diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2020-08-24 16:17:56 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2020-08-24 16:17:56 +0200 |
commit | 9ec1e4c263d8c3936840260dd4ec05ed8a8a9216 (patch) | |
tree | 2fffd62f666d746eb1c862089a2436dde34762fa | |
parent | c0adeec9dbb1f0c55f961a286d8b3d575b6c2242 (diff) |
Use HTTPS transport for www.openwall.com/lists/oss-security URLs
-rw-r--r-- | data/CVE/2002.list | 2 | ||||
-rw-r--r-- | data/CVE/2008.list | 10 | ||||
-rw-r--r-- | data/CVE/2009.list | 8 | ||||
-rw-r--r-- | data/CVE/2010.list | 20 | ||||
-rw-r--r-- | data/CVE/2011.list | 18 | ||||
-rw-r--r-- | data/CVE/2012.list | 226 | ||||
-rw-r--r-- | data/CVE/2013.list | 126 | ||||
-rw-r--r-- | data/CVE/2014.list | 110 | ||||
-rw-r--r-- | data/CVE/2015.list | 712 | ||||
-rw-r--r-- | data/CVE/2016.list | 780 | ||||
-rw-r--r-- | data/CVE/2017.list | 440 | ||||
-rw-r--r-- | data/CVE/2018.list | 186 | ||||
-rw-r--r-- | data/CVE/2020.list | 8 |
13 files changed, 1323 insertions, 1323 deletions
diff --git a/data/CVE/2002.list b/data/CVE/2002.list index e21a6e8f7d..3bffd33c93 100644 --- a/data/CVE/2002.list +++ b/data/CVE/2002.list @@ -8,7 +8,7 @@ CVE-2002-2483 - linux-2.6 2.4.20 CVE-2002-2444 (Snoopy before 2.0.0 has a security hole in exec cURL ...) - libphp-snoopy <not-affected> (affected version never was in the repo) - NOTE: http://www.openwall.com/lists/oss-security/2014/07/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2014/07/18/2 NOTE: http://sourceforge.net/p/snoopy/bugs/13/ CVE-2002-2443 (schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) ...) {DSA-2701-1} diff --git a/data/CVE/2008.list b/data/CVE/2008.list index 28e662bfe3..06939defd3 100644 --- a/data/CVE/2008.list +++ b/data/CVE/2008.list @@ -25,7 +25,7 @@ CVE-2008-7315 (UI-Dialog 1.09 and earlier allows remote attackers to execute arb [wheezy] - libui-dialog-perl <no-dsa> (Minor issue) [squeeze] - libui-dialog-perl <no-dsa> (Minor issue) NOTE: https://rt.cpan.org/Public/Bug/Display.html?id=107364 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/08/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/08/2 CVE-2008-7314 (mIRC before 6.35 allows attackers to cause a denial of service (crash) ...) NOT-FOR-US: mIRC CVE-2008-7313 (The _httpsrequest function in Snoopy allows remote attackers to execut ...) @@ -9698,7 +9698,7 @@ CVE-2008-XXXX [libetpan NULL deref] CVE-2008-XXXX [XSS in press-this of wordpress] - wordpress <not-affected> (Vulnerable code not present) NOTE: this code was never present in a released wordpress version - NOTE: http://www.openwall.com/lists/oss-security/2008/07/15/5 + NOTE: https://www.openwall.com/lists/oss-security/2008/07/15/5 CVE-2008-3224 (Unspecified vulnerability in phpBB before 3.0.1 has unknown impact and ...) - phpbb3 3.0.2-1 (low) - phpbb2 <not-affected> (Vulnerable code not present) @@ -10931,7 +10931,7 @@ CVE-2008-2713 (libclamav/petite.c in ClamAV before 0.93.1 allows remote attacker CVE-2008-2711 (fetchmail 6.3.8 and earlier, when running in -v -v (aka verbose) mode, ...) - fetchmail 6.3.9~rc2-1 (unimportant) [etch] - fetchmail 6.3.6-1etch3 - NOTE: http://www.openwall.com/lists/oss-security/2008/06/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2008/06/13/1 NOTE: -vv is only used for debugging purposes so this does not NOTE: prevent a victim from getting mails. -vv is not used in non-interactive NOTE: use. @@ -11617,7 +11617,7 @@ CVE-2008-2376 (Integer overflow in the rb_ary_fill function in array.c in Ruby b {DSA-1618-1 DSA-1612-1} - ruby1.9 1.9.0.2-2 - ruby1.8 1.8.7.22-2 - NOTE: http://www.openwall.com/lists/oss-security/2008/07/02/3 + NOTE: https://www.openwall.com/lists/oss-security/2008/07/02/3 CVE-2008-2375 (Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on ...) - vsftpd <not-affected> (debian versions all include the fix) CVE-2008-2374 (src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.3 ...) @@ -15304,7 +15304,7 @@ CVE-2008-0983 (lighttpd 1.4.18, and possibly other versions before 1.5.0, does n - lighttpd 1.4.18-2 (medium; bug #466663) CVE-2008-0883 (acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite ...) NOT-FOR-US: Adobe Acrobat Reader - NOTE: http://www.openwall.com/lists/oss-security/2008/02/21/5 + NOTE: https://www.openwall.com/lists/oss-security/2008/02/21/5 CVE-2008-0803 (Multiple PHP remote file inclusion vulnerabilities in LookStrike Lan M ...) NOT-FOR-US: LookStrike Lan Manager CVE-2008-0802 (SQL injection vulnerability in index.php in the MediaSlide (com_medias ...) diff --git a/data/CVE/2009.list b/data/CVE/2009.list index 0a315da66c..a6e7d452fe 100644 --- a/data/CVE/2009.list +++ b/data/CVE/2009.list @@ -295,8 +295,8 @@ CVE-2009-5031 (ModSecurity before 2.5.11 treats request parameter values contain - modsecurity-apache <not-affected> (Fixed before initial upload) - libapache-mod-security 2.5.12-1 NOTE: https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/22/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/22/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/22/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/22/2 CVE-2009-5030 (The tcd_free_encode function in tcd.c in OpenJPEG 1.3 through 1.5 allo ...) {DSA-2629-1} - openjpeg 1.3+dfsg-4.1 (medium; bug #672455) @@ -3974,7 +3974,7 @@ CVE-2009-3613 (The swiotlb functionality in the r8169 driver in drivers/net/r816 {DSA-1928-1 DSA-1915-1} - linux-2.6 2.6.29-1 (medium) - linux-2.6.24 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2009/10/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2009/10/15/4 CVE-2009-3612 (The tcf_fill_node function in net/sched/cls_api.c in the netlink subsy ...) {DSA-1929-1 DSA-1928-1 DSA-1927-1} - linux-2.6 2.6.31-2 (low) @@ -7637,7 +7637,7 @@ CVE-2009-2266 (OXID eShop 4.x before 4.1.4-21266, 3.x, and 2.x allows remote att CVE-2009-2281 (Multiple heap-based buffer underflows in the readPostBody function in ...) {DSA-1914-1} - mapserver 5.4.2-1 (medium; bug #535340) - NOTE: http://www.openwall.com/lists/oss-security/2009/06/22/2 + NOTE: https://www.openwall.com/lists/oss-security/2009/06/22/2 CVE-2009-2265 (Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4 ...) {DSA-1836-1} - fckeditor 1:2.6.4.1-1 (medium; bug #536051) diff --git a/data/CVE/2010.list b/data/CVE/2010.list index 5a5d7fc848..e5f495442f 100644 --- a/data/CVE/2010.list +++ b/data/CVE/2010.list @@ -48,7 +48,7 @@ CVE-2010-5322 (Cross-site scripting (XSS) vulnerability in ZeusCart 4.0 and earl NOT-FOR-US: ZeusCart CVE-2010-XXXX [crash when parsing overly long links] - lynx-cur 2.8.8dev.4-1 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/07/2 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/02/07/2 CVE-2010-5321 (Memory leak in drivers/media/video/videobuf-core.c in the videobuf sub ...) - linux <unfixed> (unimportant; bug #827340) - linux-2.6 <removed> (unimportant) @@ -4325,8 +4325,8 @@ CVE-2010-3674 (TYPO3 before 4.4.1 allows XSS in the frontend search box. ...) CVE-2010-XXXX [piwigo] - piwigo 2.1.2-2 NOTE: http://www.exploit-db.com/exploits/14973/ - NOTE: First unfilled CVE-request http://www.openwall.com/lists/oss-security/2010/12/07/1 - NOTE: Second CVE-request http://www.openwall.com/lists/oss-security/2012/10/06/3 + NOTE: First unfilled CVE-request https://www.openwall.com/lists/oss-security/2010/12/07/1 + NOTE: Second CVE-request https://www.openwall.com/lists/oss-security/2012/10/06/3 CVE-2010-3608 (Multiple SQL injection vulnerabilities in wpQuiz 2.7 allow remote atta ...) NOT-FOR-US: wpQuiz CVE-2010-3607 (Cross-site scripting (XSS) vulnerability in AGENTS/index.php in NetArt ...) @@ -8690,7 +8690,7 @@ CVE-2010-1870 (The OGNL extensive expression evaluation capability in XWork in S CVE-2010-1869 (Stack-based buffer overflow in the parser function in GhostScript 8.70 ...) {DSA-2080-1} - ghostscript 8.71~dfsg-4 - NOTE: http://www.openwall.com/lists/oss-security/2010/05/11/3 + NOTE: https://www.openwall.com/lists/oss-security/2010/05/11/3 CVE-2010-1868 (The (1) sqlite_single_query and (2) sqlite_array_query functions in ex ...) - php5 <removed> (unimportant) CVE-2010-1867 (SQL injection vulnerability in the ArticleAttachment::GetAttachmentsBy ...) @@ -11559,7 +11559,7 @@ CVE-2010-2450 (The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/ CVE-2010-1192 (libESMTP, probably 1.0.4 and earlier, does not properly handle a '\0' ...) - libesmtp 1.0.4-5 (bug #572960) [lenny] - libesmtp <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2010/03/03/6 + NOTE: https://www.openwall.com/lists/oss-security/2010/03/03/6 CVE-2010-1193 (Cross-site scripting (XSS) vulnerability in WebAccess in VMware Server ...) NOT-FOR-US: VMware Server CVE-2010-XXXX [argyll unsafe udev rules] @@ -11787,7 +11787,7 @@ CVE-2010-0735 CVE-2010-0734 (content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is enab ...) {DSA-2023-1} - curl 7.20.0-1 (low) - NOTE: http://www.openwall.com/lists/oss-security/2010/03/16/11 + NOTE: https://www.openwall.com/lists/oss-security/2010/03/16/11 NOTE: depends on the application that uses libcurl CVE-2010-0733 (Integer overflow in src/backend/executor/nodeHash.c in PostgreSQL 8.4. ...) - postgresql-8.4 8.4.2-1 @@ -11795,7 +11795,7 @@ CVE-2010-0732 (gdk/gdkwindow.c in GTK+ before 2.18.5, as used in gnome-screensav - gtk+2.0 2.18.5-1 [lenny] - gtk+2.0 <not-affected> (issue only exposed by gnome-screensaver 2.28) [etch] - gtk+2.0 <not-affected> (issue only exposed by gnome-screensaver 2.28) - NOTE: http://www.openwall.com/lists/oss-security/2010/02/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2010/02/12/1 CVE-2010-0731 (The gnutls_x509_crt_get_serial function in the GnuTLS library before 1 ...) - gnutls26 <not-affected> (Fixed before initial release) - gnutls13 1.2.1-1 @@ -12513,7 +12513,7 @@ CVE-2010-0434 (The ap_read_request function in server/protocol.c in the Apache H - apache2 2.2.15-1 CVE-2010-0433 (The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before ...) - openssl <not-affected> (Kerberos support not enabled) - NOTE: http://www.openwall.com/lists/oss-security/2010/03/03/5 + NOTE: https://www.openwall.com/lists/oss-security/2010/03/03/5 CVE-2010-0432 (Multiple cross-site scripting (XSS) vulnerabilities in the Apache Open ...) NOT-FOR-US: Apache Open For Business Project (OFBiz) CVE-2010-0431 (QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat E ...) @@ -12528,11 +12528,11 @@ CVE-2010-0428 (libspice, as used in QEMU-KVM in the Hypervisor (aka rhev-hypervi CVE-2010-0427 (sudo 1.6.x before 1.6.9p21, when the runas_default option is used, doe ...) {DSA-2006-1} - sudo 1.7.0-1 - NOTE: http://www.openwall.com/lists/oss-security/2010/02/23/4 + NOTE: https://www.openwall.com/lists/oss-security/2010/02/23/4 CVE-2010-0426 (sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-com ...) {DSA-2006-1} - sudo 1.7.2p1-1.2 (bug #570737) - NOTE: http://www.openwall.com/lists/oss-security/2010/02/23/4 + NOTE: https://www.openwall.com/lists/oss-security/2010/02/23/4 CVE-2010-0425 (modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server ...) - apache2 <not-affected> (Windows only) CVE-2010-0424 (The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) ...) diff --git a/data/CVE/2011.list b/data/CVE/2011.list index a92ecf2a33..f1cd3653b7 100644 --- a/data/CVE/2011.list +++ b/data/CVE/2011.list @@ -13,7 +13,7 @@ CVE-2011-5326 (imlib2 before 1.4.9 allows remote attackers to cause a denial of {DSA-3555-1} - imlib2 1.4.8-1 (bug #639414) NOTE: https://git.enlightenment.org/legacy/imlib2.git/commit/?id=c94d83ccab15d5ef02f88d42dce38ed3f0892882 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/10/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/10/5 CVE-2011-5325 (Directory traversal vulnerability in the BusyBox implementation of tar ...) {DLA-1445-1} - busybox 1:1.27.2-1 (bug #802702) @@ -44,7 +44,7 @@ CVE-2011-5320 (scanf and related functions in glibc before 2.15 allow local user NOTE: 2.15 ist the first version recieving the fix, mark with upstream version which should NOTE: be handled correctly then by the tracker. NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=13138 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/26/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/26/2 NOTE: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=3f8cc204fdd0 NOTE: CVE assigned specific to the https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4 issue CVE-2011-5318 (Multiple cross-site request forgery (CSRF) vulnerabilities in diafan.C ...) @@ -156,7 +156,7 @@ CVE-2011-5268 (connection.c in Bip before 0.8.9 does not properly close sockets, - bip 0.8.9-1 [squeeze] - bip <no-dsa> (Minor issue) [wheezy] - bip <no-dsa> (Minor issue) - NOTE: Difference between CVE-2011-5268 and CVE-2013-4550: http://www.openwall.com/lists/oss-security/2014/01/02/9 + NOTE: Difference between CVE-2011-5268 and CVE-2013-4550: https://www.openwall.com/lists/oss-security/2014/01/02/9 CVE-2011-5267 (Multiple cross-site scripting (XSS) vulnerabilities in spell-check-sav ...) NOT-FOR-US: SpellChecker module in Xinha CVE-2011-5266 (Imperva SecureSphere Web Application Firewall (WAF) before 12-august-2 ...) @@ -892,7 +892,7 @@ CVE-2011-4940 (The list_directory function in Lib/SimpleHTTPServer.py in SimpleH - python2.7 2.7.2-8 (unimportant) - python2.6 <unfixed> (unimportant; bug #664135) - python2.5 <removed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/14/11 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/14/11 NOTE: This only affects IE7, which is inherently insecure anyway CVE-2011-4939 (The pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin befor ...) - pidgin 2.10.2-1 (bug #664028) @@ -2819,7 +2819,7 @@ CVE-2011-4113 (SQL injection vulnerability in the Views module before 6.x-2.13 f - drupal6-mod-views 2.14-1 CVE-2011-4112 (The net subsystem in the Linux kernel before 3.1 does not properly res ...) - linux-2.6 3.1-1 (unimportant) - NOTE: Turned out to be a non-issue, http://www.openwall.com/lists/oss-security/2011/11/24/3 + NOTE: Turned out to be a non-issue, https://www.openwall.com/lists/oss-security/2011/11/24/3 CVE-2011-4111 (Buffer overflow in the ccid_card_vscard_handle_message function in hw/ ...) - qemu 0.15.1+dfsg-2 [lenny] - qemu <not-affected> (Vulnerable CCID code not present) @@ -4992,15 +4992,15 @@ CVE-2011-3344 (Cross-site scripting (XSS) vulnerability in the Lookup Login/Pass CVE-2011-3343 (Multiple buffer overflows in OpenTTD before 1.1.3 allow local users to ...) {DSA-2386-1} - openttd 1.1.3-1 - NOTE: http://www.openwall.com/lists/oss-security/2011/09/02/4 + NOTE: https://www.openwall.com/lists/oss-security/2011/09/02/4 CVE-2011-3342 (Multiple buffer overflows in OpenTTD before 1.1.3 allow remote attacke ...) {DSA-2386-1} - openttd 1.1.3-1 - NOTE: http://www.openwall.com/lists/oss-security/2011/09/02/4 + NOTE: https://www.openwall.com/lists/oss-security/2011/09/02/4 CVE-2011-3341 (Multiple off-by-one errors in order_cmd.cpp in OpenTTD before 1.1.3 al ...) {DSA-2386-1} - openttd 1.1.3-1 - NOTE: http://www.openwall.com/lists/oss-security/2011/09/02/4 + NOTE: https://www.openwall.com/lists/oss-security/2011/09/02/4 CVE-2011-3340 (SQL injection vulnerability in ATCOM Netvolution 2.5.8 ASP allows remo ...) NOT-FOR-US: ATCOM Netvolution CVE-2011-3339 (Cross-site scripting (XSS) vulnerability in the Admin Control Center i ...) @@ -9349,7 +9349,7 @@ CVE-2011-1775 (The CSecurityTLS::processMsg function in common/rfb/CSecurityTLS. NOTE: https://github.com/TigerVNC/tigervnc/commit/ce6c8b097f0d5b161039dc8c8208aff078d433ff CVE-2011-1774 (WebKit in Apple Safari before 5.0.6 has improper libxslt security sett ...) NOTE: CVE-2011-1774 is about webkit's interface to xmlsec, CVE-2011-1425 is the actual issue - NOTE: http://www.openwall.com/lists/oss-security/2011/05/09/4 + NOTE: https://www.openwall.com/lists/oss-security/2011/05/09/4 CVE-2011-1773 (virt-v2v before 0.8.4 does not preserve the VNC console password when ...) NOT-FOR-US: virt-v2v CVE-2011-1772 (Multiple cross-site scripting (XSS) vulnerabilities in XWork in Apache ...) diff --git a/data/CVE/2012.list b/data/CVE/2012.list index 2a753a17db..373c688e5b 100644 --- a/data/CVE/2012.list +++ b/data/CVE/2012.list @@ -61,7 +61,7 @@ CVE-2012-6706 (A VMSF_DELTA memory corruption was discovered in unrar before 5.5 - libclamunrar 0.99-4 (bug #867223) [stretch] - libclamunrar 0.99-3+deb9u1 [jessie] - libclamunrar 0.99-0+deb8u3 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/9 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/21/9 NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1286&desc=6 NOTE: https://github.com/vrtadmin/clamav-devel/commit/d4699442bce76574573dc564e7f2177d679b88bd CVE-2012-6705 (Cross Site Scripting (XSS) exists in Jamroom before 4.2.7 via the Stat ...) @@ -118,12 +118,12 @@ CVE-2012-6696 (inspircd in Debian before 2.0.7 does not properly handle unsigned {DSA-3226-1 DLA-276-1} - inspircd 2.0.16-1 (bug #780880) NOTE: Correct fix: https://github.com/inspircd/inspircd/commit/ed28c1ba666b39581adb860bf51cdde43c84cc89 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/29/5 CVE-2012-6697 (InspIRCd before 2.0.7 allows remote attackers to cause a denial of ser ...) {DSA-3226-1 DLA-276-1} - inspircd 2.0.16-1 (bug #780880) NOTE: https://github.com/inspircd/inspircd/commit/58c893e834ff20495d007709220881a3ff13f423 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/29/5 CVE-2012-6690 RESERVED CVE-2012-6688 @@ -134,7 +134,7 @@ CVE-2012-6689 (The netlink_sendmsg function in net/netlink/af_netlink.c in the L [wheezy] - linux 3.2.30-1 - linux-2.6 <removed> NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=848949 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/06/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/06/13 NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e1db19db5d6b9e4e83021595eab0dc8f107bef (v3.6-rc5) CVE-2012-6687 (FastCGI (aka fcgi and libfcgi) 2.4.0 allows remote attackers to cause ...) {DLA-431-1 DLA-430-1} @@ -143,7 +143,7 @@ CVE-2012-6687 (FastCGI (aka fcgi and libfcgi) 2.4.0 allows remote attackers to c - libfcgi-perl 0.78-2 (bug #815840) [jessie] - libfcgi-perl 0.77-1+deb8u1 [wheezy] - libfcgi-perl <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/06/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/06/4 CVE-2012-XXXX [Insufficient validation of USB device descriptors] - oss4 4.2-build2010-2 (bug #775662) [wheezy] - oss4 <no-dsa> (Minor issue) @@ -1050,7 +1050,7 @@ CVE-2012-6303 (Heap-based buffer overflow in the GetWavHeader function in generi [squeeze] - snack 2.2.10-dfsg1-9+squeeze1 - wavesurfer <not-affected> (originally reported in wavesurfer, but actually a bug in libsnack, see bug #695615) NOTE: http://secunia.com/advisories/49889/ - NOTE: http://www.openwall.com/lists/oss-security/2012/12/10/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/10/2 CVE-2012-6302 (Soapbox through 0.3.1: Sandbox bypass - runs a second instance of Soap ...) NOT-FOR-US: Soapbox CVE-2012-6301 (The Browser application in Android 4.0.3 allows remote attackers to ca ...) @@ -1508,7 +1508,7 @@ CVE-2012-6111 (gnome-keyring does not discard stored secrets when using gnome_ke - gnome-keyring 3.8.2-1 (low; bug #697896) [squeeze] - gnome-keyring <no-dsa> (Minor issue) [wheezy] - gnome-keyring <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/01/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/11/5 CVE-2012-6109 (lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x ...) - ruby-rack 1.4.1-2.1 (bug #698440) - librack-ruby <removed> @@ -1607,8 +1607,8 @@ CVE-2012-6084 (modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybd {DSA-2612-1} - charybdis 3.3.0-7.1 (bug #697092) - ircd-ratbox 3.0.7.dfsg-3 (bug #697093) - NOTE: http://www.openwall.com/lists/oss-security/2013/01/01/1 - NOTE: http://www.openwall.com/lists/oss-security/2013/01/01/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/01/2 CVE-2012-6083 (Freeciv before 2.3.3 allows remote attackers to cause a denial of serv ...) - freeciv 2.3.4-1 (low; bug #696306) [squeeze] - freeciv <no-dsa> (Minor issue) @@ -1630,13 +1630,13 @@ CVE-2012-6080 (Directory traversal vulnerability in the _do_attachment_move func NOTE: Fix http://hg.moinmo.in/moin/1.9/rev/3c27131a3c52 CVE-2012-6079 (W3 Total Cache before 0.9.2.5 exposes sensitive cached database inform ...) NOT-FOR-US: W3 Total Cache - NOTE: http://www.openwall.com/lists/oss-security/2012/12/30/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/30/3 CVE-2012-6078 (W3 Total Cache before 0.9.2.5 generates hash keys insecurely which all ...) NOT-FOR-US: W3 Total Cache - NOTE: http://www.openwall.com/lists/oss-security/2012/12/30/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/30/3 CVE-2012-6077 (W3 Total Cache before 0.9.2.5 allows remote attackers to retrieve pass ...) NOT-FOR-US: W3 Total Cache - NOTE: http://www.openwall.com/lists/oss-security/2012/12/30/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/30/3 CVE-2012-6076 (Inkscape before 0.48.4 reads .eps files from /tmp instead of the curre ...) - inkscape 0.48.3.1-1.3 (low; bug #654341) [squeeze] - inkscape <no-dsa> (Minor issue) @@ -1647,20 +1647,20 @@ CVE-2012-6075 (Buffer overflow in the e1000_receive function in the e1000 device - qemu-kvm 1.1.2+dfsg-4 (bug #696051) - xen 4.1.3-8 [squeeze] - xen <not-affected> (In Squeeze the code