Author: sectracker
Date: 2016-10-12 21:10:13 +0000 (Wed, 12 Oct 2016)
New Revision: 45270

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-10-12 19:55:40 UTC (rev 45269)
+++ data/CVE/list       2016-10-12 21:10:13 UTC (rev 45270)
@@ -232,6 +232,7 @@
        - dwarfutils <unfixed>
        NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/10/08/13
 CVE-2016-8602 [type confusion]
+       {DSA-3691-1}
        - ghostscript <unfixed> (bug #840451)
        NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=697203
        NOTE: 
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=f5c7555c30393e64ec1f5ab0dfae5b55b3b3fc78
@@ -469,6 +470,7 @@
        RESERVED
 CVE-2016-7979 [type confusion in .initialize_dsc_parser allows remote code 
execution]
        RESERVED
+       {DSA-3691-1}
        - ghostscript <unfixed> (bug #839846)
        NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697190
        NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697190#c0
@@ -477,6 +479,7 @@
        NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/19
 CVE-2016-7978 [reference leak in .setdevice allows use-after-free and remote 
code execution]
        RESERVED
+       {DSA-3691-1}
        - ghostscript <unfixed> (bug #839845)
        NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697179
        NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
@@ -484,6 +487,7 @@
        NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
 CVE-2016-7977 [.libfile doesn't check PermitFileReading array, allowing remote 
file disclosure]
        RESERVED
+       {DSA-3691-1}
        - ghostscript <unfixed> (high; bug #839841)
        NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169
        NOTE: Reproducer: 
http://www.openwall.com/lists/oss-security/2016/09/29/28
@@ -491,6 +495,7 @@
        NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
 CVE-2016-7976 [various userparams allow %pipe% in paths, allowing remote shell 
command execution]
        RESERVED
+       {DSA-3691-1}
        - ghostscript <unfixed> (high; bug #839260)
        NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178
        NOTE: Reproducer: 
http://www.openwall.com/lists/oss-security/2016/09/30/8
@@ -82664,6 +82669,7 @@
        - serendipity <not-affected> (Spellcheck plugin not included in 1.5.x)
 CVE-2013-5653 [Ghostscript information disclosure through getenv, 
filenameforall]
        RESERVED
+       {DSA-3691-1}
        - ghostscript <unfixed> (low; bug #839118)
        NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=694724
        NOTE: 
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to