Author: carnil
Date: 2017-06-18 05:59:18 +0000 (Sun, 18 Jun 2017)
New Revision: 52683

Modified:
   data/CVE/list
Log:
Add entries for weechat, wget, apt-cacher, apt-cacher-ng

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-06-18 05:59:07 UTC (rev 52682)
+++ data/CVE/list       2017-06-18 05:59:18 UTC (rev 52683)
@@ -4517,6 +4517,7 @@
 CVE-2017-8073 (WeeChat before 1.7.1 allows a remote crash by sending a 
filename via ...)
        {DSA-3836-1 DLA-919-1}
        - weechat 1.7-3 (bug #861121)
+       [buster] - weechat 1.6-1+deb9u1
        [stretch] - weechat 1.6-1+deb9u1
        NOTE: 
https://github.com/weechat/weechat/commit/2fb346f25f79e412cf0ed314fdf791763c19b70b
 CVE-2017-8072 (The cp2112_gpio_direction_input function in 
drivers/hid/hid-cp2112.c ...)
@@ -9187,6 +9188,7 @@
 CVE-2017-6508 (CRLF injection vulnerability in the url_parse function in url.c 
in Wget ...)
        {DLA-851-1}
        - wget 1.19.1-2 (bug #857073)
+       [buster] - wget 1.18-5
        [stretch] - wget 1.18-5
        [jessie] - wget 1.16-1+deb8u2
        NOTE: http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html
@@ -33466,10 +33468,12 @@
 CVE-2017-7443 (apt-cacher before 1.7.15 and apt-cacher-ng before 3.4 allow 
HTTP ...)
        {DLA-873-1}
        - apt-cacher-ng 3-1 (bug #858833)
+       [buster] - apt-cacher-ng 2-2
        [stretch] - apt-cacher-ng 2-2
        [jessie] - apt-cacher-ng <no-dsa> (Minor issue)
        [wheezy] - apt-cacher-ng <no-dsa> (Minor issue)
        - apt-cacher 1.7.15 (bug #858739)
+       [buster] - apt-cacher 1.7.13+deb9u1
        [stretch] - apt-cacher 1.7.13+deb9u1
        [jessie] - apt-cacher <no-dsa> (Minor issue)
 CVE-2016-7442 (The Frontend component in Sophos UTM with firmware 9.405-5 and 
earlier ...)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to