is in the package xen-qemu-dm-4.0) - NOTE: http://www.openwall.com/lists/oss-security/2012/12/30/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/30/1 CVE-2012-6074 (Cross-site scripting (XSS) vulnerability in Jenkins before 1.491, Jenk ...) - jenkins 1.447.2+dfsg-3 (bug #696816) NOTE: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20 - NOTE: http://www.openwall.com/lists/oss-security/2012/12/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/28/1 CVE-2012-6073 (Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS befor ...) - jenkins 1.447.2+dfsg-3 (bug #696816) NOTE: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20 - NOTE: http://www.openwall.com/lists/oss-security/2012/12/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/28/1 CVE-2012-6072 (CRLF injection vulnerability in Jenkins before 1.491, Jenkins LTS befo ...) - jenkins 1.447.2+dfsg-3 (bug #696816) - jenkins-winstone 0.9.10-jenkins-37+dfsg-2 (bug #696974) NOTE: https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20 - NOTE: http://www.openwall.com/lists/oss-security/2012/12/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/28/1 CVE-2012-6071 (nuSOAP before 0.7.3-5 does not properly check the hostname of a cert. ...) - nusoap 0.7.3-5 (low; bug #696707) [squeeze] - nusoap <no-dsa> (Minor issue) @@ -2637,7 +2637,7 @@ CVE-2012-5667 (Multiple integer overflows in GNU Grep before 2.11 might allow co [squeeze] - grep 2.6.3-3+squeeze1 NOTE: https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1091473 NOTE: patch http://git.savannah.gnu.org/cgit/grep.git/commit/?id=cbbc1a45b9f843c811905c97c90a5d31f8e6c189 - NOTE: http://www.openwall.com/lists/oss-security/2012/12/22/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/22/1 CVE-2012-5666 (Cross-site scripting (XSS) vulnerability in bookmarks/js/bookmarks.js ...) - owncloud 4.0.8debian-1.3 (bug #696574) [wheezy] - owncloud 4.0.4debian2-3.2 @@ -2648,7 +2648,7 @@ CVE-2012-5664 REJECTED CVE-2012-5663 (The isearch package (textproc/isearch) before 1.47.01nb1 uses the temp ...) NOT-FOR-US: Isearch - NOTE: http://www.openwall.com/lists/oss-security/2012/12/21/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/21/1 CVE-2012-5662 (x3270 before 3.3.12ga12 does not verify that the server hostname match ...) - ibm-3270 3.3.14ga11-1 (bug #706547) [wheezy] - ibm-3270 <no-dsa> (Non-free not supported) @@ -2664,7 +2664,7 @@ CVE-2012-5658 (rhc-chk.rb in Red Hat OpenShift Origin before 1.1, when -d (debug CVE-2012-5657 (The (1) Zend_Feed_Rss and (2) Zend_Feed_Atom classes in Zend_Feed in Z ...) {DSA-2602-1} - zendframework 1.11.13-1.1 (bug #696483) - NOTE: http://www.openwall.com/lists/oss-security/2012/12/20/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/20/2 NOTE: http://framework.zend.com/security/advisory/ZF2012-05 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=889037 NOTE: http://secunia.com/advisories/51583 @@ -2791,7 +2791,7 @@ CVE-2012-5618 (Ushahidi before 2.6.1 has insufficient entropy for forgot-passwor CVE-2012-5617 (gksu-polkit: permissive PolicyKit policy configuration file allows pri ...) - gksu-polkit <removed> (bug #695807) [squeeze] - gksu-polkit <end-of-life> (Unsupported in squeeze-lts) - NOTE: http://www.openwall.com/lists/oss-security/2012/12/12/8 + NOTE: https://www.openwall.com/lists/oss-security/2012/12/12/8 CVE-2012-5616 (Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly ...) NOT-FOR-US: CloudStack CVE-2012-5615 (Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.2 ...) @@ -2810,7 +2810,7 @@ CVE-2012-5614 (Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and Maria [squeeze] - mysql-5.1 5.1.73-1 NOTE: https://mariadb.atlassian.net/browse/MDEV-3910 NOTE: http://seclists.org/fulldisclosure/2012/Dec/7 - NOTE: http://www.openwall.com/lists/oss-security/2013/02/28/10 + NOTE: https://www.openwall.com/lists/oss-security/2013/02/28/10 CVE-2012-5613 - mysql-5.1 <unfixed> (unimportant; bug #695001) - mysql-5.5 <removed> (unimportant; bug #695001) @@ -2828,23 +2828,23 @@ CVE-2012-5611 (Stack-based buffer overflow in the acl_get function in Oracle MyS CVE-2012-5610 (Incomplete blacklist vulnerability in lib/filesystem.php in ownCloud b ...) - owncloud 4.0.8debian-1.1 (bug #693990) [wheezy] - owncloud 4.0.4debian2-3.1 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/30/2 CVE-2012-5609 (Incomplete blacklist vulnerability in lib/migrate.php in ownCloud befo ...) - owncloud 4.0.8debian-1.1 (bug #693990) [wheezy] - owncloud 4.0.4debian2-3.1 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/30/2 CVE-2012-5608 (Cross-site scripting (XSS) vulnerability in apps/user_webdavauth/setti ...) - owncloud 4.0.8debian-1.1 (bug #693990) [wheezy] - owncloud 4.0.4debian2-3.1 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/30/2 CVE-2012-5607 (The "Lost Password" reset functionality in ownCloud before 4.0.9 and 4 ...) - owncloud 4.0.8debian-1.1 (bug #693990) [wheezy] - owncloud 4.0.4debian2-3.1 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/30/2 CVE-2012-5606 (Multiple cross-site scripting (XSS) vulnerabilities in ownCloud before ...) - owncloud 4.0.8debian-1.1 (bug #693990) [wheezy] - owncloud 4.0.4debian2-3.1 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/30/2 CVE-2012-5605 (Grinder in Red Hat CloudForms before 1.1 uses world-writable permissio ...) NOT-FOR-US: Red Hat CloudForms CVE-2012-5604 (The ldap_fluff gem for Ruby, as used in Red Hat CloudForms 1.1, when u ...) @@ -2902,7 +2902,7 @@ CVE-2012-5581 (Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 {DSA-2589-1} - tiff 4.0.2-1 (bug #694693) - tiff3 3.9.6-10 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/28/1 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=867235 CVE-2012-5580 (Format string vulnerability in the print_proxies function in bin/proxy ...) - libproxy 0.3.1-4 (low) @@ -2924,7 +2924,7 @@ CVE-2012-5576 (Multiple stack-based buffer overflows in file-xwd.c in the X Wind [squeeze] - gimp 2.6.10-1+squeeze4 NOTE: Upstream fix http://git.gnome.org/browse/gimp/commit/?id=2873262fccba12af144ed96ed91be144d92ff2e1 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=687392 - NOTE: http://www.openwall.com/lists/oss-security/2012/11/21/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/11/21/2 CVE-2012-5575 (Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x befo ...) NOT-FOR-US: Apache CXF CVE-2012-5574 (lib/form/sfForm.class.php in Symfony CMS before 1.4.20 allows remote a ...) @@ -4792,12 +4792,12 @@ CVE-2012-4754 (Multiple untrusted search path vulnerabilities in MindManager 201 CVE-2012-4410 REJECTED CVE-2012-4753 (Multiple cross-site request forgery (CSRF) vulnerabilities in ownCloud ...) - NOTE: http://www.openwall.com/lists/oss-security/2012/09/05/17 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/05/17 NOTE: False assignment, will be rejected, see #688123 CVE-2012-4752 (appconfig.php in ownCloud before 4.0.6 does not properly restrict acce ...) - owncloud 4.0.7debian-1 [wheezy] - owncloud 4.0.4debian2-2 - NOTE: http://www.openwall.com/lists/oss-security/2012/09/05/17 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/05/17 CVE-2012-4751 (Cross-site scripting (XSS) vulnerability in Open Ticket Request System ...) - otrs2 3.1.7+dfsg1-6 [squeeze] - otrs2 2.4.9+dfsg1-3+squeeze4 @@ -5555,7 +5555,7 @@ CVE-2012-4437 (Cross-site scripting (XSS) vulnerability in the SmartyException c - smarty <removed> (bug #702710) [squeeze] - smarty 2.6.26-0.2+squeeze1 [squeeze] - smarty3 <end-of-life> (Unsupported in squeeze-lts) - NOTE: http://www.openwall.com/lists/oss-security/2012/09/19/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/19/1 NOTE: http://secunia.com/advisories/50589/ NOTE: http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt NOTE: http://code.google.com/p/smarty-php/source/detail?r=4658 @@ -5613,7 +5613,7 @@ CVE-2012-4426 (Multiple format string vulnerabilities in mcrypt 2.6.8 and earlie [squeeze] - mcrypt <no-dsa> (minor issue, it doesn't affect libmcrypt) CVE-2012-4425 (libgio, when used in setuid or other privileged programs in spice-gtk ...) - spice-gtk 0.12-5 (bug #689155) - NOTE: http://www.openwall.com/lists/oss-security/2012/09/13/18 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/13/18 CVE-2012-4424 (Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library ...) {DLA-165-1} - eglibc <removed> @@ -5623,7 +5623,7 @@ CVE-2012-4423 (The virNetServerProgramDispatchCall function in libvirt before 0. - libvirt 0.9.12-5 (bug #687598) [squeeze] - libvirt <not-affected> (Vulnerable code not present) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=857133 - NOTE: http://www.openwall.com/lists/oss-security/2012/09/13/11 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/13/11 CVE-2012-4422 (wp-admin/plugins.php in WordPress before 3.4.2, when the multisite fea ...) - wordpress 3.4.2+dfsg-1 CVE-2012-4421 (The create_post function in wp-includes/class-wp-atom-server.php in Wo ...) @@ -5633,7 +5633,7 @@ CVE-2012-4420 (An information disclosure flaw was found in the way the Java Virt CVE-2012-4419 (The compare_tor_addr_to_addr_policy function in or/policies.c in Tor b ...) {DSA-2548-1} - tor 0.2.3.22-rc-1 - NOTE: http://www.openwall.com/lists/oss-security/2012/09/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/12/5 NOTE: https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes NOTE: https://gitweb.torproject.org/tor.git/commitdiff/973c18bf0e84d14d8006a9ae97fde7f7fb97e404 NOTE: https://gitweb.torproject.org/tor.git/commitdiff/62d96284f7e0f81c40d5df7e53dd7b4dfe7e56a5 @@ -5656,7 +5656,7 @@ CVE-2012-4414 (Multiple SQL injection vulnerabilities in the replication code in - mysql-5.5 5.5.30+dfsg-1 (bug #687485) CVE-2012-4413 (OpenStack Keystone 2012.1.3 does not invalidate existing tokens when g ...) - keystone 2012.1.1-6 (bug #687428) - NOTE: http://www.openwall.com/lists/oss-security/2012/09/12/7 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/12/7 CVE-2012-4412 (Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc ...) {DLA-165-1} - eglibc <removed> @@ -5750,32 +5750,32 @@ CVE-2012-4382 (MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not proper - mediawiki 1:1.19.2-1 (bug #686330) [squeeze] - mediawiki <end-of-life> NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=39823 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/31/6 CVE-2012-4381 (MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in t ...) - mediawiki 1:1.19.2-1 (bug #686330) [squeeze] - mediawiki <end-of-life> NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=39184 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/31/6 CVE-2012-4380 (MediaWiki before 1.18.5, and 1.19.x before 1.19.2 allows remote attack ...) - mediawiki 1:1.19.2-1 (bug #686330) [squeeze] - mediawiki <end-of-life> NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=39824 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/31/6 CVE-2012-4379 (MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not send a rest ...) - mediawiki 1:1.19.2-1 (bug #686330) [squeeze] - mediawiki <end-of-life> NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=39180 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/31/6 CVE-2012-4378 (Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki befor ...) - mediawiki 1:1.19.2-1 (bug #686330) [squeeze] - mediawiki <end-of-life> NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=37587 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/31/6 CVE-2012-4377 (Cross-site scripting (XSS) vulnerability in MediaWiki before 1.18.5 an ...) - mediawiki 1:1.19.2-1 (bug #686330) [squeeze] - mediawiki <not-affected> (Introduced in 1.16) NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=39700 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/31/6 CVE-2012-4376 RESERVED CVE-2012-4375 @@ -6628,14 +6628,14 @@ CVE-2012-4049 (epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1. - wireshark 1.8.2-1 [squeeze] - wireshark <not-affected> (Vulnerable code not present) NOTE: http://www.wireshark.org/security/wnpa-sec-2012-12.html - NOTE: http://www.openwall.com/lists/oss-security/2012/07/24/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/24/2 CVE-2012-4048 (The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9 ...) {DSA-2590-1} - wireshark 1.8.2-1 (bug #680056) NOTE: http://www.wireshark.org/security/wnpa-sec-2012-11.html - NOTE: http://www.openwall.com/lists/oss-security/2012/07/24/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/24/2 CVE-2012-4033 (Multiple unspecified vulnerabilities in the Zingiri Web Shop plugin be ...) NOT-FOR-US: Zingiri not in Debian CVE-2012-4032 (Open redirect vulnerability in the login page in WebsitePanel before 1 ...) @@ -6704,12 +6704,12 @@ CVE-2012-4003 (Multiple cross-site scripting (XSS) vulnerabilities in GLPI-PROJE - glpi 0.83.31-1 (unimportant) NOTE: Only supported behind an authenticated HTTP zone NOTE: https://forge.indepnet.net/projects/glpi/versions/771 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/13/1 CVE-2012-4002 (Cross-site request forgery (CSRF) vulnerability in GLPI-PROJECT GLPI b ...) - glpi 0.83.31-1 (unimportant) NOTE: Only supported behind an authenticated HTTP zone NOTE: https://forge.indepnet.net/projects/glpi/versions/771 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/13/1 CVE-2012-4001 (The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server d ...) NOT-FOR-US: mod_pagespeed CVE-2012-4000 (Cross-site scripting (XSS) vulnerability in the print_textinputs_var f ...) @@ -7847,7 +7847,7 @@ CVE-2012-3524 (libdbus 1.5.x and earlier, when used in setuid or other privilege - glib2.0 2.33.12+really2.32.4-2 [squeeze] - glib2.0 <not-affected> (Vulnerable code not present) NOTE: fixed in 2.34.0-1 from experimental - NOTE: http://www.openwall.com/lists/oss-security/2012/09/12/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/09/12/6 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=697105 NOTE: http://stealth.openwall.net/null/dzug.c CVE-2012-3523 (The STARTTLS implementation in nnrpd in INN before 2.5.3 does not prop ...) @@ -7985,7 +7985,7 @@ CVE-2012-3482 (Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in CVE-2012-3481 (Integer overflow in the ReadImage function in plug-ins/common/file-gif ...) - gimp 2.8.2-1 (bug #685397) [squeeze] - gimp 2.6.10-1+squeeze4 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/20/8 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/20/8 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=776572 CVE-2012-3480 (Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, ...) {DLA-165-1} @@ -7995,8 +7995,8 @@ CVE-2012-3479 (lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically e {DSA-2603-1} - emacs23 23.4+1-4 (bug #684695) - emacs24 24.2+1-1 (bug #684694) - NOTE: http://www.openwall.com/lists/oss-security/2012/08/13/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/13/2 CVE-2012-3478 (rssh 2.3.3 and earlier allows local users to bypass intended restricte ...) {DSA-2530-1} - rssh 2.3.3-5 @@ -8039,7 +8039,7 @@ CVE-2012-3464 (Cross-site scripting (XSS) vulnerability in activesupport/lib/act CVE-2012-3463 (Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view ...) - rails <not-affected> (Only affects RoR 3.x) - ruby-actionpack-3.2 3.2.6-4 (bug #684454) - NOTE: http://www.openwall.com/lists/oss-security/2012/08/09/8 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/09/8 CVE-2012-3462 (A flaw was found in SSSD version 1.9.0. The SSSD's access-provider log ...) - sssd 1.10.0-1 NOTE: https://pagure.io/SSSD/sssd/issue/1470 @@ -8078,8 +8078,8 @@ CVE-2012-3450 (pdo_sql_parser.re in the PDO extension in PHP before 5.3.14 and 5 - php5 5.4.4-1 (bug #683694) NOTE: http://seclists.org/bugtraq/2012/Jun/60 NOTE: https://bugs.php.net/bug.php?id=61755 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/02/3 - NOTE: http://www.openwall.com/lists/oss-security/2012/08/02/7 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/02/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/08/02/7 CVE-2012-3449 (Open vSwitch 1.4.2 uses world writable permissions for (1) /var/lib/op ...) - openvswitch 1.4.2+git20120612-8 (bug #683665) CVE-2012-3448 (Unspecified vulnerability in Ganglia Web before 3.5.1 allows remote at ...) @@ -8098,20 +8098,20 @@ CVE-2012-3444 (The get_image_dimensions function in the image-handling functiona {DSA-2529-1} - python-django 1.4.1-1 (bug #683364) NOTE: https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ - NOTE: http://www.openwall.com/lists/oss-security/2012/07/31/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/31/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/31/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/31/2 CVE-2012-3443 (The django.forms.ImageField class in the form system in Django before ...) {DSA-2529-1} - python-django 1.4.1-1 (bug #683364) NOTE: https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ - NOTE: http://www.openwall.com/lists/oss-security/2012/07/31/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/31/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/31/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/31/2 CVE-2012-3442 (The (1) django.http.HttpResponseRedirect and (2) django.http.HttpRespo ...) {DSA-2529-1} - python-django 1.4.1-1 (bug #683364) NOTE: https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued/ - NOTE: http://www.openwall.com/lists/oss-security/2012/07/31/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/31/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/31/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/31/2 CVE-2012-3441 (The database creation script (module/idoutils/db/scripts/create_mysqld ...) - icinga <not-affected> (Debian uses dbconfig, which does the right thing, bug #683320) CVE-2012-3440 (A certain Red Hat script for sudo 1.7.2 on Red Hat Enterprise Linux (R ...) @@ -8146,7 +8146,7 @@ CVE-2012-3430 (The rds_recvmsg function in net/rds/recv.c in the Linux kernel be - linux 3.2.29-1 - linux-2.6 <removed> [squeeze] - linux-2.6 2.6.32-36 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/26/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/26/3 CVE-2012-3429 (The dns_to_ldap_dn_escape function in src/ldap_convert.c in bind-dyndb ...) NOT-FOR-US: Dynamic LDAP backend plugin for BIND CVE-2012-3428 (The IronJacamar container before 1.0.12.Final for JBoss Application Se ...) @@ -8190,7 +8190,7 @@ CVE-2012-3414 (Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFU NOTE: https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ CVE-2012-3413 (The HTMLQuoteColorer::process function in messageviewer/htmlquotecolor ...) - kdepim <not-affected> (Only affects kdepim >= 4.6) - NOTE: CVE-request http://www.openwall.com/lists/oss-security/2012/07/13/3 + NOTE: CVE-request https://www.openwall.com/lists/oss-security/2012/07/13/3 NOTE: https://projects.kde.org/projects/kde/kdepim/repository/revisions/dbb2f72f4745e00f53031965a9c10b2d6862bd54 NOTE: https://bugs.launchpad.net/ubuntu/+source/kdepim/+bug/1022690 CVE-2012-3412 (The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before ...) @@ -8216,16 +8216,16 @@ CVE-2012-3408 (lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Pupp NOTE: Fixed in 2.7.18 by updated docs CVE-2012-3407 (plow has local buffer overflow vulnerability ...) NOT-FOR-US: plow - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/6 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/16 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/16 CVE-2012-3406 (The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka ...) {DSA-3169-1 DLA-165-1} - eglibc <removed> - glibc 2.19-14 (low; bug #681888) NOTE: Upstream fix: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5985c6ea868db23380977a35a2167549f9a3653b NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=826943 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/5 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/17 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/17 CVE-2012-3405 (The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Libr ...) {DLA-165-1} - glibc 2.13-35 (low; bug #681473) @@ -8234,8 +8234,8 @@ CVE-2012-3405 (The vfprintf function in stdio-common/vfprintf.c in libc in GNU C NOTE: http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=a4647e727a2a52e1259474c13f4b13288938bed4 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=833704 NOTE: http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1d498daa95384e5c9ad5bcb35e7a996e5869ac39 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/5 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/17 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/17 CVE-2012-3404 (The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Libr ...) - glibc 2.13-35 (low; bug #681473) - eglibc 2.13-35 (low; bug #681473) @@ -8243,8 +8243,8 @@ CVE-2012-3404 (The vfprintf function in stdio-common/vfprintf.c in libc in GNU C NOTE: http://sourceware.org/bugzilla/show_bug.cgi?id=12445 NOTE: http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=84a4211850e3d23a9d3a4f3b294752a3b30bc0ff NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=833703 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/5 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/17 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/17 