Author: sectracker Date: 2016-10-18 21:10:11 +0000 (Tue, 18 Oct 2016) New Revision: 45439
Modified: data/CVE/list Log: automatic update Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-10-18 20:35:36 UTC (rev 45438) +++ data/CVE/list 2016-10-18 21:10:11 UTC (rev 45439) @@ -30,7 +30,7 @@ RESERVED CVE-2016-6911 [invalid read in gdImageCreateFromTiffPtr()] RESERVED - {DSA-3693-1} + {DSA-3693-1 DLA-665-1} - libgd2 <unfixed> (bug #840806) NOTE: Corresponds to the 0020-Fix-invalid-read-in-gdImageCreateFromTiffPtr.patch patch CVE-2016-8703 @@ -156,7 +156,7 @@ NOTE: (Wheezy) Crash is not reproducible with reprocuder. Needs clarification from upstream. CVE-2016-8670 [Stack Buffer Overflow in GD dynamicGetbuf] RESERVED - {DSA-3693-1} + {DSA-3693-1 DLA-665-1} - libgd2 <unfixed> (bug #840805) NOTE: Workaround entry for DSA-3693-1 until CVE assigned NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73280 @@ -334,12 +334,14 @@ NOTE: Fixed by: https://git.kernel.org/linus/ded89912156b1a47d940a0c954c43afbabd0c42c (v4.8-rc8) CVE-2016-8606 [REPL server vulnerable to HTTP inter-protocol attacks] RESERVED + {DLA-666-1} - guile-2.0 <unfixed> (low; bug #840555) [jessie] - guile-2.0 <no-dsa> (Minor issue) - guile-1.8 <not-affected> (repl server introduced in 2.0) NOTE: Patch: http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=08c021916dbd3a235a9f9cc33df4c418c0724e03 CVE-2016-8605 [Thread-unsafe umask modification] RESERVED + {DLA-666-1} - guile-2.0 <unfixed> (low; bug #840556) [jessie] - guile-2.0 <no-dsa> (Minor issue) - guile-1.8 <not-affected> (repl server introduced in 2.0) @@ -2571,10 +2573,12 @@ NOTE: https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3 CVE-2016-7950 RESERVED + {DLA-664-1} - libxrender <unfixed> (bug #840443) NOTE: https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=8fad00b0b647ee662ce4737ca15be033b7a21714 CVE-2016-7949 RESERVED + {DLA-664-1} - libxrender <unfixed> (bug #840443) NOTE: https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=9362c7ddd1af3b168953d0737877bc52d79c94f4 CVE-2016-7948 [for all of the other mishandling of the reply data] @@ -24317,6 +24321,7 @@ NOTE: https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 (4.037) CVE-2016-1245 RESERVED + {DSA-3695-1 DLA-662-1} - quagga 1.0.20160315-3 (bug #841162) NOTE: Fixed by: https://github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 NOTE: https://lists.quagga.net/pipermail/quagga-users/2016-October/014478.html _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits