data/CVE/list       2016-09-08 21:10:12 UTC (rev 44427)
@@ -1,3 +1,31 @@
+CVE-2016-7174
+       RESERVED
+CVE-2016-7173
+       RESERVED
+CVE-2016-7172
+       RESERVED
+CVE-2016-7171
+       RESERVED
+CVE-2016-7170
+       RESERVED
+CVE-2016-7169
+       RESERVED
+CVE-2016-7168
+       RESERVED
+CVE-2016-7167
+       RESERVED
+CVE-2016-7165
+       RESERVED
+CVE-2016-7162
+       RESERVED
+CVE-2016-7161
+       RESERVED
+CVE-2016-7160
+       RESERVED
+CVE-2016-7159
+       RESERVED
+CVE-2016-7158
+       RESERVED
 CVE-2016-XXXX [SGI security bug]
        - imagemagick <unfixed> (bug #836776)
 CVE-2016-XXXX [incorrect quoting may allow SQL injection]
@@ -6,23 +34,27 @@
        NOTE: https://github.com/ADOdb/ADOdb/commit/bd9eca9
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/09/07/8
 CVE-2016-7154 [use after free in FIFO event channel code]
+       RESERVED
        - xen 4.6.0-1
        [wheezy] - xen <not-affected> (Versions 4.3 and earlier are not 
vulnerable)
        NOTE: http://xenbits.xen.org/xsa/advisory-188.html
        NOTE: Only affects Xen 4.4, as workaround it is marked as fixed in the 
first xen version entering unstable
        NOTE: after the 4.4 series.
 CVE-2016-7166 [denial of service with gzip quine]
+       RESERVED
        - libarchive 3.2.0-2
        NOTE: https://github.com/libarchive/libarchive/issues/660
        NOTE: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207362
        NOTE: Fixed by: 
https://github.com/libarchive/libarchive/commit/6e06b1c89dd0d16f74894eac4cfc1327a06ee4a0
 CVE-2016-7164 [inflate_gzip denial of service]
+       RESERVED
        - libtorrent-rasterbar <unfixed>
        NOTE: https://github.com/arvidn/libtorrent/issues/1021
        NOTE: https://github.com/arvidn/libtorrent/pull/1022
        NOTE: 
https://github.com/arvidn/libtorrent/commit/debf3c6e3688aab8394fe5c47737625faffe6f9e
        NOTE: Fixed upstream in 1.1.1.
 CVE-2016-7163
+       RESERVED
        - openjpeg2 <unfixed>
        NOTE: 
https://github.com/uclouvain/openjpeg/commit/c16bc057ba3f125051c9966cf1f5b68a05681de4
        NOTE: 
https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24
@@ -47,18 +79,21 @@
 CVE-2016-7121
        RESERVED
 CVE-2016-7155 [scsi: pvscsi: OOB read and infinite loop while setting 
descriptor rings]
+       RESERVED
        - qemu <unfixed>
        - qemu-kvm <removed>
        NOTE: Upstream patch: 
https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00050.html
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1373462
        NOTE: http://www.openwall.com/lists/oss-security/2016/09/06/2
 CVE-2016-7156 [scsi: pvscsi: infintie loop when building SG list]
+       RESERVED
        - qemu <unfixed>
        - qemu-kvm <removed>
        NOTE: Upstream patch: 
https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00772.html
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1373478
        NOTE: http://www.openwall.com/lists/oss-security/2016/09/06/3
 CVE-2016-7157 [mptsas: invalid memory access while building  configuration 
pages]
+       RESERVED
        - qemu <unfixed>
        - qemu-kvm <removed>
        NOTE: Upstream patches: 
https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04295.html
@@ -106,6 +141,7 @@
        NOTE: http://www.openwall.com/lists/oss-security/2016/09/04/3
 CVE-2016-7142 [certificate fingerprint spoofing through crafted SASL messages]
        RESERVED
+       {DSA-3662-1}
        - inspircd 2.0.23-1 (bug #836706)
        NOTE: http://www.inspircd.org/2016/09/03/v2023-released.html
        NOTE: http://www.openwall.com/lists/oss-security/2016/09/04/3
@@ -249,14 +285,14 @@
        - qemu-kvm <removed>
        NOTE: Fixed by: 
http://git.qemu.org/?p=qemu.git;a=commit;h=56f101ecce0eafd09e2daf1c4eeb1377d6959261
        NOTE: May as well need: 
http://git.qemu.org/?p=qemu.git;a=commit;h=fff39a7ad09da07ef490de05c92c91f22f8002f2
-CVE-2016-7110
-       RESERVED
-CVE-2016-7109
-       RESERVED
-CVE-2016-7108
-       RESERVED
-CVE-2016-7107
-       RESERVED
+CVE-2016-7110 (Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 
allows ...)