CVE-2012-3403 (Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP ...) - gimp 2.8.2-1 (bug #685397) [squeeze] - gimp 2.6.10-1+squeeze4 @@ -8309,16 +8309,16 @@ CVE-2012-3386 (The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12. [squeeze] - automake1.9 1.9.6+nogfdl-3.1+squeeze1 CVE-2012-3385 (WordPress before 3.4.1 does not properly restrict access to post conte ...) - wordpress 3.4.1+dfsg-1 (bug #680721) - NOTE: http://www.openwall.com/lists/oss-security/2012/07/02/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/08/1 CVE-2012-3384 (Cross-site request forgery (CSRF) vulnerability in the customizer in W ...) - wordpress 3.4.1+dfsg-1 (bug #680721) - NOTE: http://www.openwall.com/lists/oss-security/2012/07/02/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/08/1 CVE-2012-3383 (The map_meta_cap function in wp-includes/capabilities.php in WordPress ...) - wordpress 3.4.1+dfsg-1 (bug #680721) - NOTE: http://www.openwall.com/lists/oss-security/2012/07/02/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/08/1 CVE-2012-3382 (Cross-site scripting (XSS) vulnerability in the ProcessRequest functio ...) {DSA-2512-1} - mono 2.10.8.1-5 (bug #681095) @@ -8328,8 +8328,8 @@ CVE-2012-3381 (sfcb in sblim-sfcb places a zero-length directory name in the LD_ NOT-FOR-US: sblim-sfcb NOTE: https://bugzilla.suse.com/show_bug.cgi?id=770234 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=838160 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/06/7 - NOTE: http://www.openwall.com/lists/oss-security/2012/07/06/8 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/06/7 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/06/8 CVE-2012-3380 (Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Nax ...) - nginx 1.2.1-2 [squeeze] - nginx <not-affected> (naxsi package was introduced in 1.1.18-1) @@ -8362,7 +8362,7 @@ CVE-2012-3372 (** DISPUTED ** The default configuration of Cyberoam UTM applianc NOTE: http://seclists.org/bugtraq/2012/Jul/20 CVE-2012-3371 (The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Ess ...) - nova 2012.1.1-5 (bug #681301) - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/13 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/13 NOTE: https://github.com/openstack/nova/commit/034762e8060dcf0a11cb039b9d426b0d0bb1801d NOTE: https://github.com/openstack/nova/commit/25f5bd31805bd21d7b7e3583c775252aa8f737e9 NOTE: https://bugs.launchpad.net/nova/+bug/1017795 @@ -8405,7 +8405,7 @@ CVE-2012-3359 (Luci in Red Hat Conga stores the user's username and password in CVE-2012-3358 (Multiple heap-based buffer overflows in the j2k_read_sot function in j ...) {DSA-2629-1} - openjpeg 1.3+dfsg-4.4 (bug #681075) - NOTE: http://www.openwall.com/lists/oss-security/2012/07/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/07/11/1 NOTE: Upstream patch: http://code.google.com/p/openjpeg/source/detail?r=1727 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=835767 CVE-2012-3357 (The SVN revision view (lib/vclib/svn/svn_repos.py) in ViewVC before 1. ...) @@ -8428,7 +8428,7 @@ CVE-2012-3355 ((1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) Lyric NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=835076 CVE-2012-3354 (doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain P ...) - dokuwiki 0.0.20130510a-1 (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2012/06/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/24/2 CVE-2012-3353 (The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling J ...) NOT-FOR-US: Apache Sling CVE-2012-3553 (chan_skinny.c in the Skinny (aka SCCP) channel driver in Asterisk Open ...) @@ -8450,7 +8450,7 @@ CVE-2012-3346 RESERVED CVE-2012-3345 (ioquake3 before r2253 allows local users to overwrite arbitrary files ...) - ioquake3 1.36+svn2224-4 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/15/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/15/3 CVE-2012-3344 RESERVED CVE-2012-3343 (Cross-site request forgery (CSRF) vulnerability in Microdasys before 3 ...) @@ -9816,7 +9816,7 @@ CVE-2012-2764 (Untrusted search path vulnerability in Google Chrome before 20.0. CVE-2012-2763 (Buffer overflow in the readstr_upto function in plug-ins/script-fu/tin ...) - gimp 2.8.0-1 (unimportant) NOTE: Only exploitable in rare/theoretical setups - NOTE: http://www.openwall.com/lists/oss-security/2012/05/31/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/31/1 NOTE: http://www.reactionpenetrationtesting.co.uk/advisories/scriptfu-buffer-overflow-GIMP-2.6.html NOTE: http://www.reactionpenetrationtesting.co.uk/advisories/scriptfubof.c CVE-2012-2762 (SQL injection vulnerability in include/functions_trackbacks.inc.php in ...) @@ -9846,8 +9846,8 @@ CVE-2012-2751 (ModSecurity before 2.6.6, when used with PHP, does not properly h {DSA-2506-1} - modsecurity-apache 2.6.6-1 (bug #678527) - libapache-mod-security <removed> (bug #678529) - NOTE: http://www.openwall.com/lists/oss-security/2012/06/22/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/22/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/22/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/22/2 CVE-2012-2750 (Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown imp ...) {DSA-2780-1} - mysql-5.5 5.5.23-1 @@ -9875,11 +9875,11 @@ CVE-2012-2744 (net/ipv6/netfilter/nf_conntrack_reasm.c in the Linux kernel befor CVE-2012-2743 (Revelation 0.4.13-2 and earlier does not iterate through SHA hashing a ...) - revelation 0.4.11-10 (low; bug #633088) [squeeze] - revelation <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2012/06/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/18/1 CVE-2012-2742 (Revelation 0.4.13-2 and earlier uses only the first 32 characters of a ...) - revelation 0.4.11-10 (bug #633088) [squeeze] - revelation <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2012/06/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/18/1 CVE-2012-2741 (Cross-site scripting (XSS) vulnerability in public_html/lists/admin/ i ...) - phplist <itp> (bug #612288) CVE-2012-2740 (SQL injection vulnerability in public_html/lists/admin in phpList befo ...) @@ -9890,15 +9890,15 @@ CVE-2012-2739 (Oracle Java SE before 7 Update 6, and OpenJDK 7 before 7u6 build NOTE: Upstream disputes this and states it needs to be fixed in Java apps itself NOTE: http://mail.openjdk.java.net/pipermail/core-libs-dev/2012-May/010238.html NOTE: http://armoredbarista.blogspot.de/2012/02/investigating-hashdos-issue.html - NOTE: http://www.openwall.com/lists/oss-security/2012/06/15/12 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/15/12 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/17/1 CVE-2012-2738 (The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote au ...) - vte 1:0.28.2-5 (bug #677717) - vte3 1:0.32.2-1 [squeeze] - vte 1:0.24.3-4 CVE-2012-2737 (The user_change_icon_file_authorized_cb function in /usr/libexec/accou ...) - accountsservice 0.6.21-6 (bug #679429) - NOTE: http://www.openwall.com/lists/oss-security/2012/06/28/9 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/28/9 NOTE: http://cgit.freedesktop.org/accountsservice/commit/?id=69b526a6cd4c078732068de2ba393cf9242a404b NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=832532 CVE-2012-2736 (In NetworkManager 0.9.2.0, when a new wireless network was created wit ...) @@ -10007,8 +10007,8 @@ CVE-2012-2690 (virt-edit in libguestfs before 1.18.0 does not preserve the permi NOTE: Upstream patch https://www.redhat.com/archives/libguestfs/2012-February/msg00034.html NOTE: https://www.redhat.com/archives/libguestfs/2012-February/msg00033.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=788642 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/11/1 - NOTE: http://www.openwall.com/lists/oss-security/2012/06/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/06/11/5 CVE-2012-2689 RESERVED CVE-2012-2688 (Unspecified vulnerability in the _php_stream_scandir function in the s ...) @@ -10798,7 +10798,7 @@ CVE-2012-2353 (Moodle 2.1.x before 2.1.6 and 2.2.x before 2.2.3 allows remote au CVE-2012-2352 (The archive management (arc_manage) page in wwsympa/wwsympa.fcgi.in in ...) {DSA-2477-1} - sympa 6.1.11~dfsg-1 (bug #672893; high) - NOTE: http://www.openwall.com/lists/oss-security/2012/05/12/8 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/12/8 CVE-2012-2351 (The default configuration of the auth/saml plugin in Mahara before 1.4 ...) {DSA-2467-1} - mahara 1.4.2-1 @@ -10822,23 +10822,23 @@ CVE-2012-2343 CVE-2012-2342 REJECTED CVE-2012-2341 (Cross-site request forgery (CSRF) vulnerability in the Take Control mo ...) - NOTE: http://www.openwall.com/lists/oss-security/2012/05/10/6 - NOTE: http://www.openwall.com/lists/oss-security/2012/05/11/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/11/2 NOT-FOR-US: Drupal Take Control CVE-2012-2340 (The Contact Forms module 7.x-1.x before 7.x-1.2 for Drupal does not sp ...) - NOTE: http://www.openwall.com/lists/oss-security/2012/05/10/6 - NOTE: http://www.openwall.com/lists/oss-security/2012/05/11/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/11/2 NOT-FOR-US: Drupal Contact Forms CVE-2012-2339 (Cross-site scripting (XSS) vulnerability in the Glossary module 6.x-1. ...) - NOTE: http://www.openwall.com/lists/oss-security/2012/05/10/6 - NOTE: http://www.openwall.com/lists/oss-security/2012/05/11/2 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/11/2 NOT-FOR-US: Drupal Glossary CVE-2012-2338 (SQL injection vulnerability in includes/picture.class.php in Galette 0 ...) NOT-FOR-US: Galette NOTE: http://redmine.ulysses.fr/issues/250 NOTE: http://redmine.ulysses.fr/projects/galette/repository/revisions/8c13ec159ba - NOTE: http://www.openwall.com/lists/oss-security/2012/05/10/5 - NOTE: http://www.openwall.com/lists/oss-security/2012/05/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/10/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/11/1 CVE-2012-2337 (sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does no ...) {DSA-2478-1} - sudo 1.8.3p2-1.1 (bug #673766) @@ -10882,15 +10882,15 @@ CVE-2012-2328 (internal/cimxml/sax/NodeFactory.java in Standards-Based Linux Ins CVE-2012-2327 (MyBB (aka MyBulletinBoard) before 1.6.7 allows remote attackers to obt ...) NOT-FOR-US: MyBB (aka MyBulletinBoard) NOTE: http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/ - NOTE: http://www.openwall.com/lists/oss-security/2012/05/07/14 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/07/14 CVE-2012-2326 (Cross-site scripting (XSS) vulnerability in the Admin Control Panel (A ...) NOT-FOR-US: MyBB (aka MyBulletinBoard) NOTE: http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/ - NOTE: http://www.openwall.com/lists/oss-security/2012/05/07/14 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/07/14 CVE-2012-2325 (SQL injection vulnerability in the User Inline Moderation feature in t ...) NOT-FOR-US: MyBB (aka MyBulletinBoard) NOTE: http://blog.mybb.com/2012/04/01/mybb-1-6-7-update-1-8-development/ - NOTE: http://www.openwall.com/lists/oss-security/2012/05/07/14 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/07/14 CVE-2012-2324 (Multiple SQL injection vulnerabilities in MyBB (aka MyBulletinBoard) b ...) NOT-FOR-US: MyBB CVE-2012-2323 @@ -11289,7 +11289,7 @@ CVE-2012-2153 (Drupal 7.x before 7.14 does not properly restrict access to nodes CVE-2012-2152 (Stack-based buffer overflow in the get_packet method in socket.c in dh ...) {DSA-2498-1} - dhcpcd 1:3.2.3-11 (bug #671265) - NOTE: http://www.openwall.com/lists/oss-security/2012/05/02/4 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/02/4 CVE-2012-2151 (Multiple cross-site scripting (XSS) vulnerabilities in SPIP 1.9.x befo ...) {DSA-2461-1} - spip 2.1.13-1 (low; bug #671264) @@ -13544,11 +13544,11 @@ CVE-2012-1185 (Multiple integer overflows in (1) magick/profile.c or (2) magick/ CVE-2012-1184 (Stack-based buffer overflow in the ast_parse_digest function in main/u ...) - asterisk 1:1.8.10.0~dfsg-1 (bug #664411) [squeeze] - asterisk <not-affected> (HTTP digest authentication code not present) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/16/10 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/16/10 CVE-2012-1183 (Stack-based buffer overflow in the milliwatt_generate function in the ...) {DSA-2460-1} - asterisk 1:1.8.10.0~dfsg-1 (bug #664411) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/16/10 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/16/10 CVE-2012-1182 (The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14 ...) {DSA-2450-1} - samba 2:3.6.4-1 (bug #668309) @@ -13570,14 +13570,14 @@ CVE-2012-1178 (The msn_oim_report_to_user function in oim.c in the MSN protocol CVE-2012-1177 (libgdata before 0.10.2 and 0.11.x before 0.11.1 does not validate SSL ...) {DSA-2482-1} - libgdata 0.10.2-1 (bug #664032) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/14/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/14/3 CVE-2012-1176 (Buffer overflow in the fribidi_utf8_to_unicode function in PyFriBidi b ...) - pyfribidi 0.11.0-1 (bug #663189) [squeeze] - pyfribidi <no-dsa> (Minor issue) CVE-2012-1175 (Integer overflow in the GnashImage::size method in libbase/GnashImage. ...) {DSA-2435-1} - gnash 0.8.10-5 (bug #664023) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/14/5 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/14/5 CVE-2012-1174 (The rm_rf_children function in util.c in the systemd-logind login mana ...) - systemd 44-1 (bug #664364) CVE-2012-1173 (Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow r ...) @@ -13605,12 +13605,12 @@ CVE-2012-1166 (The default keybindings for wwm in LTSP Display Manager (ldm) 2.2 CVE-2012-1165 (The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL befor ...) {DSA-2454-1} - openssl 1.0.0h-1 (low; bug #663642) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/12/3 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/12/3 CVE-2012-1164 (slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a den ...) {DLA-203-1} - openldap 2.4.31-1 (low; bug #663644) [squeeze] - openldap <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2012/03/12/4 + NOTE: https://www.openwall.com/lists/oss-security/2012/03/12/4 CVE-2012-1163 (Integer overflow in the _zip_readcdir function in zip_open.c in libzip ...) - libzip 0.10.1-1 (bug #664990) [squeeze] - libzip <not-affected> (Only affects 0.10.x) @@ -14149,7 +14149,7 @@ CVE-2012-0947 (Heap-based buffer overflow in the vqa_decode_chunk function in th - libav 6:0.8.2-1 - ffmpeg 7:2.4.1-1 NOTE: https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963 - NOTE: http://www.openwall.com/lists/oss-security/2012/05/03/4 + NOTE: https://www.openwall.com/lists/oss-security/2012/05/03/4 CVE-2012-0946 (The NVIDIA UNIX driver before 295.40 allows local users to access arbi ...) - nvidia-graphics-drivers 295.40-1 [squeeze] - nvidia-graphics-drivers 195.36.31-6squeeze1 @@ -14283,7 +14283,7 @@ CVE-2012-0908 (Cross-site scripting (XSS) vulnerability in logout.php in SimpleS CVE-2012-0884 (The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 i ...) {DSA-2454-1} - openssl 1.0.0h-1 (low) - NOTE: "If a Linux distribution picks up the fix for CVE-2012-0884 then they will want to pick up change 22161 at the same time" -- http://www.openwall.com/lists/oss-security/2012/03/23/12 + NOTE: "If a Linux distribution picks up the fix for CVE-2012-0884 then they will want to pick up change 22161 at the same time" -- https://www.openwall.com/lists/oss-security/2012/03/23/12 CVE-2012-0883 (envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 place ...) - apache2 <not-affected> (LD_LIBRARY_PATH not set in debian package) CVE-2012-0882 (Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other v ...) diff --git a/data/CVE/2013.list b/data/CVE/2013.list index d9de6da437..ba6019364e 100644 --- a/data/CVE/2013.list +++ b/data/CVE/2013.list @@ -87,7 +87,7 @@ CVE-2013-7459 (Heap-based buffer overflow in the ALGnew function in block_templa CVE-2013-7458 (linenoise, as used in Redis before 3.2.3, uses world-readable permissi ...) {DSA-3634-1 DLA-577-1} - redis 2:3.2.1-4 (bug #832460) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/1 CVE-2013-7457 (Unspecified vulnerability in the Qualcomm components in Android before ...) NOT-FOR-US: Qualcomm components for Android CVE-2013-7456 (gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1 ...) @@ -100,7 +100,7 @@ CVE-2013-7456 (gd_interpolation.c in the GD Graphics Library (aka libgd) before NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd NOTE: PHP bug: https://bugs.php.net/bug.php?id=72227 NOTE: Fixed in 7.0.7, 5.6.22, 5.5.36 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/25/3 CVE-2013-7455 (Double free vulnerability in the DefaultICCintents function in cmscnvr ...) - lcms2 2.6-1 [wheezy] - lcms2 <not-affected> (vulnerable code not present, no cmsPipelineFree(Lut); in Error:-part) @@ -120,7 +120,7 @@ CVE-2013-7448 (Directory traversal vulnerability in wiki.c in didiwiki allows re {DSA-3485-1 DLA-424-1} - didiwiki 0.5-12 (bug #815111) NOTE: https://github.com/OpenedHand/didiwiki/pull/1/files - NOTE: http://www.openwall.com/lists/oss-security/2016/02/19/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/19/4 CVE-2013-7447 (Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gd ...) {DLA-419-1} - gtk+2.0 2.24.30-1.1 (bug #799275) @@ -136,7 +136,7 @@ CVE-2013-7446 (Use-after-free vulnerability in net/unix/af_unix.c in the Linux k - linux-2.6 <removed> NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1273845 NOTE: https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8 - NOTE: http://www.openwall.com/lists/oss-security/2015/11/18/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/18/9 NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec0d215f9420564fc8286dcf93d2d068bb53a07e (v2.6.26-rc9) NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c (v4.4-rc4) CVE-2013-7445 (The Direct Rendering Manager (DRM) subsystem in the Linux kernel throu ...) @@ -161,7 +161,7 @@ CVE-2013-7443 (Buffer overflow in the skip-scan optimization in SQLite 3.8.2 all NOTE: Fixed by: https://www.sqlite.org/src/info/ac5852d6403c9c96 NOTE: Introduced by: https://www.sqlite.org/src/info/b0bb975c0986fe01 NOTE: https://www.sqlite.org/src/info/520070ec7fbaac - NOTE: http://www.openwall.com/lists/oss-security/2015/07/14/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/14/5 CVE-2013-7442 (GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1 has a password ...) NOT-FOR-US: GE Healthcare Centricity PACS Workstation CVE-2013-7440 (The ssl.match_hostname function in CPython (aka Python) before 2.7.9 a ...) @@ -186,7 +186,7 @@ CVE-2013-7439 (Multiple off-by-one errors in the (1) MakeBigReq and (2) SetReqLe - libx11 2:1.6.0-1 NOTE: http://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=39547d600a13713e15429f49768e54c3173c828d NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=56508 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/08/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/08/4 NOTE: The following packages will be recompiled after the release of NOTE: the DSA for wheezy and the DLA for squeeze: NOTE: libxrender (1:0.9.7-1+deb7u2 / 0.9.6-1+squeeze1+build1) @@ -209,7 +209,7 @@ CVE-2013-7441 (The modern style negotiation in Network Block Device (nbd-server) {DSA-3271-1} - nbd 1:3.4-1 (bug #781547) [squeeze] - nbd <not-affected> (Named export introduced in 2.9.17) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/19/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/19/6 CVE-2013-7435 (The open-ils.pcrud endpoint in Evergreen before 2.5.9, 2.6.x before 2. ...) NOT-FOR-US: Evergreen library CVE-2013-7434 @@ -232,12 +232,12 @@ CVE-2013-7436 (noVNC before 0.5 does not set the secure flag for a cookie in an - novnc 1:0.4+dfsg+1+20131010+gitf68af8af3d-4 (bug #778618) [wheezy] - novnc <not-affected> (Only an issue in combination with later OpenStack components) NOTE: https://github.com/kanaka/noVNC/commit/ad941faddead705cd611921730054767a0b32dcd - NOTE: http://www.openwall.com/lists/oss-security/2015/02/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/17/1 CVE-2013-7425 RESERVED CVE-2013-XXXX [TOCTOU race when expanding JAR files] - libbluray 0.7.0-1 (unimportant) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/06/9 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/02/06/9 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=959433 NOTE: libbluray is only in wheezy and later and the issue is neutered by the kernel hardening for /tmp NOTE: Affected code removed in 0.7.0-1 @@ -246,7 +246,7 @@ CVE-2013-7437 (Multiple integer overflows in potrace 1.11 allow remote attackers - potrace 1.12-1 (bug #778646) [squeeze] - potrace <no-dsa> (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=955808 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/06/12 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/06/12 CVE-2013-7449 (The ssl_do_connect function in common/server.c in HexChat before 2.10. ...) - xchat 2.8.8-10 (bug #776609) [jessie] - xchat <no-dsa> (Minor issue) @@ -276,7 +276,7 @@ CVE-2013-7423 (The send_dg function in resolv/res_send.c in GNU C Library (aka g - eglibc <removed> NOTE: Fix: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=f9d2d03254a58d92635a311a42253eeed5a40a47 NOTE: Upstream report: