Author: carnil
Date: 2016-11-04 07:17:59 +0000 (Fri, 04 Nov 2016)
New Revision: 45961

Modified:
   data/CVE/list
Log:
CVE-2015-8970/linux assigned

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-11-04 07:15:29 UTC (rev 45960)
+++ data/CVE/list       2016-11-04 07:17:59 UTC (rev 45961)
@@ -4,14 +4,14 @@
        TODO: check
 CVE-2015-8968 (git-fastclone before 1.0.1 permits arbitrary shell command 
execution ...)
        TODO: check
-CVE-2016-XXXX [crypto: GPF in lrw_crypt caused by null-deref]
+CVE-2015-8970 [crypto: GPF in lrw_crypt caused by null-deref]
        - linux 4.4.2-1
        NOTE: 
https://groups.google.com/forum/#!msg/syzkaller/frb2XrB5aWk/xCXzkIBcDAAJ
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1386286
        NOTE: Fixed by: 
https://git.kernel.org/linus/dd504589577d8e8e70f51f997ad487a4cb6c026f (v4.5-rc1)
        NOTE: Followed by a complete set of related upstrema commits. See 
kernel-sec
        NOTE: triage for details.
-       NOTE: CVE Request: 
http://www.openwall.com/lists/oss-security/2016/11/03/6
+       NOTE: http://www.openwall.com/lists/oss-security/2016/11/03/6
 CVE-2016-9178 [privilege escalation in exception table handling]
        - linux <not-affected> (Vulnerable code not present, see NOTE)
        NOTE: This is only an issue if 1c109fabbd51863475cd12ac206bdd249aee35af


_______________________________________________
Secure-testing-commits mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to