+       TODO: check
+CVE-2016-7109 (Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 
allows ...)
+       TODO: check
+CVE-2016-7108 (Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 
SPH206 ...)
+       TODO: check
+CVE-2016-7107 (Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 
SPH206 ...)
+       TODO: check
 CVE-2016-7106
        RESERVED
 CVE-2016-7105
@@ -294,6 +330,7 @@
        NOTE: https://github.com/jquery/api.jqueryui.com/issues/281
 CVE-2016-7094 [x86 HVM: Overflow of sh_ctxt->seg_reg[]]
        RESERVED
+       {DLA-614-1}
        - xen <unfixed>
        NOTE:  http://xenbits.xen.org/xsa/advisory-187.html
 CVE-2016-7093 [x86: Mishandling of instruction pointer truncation during 
emulation]
@@ -302,6 +339,7 @@
        NOTE: http://xenbits.xen.org/xsa/advisory-186.html
 CVE-2016-7092 [Disallow L3 recursive pagetable for 32-bit PV guests]
        RESERVED
+       {DLA-614-1}
        - xen <unfixed>
        NOTE: http://xenbits.xen.org/xsa/advisory-185.html
 CVE-2016-7090
@@ -438,11 +476,9 @@
        RESERVED
 CVE-2016-7035
        RESERVED
-CVE-2016-7034
-       RESERVED
+CVE-2016-7034 (The dashbuilder in Red Hat JBoss BPM Suite 6.3.2 does not 
properly ...)
        NOT-FOR-US: JBoss BPMS
-CVE-2016-7033
-       RESERVED
+CVE-2016-7033 (Multiple cross-site scripting (XSS) vulnerabilities in the 
admin pages ...)
        NOT-FOR-US: JBoss BPMS
 CVE-2016-7032
        RESERVED
@@ -706,12 +742,12 @@
        RESERVED
 CVE-2016-6901
        RESERVED
-CVE-2016-6900
-       RESERVED
-CVE-2016-6899
-       RESERVED
-CVE-2016-6898
-       RESERVED
+CVE-2016-6900 (The Intelligent Baseboard Management Controller (iBMC) in 
Huawei ...)
+       TODO: check
+CVE-2016-6899 (The Intelligent Baseboard Management Controller (iBMC) in 
Huawei ...)
+       TODO: check
+CVE-2016-6898 (XML external entity (XXE) vulnerability in the Hyper Management 
Module ...)
+       TODO: check
 CVE-2016-6895
        REJECTED
 CVE-2016-6894
@@ -767,8 +803,8 @@
        RESERVED
 CVE-2016-6877
        RESERVED
-CVE-2016-6876
-       RESERVED
+CVE-2016-6876 (The RESOLV::lookup iRule command in F5 BIG-IP LTM, APM, ASM, 
and Link ...)
+       TODO: check
 CVE-2016-6869
        RESERVED
 CVE-2016-6868
@@ -795,8 +831,7 @@
        RESERVED
 CVE-2016-6856
        RESERVED
-CVE-2016-6855 [out-of-bounds write when passing invalid UTF-8 to GMarkup]
-       RESERVED
+CVE-2016-6855 (Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 
3.19.x, ...)
        {DLA-605-1}
        - eog 3.20.4-1
        [jessie] - eog <no-dsa> (Minor issue)
@@ -832,18 +867,18 @@
        RESERVED
 CVE-2016-6840
        RESERVED
-CVE-2016-6839
-       RESERVED
-CVE-2016-6838
-       RESERVED
+CVE-2016-6839 (CRLF injection vulnerability in Huawei FusionAccess before 
V100R006C00 ...)