https://sourceware.org/bugzilla/show_bug.cgi?id=15946 - NOTE: http://www.openwall.com/lists/oss-security/2015/01/28/16 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/28/16 CVE-2013-7421 (The Crypto API in the Linux kernel before 3.18.5 allows local users to ...) {DSA-3170-1} - linux 3.16.7-ckt4-2 @@ -290,7 +290,7 @@ CVE-2013-7422 (Integer underflow in regcomp.c in Perl before 5.20, as used in Ap [wheezy] - perl <no-dsa> (Minor issue) [squeeze] - perl <no-dsa> (Minor issue) NOTE: https://rt.perl.org/Public/Bug/Display.html?id=119505 - NOTE: http://www.openwall.com/lists/oss-security/2015/01/23/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/23/9 CVE-2013-XXXX [lhasa: several directory traversal vulnerabilities] - lhasa 0.2.0-1 [wheezy] - lhasa <no-dsa> (Minor issue) @@ -577,7 +577,7 @@ CVE-2013-7338 (Python before 3.3.4 RC1 allows remote attackers to cause a denial CVE-2013-XXXX [libclamunrar: double-free error libclamunrar_iface/unrar_iface.c] - libclamunrar 0.97.7+dfsg-1 (bug #770647) [wheezy] - libclamunrar <no-dsa> (Non-free not supported, also minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/11/29/6 + NOTE: https://www.openwall.com/lists/oss-security/2013/11/29/6 CVE-2013-XXXX [staden-io-lib buffer overflow] - staden-io-lib 1.13.3-2 (low; bug #729276) [squeeze] - staden-io-lib <no-dsa> (Minor issue) @@ -1194,7 +1194,7 @@ CVE-2013-7108 (Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earli [squeeze] - nagios3 <no-dsa> (Minor issue) [wheezy] - nagios3 <no-dsa> (Minor issue) NOTE: https://dev.icinga.org/issues/5251 - NOTE: separate CVE requested for nagios, http://www.openwall.com/lists/oss-security/2013/12/23/4 + NOTE: separate CVE requested for nagios, https://www.openwall.com/lists/oss-security/2013/12/23/4 NOTE: Fixed by https://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/ CVE-2013-7107 (Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1 ...) {DSA-2956-1} @@ -1356,7 +1356,7 @@ CVE-2013-7060 (Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allow NOT-FOR-US: Plone CVE-2013-7049 (Stack-based buffer overflow in fish.cpp in the Fish plugin for ZNC, as ...) NOTE: vulnerable code not found in Debian - NOTE: http://www.openwall.com/lists/oss-security/2013/12/11/14 + NOTE: https://www.openwall.com/lists/oss-security/2013/12/11/14 NOT-FOR-US: FiSH Plugin for ZNC IRC Bouncer CVE-2013-7048 (OpenStack Compute (Nova) Grizzly 2013.1.4, Havana 2013.2.1, and earlie ...) - nova 2013.2.2 (bug #732022) @@ -7467,7 +7467,7 @@ CVE-2013-4550 (Bip before 0.8.9, when running as a daemon, writes SSL handshake [squeeze] - bip <no-dsa> (Minor issue) NOTE: Upstream commit: https://projects.duckcorp.org/projects/bip/repository/revisions/df45c4c2d6f892e3e1dec23ce0ed2575b53a7d8c NOTE: https://projects.duckcorp.org/issues/261 - NOTE: Difference between CVE-2011-5268 and CVE-2013-4550: http://www.openwall.com/lists/oss-security/2014/01/02/9 + NOTE: Difference between CVE-2011-5268 and CVE-2013-4550: https://www.openwall.com/lists/oss-security/2014/01/02/9 CVE-2013-4549 (QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers t ...) - qtbase-opensource-src 5.1.1+dfsg-6 - qt4-x11 4:4.8.5+git192-g085f851+dfsg-1 (low; bug #750141) @@ -7688,7 +7688,7 @@ CVE-2013-4509 (The default configuration of IBUS 1.5.4, and possibly 1.5.2 and e - ibus-chewing 1.4.3-4 (low; bug #730781) [wheezy] - ibus-chewing <not-affected> (Only in combination with Ibus 1.5.4, which is not in stable) [squeeze] - ibus-chewing <not-affected> (Only in combination with Ibus 1.5.4, which is not in oldstable) - NOTE: http://www.openwall.com/lists/oss-security/2013/11/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/11/04/2 NOTE: This is rather a bug in the various IBus engines not in ibus itself, asked maintainers to investigate affected engines, NOTE: can be assigned to affected engines once more info is available NOTE: Introduced in 1.5, so stable/oldstable not affected @@ -8244,7 +8244,7 @@ CVE-2013-4350 (The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kern - linux-2.6 <not-affected> (Vulnerable code not present) - linux 3.11.5-1 [wheezy] - linux 3.2.53-1 - NOTE: http://www.openwall.com/lists/oss-security/2013/09/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/09/13/2 NOTE: http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=95ee62083cb6453e056562d91f597552021e6ae7 CVE-2013-4349 REJECTED @@ -8255,12 +8255,12 @@ CVE-2013-4348 (The skb_flow_dissect function in net/core/flow_dissector.c in the CVE-2013-4347 (The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier func ...) - python-oauth2 <removed> (low; bug #722657) [wheezy] - python-oauth2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/09/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2013/09/12/5 NOTE: https://github.com/simplegeo/python-oauth2/issues/9 CVE-2013-4346 (The Server.verify_request function in SimpleGeo python-oauth2 does not ...) - python-oauth2 <removed> (low; bug #722656) [wheezy] - python-oauth2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/09/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2013/09/12/5 NOTE: https://github.com/simplegeo/python-oauth2/issues/129 CVE-2013-4345 (Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c ...) {DSA-2906-1} @@ -8360,7 +8360,7 @@ CVE-2013-4319 (pbs_mom in Terascale Open-Source Resource and Queue Manager (aka NOTE: http://www.supercluster.org/pipermail/torqueusers/2013-September/016098.html CVE-2013-4318 (File injection vulnerability in Ruby gem Features 0.3.0 allows remote ...) NOT-FOR-US: Ruby gem Features - NOTE: http://www.openwall.com/lists/oss-security/2013/09/09/9 + NOTE: https://www.openwall.com/lists/oss-security/2013/09/09/9 CVE-2013-4317 (In Apache CloudStack 4.1.0 and 4.1.1, when calling the CloudStack API ...) NOT-FOR-US: CloudStack CVE-2013-4316 (Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation ...) @@ -13634,7 +13634,7 @@ CVE-2013-2221 (Heap-based buffer overflow in the ZRtp::storeMsgTemp function in CVE-2013-2220 (Buffer overflow in the radius_get_vendor_attr function in the Radius e ...) {DSA-2726-1} - php-radius 1.2.5-2.4 (bug #714362) - NOTE: http://www.openwall.com/lists/oss-security/2013/06/28/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/06/28/2 CVE-2013-2219 (The Red Hat Directory Server before 8.2.11-13 and 389 Directory Server ...) - 389-ds-base 1.3.2.9-1 (bug #718325) CVE-2013-2218 (Double free vulnerability in the virConnectListAllInterfaces method in ...) @@ -13757,7 +13757,7 @@ CVE-2013-2186 (The DiskFileItem class in Apache Commons FileUpload, as used in R CVE-2013-2185 (** DISPUTED ** The readObject method in the DiskFileItem class in Apac ...) NOT-FOR-US: Red Hat JBoss Enterprise Application Platform NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=974813 - NOTE: http://www.openwall.com/lists/oss-security/2013/09/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2013/09/05/4 CVE-2013-2184 (Movable Type before 5.2.6 does not properly use the Storable::thaw fun ...) {DSA-3183-1} - movabletype-opensource 5.2.7+dfsg-1 (bug #712602) @@ -13780,7 +13780,7 @@ CVE-2013-2179 (X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when perfo - xdm <not-affected> (Not affected when PAM is used) [squeeze] - xdm <not-affected> (same as above and glibc too old) [wheezy] - xdm <not-affected> (same as above and glibc too old) - NOTE: http://www.openwall.com/lists/oss-security/2013/06/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2013/06/11/5 CVE-2013-2178 (The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and ap ...) {DSA-2708-1} - fail2ban 0.8.10-1 @@ -13942,7 +13942,7 @@ CVE-2013-2127 (Buffer overflow in the exposure correction code in LibRaw before - libraw <not-affected> (Only affects 0.15, 0.15 was only in experimental) - libkdcraw <not-affected> (embeds libraw 0.14) - darktable <not-affected> (embeds libraw 0.14) - NOTE: http://www.openwall.com/lists/oss-security/2013/05/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/28/3 NOTE: https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d CVE-2013-2126 (Multiple double free vulnerabilities in the LibRaw::unpack function in ...) - libraw 0.15.3-1 (low; bug #710353) @@ -13954,11 +13954,11 @@ CVE-2013-2126 (Multiple double free vulnerabilities in the LibRaw::unpack functi NOTE: Not suitable for code injection, no security impact for an enduser application like Darktable - kdegraphics <removed> [squeeze] - kdegraphics <not-affected> (embedded version of kdcraw+libraw too old) - NOTE: http://www.openwall.com/lists/oss-security/2013/05/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/28/3 NOTE: https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6 CVE-2013-2125 (OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which al ...) - opensmtpd 5.3.3p1-1 - NOTE: http://www.openwall.com/lists/oss-security/2013/05/18/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/18/8 CVE-2013-2124 (Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before ...) - libguestfs 1:1.20.8-1 (bug #710290) [wheezy] - libguestfs <not-affected> (Vulnerable code not present) @@ -14156,7 +14156,7 @@ CVE-2013-2070 (http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 [squeeze] - nginx <not-affected> (Vulnerable code not present) CVE-2013-2069 (Red Hat livecd-tools before 13.4.4, 17.x before 17.17, 18.x before 18. ...) NOT-FOR-US: Red Hat livecd-tools - NOTE: http://www.openwall.com/lists/oss-security/2013/05/23/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/23/2 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=964299 CVE-2013-2068 (Multiple directory traversal vulnerabilities in the AgentController in ...) NOT-FOR-US: RedHat CloudForms Management Engine @@ -14197,7 +14197,7 @@ CVE-2013-2058 (The host_start function in drivers/usb/chipidea/host.c in the Lin - linux-2.6 <not-affected> (Vulnerable code not present) - linux 3.8-1 [wheezy] - linux <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2013/05/03/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/03/2 CVE-2013-2057 (YaBB through 2.5.2: 'guestlanguage' Cookie Parameter Local File Includ ...) NOT-FOR-US: YaBB CVE-2013-2056 (The Inter-Satellite Sync (ISS) operation in Red Hat Network (RHN) Sate ...) @@ -14274,7 +14274,7 @@ CVE-2013-2030 (keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizz NOTE: http://lists.openstack.org/pipermail/openstack-announce/2013-May/000098.html CVE-2013-2029 (nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others ...) - nagios3 <not-affected> (Affected file nagios.upgrade_to_v3.sh not in Debian) - NOTE: http://www.openwall.com/lists/oss-security/2013/04/30/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/04/30/8 CVE-2013-2028 (The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx ...) - nginx <not-affected> (Vulnerable code not present) CVE-2013-2027 (Jython 2.2.1 uses the current umask to set the privileges of the class ...) @@ -14300,12 +14300,12 @@ CVE-2013-2024 (OS command injection vulnerability in the "qs" procedure from the CVE-2013-2023 (Cross-site scripting (XSS) vulnerability in actionscript/Jplayer.as in ...) - jquery-jplayer 2.1.0-2 NOTE: used for jPlayer 2.2.23 XSS - NOTE: http://www.openwall.com/lists/oss-security/2013/05/05/3 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/05/3 CVE-2013-2022 (Multiple cross-site scripting (XSS) vulnerabilities in actionscript/Jp ...) - jquery-jplayer 2.1.0-2 NOTE: https://github.com/happyworm/jPlayer/commit/c5fe17bb4459164bd59153b57248cf94b8867373 NOTE: used for jPlayer 2.2.20 XSS - NOTE: http://www.openwall.com/lists/oss-security/2013/05/05/3 + NOTE: https://www.openwall.com/lists/oss-security/2013/05/05/3 CVE-2013-2021 (pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause ...) - clamav 0.97.8+dfsg-1 [squeeze] - clamav 0.97.8+dfsg-1~squeeze1 @@ -14458,7 +14458,7 @@ CVE-2013-1978 (Heap-based buffer overflow in the read_xwd_cols function in file- - gimp 2.8.10-0.1 (bug #731305) CVE-2013-1977 (OpenStack devstack uses world-readable permissions for keystone.conf, ...) - keystone <not-affected> (permissions to /etc/keystone/keystone.conf restricted in postinst) - NOTE: http://www.openwall.com/lists/oss-security/2013/04/19/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/04/19/2 CVE-2013-1976 (The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in ...) - tomcat6 <not-affected> (RedHat-specific issue) - tomcat7 <not-affected> (RedHat-specific issue) @@ -14549,7 +14549,7 @@ CVE-2013-1950 (The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows - libtirpc <not-affected> (regression code not present) NOTE: Regression introduced with 82cc2e6129c872c8be09381055f2fb5641c5e6fe NOTE: Regression fixed with a9f437119d79a438cb12e510f3cadd4060102c9f - NOTE: http://www.openwall.com/lists/oss-security/2013/04/22/9 + NOTE: https://www.openwall.com/lists/oss-security/2013/04/22/9 CVE-2013-1949 (Social Media Widget (social-media-widget) plugin 4.0 for WordPress con ...) NOT-FOR-US: Wordpress Social Media Widget CVE-2013-1948 (converter.rb in the md2pdf gem 0.0.1 for Ruby allows context-dependent ...) @@ -14602,13 +14602,13 @@ CVE-2013-1933 (The extract_from_ocr function in lib/docsplit/text_extractor.rb i NOT-FOR-US: Karteek Docsplit Ruby Gem CVE-2013-1932 (A cross-site scripting (XSS) vulnerability in the configuration report ...) - mantis <not-affected> (affects Mantis 1.2.13 only) - NOTE: http://www.openwall.com/lists/oss-security/2013/04/04/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/04/04/8 CVE-2013-1931 (A cross-site scripting (XSS) vulnerability in MantisBT 1.2.14 allows r ...) - mantis <not-affected> (affects Mantis 1.2.14 only) - NOTE: http://www.openwall.com/lists/oss-security/2013/04/04/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/04/04/8 CVE-2013-1930 (MantisBT 1.2.12 before 1.2.15 allows authenticated users to by the wor ...) - mantis <not-affected> (affects only Mantis 1.2.12 and later) - NOTE: http://www.openwall.com/lists/oss-security/2013/04/04/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/04/04/8 CVE-2013-1929 (Heap-based buffer overflow in the tg3_read_vpd function in drivers/net ...) {DSA-2669-1 DSA-2668-1} - linux 3.8.11-1 @@ -14731,7 +14731,7 @@ CVE-2013-1892 (MongoDB before 2.0.9 and 2.2.x before 2.2.4 does not properly val - mongodb 1:2.4.1-1 (bug #704042) [wheezy] - mongodb 1:2.0.6-1.1 [squeeze] - mongodb <no-dsa> (Minor isue, Spidermonkey in Lenny is EOLed) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/25/7 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/25/7 CVE-2013-1891 RESERVED CVE-2013-1890 (Multiple cross-site scripting (XSS) vulnerabilities in ownCloud Server ...) @@ -14760,7 +14760,7 @@ CVE-2013-1884 (The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 th NOTE: http://subversion.apache.org/security/CVE-2013-1884-advisory.txt CVE-2013-1883 (Mantis Bug Tracker (aka MantisBT) 1.2.12 before 1.2.15 allows remote a ...) - mantis <not-affected> (only affects 1.2.12 to 1.2.14) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/21/3 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/21/3 CVE-2013-1882 RESERVED CVE-2013-1881 (GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary f ...) @@ -14785,7 +14785,7 @@ CVE-2013-1874 (Untrusted search path vulnerability in csi in Chicken before 4.8. - chicken 4.8.0.3-1 (low; bug #702410) [squeeze] - chicken <no-dsa> (Minor issue) [wheezy] - chicken <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/19/11 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/19/11 CVE-2013-1873 [linux kernel kernel stack memory disclosure] REJECTED CVE-2013-1872 (The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent atta ...) @@ -14812,7 +14812,7 @@ CVE-2013-1865 (OpenStack Keystone Folsom (2012.2) does not properly perform revo - keystone <not-affected> (only affects folsom) NOTE: fixed in experimental with keystone/2012.2.3-2 CVE-2013-1864 (The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga ...) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/15/6 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/15/6 - ekiga 4.0.1-1 (low; bug #704133) [wheezy] - ekiga <no-dsa> (Minor issue) [squeeze] - ekiga <no-dsa> (Minor issue) @@ -14875,11 +14875,11 @@ CVE-2013-1852 (SQL injection vulnerability in leaguemanager.php in the LeagueMan CVE-2013-1851 (Incomplete blacklist vulnerability in lib/migrate.php in ownCloud befo ...) - owncloud 4.0.8debian-1.6 (bug #703094) NOTE: https://owncloud.org/about/security/advisories/oC-SA-2013-010/ - NOTE: http://www.openwall.com/lists/oss-security/2013/03/14/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/14/8 CVE-2013-1850 (Multiple incomplete blacklist vulnerabilities in (1) import.php and (2 ...) - owncloud 4.0.8debian-1.6 (bug #703094) NOTE: https://owncloud.org/about/security/advisories/oC-SA-2013-009/ - NOTE: http://www.openwall.com/lists/oss-security/2013/03/14/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/14/8 CVE-2013-1849 (The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through ...) {DLA-207-1} - subversion 1.7.9-1 (bug #704940) @@ -14890,7 +14890,7 @@ CVE-2013-1848 (fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect a - linux 3.2.41-1 - linux-2.6 <removed> [squeeze] - linux-2.6 <not-affected> (Introduced in 2.6.33) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/20/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/20/8 CVE-2013-1847 (The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through ...) {DLA-207-1} - subversion 1.7.9-1 (bug #704940) @@ -14982,7 +14982,7 @@ CVE-2013-1823 (Cross-site scripting (XSS) vulnerability in the Notifications for CVE-2013-1822 (Multiple cross-site scripting (XSS) vulnerabilities in ownCloud 4.5.x ...) - owncloud <not-affected> (owncloud stable4 (4.0.x) is not affected) NOTE: https://owncloud.org/about/security/advisories/oC-SA-2013-008/ - NOTE: http://www.openwall.com/lists/oss-security/2013/03/14/8 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/14/8 CVE-2013-1821 (lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows ...) {DSA-2809-1 DSA-2738-1} - ruby1.9.1 1.9.3.194-8.1 (bug #702525) @@ -15055,17 +15055,17 @@ CVE-2013-1798 (The ioapic_read_indirect function in virt/kvm/ioapic.c in the Lin {DSA-2668-1} - linux 3.2.41-2 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2013/03/20/9 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/20/9 CVE-2013-1797 (Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel ...) - linux 3.2.41-2 - linux-2.6 <removed> [squeeze] - linux-2.6 <no-dsa> (Too intrusive to backport, KVM server not supported in squeeze-lts) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/20/9 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/20/9 CVE-2013-1796 (The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux ker ...) {DSA-2669-1 DSA-2668-1} - linux 3.2.41-2 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2013/03/20/9 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/20/9 CVE-2013-1795 (Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote att ...) {DSA-2638-1} - openafs 1.6.1-3 @@ -15132,7 +15132,7 @@ CVE-2013-1772 (The log_prefix function in kernel/printk.c in the Linux kernel 3. CVE-2013-1771 (The web server Monkeyd produces a world-readable log (/var/log/monkeyd ...) - monkey <removed> (low) [squeeze] - monkey <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/02/24/5 + NOTE: https://www.openwall.com/lists/oss-security/2013/02/24/5 CVE-2013-1770 (Cross-site scripting (XSS) vulnerability in views_view.php in Ganglia ...) - ganglia 3.6.0-1 (low; bug #700158) [squeeze] - ganglia <no-dsa> (Minor issue) @@ -18264,7 +18264,7 @@ CVE-2013-0723 (Multiple heap-based buffer overflows in etxrw.dll in Kingsoft Spr CVE-2013-0722 (Stack-based buffer overflow in the scan_load_hosts function in ec_scan ...) - ettercap 1:0.7.5.1-2 (low; bug #697987) [squeeze] - ettercap 1:0.7.3-2.1+squeeze1 - NOTE: http://www.openwall.com/lists/oss-security/2013/01/10/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/10/2 NOTE: http://www.exploit-db.com/exploits/23945/ NOTE: https://secunia.com/advisories/51731/ NOTE: Proposed patch http://www.securation.com/files/2013/01/ec.patch @@ -18905,7 +18905,7 @@ CVE-2013-0423 (Unspecified vulnerability in the Java Runtime Environment (JRE) c CVE-2013-0422 (Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remot ...) - openjdk-6 <not-affected> (Only affects Java 7) - openjdk-7 7u3-2.1.4-1 - NOTE: Exploitable on Linux http://www.openwall.com/lists/oss-security/2013/01/11/1 + NOTE: Exploitable on Linux https://www.openwall.com/lists/oss-security/2013/01/11/1 CVE-2013-0421 REJECTED CVE-2013-0420 (Unspecified vulnerability in the VirtualBox component in Oracle Virtua ...) @@ -19258,7 +19258,7 @@ CVE-2013-0288 (nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows contex - nss-pam-ldapd 0.8.10-3 (bug #690319) CVE-2013-0287 (The Simple Access Provider in System Security Services Daemon (SSSD) 1 ...) - sssd <not-affected> (Introduced in 1.9.0) - NOTE: http://www.openwall.com/lists/oss-security/2013/03/20/12 + NOTE: https://www.openwall.com/lists/oss-security/2013/03/20/12 CVE-2013-0286 (Pinboard 1.0.6 theme for Wordpress has XSS. ...) NOT-FOR-US: Wordpress theme CVE-2013-0285 (The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before ...) @@ -19387,7 +19387,7 @@ CVE-2013-0251 (Stack-based buffer overflow in llogincircuit.cc in latd 1.25 thro CVE-2013-0250 (The init_nss_hash function in exec/totemcrypto.c in Corosync 2.0 befor ...) - corosync <not-affected> (Introduced in v1.99.8-2-ge925f42; bug #699615) NOTE: https://github.com/corosync/corosync/commit/4378915a33ab7fbbb5874f79dd7cd71b014ef44e#L0R407 - NOTE: http://www.openwall.com/lists/oss-security/2013/02/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2013/02/01/1 CVE-2013-0249 (Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message ...) - curl 7.29.0-1 (bug #700002) [squeeze] - curl <not-affected> (Only affects 7.26.0 to 7.28.1) @@ -19433,15 +19433,15 @@ CVE-2013-0238 (The try_parse_v4_netmask function in hostmask.c in IRCD-Hybrid be CVE-2013-0237 (Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode p ...) - wordpress 3.5.1+dfsg-1 (bug #698929) NOTE: http://wordpress.org/news/2013/01/wordpress-3-5-1/ - NOTE: http://www.openwall.com/lists/oss-security/2013/01/25/7 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/25/7 CVE-2013-0236 (Multiple cross-site scripting (XSS) vulnerabilities in WordPress befor ...) - wordpress 3.5.1+dfsg-1 (bug #698927) NOTE: http://wordpress.org/news/2013/01/wordpress-3-5-1/ - NOTE: http://www.openwall.com/lists/oss-security/2013/01/25/7 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/25/7 CVE-2013-0235 (The XMLRPC API in WordPress before 3.5.1 allows remote attackers to se ...) - wordpress 3.5.1+dfsg-1 (bug #698916) NOTE: http://wordpress.org/news/2013/01/wordpress-3-5-1/ - NOTE: http://www.openwall.com/lists/oss-security/2013/01/25/7 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/25/7 CVE-2013-0234 (Cross-site scripting (XSS) vulnerability in the Twitter widget in Elgg ...) - elgg <itp> (bug #526197) CVE-2013-0233 (Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, ...) @@ -19475,13 +19475,13 @@ CVE-2013-0224 (The Video module 7.x-2.x before 7.x-2.9 for Drupal, when using th NOT-FOR-US: Drupal addon CVE-2013-0223 (The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...) - coreutils <not-affected> (Affected patch not added to Debian package) - NOTE: http://www.openwall.com/lists/oss-security/2013/01/21/14 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/21/14 CVE-2013-0222 (The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...) - coreutils <not-affected> (Affected patch not added to Debian package) - NOTE: http://www.openwall.com/lists/oss-security/2013/01/21/14 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/21/14 CVE-2013-0221 (The SUSE coreutils-i18n.patch for GNU coreutils allows context-depende ...) - coreutils <not-affected> (Affected patch not added to Debian package) - NOTE: http://www.openwall.com/lists/oss-security/2013/01/21/14 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/21/14 CVE-2013-0220 (The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomnt ...) - sssd 1.8.4-2 (low; bug #698871) [squeeze] - sssd <not-affected> (autofs and ssh responders not yet present) @@ -19550,7 +19550,7 @@ CVE-2013-0198 (Dnsmasq before 2.66test2, when used with certain libvirt configur - dnsmasq 2.66-1 (low) [wheezy] - dnsmasq <no-dsa> (Minor issue) [squeeze] - dnsmasq <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2013/01/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/18/2 CVE-2013-0197 (Cross-site scripting (XSS) vulnerability in the filter_draw_selection_ ...) - mantis <not-affected> (This only affects the 1.2.12 version, which isn't present in Debian, bug #698481) NOTE: http://www.mantisbt.org/bugs/view.php?id=15373 @@ -19683,7 +19683,7 @@ CVE-2013-0163 (OpenShift haproxy cartridge: predictable /tmp in set-proxy connec NOT-FOR-US: OpenShift haproxy cartridge CVE-2013-0162 (The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser ...) - ruby-parser 2.3.1-2 (bug #701637) - NOTE: http://www.openwall.com/lists/oss-security/2013/02/22/5 + NOTE: https://www.openwall.com/lists/oss-security/2013/02/22/5 CVE-2013-0161 (Havalite CMS 1.1.7 has a stored XSS vulnerability ...) NOT-FOR-US: Havalite CMS CVE-2013-0160 (The Linux kernel through 3.7.9 allows local users to obtain sensitive ...) @@ -19707,7 +19707,7 @@ CVE-2013-0156 (active_support/core_ext/hash/conversions.rb in Ruby on Rails befo - ruby-activesupport-3.2 3.2.6-5 (bug #697790) NOTE: Starting with 2.3.14.1 rails is a transition package NOTE: http://www.insinuator.net/2013/01/rails-yaml/ - NOTE: http://www.openwall.com/lists/oss-security/2013/01/08/14 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/08/14 NOTE: experimental has 3.2.8-1 and should be affected too CVE-2013-0155 (Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x befo ...) {DSA-2609-1} @@ -19716,7 +19716,7 @@ CVE-2013-0155 (Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x - ruby-actionpack-3.2 3.2.6-5 (bug #697802) - rails 2.3.14.1 NOTE: Starting with 2.3.14.1 rails is a transition package - NOTE: http://www.openwall.com/lists/oss-security/2013/01/08/13 + NOTE: https://www.openwall.com/lists/oss-security/2013/01/08/13 CVE-2013-0154 (The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debug ...) - xen <not-affected> (Only applies to Xen 4.2, which is only available in experimental) CVE-2013-0153 (The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, wh ...) diff --git a/data/CVE/2014.list b/data/CVE/2014.list index c608091064..9119efc646 100644 --- a/data/CVE/2014.list +++ b/data/CVE/2014.list @@ -1325,7 +1325,7 @@ CVE-2014-9913 (Buffer overflow in the list_files function in list.c in Info-Zip NOTE: Same reproducer as in https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 NOTE: can be used to verify a fix (which trigger the issue in unzip -l but crash NOTE: in different areas of the unzip codebase) - NOTE: http://www.openwall.com/lists/oss-security/2014/11/03/5 + NOTE: https://www.openwall.com/lists/oss-security/2014/11/03/5 CVE-2014-9912 (The get_icu_disp_value_src_php function in ext/intl/locale/locale_meth ...) - php5 5.6.0+dfsg-1 [wheezy] - php5 5.4.34-0+deb7u1 @@ -1352,7 +1352,7 @@ CVE-2014-9907 (coders/dds.c in ImageMagick allows remote attackers to cause a de NOTE: https://github.com/ImageMagick/ImageMagick/commit/21eae25a8db5fdcd112dbcfcd9e5c37e32d32e2f NOTE: https://github.com/ImageMagick/ImageMagick/commit/d7325bac173492b358417a0ad49fabad44447d52 NOTE: https://github.com/ImageMagick/ImageMagick/commit/504ada82b6fa38a30c846c1c29116af7290decb2 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2014-9906 (Use-after-free vulnerability in DBD::mysql before 4.029 allows attacke ...) {DSA-3635-1 DLA-576-1} - libdbd-mysql-perl 4.033-1 @@ -1703,7 +1703,7 @@ CVE-2014-9773 (modules/chanserv/flags.c in Atheme before 7.2.7 allows remote att NOTE: https://github.com/atheme/atheme/issues/397 NOTE: Fixed by: https://github.com/atheme/atheme/commit/c597156adc60a45b5f827793cd420945f47bc03b NOTE: Introduced in: https://github.com/atheme/atheme/commit/5c734f28068cf47b9b450af4dcf37195734b15be - NOTE: http://www.openwall.com/lists/oss-security/2016/05/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/02/2 CVE-2014-9772 (The validator package before 2.0.0 for Node.js allows remote attackers ...) - validator.js <not-affected> (Fixed before initial release) CVE-2014-9771 (Integer overflow in imlib2 before 1.4.7 allows remote attackers to cau ...) @@ -1711,7 +1711,7 @@ CVE-2014-9771 (Integer overflow in imlib2 before 1.4.7 allows remote attackers t - imlib2 1.4.7-1 (bug #820206) NOTE: https://git.enlightenment.org/legacy/imlib2.git/commit/?id=143f299 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1324774 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/09/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/09/3 CVE-2014-9770 (tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions fo ...) - systemd 215-1 [wheezy] - systemd <not-affected> (Vulnerable code not present) @@ -1724,7 +1724,7 @@ CVE-2014-9769 (pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps [wheezy] - pcre3 <not-affected> (Vulnerable code not present) NOTE: Upstream fix: http://vcs.pcre.org/pcre?view=revision&revision=1475 (8.36) NOTE: Introduced in: http://vcs.pcre.org/pcre?view=revision&revision=1434 (8.35) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/26/1 CVE-2014-9768 (** DISPUTED ** IBM Tivoli NetView Access Services (NVAS) allows remote ...) NOT-FOR-US: Tivoli CVE-2014-9767 (Directory traversal vulnerability in the ZipArchive::extractTo functio ...) @@ -1744,7 +1744,7 @@ CVE-2014-9765 (Buffer overflow in the main_get_appheader function in xdelta3-mai {DSA-3484-1 DLA-417-1} - xdelta3 3.0.8-dfsg-1.1 (bug #814067) NOTE: https://github.com/jmacd/xdelta-devel/commit/ef93ff74203e030073b898c05e8b4860b5d09ef2 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/08/1 CVE-2014-9764 (imlib2 before 1.4.7 allows remote attackers to cause a denial of servi ...) {DSA-3537-1 DLA-401-1} - imlib2 1.4.7-1 @@ -1778,7 +1778,7 @@ CVE-2014-9759 (Incomplete blacklist vulnerability in the config_is_private funct NOTE: http://github.com/mantisbt/mantisbt/commit/7927c275 NOTE: https://sourceforge.net/p/mantisbt/mailman/message/32948048/ NOTE: https://mantisbt.org/bugs/view.php?id=20277 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/02/1 CVE-2014-9758 (Cross-site scripting (XSS) vulnerability in Magento E-Commerce Platfor ...) NOT-FOR-US: Magento CVE-2014-9757 (The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before ...) @@ -1823,7 +1823,7 @@ CVE-2014-9745 (The parse_encoding function in type1/t1load.c in FreeType before NOTE: http://www.ubuntu.com/usn/usn-2739-1/ NOTE: https://savannah.nongnu.org/bugs/?41590 NOTE: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 (VER-2-5-3) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/11/4 CVE-2014-9746 (The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse ...) {DSA-3370-1 DLA-319-1} - freetype 2.6-1 (bug #798619) @@ -1831,7 +1831,7 @@ CVE-2014-9746 (The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_ NOTE: http://www.ubuntu.com/usn/usn-2739-1/ NOTE: https://savannah.nongnu.org/bugs/?41309 NOTE: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1 (VER-2-5-3) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/11/4 CVE-2014-9747 (The t42_parse_encoding function in type42/t42parse.c in FreeType befor ...) {DSA-3370-1 DLA-319-1} - freetype 2.6-1 (bug #798619) @@ -1839,7 +1839,7 @@ CVE-2014-9747 (The t42_parse_encoding function in type42/t42parse.c in FreeType NOTE: http://www.ubuntu.com/usn/usn-2739-1/ NOTE: https://savannah.nongnu.org/bugs/?41309 NOTE: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1 (VER-2-5-3) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/11/4 CVE-2014-9744 (Memory leak in PolarSSL before 1.3.9 allows remote attackers to cause ...) - polarssl 1.3.9-1 [wheezy] - polarssl <not-affected> (Affects only 1.3.x series) @@ -1858,7 +1858,7 @@ CVE-2014-9939 (ihex.c in GNU Binutils before 2.26 contains a stack buffer overfl - binutils 2.25.90.20151125-1 [jessie] - binutils <ignored> (Minor issue) - gdb 7.10-1 (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/31/6 NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=18750 NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commitdiff;h=7e27a9d5f22f9f7ead11738b1546d0b5c737266b CVE-2014-8878 (KDE KMail does not encrypt attachments in emails when "automatic encry ...) @@ -1867,7 +1867,7 @@ CVE-2014-8878 (KDE KMail does not encrypt attachments in emails when "automatic [wheezy] - kdepim <no-dsa> (Minor issue) [squeeze] - kdepim <not-affected> (Bogus condition not present) NOTE: https://bugs.kde.org/show_bug.cgi?id=340312 - NOTE: http://www.openwall.com/lists/oss-security/2015/07/15/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/15/5 CVE-2014-9741 (Multiple cross-site scripting (XSS) vulnerabilities in ESRI ArcGIS for ...) NOT-FOR-US: ArcGIS CVE-2014-9740 (Cross-site scripting (XSS) vulnerability in the Rules Link module 7.x- ...) @@ -1894,21 +1894,21 @@ CVE-2014-9731 (The UDF filesystem implementation in the Linux kernel before 3.18 [wheezy] - linux 3.2.68-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14 (v3.19-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/03/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/03/4 CVE-2014-9730 (The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel be ...) {DLA-246-1} - linux 3.16.7-ckt4-1 [wheezy] - linux 3.2.68-1 - linux-2.6 <removed> NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/02/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/02/7 CVE-2014-9729 (The udf_read_inode function in fs/udf/inode.c in the Linux kernel befo ...) {DLA-246-1} - linux 3.16.7-ckt4-1 [wheezy] - linux 3.2.68-1 - linux-2.6 <removed> NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/02/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/02/7 CVE-2014-9728 (The UDF filesystem implementation in the Linux kernel before 3.18.2 do ...) {DLA-246-1} - linux 3.16.7-ckt4-1 @@ -1917,7 +1917,7 @@ CVE-2014-9728 (The UDF filesystem implementation in the Linux kernel before 3.18 NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3) NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3) NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c (v3.19-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/02/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/02/7 CVE-2014-9726 RESERVED CVE-2014-9725 @@ -1941,7 +1941,7 @@ CVE-2014-9721 (libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attacker - zeromq3 4.0.5+dfsg-3 (bug #784366) NOTE: https://github.com/zeromq/libzmq/issues/1273 NOTE: https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/8 CVE-2014-9717 (fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH u ...) - linux 4.0.2-1 (low) [jessie] - linux <ignored> (Too intrusive to backport) @@ -1949,7 +1949,7 @@ CVE-2014-9717 (fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DET - linux-2.6 <not-affected> (user namespaces known broken before 3.5, see kernel-sec info) NOTE: https://groups.google.com/forum/#!topic/linux.kernel/HnegnbXk0Vs NOTE: Proposed fixes: http://www.spinics.net/lists/linux-containers/msg30786.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/17/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/17/4 NOTE: CVE assignement for issue in http://marc.info/?l=linux-kernel&m=141271552117745&w=2 CVE-2014-9716 (Cross-site scripting (XSS) vulnerability in WebODF before 0.5.4 allows ...) - owncloud <not-affected> (embedded partial copy doesn't contain the related code) @@ -1963,7 +1963,7 @@ CVE-2014-9715 (include/net/netfilter/nf_conntrack_extend.h in the netfilter subs NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=223b02d923ecd7c84cf9780bb3686f455d279279 (v3.15-rc1) NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5b423f6a40a0327f9d40bc8b97ce9be266f74368 (v3.6-rc5) NOTE: Introduced in 3.2.x in https://git.kernel.org/cgit/linux/kernel/git/bwh/linux-3.2.y.git/commit/?id=cc1b75d796ad050c83c95733c4220aaa04fa1304 (v3.2.33) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/08/1 CVE-2014-9714 (Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveA ...) - hhvm 3.11.0+dfsg-1 NOTE: https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34 @@ -1984,7 +1984,7 @@ CVE-2014-9710 (The Btrfs implementation in the Linux kernel before 3.19 does not - linux-2.6 <removed> [squeeze] - linux-2.6 <no-dsa> (btrfs in 2.6.32 is just a tech preview and not usable for production) NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 (v3.19-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/24/11 CVE-2014-9718 (The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in ...) {DSA-3259-1} - qemu 1:2.3+dfsg-1 (unimportant; bug #781250) @@ -1992,7 +1992,7 @@ CVE-2014-9718 (The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionalit - qemu-kvm <removed> (unimportant) [wheezy] - qemu-kvm <postponed> (Can be fixed along in later update) NOTE: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8 (v2.2.0-rc2) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/24/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/24/4 NOTE: Per maintainer not a security issue: NOTE: Qemu either leaks memory or loops infinitely. Memory leakage can be easily NOTE: mitigated using some kind of resource limits in security-sensitive environments, @@ -2004,7 +2004,7 @@ CVE-2014-9706 (The build_index_from_tree function in index.py in Dulwich before [jessie] - dulwich 0.9.7-3 [squeeze] - dulwich <not-affected> (Repo.checkout (later renamed to build_index_from_tree) introduced past 0.6.1) NOTE: Patch: https://git.samba.org/?p=jelmer/dulwich.git;a=commitdiff;h=091638be3c89f46f42c3b1d57dc1504af5729176 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/21/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/21/1 CVE-2014-9704 RESERVED CVE-2014-9703 @@ -2057,7 +2057,7 @@ CVE-2014-9705 (Heap-based buffer overflow in the enchant_broker_request_dict fun - php5 5.6.6+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=68552 NOTE: http://svn.php.net/viewvc/pecl/enchant/trunk/enchant.c?r1=317600&r2=335803 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/10/6 CVE-2014-9689 (content/renderer/device_sensors/device_orientation_event_pump.cc in Go ...) - chromium-browser 41.0.2272.76-1 [wheezy] - chromium-browser <end-of-life> @@ -2100,10 +2100,10 @@ CVE-2014-9676 (The seg_write_packet function in libavformat/segment.c in ffmpeg {DLA-464-1} - ffmpeg <not-affected> (Vulnerable code not present in a ffmpeg version in the archive) - libav 6:11.2-1 - NOTE: Patch in http://www.openwall.com/lists/oss-security/2015/01/04/10 seem to apply for libav + NOTE: Patch in https://www.openwall.com/lists/oss-security/2015/01/04/10 seem to apply for libav NOTE: ffmpeg: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=169065fbfb3da1ab776379c333aebc54bb1f1bc4 NOTE: libav: https://git.libav.org/?p=libav.git;a=commit;h=b3f04657368a32a9903406395f865e230b1de348 - NOTE: http://www.openwall.com/lists/oss-security/2015/01/04/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/04/10 CVE-2014-9675 (bdf/bdflib.c in FreeType before 2.5.4 identifies property names by onl ...) {DSA-3188-1 DLA-185-1} - freetype 2.5.2-3 (bug #777656) @@ -2222,19 +2222,19 @@ CVE-2014-9679 (Integer underflow in the cupsRasterReadPixels function in filter/ NOTE: Marked with [experimental] tag as the fix is only in experimental so far NOTE: Switch this to regular fixed version once the fix is in unstable NOTE: https://www.cups.org/strfiles.php/3438/str4551.patch - NOTE: http://www.openwall.com/lists/oss-security/2015/02/10/15 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/10/15 CVE-2014-9681 REJECTED CVE-2014-9680 (sudo before 1.8.12 does not ensure that the TZ environment variable is ...) {DSA-3167-1 DLA-160-1} - sudo 1.8.12-1 (bug #772707) [jessie] - sudo 1.8.10p3-1+deb8u2 - NOTE: http://www.openwall.com/lists/oss-security/2014/10/15/24 + NOTE: https://www.openwall.com/lists/oss-security/2014/10/15/24 NOTE: http://www.sudo.ws/repos/sudo/rev/650ac6938b59 (1.8.x) NOTE: http://www.sudo.ws/repos/sudo/rev/ac1467f71ac0 (typos) NOTE: http://www.sudo.ws/repos/sudo/rev/91859f613b88 (description) NOTE: http://www.sudo.ws/repos/sudo/rev/579b02f0dbe0 (improved description) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/09/12 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/09/12 CVE-2014-XXXX [RPATH set to untrusted directory] [experimental] - noise <unfixed> (bug #759868) CVE-2014-9655 (The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeX ...) @@ -2254,7 +2254,7 @@ CVE-2014-9653 (readelf.c in file before 5.22, as used in the Fileinfo component - php5 <not-affected> (readelf.c not used and even removed in 5.4.36-0+deb7u3) NOTE: http://bugs.gw.com/view.php?id=409 NOTE: http://mx.gw.com/pipermail/file/2014/001649.html - NOTE: http://www.openwall.com/lists/oss-security/2015/02/04/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/04/13 CVE-2014-9983 (Directory Traversal exists in RAR 4.x and 5.x because an unpack operat ...) - rar 2:5.3.b2-1 (bug #774172) [jessie] - rar <no-dsa> (Non-free not supported) @@ -2327,7 +2327,7 @@ CVE-2014-9649 (Cross-site scripting (XSS) vulnerability in the management plugin [wheezy] - rabbitmq-server <no-dsa> (Minor issue) [squeeze] - rabbitmq-server <not-affected> (Management web UI not available in version 1.8.1) NOTE: https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs - NOTE: http://www.openwall.com/lists/oss-security/2015/01/21/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/21/13 CVE-2014-9650 (CRLF injection vulnerability in the management plugin in RabbitMQ 2.1. ...) - rabbitmq-server 3.4.1-1 [jessie] - rabbitmq-server <no-dsa> (Minor issue) @@ -2335,10 +2335,10 @@ CVE-2014-9650 (CRLF injection vulnerability in the management plugin in RabbitMQ [squeeze] - rabbitmq-server <not-affected> (Management web UI not available in version 1.8.1) NOTE: https://groups.google.com/forum/#!topic/rabbitmq-users/-3Z2FyGtXhs NOTE: Fixed by: https://github.com/rabbitmq/rabbitmq-management/commit/b5a5fc31bd49ad821a655ea9e2fe920d670a62ad - NOTE: http://www.openwall.com/lists/oss-security/2015/01/21/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/21/13 CVE-2014-9732 (The cabd_extract function in cabd.c in libmspack before 0.5 does not p ...) - libmspack 0.5-1 (bug #774665) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2014-9637 (GNU patch 2.7.2 and earlier allows remote attackers to cause a denial ...) - patch 2.7.1-7 [wheezy] - patch <not-affected> (Vulnerability introduced later) @@ -2349,7 +2349,7 @@ CVE-2014-XXXX [formail: memory corruption] - procmail 3.22-24 (bug #769937) [wheezy] - procmail <no-dsa> (Minor issue) [squeeze] - procmail <no-dsa> (Minor issue) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/01/21/9 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/01/21/9 CVE-2014-9630 (The rtp_packetize_xiph_config function in modules/stream_out/rtpfmt.c ...) {DSA-3150-1} - vlc 2.2.0~rc2-2 (bug #775866) @@ -2684,7 +2684,7 @@ CVE-2014-9651 (Buffer overflow in CHICKEN 4.9.0.x before 4.9.0.2, 4.9.x before 4 [jessie] - chicken <no-dsa> (Minor issue) [wheezy] - chicken <no-dsa> (Minor issue) [squeeze] - chicken <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/01/12/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/12/3 NOTE: Patch: http://lists.nongnu.org/archive/html/chicken-hackers/2014-12/txt2UqAS9CtvH.txt CVE-2014-1155 REJECTED @@ -2898,7 +2898,7 @@ CVE-2014-9490 (The numtok function in lib/raven/okjson.rb in the raven-ruby gem NOT-FOR-US: raven ruby gem CVE-2014-9488 (The is_utf8_well_formed function in GNU less before 475 allows remote ...) - less 481-1 (unimportant; bug #780247) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/10/14 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/10/14 NOTE: https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html CVE-2014-9484 RESERVED @@ -3102,7 +3102,7 @@ CVE-2014-9413 (Multiple cross-site request forgery (CSRF) vulnerabilities in the NOT-FOR-US: IP Ban (simple-ip-ban) plugin for WordPress CVE-2014-9482 (Use-after-free vulnerability in dwarfdump in libdwarf 20130126 through ...) - dwarfutils <not-affected> (Vulnerable code introduced later, see bug #774530) - NOTE: http://www.openwall.com/lists/oss-security/2014/12/31/3 + NOTE: https://www.openwall.com/lists/oss-security/2014/12/31/3 CVE-2014-9427 (sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x ...) {DSA-3117-1} - php5 5.6.5+dfsg-1 @@ -4085,7 +4085,7 @@ CVE-2014-9129 (Cross-site request forgery (CSRF) vulnerability in the CreativeMi NOT-FOR-US: WordPress plugin cm-download-manager CVE-2014-8123 (Buffer overflow in the bGetPPS function in wordole.c in Antiword 0.37 ...) - antiword 0.37-5 (bug #771768) - NOTE: http://www.openwall.com/lists/oss-security/2014/12/01/4 + NOTE: https://www.openwall.com/lists/oss-security/2014/12/01/4 NOTE: This actually was fixed long time ago in https://bugs.debian.org/407015 CVE-2014-8104 (OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before ...) {DSA-3084-1 DLA-98-1} @@ -4163,7 +4163,7 @@ CVE-2014-9114 (Blkid in util-linux before 2.26rc-1 allows local users to execute - util-linux 2.25.2-4 (bug #771274) [squeeze] - util-linux <no-dsa> (Minor issue) [wheezy] - util-linux <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2014/11/26/13 + NOTE: https://www.openwall.com/lists/oss-security/2014/11/26/13 NOTE: https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc CVE-2014-9112 (Heap-based buffer overflow in the process_copy_in function in GNU Cpio ...) {DSA-3111-1 DLA-111-1} @@ -5581,19 +5581,19 @@ CVE-2014-8559 (The d_walk function in fs/dcache.c in the Linux kernel through 3. {DSA-3170-1} - linux 3.16.7-ckt4-1 - linux-2.6 <not-affected> (Introduced in 2.6.38) - NOTE: References in http://www.openwall.com/lists/oss-security/2014/10/30/7 + NOTE: References in https://www.openwall.com/lists/oss-security/2014/10/30/7 NOTE: Upstream fix: https://git.kernel.org/linus/ca5358ef75fc69fee5322a38a340f5739d997c10 (v3.19-rc1) NOTE: Upstream fix: https://git.kernel.org/linus/946e51f2bf37f1656916eb75bd0742ba33983c28 (v3.19-rc1) CVE-2014-8517 (The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in Net ...) - tnftp 20130505-2 (low; bug #767171) [wheezy] - tnftp <no-dsa> (Minor issue) [squeeze] - tnftp <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2014/10/28/4 + NOTE: https://www.openwall.com/lists/oss-security/2014/10/28/4 CVE-2014-9915 (Off-by-one error in ImageMagick before 6.6.0-4 allows remote attackers ...) - imagemagick 8:6.8.9.9-1 (bug #767240) [wheezy] - imagemagick <not-affected> (Vulnerable code not present) [squeeze] - imagemagick <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2014-8355 (PCX parser code in ImageMagick before 6.8.9-9 allows remote attackers ...) {DLA-960-1 DLA-242-1} - imagemagick 8:6.8.9.9-1 (bug #767240) @@ -6717,7 +6717,7 @@ CVE-2014-8117 (softmagic.c in file before 5.21 does not properly limit recursion - php5 5.6.4+dfsg-2 NOTE: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc NOTE: https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c - NOTE: Other commits needed as well: http://www.openwall.com/lists/oss-security/2014/12/16/2 + NOTE: Other commits needed as well: https://www.openwall.com/lists/oss-security/2014/12/16/2 CVE-2014-8116 (The ELF parser (readelf.c) in file before 5.21 allows remote attackers ...) {DSA-3121-1 DLA-131-1} - file 1:5.21+15-1 (low; bug #773148) @@ -6727,7 +6727,7 @@ CVE-2014-8116 (The ELF parser (readelf.c) in file before 5.21 allows remote atta NOTE: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:28.file.asc NOTE: https://github.com/file/file/commit/b4c01141e5367f247b84dcaf6aefbb4e741842b NOTE: https://github.com/file/file/commit/d7cdad007c507e6c79f51f058dd77fab70ceb9f6 - NOTE: Other commits needed as well: http://www.openwall.com/lists/oss-security/2014/12/16/2 + NOTE: Other commits needed as well: https://www.openwall.com/lists/oss-security/2014/12/16/2 CVE-2014-8115 (The default authorization constrains in KIE Workbench 6.0.x allows rem ...) NOT-FOR-US: KIE Workbench CVE-2014-8114 (The UberFire Framework 0.3.x does not properly restrict paths, which a ...) @@ -11236,7 +11236,7 @@ CVE-2014-6228 (Integer overflow in the string_chunk_split function in hphp/runti CVE-2014-3618 (Heap-based buffer overflow in formisc.c in formail in procmail 3.22 al ...) {DSA-3019-1 DLA-46-1} - procmail 3.22-22 (bug #760443) - NOTE: http://www.openwall.com/lists/oss-security/2014/09/03/8 + NOTE: https://www.openwall.com/lists/oss-security/2014/09/03/8 CVE-2014-6241 (SQL injection vulnerability in the wt_directory extension before 1.4.1 ...) NOT-FOR-US: TYPO3 extension wt_directory CVE-2014-6240 (Cross-site scripting (XSS) vulnerability in the Google Sitemap (weeaar ...) @@ -13580,13 +13580,13 @@ CVE-2014-5207 (fs/namespace.c in the Linux kernel through 3.16.1 does not proper NOTE: Fixed by https://git.kernel.org/cgit/linux/kernel/git/ebiederm/user-namespace.git/commit/?h=for-linus&id=9566d6742852c527bf5af38af5cbb878dad75705 (v3.17-rc1) NOTE: and: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ffbc6f0ead47fa5a1dc9642b0331cb75c20a640e (v3.17-rc1) NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c55cfc4166d9a0f38de779bd4d75a90afbe7734 (v3.8) - NOTE: Thread starting at http://www.openwall.com/lists/oss-security/2014/08/12/6 + NOTE: Thread starting at https://www.openwall.com/lists/oss-security/2014/08/12/6 CVE-2014-5206 (The do_remount function in fs/namespace.c in the Linux kernel through ...) - linux 3.16.2-1 [wheezy] - linux <not-affected> (User namespaces only usable in later kernels) - linux-2.6 <not-affected> (User namespaces only usable in later kernels) NOTE: https://git.kernel.org/cgit/linux/kernel/git/ebiederm/user-namespace.git/commit/?h=for-linus&id=db181ce011e3c033328608299cd6fac06ea50130 - NOTE: Thread starting at http://www.openwall.com/lists/oss-security/2014/08/12/6 + NOTE: Thread starting at https://www.openwall.com/lists/oss-security/2014/08/12/6 CVE-2014-5247 (The _UpgradeBeforeConfigurationChange function in lib/client/gnt_clust ...) - ganeti 2.11.5-1 [wheezy] - ganeti <not-affected> (Vulnerable code not present) @@ -13981,7 +13981,7 @@ CVE-2014-5033 (KDE kdelibs before 4.14 and kauth before 5.1 does not properly us NOTE: http://quickgit.kde.org/?p=kdelibs.git&a=commit&h=e4e7b53b71e2659adaf52691d4accc3594203b23 CVE-2014-5032 (GLPI before 0.84.7 does not properly restrict access to cost informati ...) - glpi <removed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2014/07/22/6 + NOTE: https://www.openwall.com/lists/oss-security/2014/07/22/6 NOTE: Only supported behind an authenticated HTTP zone CVE-2014-5031 (The web interface in CUPS before 2.0 does not check that files have wo ...) {DSA-2990-1 DLA-0022-1} @@ -14651,7 +14651,7 @@ CVE-2014-5119 (Off-by-one error in the __gconv_translit_find function in gconv_t {DSA-3012-1 DLA-43-1} - glibc 2.19-10 (medium) - eglibc <removed> (medium) - NOTE: http://www.openwall.com/lists/oss-security/2014/07/14/2 + NOTE: https://www.openwall.com/lists/oss-security/2014/07/14/2 NOTE: http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html CVE-2014-4909 (Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bit ...) {DSA-2988-1} @@ -14881,7 +14881,7 @@ CVE-2014-4652 (Race condition in the tlv handler functionality in the snd_ctl_el CVE-2014-4678 (The safe_eval function in Ansible before 1.6.4 does not properly restr ...) - ansible 1.6.6+dfsg-1 NOTE: https://github.com/ansible/ansible/commit/5429b85b9f6c2e640074176f36ff05fd5e4d1916 - NOTE: See http://www.openwall.com/lists/oss-security/2014/06/26/30 + NOTE: See https://www.openwall.com/lists/oss-security/2014/06/26/30 CVE-2014-4660 (Ansible before 1.5.5 constructs filenames containing user and password ...) - ansible 1.5.5+dfsg-1 NOTE: https://github.com/ansible/ansible/commit/c4b5e46054c74176b2446c82d4df1a2610eddc08 @@ -16606,7 +16606,7 @@ CVE-2014-3956 (The sm_close_on_exec function in conf.c in sendmail before 8.14.9 - sendmail 8.14.4-6 (low; bug #750562) [wheezy] - sendmail 8.14.4-4+deb7u1 [squeeze] - sendmail <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2014/06/03/1 + NOTE: https://www.openwall.com/lists/oss-security/2014/06/03/1 CVE-2014-3940 (The Linux kernel through 3.14.5 does not properly consider the presenc ...) - linux 3.14.7-1 (low) [wheezy] - linux 3.2.60-1 @@ -19356,7 +19356,7 @@ CVE-2014-3985 (The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows [wheezy] - miniupnpc <not-affected> (Vulnerable code not present) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1085618 NOTE: https://github.com/miniupnp/miniupnp/commit/3a87aa2f10bd7f1408e1849bdb59c41dd63a9fe9 - NOTE: http://www.openwall.com/lists/oss-security/2014/04/30/3 + NOTE: https://www.openwall.com/lists/oss-security/2014/04/30/3 CVE-2014-4338 (cups-browsed in cups-filters before 1.0.53 allows remote attackers to ...) - cups-filters 1.0.53-1 [wheezy] - cups-filters <not-affected> (vulnerable code not present) @@ -20738,7 +20738,7 @@ CVE-2014-2440 (Unspecified vulnerability in the MySQL Client component in Oracle - mariadb-10.0 <not-affected> (Fixed before initial upload) - mysql-5.1 <not-affected> (Only affects Mysql 5.5/5.6) - percona-xtradb-cluster-5.5 5.5.37-25.10+dfsg-1 - NOTE: this is the same issue as CVE-2014-0001, see http://www.openwall.com/lists/oss-security/2014/09/11/23 + NOTE: this is the same issue as CVE-2014-0001, see https://www.openwall.com/lists/oss-security/2014/09/11/23 CVE-2014-2439 (Unspecified vulnerability in the Oracle Secure Global Desktop (SGD) co ...) NOT-FOR-US: Oracle Secure Global Desktop (SGD) CVE-2014-2438 (Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier an ...) @@ -21993,7 +21993,7 @@ CVE-2014-1949 (GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-s [wheezy] - gtk+3.0 <not-affected> (Only affects GTK+ 3.10.9 and later) - gtk+2.0 <not-affected> (Only affects GTK+ 3.10.9 and later) - cinnamon 2.2.14-1 (bug #738828) - NOTE: http://www.openwall.com/lists/oss-security/2014/02/12/7 + NOTE: https://www.openwall.com/lists/oss-security/2014/02/12/7 NOTE: https://git.gnome.org/browse/gtk+/commit/?id=1691bb741d50c90ee938f0b73fe81b0ca9bfd6d4 NOTE: The CVE was originally assigned specifically for cinnamon-screensaver, but the underlying fix lies in gtk+3.0 NOTE: and later MITRE assigned the CVE to GTK+ 3.10.9 and later, see official MITRE CVE description. @@ -23567,7 +23567,7 @@ CVE-2014-1642 (The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrou - xen 4.4.0-1 [squeeze] - xen <not-affected> (Only affects 4.2 and later) [wheezy] - xen <not-affected> (Only affects 4.2 and later) - NOTE: http://www.openwall.com/lists/oss-security/2014/01/23/2 + NOTE: https://www.openwall.com/lists/oss-security/2014/01/23/2 CVE-2014-1640 (axiom-test.sh in axiom 20100701-1.1 uses tempfile to create a safe tem ...) - axiom 20120501-17 (low; bug #736358) [squeeze] - axiom <no-dsa> (Minor issue) @@ -26807,7 +26807,7 @@ CVE-2014-0001 (Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB be CVE-2014-0158 (Heap-based buffer overflow in the JPEG2000 image tile decoder in OpenJ ...) - openjpeg 1.3+dfsg-4.7 NOTE: Not considering a duplicate of CVE-2013-1447 following - NOTE: http://www.openwall.com/lists/oss-security/2014/04/02/2 . A query + NOTE: https://www.openwall.com/lists/oss-security/2014/04/02/2 . A query NOTE: to MITRE though indicated that CVE-2014-0158 will not be REJECTED NOTE: since people might have tracked CVE-2014-0158 of the much higher NOTE: impact as due https://bugzilla.redhat.com/show_bug.cgi?id=1082925 diff --git a/data/CVE/2015.list b/data/CVE/2015.list index b724f87810..00a5e2c97f 100644 --- a/data/CVE/2015.list +++ b/data/CVE/2015.list @@ -1224,7 +1224,7 @@ CVE-2015-8979 (Stack-based buffer overflow in the parsePresentationContext funct NOTE: 3.6.1~20160216-2 is the first version in unstable containing the fix NOTE: http://zeroscience.mk/en/vulnerabilities/ZSL-2016-5384.php NOTE: Fixed by: https://github.com/commontk/DCMTK/commit/1b6bb76 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/17/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/17/2 CVE-2015-8978 (In Soap Lite (aka the SOAP::Lite extension for Perl) 1.14 and earlier, ...) {DLA-723-1} - libsoap-lite-perl 1.19-1 @@ -1250,7 +1250,7 @@ CVE-2015-8971 (Terminology 0.7.0 allows remote attackers to execute arbitrary co {DSA-3712-1} - terminology 0.7.0-2 (bug #843434) NOTE: https://git.enlightenment.org/apps/terminology.git/commit/?id=b80bedc7c21ecffe99d8d142930db696eebdd6a5 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/04/12 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/04/12 CVE-2015-8969 (git-fastclone before 1.0.5 passes user modifiable strings directly to ...) NOT-FOR-US: git-fastclone CVE-2015-8968 (git-fastclone before 1.0.1 permits arbitrary shell command execution f ...) @@ -1264,7 +1264,7 @@ CVE-2015-8970 (crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not NOTE: Fixed by: https://git.kernel.org/linus/dd504589577d8e8e70f51f997ad487a4cb6c026f (v4.5-rc1) NOTE: Followed by a complete set of related upstrema commits. See kernel-sec NOTE: triage for details. - NOTE: http://www.openwall.com/lists/oss-security/2016/11/03/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/03/6 CVE-2015-8967 (arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local us ...) - linux 4.0.2-1 (unimportant) NOTE: Fixed by: https://git.kernel.org/linus/c623b33b4e9599c6ac5076f7db7369eb9869aa04 (v4.0-rc1) @@ -1340,7 +1340,7 @@ CVE-2015-8957 (Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote NOTE: https://github.com/ImageMagick/ImageMagick/commit/78f82d9d1c2944725a279acd573a22168dc6e22a NOTE: https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d NOTE: https://github.com/ImageMagick/ImageMagick/commit/450bd716ed3b9186dd10f9e60f630a3d9eeea2a4 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2015-8958 (coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attacker ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832465) @@ -1349,14 +1349,14 @@ CVE-2015-8958 (coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote att NOTE: https://github.com/ImageMagick/ImageMagick/commit/1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f NOTE: https://github.com/ImageMagick/ImageMagick/commit/6b4aff0f117b978502ee5bcd6e753c17aec5a961 NOTE: https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2015-8959 (coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attacker ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832944) NOTE: http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26861 NOTE: https://github.com/ImageMagick/ImageMagick/commit/3ab016764c7f787829d9065440d86f5609765110 NOTE: https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2015-8949 (Use-after-free vulnerability in the my_login function in DBD::mysql be ...) {DSA-3635-1 DLA-576-1} - libdbd-mysql-perl 4.035-1 @@ -1379,7 +1379,7 @@ CVE-2015-8946 (ecryptfs-setup-swap in eCryptfs before 111 does not prevent the u [wheezy] - ecryptfs-utils <no-dsa> (Only happens if using systemd v207 onward) NOTE: https://launchpad.net/bugs/1447282 NOTE: Fixed by: https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/13/2 CVE-2015-8945 (openshift-node in OpenShift Origin 1.1.6 and earlier improperly stores ...) NOT-FOR-US: OpenShift CVE-2015-8944 (The ioresources_init function in kernel/resource.c in the Linux kernel ...) @@ -1403,7 +1403,7 @@ CVE-2015-8936 (Cross-site scripting (XSS) vulnerability in squidGuard.cgi in squ - squidguard 1.5-5 (unimportant) NOTE: Only affects an example script NOTE: Fix applied: 16_XSS-security-bugfix.patch in 1.5-5 - NOTE: http://www.openwall.com/lists/oss-security/2016/06/20/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/06/20/2 CVE-2015-8935 (The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x ...) - php5 5.6.6+dfsg-1 [wheezy] - php5 5.4.38-0+deb7u1 @@ -1605,8 +1605,8 @@ CVE-2015-8896 (Integer truncation issue in coders/pict.c in ImageMagick before 7 [wheezy] - imagemagick 8:6.7.7.10-5+deb7u4 NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1448803 NOTE: https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/07/2 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/22/4 CVE-2015-8895 (Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later all ...) {DLA-353-1} - imagemagick 8:6.8.9.9-7 (bug #806441) @@ -1614,8 +1614,8 @@ CVE-2015-8895 (Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and late [wheezy] - imagemagick 8:6.7.7.10-5+deb7u4 NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1459747 NOTE: https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/07/2 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/22/4 NOTE: The issue is only exploitable on 32 bit architectures. CVE-2015-8894 (Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and lat ...) - imagemagick 8:6.8.9.9-6 (bug #806442; bug #799524) @@ -1624,8 +1624,8 @@ CVE-2015-8894 (Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 an [squeeze] - imagemagick <not-affected> (Can't reproduce crash with file) NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 NOTE: https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/07/2 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/22/4 NOTE: The problem can only be triggered with recent versions of ImageMagick (8:6.9.1.2-1 in experimental is vulnerable, 8:6.8.9.9-6 in sid is not vulnerable, older versions are not vulnerable) CVE-2015-8893 (app/aboot/aboot.c in the Qualcomm bootloader in Android before 2016-07 ...) NOT-FOR-US: Qualcomm components for Android @@ -1719,7 +1719,7 @@ CVE-2015-8869 (OCaml before 4.03.0 does not properly handle sign extensions, whi - ocaml 4.02.3-9 (bug #824139) [jessie] - ocaml <no-dsa> (Minor issue; can be fixed via point release and sheduling binNMUs there) NOTE: https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/29/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/29/1 NOTE: Ocaml applications using the patched functions need to be recompiled with the NOTE: fixed ocaml version. CVE-2015-8864 (Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1 ...) @@ -1729,7 +1729,7 @@ CVE-2015-8864 (Cross-site scripting (XSS) vulnerability in Roundcube Webmail bef NOTE: https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115 NOTE: https://github.com/roundcube/roundcubemail/commit/40d7342dd9c9bd2a1d613edc848ed95a4d71aa18 NOTE: https://github.com/roundcube/roundcubemail/commit/7bbefdb63b12e2344cf1cb87aeb6e3933b4063e0 (release-1.1) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/23/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/23/3 NOTE: https://lists.debian.org/debian-lts/2016/06/msg00159.html CVE-2015-8862 (mustache package before 2.2.1 for Node.js allows remote attackers to c ...) - mustache.js <unfixed> (unimportant) @@ -1763,7 +1763,7 @@ CVE-2015-8866 (ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, NOTE: http://framework.zend.com/security/advisory/ZF2015-06 -> Relation to CVE-2015-5161 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=de31324c221c1791b26350ba106cc26bad23ace9 NOTE: Fixed in 5.6.6, 5.5.22 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/21/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/21/8 CVE-2015-8867 (The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in P ...) - php7.0 7.0.0-1 - php5 5.6.12+dfsg-1 @@ -1773,20 +1773,20 @@ CVE-2015-8867 (The openssl_random_pseudo_bytes function in ext/openssl/openssl.c NOTE: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1534203 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 NOTE: Fixed in 7.0.0, 5.6.12, 5.5.28, 5.5.44 