+       TODO: check
+CVE-2016-6838 (Huawei X6800 and XH620 V3 servers with software before ...)
+       TODO: check
 CVE-2016-6829
        RESERVED
 CVE-2016-6827
        RESERVED
 CVE-2016-6826
        RESERVED
-CVE-2016-6825
-       RESERVED
+CVE-2016-6825 (Huawei XH620 V3, XH622 V3, and XH628 V3 servers with software 
before ...)
+       TODO: check
 CVE-2016-6824
        RESERVED
 CVE-2016-6823
@@ -1296,8 +1331,8 @@
 CVE-2016-6671 [buffer overflow when decoding swf]
        RESERVED
        - ffmpeg 7:3.1.2-1
-CVE-2016-6670
-       RESERVED
+CVE-2016-6670 (Huawei S7700, S9300, S9700, and S12700 devices with software 
before ...)
+       TODO: check
 CVE-2016-6669
        RESERVED
 CVE-2016-6668
@@ -2386,16 +2421,13 @@
        RESERVED
        - resteasy <unfixed>
        TODO: check
-CVE-2016-6346
-       RESERVED
+CVE-2016-6346 (RESTEasy enables GZIPInterceptor, which allows remote attackers 
to ...)
        - resteasy <unfixed>
        TODO: check
-CVE-2016-6345
-       RESERVED
+CVE-2016-6345 (RESTEasy allows remote authenticated users to obtain sensitive 
...)
        - resteasy <unfixed>
        TODO: check
-CVE-2016-6344
-       RESERVED
+CVE-2016-6344 (Red Hat JBoss BPM Suite 6.3.x does not include the HTTPOnly 
flag in a ...)
        NOT-FOR-US: Red Hat JBoss bpm Suite
 CVE-2016-6343
        RESERVED
@@ -2488,20 +2520,17 @@
        [wheezy] - cracklib2 <no-dsa> (Minor issue)
        NOTE: SuSE patch (not a complete fix): 
https://build.opensuse.org/package/view_file/Base:System/cracklib/0004-overflow-processing-long-words.patch
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/08/23/8
-CVE-2016-6318 [Stack-based buffer overflow when parsing large GECOS field]
-       RESERVED
+CVE-2016-6318 (Stack-based buffer overflow in the FascistGecosUser function in 
...)
        {DLA-599-1}
        - cracklib2 2.9.2-2 (bug #834502)
        [jessie] - cracklib2 <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/attachment.cgi?id=1188599
        NOTE: In Debian compiled with CPPFLAGS="-D_FORTIFY_SOURCE=2" so, at 
most application crash
-CVE-2016-6317 [unsafe query generation in Active Record]
-       RESERVED
+CVE-2016-6317 (Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not 
properly ...)
        - rails 2:4.2.7.1-1 (bug #834154)
        [jessie] - rails <not-affected> (Vulnerable code not present, 
introduced in 4.2)
        [wheezy] - rails <not-affected> (Vulnerable code not present, is only a 
transitional package and introduced in 4.2 anyway)
-CVE-2016-6316 [Possible XSS Vulnerability in Action View]
-       RESERVED
+CVE-2016-6316 (Cross-site scripting (XSS) vulnerability in Action View in Ruby 
on ...)
        {DSA-3651-1 DLA-604-1}
        - rails 2:4.2.7.1-1 (low; bug #834155)
        [wheezy] - rails <not-affected> (Vulnerable code not present, is only a 
transitional package)
@@ -2583,8 +2612,7 @@
        NOTE: Intorduced by: 
https://github.com/westes/flex/commit/9ba3187a537d6a58d345f2874d06087fd4050399 
(flex-2-5-36)
        NOTE: Fixed by: 
https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466 
(v2.6.1)
        TODO: It needs to be evaluated which reverse reverse build-dependencies 
or sources using the generated code needs fixing/rebuild
-CVE-2016-6351 [scsi: esp: oob write access while reading ESP command]
-       RESERVED
+CVE-2016-6351 (The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick 
Emulator), ...)