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/21/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/21/8 CVE-2015-8853 (The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in ...) - perl 5.22.1-1 (bug #821848) [jessie] - perl 5.20.2-3+deb8u5 [wheezy] - perl <no-dsa> (Minor issue) NOTE: https://rt.perl.org/Public/Bug/Display.html?id=123562 NOTE: http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/20/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/20/5 CVE-2015-8863 (Off-by-one error in the tokenadd function in jv_parse.c in jq allows r ...) - jq 1.5+dfsg-1.1 (low; bug #802231) [jessie] - jq 1.4-2.1+deb8u1 NOTE: https://github.com/stedolan/jq/issues/995 NOTE: https://github.com/stedolan/jq/commit/8eb1367ca44e772963e704a700ef72ae2e12babd - NOTE: http://www.openwall.com/lists/oss-security/2016/04/23/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/23/1 CVE-2015-8850 RESERVED CVE-2015-8849 @@ -1825,7 +1825,7 @@ CVE-2015-8868 (Heap-based buffer overflow in the ExponentialFunction::Exponentia - poppler 0.38.0-3 (bug #822578) NOTE: https://cgit.freedesktop.org/poppler/poppler/commit/?id=b3425dd3261679958cd56c0f71995c15d2124433 NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=93476 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/12/1 CVE-2015-8841 (Heap-based buffer overflow in the Archive support module in ESET NOD32 ...) NOT-FOR-US: ESET NOD32 CVE-2015-8840 (The XML Data Archiving Service (XML DAS) in SAP NetWeaver AS Java does ...) @@ -1851,7 +1851,7 @@ CVE-2015-8865 (The file_check_mem function in funcs.c in file before 5.23, as us NOTE: https://bugs.php.net/bug.php?id=71527 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e NOTE: PHP fixed in 7.0.5, 5.6.20, 5.5.34 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/7 NOTE: Fix in HHVM: https://github.com/facebook/hhvm/commit/4e614ba041e24af8351afbb49c92444c0850f23b CVE-2015-8839 (Multiple race conditions in the ext4 filesystem implementation in the ...) {DLA-2241-1} @@ -1897,19 +1897,19 @@ CVE-2015-8833 (Use-after-free vulnerability in the create_smp_dialog function in NOTE: https://bugs.otr.im/issues/128 NOTE: Fixed by: https://bugs.otr.im/projects/pidgin-otr/repository/revisions/aaf551b9dd5cbba8c4abaa3d4dc7ead860efef94 NOTE: Introduced by: https://bugs.otr.im/projects/pidgin-otr/repository/revisions/c276bfa786bef8a4572a37d5633cf40f480d3ae0 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/09/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/09/8 CVE-2015-8832 (Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.cor ...) - dotclear <removed> (bug #815979) NOTE: https://hg.dotclear.org/dotclear/rev/198580bc3d80 NOTE: https://dotclear.org/blog/post/2015/10/25/Dotclear-2.8.2 NOTE: Fixed upstream in 2.8.2 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/05/4 CVE-2015-8831 (Cross-site scripting (XSS) vulnerability in admin/comments.php in Dotc ...) - dotclear <removed> (bug #815979) NOTE: https://hg.dotclear.org/dotclear/rev/65e65154dadf NOTE: https://dotclear.org/blog/post/2015/10/25/Dotclear-2.8.2 NOTE: Fixed upstream in 2.8.2 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/05/4 CVE-2015-8829 REJECTED CVE-2015-8828 @@ -1938,7 +1938,7 @@ CVE-2015-8818 (The cpu_physical_memory_write_rom_internal function in exec.c in [wheezy] - qemu <not-affected> (Affects Qemu versions >= 1.6.0 and <= 2.3.1) [squeeze] - qemu <not-affected> (Affects Qemu versions >= 1.6.0 and <= 2.3.1) - qemu-kvm <not-affected> (Affects Qemu versions >= 1.6.0 and <= 2.3.1) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/01/10 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/01/10 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=b242e0e0e2969c044a318e56f7988bbd84de1f63 (v2.4.0-rc0) NOTE: same patchset than CVE-2015-8817 NOTE: https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00065.html @@ -1948,7 +1948,7 @@ CVE-2015-8817 (QEMU (aka Quick Emulator) built to use 'address_space_translate' [wheezy] - qemu <not-affected> (Affects Qemu versions >= 1.6.0 and <= 2.3.1) [squeeze] - qemu <not-affected> (Affects Qemu versions >= 1.6.0 and <= 2.3.1) - qemu-kvm <not-affected> (Affects Qemu versions >= 1.6.0 and <= 2.3.1) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/01/10 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/01/10 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459 (v2.3.0-rc1) NOTE: https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=23820dbfc79d1c9dce090b4c555994f2bb6a69b3 (v2.4.0-rc0) @@ -1956,7 +1956,7 @@ CVE-2015-8817 (QEMU (aka Quick Emulator) built to use 'address_space_translate' CVE-2015-8852 (Varnish 3.x before 3.0.7, when used in certain stacked installations, ...) {DSA-3553-1} - varnish 4.0.0-1 (bug #783510) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/16/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/16/1 NOTE: fixed in 3.0.7 upstream, mark as fixed with first 4.x version in unstable NOTE: 4.x not affected CVE-2015-8857 (The uglify-js package before 2.4.24 for Node.js does not properly acco ...) @@ -2012,7 +2012,7 @@ CVE-2015-8812 (drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before {DSA-3503-1 DLA-439-1} - linux 4.4.2-1 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/02/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/11/1 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1303532 NOTE: Fixed by: https://git.kernel.org/linus/67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3 (v4.5-rc1) NOTE: Introduced by: https://git.kernel.org/linus/04b5d028f50ff05a8f9ae049ee71f8fdfcf1f5de (v2.6.30-rc2) @@ -2025,7 +2025,7 @@ CVE-2015-8809 CVE-2015-8808 (The DecodeImage function in coders/gif.c in GraphicsMagick 1.3.18 allo ...) {DSA-3746-1 DLA-484-1} - graphicsmagick 1.3.21-2 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/06/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/06/1 NOTE: http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=8e8fa353f53 CVE-2015-8802 REJECTED @@ -2041,7 +2041,7 @@ CVE-2015-8807 (Cross-site scripting (XSS) vulnerability in the _renderVarInput_n {DSA-3496-1} - php-horde-core 2.22.4+debian0-1 (bug #813590) NOTE: https://github.com/horde/horde/commit/11d74fa5a22fe626c5e5a010b703cd46a136f253 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/06/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/06/4 CVE-2015-8806 (dict.c in libxml2 allows remote attackers to cause a denial of service ...) {DSA-3593-1 DLA-503-1} - libxml2 2.9.3+dfsg1-1.1 (bug #813613) @@ -2108,7 +2108,7 @@ CVE-2015-XXXX [Type Confusion Vulnerability in PHP_to_XMLRPC_worker()] NOTE: Workaround entry for DLA-533-1 until CVE is assigned NOTE: https://git.php.net/?p=php-src.git;a=commit;h=f3c1863aa2721343245b63ac7bd68cfdc3dd41f3 NOTE: https://bugs.php.net/bug.php?id=70728 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/03/3 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/02/03/3 CVE-2015-XXXX [Session WDDX Packet Deserialization Type Confusion Vulnerability] - php5 5.6.17+dfsg-1 [jessie] - php5 5.6.17+dfsg-0+deb8u1 @@ -2116,7 +2116,7 @@ CVE-2015-XXXX [Session WDDX Packet Deserialization Type Confusion Vulnerability] NOTE: Workaround entry for DLA-533-1 until CVE is assigned NOTE: https://git.php.net/?p=php-src.git;a=commit;h=1785d2b805f64eaaacf98c14c9e13107bf085ab1 NOTE: https://bugs.php.net/bug.php?id=70741 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/03/3 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/02/03/3 CVE-2015-XXXX [Use-after-free in WDDX Packet Deserialization] - php5 5.6.17+dfsg-1 [jessie] - php5 5.6.17+dfsg-0+deb8u1 @@ -2124,7 +2124,7 @@ CVE-2015-XXXX [Use-after-free in WDDX Packet Deserialization] NOTE: Workaround entry for DLA-533-1 until CVE is assigned NOTE: https://git.php.net/?p=php-src.git;a=commit;h=366f9505a4aae98ef2f4ca39a838f628a324b746 NOTE: https://bugs.php.net/bug.php?id=70661 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/03/3 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/02/03/3 CVE-2015-8792 (The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 al ...) {DSA-3526-1 DLA-420-1} - libmatroska 1.4.4-1 @@ -2147,7 +2147,7 @@ CVE-2015-8787 (The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirec NOTE: https://lkml.org/lkml/2015/12/2/618 NOTE: Introduced by: https://git.kernel.org/linus/8b13eddfdf04cbfa561725cfc42d6868fe896f56 (v3.19-rc1) NOTE: Fixed by: https://git.kernel.org/linus/94f9cd81436c85d8c3a318ba92e236ede73752fc (v4.4-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2016/01/27/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/27/6 CVE-2015-8786 (The Management plugin in RabbitMQ before 3.6.1 allows remote authentic ...) - rabbitmq-server 3.6.5-1 [jessie] - rabbitmq-server <no-dsa> (Minor issue) @@ -2161,21 +2161,21 @@ CVE-2015-8783 (tif_luv.c in libtiff allows attackers to cause a denial of servic - tiff3 <removed> NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2522 NOTE: Commit: https://github.com/vadz/libtiff/commit/aaab5c3c9d2a2c6984f23ccbc79702610439bc65 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/24/3 CVE-2015-8782 (tif_luv.c in libtiff allows attackers to cause a denial of service (ou ...) {DSA-3467-1 DLA-880-1 DLA-405-1} - tiff 4.0.6-1 - tiff3 <removed> NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2522 NOTE: Commit: https://github.com/vadz/libtiff/commit/aaab5c3c9d2a2c6984f23ccbc79702610439bc65 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/24/3 CVE-2015-8781 (tif_luv.c in libtiff allows attackers to cause a denial of service (ou ...) {DSA-3467-1 DLA-880-1 DLA-405-1} - tiff 4.0.6-1 - tiff3 <removed> NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2522#0 NOTE: Commit: https://github.com/vadz/libtiff/commit/aaab5c3c9d2a2c6984f23ccbc79702610439bc65 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/24/3 CVE-2015-8784 (The NeXTDecode function in tif_next.c in LibTIFF allows remote attacke ...) {DSA-3467-1 DLA-880-1 DLA-405-1} - tiff 4.0.6-1 @@ -2184,7 +2184,7 @@ CVE-2015-8784 (The NeXTDecode function in tif_next.c in LibTIFF allows remote at NOTE: Can be reproduced with tiff compiled with AddressSanitizer NOTE: and the same reproducer file http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif NOTE: Commit: https://github.com/vadz/libtiff/commit/b18012dae552f85dcc5c57d3bf4e997a15b1cc1c - NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/24/4 CVE-2015-XXXX [buffer overflows in init_cups] - cups-filters 1.6.0-1 (unimportant) - foomatic-filters <unfixed> (unimportant) @@ -2264,7 +2264,7 @@ CVE-2015-8767 (net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not [wheezy] - linux 3.2.73-2+deb7u3 - linux-2.6 <removed> NOTE: https://git.kernel.org/linus/635682a14427d241bab7bbdeebb48a7d7b91638e (v4.3-rc4) - NOTE: http://www.openwall.com/lists/oss-security/2016/01/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/11/4 CVE-2015-XXXX [use after free / double free] - lighttpd 1.4.39-1 [jessie] - lighttpd <not-affected> (Regression introduced in 1.4.36) @@ -2317,7 +2317,7 @@ CVE-2015-8604 (SQL injection vulnerability in the host_new_graphs function in gr {DSA-3494-1 DLA-386-1} - cacti 0.8.8f+ds1-4 NOTE: http://bugs.cacti.net/view.php?id=2652 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/04/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/04/8 CVE-2015-8742 (The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c ...) - wireshark 2.0.1+g59ea380-1 [jessie] - wireshark <not-affected> (Only affects 2.x) @@ -2601,7 +2601,7 @@ CVE-2015-8743 (QEMU (aka Quick Emulator) built with the NE2000 device emulation NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1264929 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.html NOTE: Introduced by (at least after): http://git.qemu.org/?p=qemu.git;a=commit;h=69b910399a3c40620a5213adaeb14a37366d97ac - NOTE: http://www.openwall.com/lists/oss-security/2016/01/04/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/04/1 CVE-2015-8706 RESERVED CVE-2015-8705 (buffer.c in named in ISC BIND 9.10.x before 9.10.3-P3, when debug logg ...) @@ -2624,7 +2624,7 @@ CVE-2015-8701 (QEMU (aka Quick Emulator) built with the Rocker switch emulation [wheezy] - qemu <not-affected> (Vulnerable code introduced after qemu 2.3) [squeeze] - qemu <not-affected> (Vulnerable code introduced after qemu 2.3) - qemu-kvm <not-affected> (Vulnerable code introduced after qemu 2.3) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/28/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/28/6 CVE-2015-8700 RESERVED CVE-2015-8699 (Multiple cross-site scripting (XSS) vulnerabilities in CA Release Auto ...) @@ -2808,13 +2808,13 @@ CVE-2015-8683 (The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0 {DSA-3467-1 DLA-610-1 DLA-402-1} - tiff 4.0.6-1 (bug #809021) - tiff3 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2015/12/25/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/25/1 NOTE: https://github.com/vadz/libtiff/commit/f94a29a822f5528d2334592760fbb7938f15eb55 CVE-2015-8665 (tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a den ...) {DSA-3467-1 DLA-610-1 DLA-402-1} - tiff 4.0.6-1 (bug #808968) - tiff3 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2015/12/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/24/2 NOTE: https://github.com/vadz/libtiff/commit/f94a29a822f5528d2334592760fbb7938f15eb55 CVE-2015-8666 (Heap-based buffer overflow in QEMU, when built with the Q35-chipset-ba ...) {DLA-1497-1} @@ -2826,7 +2826,7 @@ CVE-2015-8666 (Heap-based buffer overflow in QEMU, when built with the Q35-chips [wheezy] - qemu-kvm <no-dsa> (Minor issue) NOTE: Upstream commit: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb (v2.5.0-rc1) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283722 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/24/1 NOTE: Vulnerable code introduced after 0.14.50: http://git.qemu.org/?p=qemu.git;a=commit;h=23910d3f669d46073b403876e30a7314599633af CVE-2015-8660 (The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel t ...) - linux 4.3.3-3 @@ -2835,7 +2835,7 @@ CVE-2015-8660 (The ovl_setattr function in fs/overlayfs/inode.c in the Linux ker - linux-2.6 <not-affected> (Vulnerable code not present) NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acff81ec2c79492b180fade3c2894425cd35a545 (v4.4-rc4) NOTE: OverlayFS introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9be9d5e76e34872f0c37d72e25bc27fe9e2c54c (v3.18-rc2) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/23/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/23/5 CVE-2015-8659 (The idle stream handling in nghttp2 before 1.6.0 allows attackers to h ...) - nghttp2 1.6.0-1 [jessie] - nghttp2 <not-affected> (Vulnerable code introduced later) @@ -2887,11 +2887,11 @@ CVE-2015-8617 (Format string vulnerability in the zend_throw_or_error function i CVE-2015-8616 (Use-after-free vulnerability in the Collator::sortWithSortKeys functio ...) - php7.0 7.0.1-1 NOTE: https://bugs.php.net/bug.php?id=71020 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/22/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/22/4 CVE-2015-8697 (stalin 0.11-5 allows local users to write to arbitrary files. ...) - stalin <unfixed> (unimportant; bug #808730) [squeeze] - stalin <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/27/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/27/1 NOTE: Not exploitable with kernel hardening since wheezy CVE-2015-8708 (Stack-based buffer overflow in the conv_euctojis function in codeconv. ...) - claws-mail 3.13.1-1.1 (bug #811048) @@ -2922,7 +2922,7 @@ CVE-2015-8613 (Stack-based buffer overflow in the megasas_ctrl_get_info function - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1284008 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/21/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/21/7 NOTE: LSI Megaraid SAS HBA emulation introduced in http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e8f943c3bcc2a578bfd30b825f2ebaf345c63a09 (v1.2.0-rc0) CVE-2015-8618 (The Int.Exp Montgomery code in the math/big library in Go 1.5.x before ...) - golang 2:1.5.3-1 (bug #809168) @@ -2930,7 +2930,7 @@ CVE-2015-8618 (The Int.Exp Montgomery code in the math/big library in Go 1.5.x b [wheezy] - golang <not-affected> (Introduced in 1.5 release) NOTE: https://go-review.googlesource.com/#/c/17672/ NOTE: Introduced in 1.5 release. Fixed in 1.5.3 upstream. - NOTE: http://www.openwall.com/lists/oss-security/2015/12/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/21/6 CVE-2015-8615 (The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 doe ...) {DLA-479-1} - xen 4.8.0~rc3-1 (bug #823620) @@ -3001,13 +3001,13 @@ CVE-2015-8612 (The EnableNetwork method in the Network class in plugins/mechanis [squeeze] - blueman <not-affected> (vulnerable code not present) NOTE: https://twitter.com/thegrugq/status/677809527882813440 NOTE: https://github.com/blueman-project/blueman/commit/a3845bbed5fdddf14daec436b7e74f62719a71c1 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/18/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/18/6 CVE-2015-8709 (** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 misha ...) - linux 4.3.3-3 [jessie] - linux 3.16.7-ckt20-1+deb8u2 [wheezy] - linux <not-affected> (Vulnerable code not present) - linux-2.6 <not-affected> (Vulnerable code not present) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/12/17/12 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/12/17/12 NOTE: https://lkml.org/lkml/2015/12/12/259 CVE-2015-8591 REJECTED @@ -3151,7 +3151,7 @@ CVE-2015-8569 (The (1) pptp_bind and (2) pptp_connect functions in drivers/net/p - linux 4.3.3-3 - linux-2.6 <removed> [squeeze] - linux-2.6 <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/15/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/15/7 NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1 (v4.4-rc6) NOTE: pptp_{connect,bind} introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=00959ade36acadc00e757f87060bf6e4501d545f (v2.6.37-rc1) NOTE: https://lkml.org/lkml/2015/12/14/252 @@ -3162,7 +3162,7 @@ CVE-2015-8568 (Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual [squeeze] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html - NOTE: http://www.openwall.com/lists/oss-security/2015/12/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/15/4 CVE-2015-8567 (Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause ...) {DSA-3471-1} - qemu 1:2.5+dfsg-3 (bug #808145) @@ -3170,7 +3170,7 @@ CVE-2015-8567 (Memory leak in net/vmxnet3.c in QEMU allows remote attackers to c [squeeze] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html - NOTE: http://www.openwall.com/lists/oss-security/2015/12/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/15/4 CVE-2015-8559 (The knife bootstrap command in chef leaks the validator.pem private RS ...) - chef <removed> (low; bug #809670) [buster] - chef <ignored> (Minor issue; workaround using validatorless bootstrapping) @@ -3179,7 +3179,7 @@ CVE-2015-8559 (The knife bootstrap command in chef leaks the validator.pem priva [wheezy] - chef <ignored> (Minor issue; workaround using validatorless bootstrapping) NOTE: https://github.com/chef/chef/issues/3871 NOTE: https://github.com/chef/chef/pull/8885 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/14/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/14/10 NOTE: Workaround: use validatorless bootstrapping CVE-2015-8558 (The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows loca ...) {DSA-3471-1 DSA-3470-1 DSA-3469-1} @@ -3188,13 +3188,13 @@ CVE-2015-8558 (The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows - qemu-kvm <removed> [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) NOTE: Upstream commit: http://git.qemu.org/?p=qemu.git;a=commit;h=156a2e4dbffa85997636a7a39ef12da6f1b40254 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/14/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/14/9 CVE-2015-8557 (The FontManager._get_nix_font_path function in formatters/img.py in Py ...) {DSA-3445-1 DLA-369-1} - pygments 2.0.1+dfsg-2 (bug #802828) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1276321 NOTE: https://bitbucket.org/birkenfeld/pygments-main/commits/0036ab1c99e256298094505e5e92f - NOTE: http://www.openwall.com/lists/oss-security/2015/12/14/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/14/6 CVE-2015-8548 (Multiple unspecified vulnerabilities in Google V8 before 4.7.80.23, as ...) {DSA-3418-1} - chromium-browser 47.0.2526.80-1 @@ -3210,7 +3210,7 @@ CVE-2015-8542 (An issue was discovered in Open-Xchange Guard before 2.2.0-rev8. NOT-FOR-US: Open-Xchange CVE-2015-8556 (Local privilege escalation vulnerability in the Gentoo QEMU package be ...) - qemu <not-affected> (Issue specific to virtfs-proxy-helper in Gentoo installed suid) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/14/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/14/5 CVE-2015-8785 (The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kern ...) {DSA-3503-1 DLA-412-1} - linux 4.3.5-1 @@ -3218,7 +3218,7 @@ CVE-2015-8785 (The fuse_fill_write_pages function in fs/fuse/file.c in the Linux NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ca8138f014a913f98e6ef40e939868e1e9ea876 (v4.4-rc5) NOTE: Introduced in: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea9b9907b82a09bd1a708004454f7065de77c5b0 (v2.6.26-rc1) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1290642 