        {DLA-574-1 DLA-573-1}
        - qemu <unfixed> (bug #832621)
        - qemu-kvm <removed>
@@ -2668,6 +2696,7 @@
        NOTE: 
http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4
        NOTE: Fixed in 7.0.9, 5.6.24, 5.5.38
 CVE-2016-6293 (The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in 
...)
+       {DLA-615-1}
        - icu 57.1-4
        NOTE: http://bugs.icu-project.org/trac/changeset/39109
        NOTE: And possibly needs some more follow-up fixes, cf. with upstream 
changes
@@ -2961,8 +2990,7 @@
        NOTE: 
http://repo.or.cz/uclibc-ng.git/commit/e3848e3dd64a8d6437531488fe341354bc02eaed
        NOTE: http://mailman.uclibc-ng.org/pipermail/devel/2016-July/001067.html
        NOTE: Fixed in 1.0.16 of uClibc-ng
-CVE-2016-6263 [stringprep_utf8_nfkc_normalize reject invalid UTF-8]
-       RESERVED
+CVE-2016-6263 (The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in 
libidn ...)
        {DSA-3658-1 DLA-582-1}
        - libidn 1.33-1
        NOTE: 
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
@@ -2973,21 +3001,18 @@
        - libdbd-mysql-perl 4.035-1
        NOTE: https://github.com/perl5-dbi/DBD-mysql/pull/45
        NOTE: 
https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156
-CVE-2015-8948 [Solve out-of-bounds-read when reading one zero byte as input]
-       RESERVED
+CVE-2015-8948 (idn in GNU libidn before 1.33 might allow remote attackers to 
obtain ...)
        {DSA-3658-1 DLA-582-1}
        - libidn 1.33-1
        NOTE: Fix: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
 (libidn-1-33)
        NOTE: When fixing this issue, the followup fix 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
        NOTE: is required to fix the problem. (Resultet in followup CVE, 
CVE-2016-6262
        NOTE: if not applied completely).
-CVE-2016-6262 [Solve out-of-bounds-read when reading one zero byte as input]
-       RESERVED
+CVE-2016-6262 (idn in libidn before 1.33 might allow remote attackers to 
obtain ...)
        - libidn <not-affected> (Incomplete fix for CVE-2015-8948 not applied)
        NOTE: Follow-up fix for CVE-2015-8948: 
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
 (libidn-1-33)
        NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6
-CVE-2016-6261 [out-of-bounds stack read in idna_to_ascii_4i]
-       RESERVED
+CVE-2016-6261 (The idna_to_ascii_4i function in lib/idna.c in libidn before 
1.33 ...)
        {DSA-3658-1 DLA-582-1}
        - libidn 1.33-1
        NOTE: 
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
@@ -3398,18 +3423,18 @@
        NOTE: Unimportant since Debian's binary packages are not built
        NOTE: with --with-default-trust-store-pkcs11=
        TODO: check CVE request
-CVE-2016-6184
-       RESERVED
-CVE-2016-6183
-       RESERVED
-CVE-2016-6182
-       RESERVED
-CVE-2016-6181
-       RESERVED
-CVE-2016-6180
-       RESERVED
-CVE-2016-6179
-       RESERVED
+CVE-2016-6184 (The Camera driver in Huawei Honor 4C smartphones with software 
...)
+       TODO: check
+CVE-2016-6183 (The Camera driver in Huawei Honor 4C smartphones with software 
...)
+       TODO: check
+CVE-2016-6182 (The Camera driver in Huawei Honor 4C smartphones with software 
...)
+       TODO: check
+CVE-2016-6181 (The Camera driver in Huawei Honor 4C smartphones with software 
...)
+       TODO: check
+CVE-2016-6180 (The Camera driver in Huawei Honor 4C smartphones with software 
...)
+       TODO: check
+CVE-2016-6179 (The WiFi driver in Huawei Honor6 smartphones with software 
H60-L01 ...)
+       TODO: check
 CVE-2016-6178 (Huawei NE40E and CX600 devices with software before 
V800R007SPH017; ...)
        NOT-FOR-US: Huawei
 CVE-2016-6177
@@ -5407,8 +5432,7 @@
        - postgresql-9.1 <removed>
        [jessie] - postgresql-9.1 <no-dsa> (postgresql-9.1 in jessie only 
provides PL/Perl)
        NOTE: 
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=f0c7b789ab12fbc8248b671c7882dd96ac932ef4
-CVE-2016-5422
-       RESERVED
+CVE-2016-5422 (The web console in Red Hat JBoss Operations Network (JON) 
before 3.3.7 ...)
        NOT-FOR-US: Red Hat JBoss Operations Network
 CVE-2016-5421 (Use-after-free vulnerability in libcurl before 7.50.1 allows 
attackers ...)
        {DSA-3638-1}
@@ -5479,8 +5503,7 @@
        NOT-FOR-US: JBoss EAP
 CVE-2016-5405
        RESERVED
-CVE-2016-5404 [insufficient permission check]
-       RESERVED
+CVE-2016-5404 (The cert_revoke command in FreeIPA does not check for the 
&quot;revoke ...)
        - freeipa <removed> (bug #835131)
        NOTE: 
https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=cf74584d0f772f3f5eccc1d30c001e4212a104fd
 (master)
        NOTE: https://fedorahosted.org/freeipa/ticket/6232
@@ -7126,8 +7149,8 @@
        RESERVED
 CVE-2016-5023 (Virtual servers in F5 BIG-IP systems 11.2.1 HF11 through HF15, 
11.4.1 ...)
        NOT-FOR-US: BIG-IP
-CVE-2016-5022
-       RESERVED
+CVE-2016-5022 (F5 BIG-IP LTM, Analytics, APM, ASM, and Link Controller 11.2.x 
before ...)
+       TODO: check
 CVE-2016-5021 (The iControl REST service in F5 BIG-IP LTM, AAM, AFM, 
Analytics, APM, ...)
        NOT-FOR-US: BIG-IP
 CVE-2016-5020 (F5 BIG-IP before 12.0.0 HF3 allows remote authenticated users 
to ...)
@@ -9977,6 +10000,7 @@
        NOTE: https://github.com/stedolan/jq/issues/1136
        NOTE: http://www.openwall.com/lists/oss-security/2016/04/24/3
 CVE-2016-4069 (Cross-site request forgery (CSRF) vulnerability in Roundcube 
Webmail ...)
+       {DLA-613-1}
        - roundcube 1.1.5+dfsg.1-1 (bug #822333)
        NOTE: https://github.com/roundcube/roundcubemail/issues/4957
        NOTE: 
https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
@@ -19595,12 +19619,10 @@
        RESERVED
 CVE-2016-1243
        RESERVED
-CVE-2016-1242
-       RESERVED
+CVE-2016-1242 (file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x 
before ...)
        {DSA-3656-1 DLA-607-1}
        - tryton-server 4.0.4-1
-CVE-2016-1241
-       RESERVED
+CVE-2016-1241 (Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 
3.6.12, ...)
        {DSA-3656-1}
        - tryton-server 4.0.4-1
        [wheezy] - tryton-server <not-affected> (password_hash field introduced 
in 3.2 series)
@@ -44271,6 +44293,7 @@
        NOTE: Request to mark the package as unsupported in #779104
        NOTE: http://piwigo.org/releases/2.7.3
 CVE-2015-1433 (program/lib/Roundcube/rcube_washtml.php in Roundcube before 
1.0.5 does ...)
+       {DLA-613-1}
        - roundcube 0.9.5+dfsg1-4.2 (low; bug #776700)
        [wheezy] - roundcube <no-dsa> (Minor issue)
        [squeeze] - roundcube <no-dsa> (Minor issue)
@@ -47445,6 +47468,7 @@
        [wheezy] - lftp <no-dsa> (Minor issue)
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2015/03/12/10
 CVE-2014-9587 (Multiple cross-site request forgery (CSRF) vulnerabilities in 
...)
+       {DLA-613-1}
        - roundcube 1.1.1+dfsg.1-2 (bug #775576)
        [squeeze] - roundcube <no-dsa> (Minor issue)
        [wheezy] - roundcube <no-dsa> (Minor issue)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to