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/24/1 CVE-2015-XXXX [remotely triggerable crash] - ruby-eventmachine 1.0.7-1 (bug #678512; bug #696015) [jessie] - ruby-eventmachine 1.0.3-6+deb8u1 @@ -3231,12 +3231,12 @@ CVE-2015-8560 (Incomplete blacklist vulnerability in util.c in foomatic-rip in c [wheezy] - cups-filters <not-affected> (Vulnerable code not present; introduced in 1.0.42) - foomatic-filters 4.0.17-7 (bug #807993) NOTE: http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/13/2 CVE-2015-9097 (The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is ...) {DLA-489-1} - ruby-mail 2.6.1+dfsg1-1 NOTE: https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/12/11/3 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/12/11/3 NOTE: Fixed in 2.6.0 NOTE: "Note that, this patch might not be complete ..." https://bugzilla.redhat.com/show_bug.cgi?id=1293598 CVE-2015-8547 (The CoreUserInputHandler::doMode function in core/coreuserinputhandler ...) @@ -3247,7 +3247,7 @@ CVE-2015-8547 (The CoreUserInputHandler::doMode function in core/coreuserinputha NOTE: https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7 NOTE: Support for oping a whole channel with /op * was only added in NOTE: https://github.com/quassel/quassel/commit/7ecbc1bf921880f7b03af779de7d9611853a0d46 (0.10-beta1) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/12/1 CVE-2015-8541 RESERVED CVE-2015-8536 (MITRE is populating this ID because it was assigned prior to Lenovo be ...) @@ -3259,7 +3259,7 @@ CVE-2015-8534 (MITRE is populating this ID because it was assigned prior to Leno CVE-2015-8540 (Integer underflow in the png_check_keyword function in pngwutil.c in l ...) {DSA-3443-1 DLA-375-1} - libpng <removed> (bug #807694) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/10/6 NOTE: https://sourceforge.net/p/libpng/bugs/244/ NOTE: http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/ NOTE: Fixed in 1.0.66, 1.2.56, 1.4.19, and 1.5.26 @@ -3269,7 +3269,7 @@ CVE-2015-8543 (The networking implementation in the Linux kernel through 4.3.3, [jessie] - linux 3.16.7-ckt20-1+deb8u1 [wheezy] - linux 3.2.73-2+deb7u2 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2015/12/09/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/09/3 NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79462ad02e861803b3840cc782248c7359451cd9 (v4.4-rc6) CVE-2015-8539 (The KEYS subsystem in the Linux kernel before 4.4 allows local users t ...) - linux <not-affected> (Vulnerable code not present) @@ -3277,14 +3277,14 @@ CVE-2015-8539 (The KEYS subsystem in the Linux kernel before 4.4 allows local us NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096fe9eaea40a17e125569f9e657e34cdb6d73bd (v4.4-rc3) NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146aa8b1453bd8f1ff2304ffb71b4ee0eb9acdcc (v4.4-rc1) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1284450 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/09/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/09/1 CVE-2015-8538 (dwarf_leb.c in libdwarf allows attackers to cause a denial of service ...) {DLA-669-1} - dwarfutils 20160507-1 (bug #807817) [jessie] - dwarfutils 20120410-2+deb8u1 [squeeze] - dwarfutils <not-affected> (No segfault with provided test case) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1289385 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/09/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/09/2 NOTE: http://sourceforge.net/p/libdwarf/code/ci/da724a0bc5eec8e9ec0b0cb0c238a80e34466459/ CVE-2015-8533 REJECTED @@ -3398,7 +3398,7 @@ CVE-2015-8504 (Qemu, when built with VNC display driver support, allows remote a [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) NOTE: Fixed by http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4c65fed8bdf96780735dbdb92a8bd0d6b6526cc3 (v2.5.0-rc3) NOTE: Issue possibly introduced after http://git.qemu.org/?p=qemu.git;a=commitdiff;h=6cec5487990bf3f1f22b3fcb871978255e92ae0d (v0.10.0) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/08/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/08/4 CVE-2015-8480 (The VideoFramePool::PoolImpl::CreateFrame function in media/base/video ...) - chromium-browser 47.0.2526.73-1 [wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy) @@ -3445,7 +3445,7 @@ CVE-2015-8537 (app/views/journals/index.builder in Redmine before 2.6.9, 3.0.x b NOTE: https://www.redmine.org/issues/21419 (private) NOTE: https://github.com/redmine/redmine/commit/7e423fb4538247d59e01958c48b491f196a1de56 NOTE: upstream fixed in 2.6.9, 3.0.6 and 3.1.3 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/08/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/08/8 CVE-2015-8476 (Multiple CRLF injection vulnerabilities in PHPMailer before 5.2.14 all ...) {DSA-3416-1 DLA-363-1} - libphp-phpmailer 5.2.14+dfsg-1 (bug #807265) @@ -3459,7 +3459,7 @@ CVE-2015-8474 (Open redirect vulnerability in the valid_back_url function in app NOTE: https://www.redmine.org/issues/19577 (private) NOTE: commit: https://github.com/redmine/redmine/commit/032f2c9be6520d9d1a1608aa4f1d5d1f184f2472 NOTE: upstream fixed in 2.6.7, 3.0.5 and 3.1.1 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/04/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/04/1 NOTE: depends on the CVE-2014-1985 fix first CVE-2015-8473 (The Issues API in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3.1.x ...) {DSA-3529-1} @@ -3468,7 +3468,7 @@ CVE-2015-8473 (The Issues API in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3 [wheezy] - redmine <end-of-life> (Redmine not supported because of rails) NOTE: https://www.redmine.org/projects/redmine/wiki/Changelog_3_0 NOTE: https://www.redmine.org/issues/21136 - NOTE: http://www.openwall.com/lists/oss-security/2015/12/03/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/03/7 NOTE: https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22 CVE-2015-8465 RESERVED @@ -3632,7 +3632,7 @@ CVE-2015-8400 (The HTTPS fallback implementation in Shell In A Box (aka shellina - shellinabox 2.19 [jessie] - shellinabox <no-dsa> (Minor issue) [wheezy] - shellinabox <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/02/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/02/6 CVE-2015-8377 (SQL injection vulnerability in the host_new_graphs_save function in gr ...) {DSA-3494-1 DLA-374-1} - cacti 0.8.8f+ds1-4 @@ -3669,7 +3669,7 @@ CVE-2015-8378 (In KeePassX before 0.4.4, a cleartext copy of password data is cr [jessie] - keepassx 0.4.3+dfsg-0.1+deb8u1 [wheezy] - keepassx <no-dsa> (Minor issue) [squeeze] - keepassx <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/30/4 CVE-2015-8375 (Cross-site scripting (XSS) vulnerability in PHP-Fusion 9. ...) NOT-FOR-US: PHP-Fusion CVE-2015-8368 (ntopng (aka ntop) before 2.2 allows remote authenticated users to chan ...) @@ -3817,7 +3817,7 @@ CVE-2015-8374 (fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles comp - linux-2.6 <removed> [squeeze] - linux-2.6 <no-dsa> (btrfs in 2.6.32 is just a tech preview and not usable for production) NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7 (v4.4-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/27/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/27/2 NOTE: CVE assignment for the vulnerability with the impact of "User B now NOTE: gets to see the 1000 bytes that user A truncated from its file before NOTE: it made its file world readable" @@ -3852,7 +3852,7 @@ CVE-2015-8325 (The do_setup_env function in session.c in sshd in OpenSSH through NOTE: Upstream fix: https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755 CVE-2015-XXXX [RCE in gitlab-shell 2.6.6-2.6.7] - gitlab-shell <not-affected> (Only affects version 2.6.6-2.6.7) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/11/25/5 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/11/25/5 CVE-2015-8345 (The eepro100 emulator in QEMU qemu-kvm blank allows local guest users ...) {DSA-3471-1 DSA-3470-1 DSA-3469-1} - qemu 1:2.5+dfsg-1 (bug #806373) @@ -3864,7 +3864,7 @@ CVE-2015-8345 (The eepro100 emulator in QEMU qemu-kvm blank allows local guest u [wheezy] - qemu-kvm <no-dsa> (Minor issue, can be fixed along in a later DSA) [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html - NOTE: http://www.openwall.com/lists/oss-security/2015/11/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/25/3 CVE-2015-8346 (app/views/timelog/_form.html.erb in Redmine before 2.6.8, 3.0.x before ...) {DSA-3529-1 DLA-351-1} - redmine 3.2.0-1 (bug #806376) @@ -3873,7 +3873,7 @@ CVE-2015-8346 (app/views/timelog/_form.html.erb in Redmine before 2.6.8, 3.0.x b NOTE: https://www.redmine.org/projects/redmine/wiki/Changelog_3_0 NOTE: https://www.redmine.org/projects/redmine/wiki/Security_Advisories NOTE: https://www.redmine.org/issues/21150 (private) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/25/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/25/1 NOTE: Commit: https://github.com/redmine/redmine/commit/945a091c94a9ed651f61e225fa8646479478e9d4 NOTE: Commit: https://github.com/redmine/redmine/commit/c096dde88ff02872ba35edc4dc403c80a7867b5c NOTE: For squeeze, the bug is in app/views/timelog/edit.rhtml @@ -3894,7 +3894,7 @@ CVE-2015-8326 (The IPTables-Parse module before 1.6 for Perl allows local users [wheezy] - libiptables-parse-perl 1.1-1+deb7u1 [squeeze] - libiptables-parse-perl <no-dsa> (Minor issue) NOTE: https://github.com/mtrmac/IPTables-Parse/commit/b400b976d81140f6971132e94eb7657b5b0a2b87 - NOTE: http://www.openwall.com/lists/oss-security/2015/11/24/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/24/6 CVE-2015-8381 (The compile_regex function in pcre_compile.c in PCRE before 8.38 and p ...) - pcre3 2:8.38-1 (bug #796762; bug #795539) [jessie] - pcre3 2:8.35-3.3+deb8u2 @@ -3902,9 +3902,9 @@ CVE-2015-8381 (The compile_regex function in pcre_compile.c in PCRE before 8.38 [squeeze] - pcre3 <not-affected> (Vulnerable code introduced later) NOTE: https://bugs.exim.org/show_bug.cgi?id=1672 NOTE: http://vcs.pcre.org/pcre?view=revision&revision=1594 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/24/1 NOTE: https://bugs.exim.org/show_bug.cgi?id=1667 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/05/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/05/3 NOTE: http://vcs.pcre.org/pcre?view=revision&revision=1585 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1250943 CVE-2015-8380 (The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a ...) @@ -3964,7 +3964,7 @@ CVE-2015-8324 (The ext4 implementation in the Linux kernel before 2.6.34 does no {DLA-360-1} - linux 2.6.37-1 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2015/11/23/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/23/2 NOTE: https://bugs.openvz.org/browse/OVZ-6541 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1267261 NOTE: Commit fixing the issue: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=744692dc059845b2a3022119871846e74d4f6e11 (v2.6.34-rc1) @@ -3974,7 +3974,7 @@ CVE-2015-8316 (Array index error in LightDM (aka Light Display Manager) 1.14.3, - lightdm 1.16.6-1 [jessie] - lightdm <not-affected> (Affects 1.14.x, 1.16.x and development 1.17.x) [wheezy] - lightdm <not-affected> (Affects 1.14.x, 1.16.x and development 1.17.x) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/21/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/21/2 NOTE: https://bugs.launchpad.net/lightdm/+bug/15168 NOTE: https://bazaar.launchpad.net/~lightdm-team/lightdm/1.14/revision/2166 (1.14.x) NOTE: https://bazaar.launchpad.net/~lightdm-team/lightdm/1.16/revision/2207 (1.16.x) @@ -4128,7 +4128,7 @@ CVE-2015-8308 (LXDM before 0.5.2 did not start X server with -auth, which allows NOTE: http://git.lxde.org/gitweb/?p=lxde/lxdm.git;a=commitdiff;h=e8f387089e241360bdc6955d3e479450722dcea3 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1268900 NOTE: http://advisories.mageia.org/MGASA-2015-0411.html - NOTE: http://www.openwall.com/lists/oss-security/2015/11/20/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/20/2 CVE-2015-8243 RESERVED CVE-2015-8240 (The Traffic Management Microkernel (TMM) in F5 BIG-IP LTM, AAM, AFM, A ...) @@ -4185,13 +4185,13 @@ CVE-2015-8241 (The xmlNextChar function in libxml2 2.9.2 does not properly check NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756263 NOTE: https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe NOTE: Introduced/Uncovered by https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (fix for CVE-2015-7941) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/17/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/17/5 CVE-2015-8239 (The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 all ...) - sudo 1.8.17p1-1 (bug #805563) [jessie] - sudo <no-dsa> (Minor issue) [wheezy] - sudo <not-affected> (Command digests are only supported by version 1.8.7 or higher) [squeeze] - sudo <not-affected> (Command digests are only supported by version 1.8.7 or higher) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/10/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/10/2 CVE-2015-8234 (The image signature algorithm in OpenStack Glance 11.0.0 allows remote ...) - glance <unfixed> (unimportant) CVE-2015-8219 (The init_tile function in libavcodec/jpeg2000dec.c in FFmpeg before 2. ...) @@ -4506,10 +4506,10 @@ CVE-2015-8472 (Buffer overflow in the png_set_PLTE function in libpng before 1.0 CVE-2015-8126 (Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE ...) {DSA-3507-1 DSA-3399-1 DLA-410-1 DLA-343-1} - libpng 1.2.54-1 (bug #805113) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/12/2 NOTE: Fixed in 1.6.19, 1.5.24, 1.4.17, 1.2.54, and 1.0.64 NOTE: The original patch was incomplete, cf. - NOTE: http://www.openwall.com/lists/oss-security/2015/12/03/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/03/6 NOTE: and fixed in new upstream versions 1.6.20, 1.5.25, NOTE: 1.4.18, 1.2.55, and 1.0.65 - chromium-browser 49.0.2623.75-1 @@ -4596,7 +4596,7 @@ CVE-2015-7501 (Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; D - libcommons-collections4-java <unfixed> (unimportant) NOTE: severity unimportant since this is a hardening change, actual vulnerability relies in specific NOTE: https://issues.apache.org/jira/browse/COLLECTIONS-580 - NOTE: No CVE is expected to be assigned, cf http://www.openwall.com/lists/oss-security/2015/11/17/19 + NOTE: No CVE is expected to be assigned, cf https://www.openwall.com/lists/oss-security/2015/11/17/19 NOTE: Patches for 3.2.x: NOTE: https://github.com/apache/commons-collections/commit/1642b00d67b96de87cad44223efb9ab5b4fb7be5 NOTE: https://github.com/apache/commons-collections/commit/5ec476b0b756852db865b2e442180f091f8209ee @@ -4734,7 +4734,7 @@ CVE-2015-8035 (The xz_decomp function in xzlib.c in libxml2 2.9.1 does not prope NOTE: so it barfs on the problematic file (parser error : Start tag expected, NOTE: '<' not found) even though it does not have the fix yet. The next upstream NOTE: release will fix this issue and will restore XZ support. - NOTE: http://www.openwall.com/lists/oss-security/2015/11/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/02/2 CVE-2015-7984 (Multiple cross-site request forgery (CSRF) vulnerabilities in Horde be ...) {DSA-3391-1} - php-horde 5.2.8+debian0-1 (bug #803641) @@ -4788,12 +4788,12 @@ CVE-2015-XXXX [iptables-persistent minor local info leak] [jessie] - iptables-persistent 1.0.3+deb8u1 [wheezy] - iptables-persistent 0.5.7+deb7u1 [squeeze] - iptables-persistent <no-dsa> (Minor issue) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/01/05/5 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/01/05/5 CVE-2015-XXXX - cinnamon-settings-daemon 2.8.3-1 (low) [jessie] - cinnamon-settings-daemon 2.2.4.repack-7+deb8u1 NOTE: https://github.com/linuxmint/cinnamon-settings-daemon/commit/ac5e0be8c1817616dbdb056b6881cfc4660f57a8 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/28/3 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/10/28/3 CVE-2015-8025 (driver/subprocs.c in XScreenSaver before 5.34 does not properly perfor ...) {DSA-3438-1 DLA-338-1} - xscreensaver 5.34-1 (bug #802914) @@ -4855,7 +4855,7 @@ CVE-2015-7985 (Valve Steam 2.10.91.91 uses weak permissions (Users: read and wri CVE-2015-8019 (The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c i ...) - linux <not-affected> (Vulnerable code not present) - linux-2.6 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/27/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/27/11 NOTE: Only for all stable kernels before v3.19 which have backported commit NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=89c22d8c3b278212eef6a8cc66b570bc840a6f5a NOTE: but are lacking the ioviter conversion. @@ -4870,7 +4870,7 @@ CVE-2015-7990 (Race condition in the rds_sendmsg function in net/rds/sendmsg.c i - linux 4.2.6-1 - linux-2.6 <removed> NOTE: https://lkml.org/lkml/2015/10/16/530 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/27/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/27/5 CVE-2015-7979 (NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to ...) {DSA-3629-1 DLA-559-1} - ntp 1:4.2.8p7+dfsg-1 @@ -5002,7 +5002,7 @@ CVE-2015-9261 (huft_build in archival/libarchive/decompress_gunzip.c in BusyBox {DLA-1445-1 DLA-337-1} - busybox 1:1.27.2-1 (bug #803097) [stretch] - busybox <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/25/3 NOTE: http://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e NOTE: https://git.busybox.net/busybox/commit/archival/libarchive/decompress_gunzip.c?id=6bd3fff51aa74e2ee2d87887b12182a3b09792ef CVE-2015-7995 (The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does n ...) @@ -5010,7 +5010,7 @@ CVE-2015-7995 (The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 d - libxslt 1.1.28-2.1 (bug #802971) [squeeze] - libxslt <no-dsa> (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1257962 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/27/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/27/10 NOTE: https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617 (v1.1.29-rc1) CVE-2015-8982 (Integer overflow in the strxfrm function in the GNU C Library (aka gli ...) - glibc 2.21-1 (bug #803927) @@ -5042,7 +5042,7 @@ CVE-2015-XXXX [Endlees loop issue] NOTE: https://github.com/relan/exfat/issues/6 NOTE: https://crashes.fuzzing-project.org/exfatfsck-endless-loop NOTE: https://github.com/relan/exfat/commit/35a1f77f9be2d8b21731f758baba4334935bf18b - NOTE: will possibly not get a CVE, cf. http://www.openwall.com/lists/oss-security/2015/10/29/13 + NOTE: will possibly not get a CVE, cf. https://www.openwall.com/lists/oss-security/2015/10/29/13 CVE-2015-8010 (Cross-site scripting (XSS) vulnerability in the Classic-UI with the CS ...) - icinga 1.13.3-3 (bug #803432) [jessie] - icinga <no-dsa> (Minor issue) @@ -5051,7 +5051,7 @@ CVE-2015-8010 (Cross-site scripting (XSS) vulnerability in the Classic-UI with t NOTE: Introduced by: https://dev.icinga.org/issues/593 in 1.3. NOTE: Upstream issue: https://dev.icinga.org/issues/10453 NOTE: Upstream fix: https://dev.icinga.org/projects/icinga-core/repository/revisions/5c816f5d9352c373e9dadb95b63612a96cf96dff - NOTE: http://www.openwall.com/lists/oss-security/2015/10/23/15 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/23/15 CVE-2015-7981 (The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1. ...) {DSA-3399-1 DLA-343-1} - libpng 1.2.54-1 (bug #803078) @@ -5196,7 +5196,7 @@ CVE-2015-7943 (Open redirect vulnerability in the Overlay module in Drupal 7.x b - drupal7 7.41-1 [jessie] - drupal7 7.32-1+deb8u9 NOTE: https://www.drupal.org/SA-CORE-2015-004 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/21/6 NOTE: http://cgit.drupalcode.org/drupal/commit/?id=9f72251c9291b5613acb9ca4ea7a51b4739e3f93 CVE-2015-7885 (The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in th ...) - linux 4.4.2-1 (unimportant) @@ -5325,10 +5325,10 @@ CVE-2015-7872 (The key_gc_unused_keys function in security/keys/gc.c in the Linu NOTE: Prerequisite for Fedora patches: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94c4554ba07adbdde396748ee7ae01e86cf2d8d7 NOTE: Patches from Fedora: http://pkgs.fedoraproject.org/cgit/kernel.git/commit/?id=d76d5fe34b5c151ad83761160998b1075729b541 NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61 (v4.3-rc7) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/20/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/20/5 CVE-2015-8013 (s2k.js in OpenPGP.js will decrypt arbitrary messages regardless of pas ...) - node-openpgp <itp> (bug #787774) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/13/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/13/7 CVE-2015-7840 (The command line management console (CMC) in SolarWinds Log and Event ...) NOT-FOR-US: SolarWinds CVE-2015-7839 (SolarWinds Log and Event Manager (LEM) allows remote attackers to exec ...) @@ -5427,14 +5427,14 @@ CVE-2015-8011 (Buffer overflow in the lldp_decode function in daemon/protocols/l [wheezy] - lldpd <not-affected> (Vulnerable code not present) [squeeze] - lldpd <not-affected> (Vulnerable code not present) NOTE: https://github.com/vincentbernat/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/16/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/16/2 CVE-2015-8012 (lldpd before 0.8.0 allows remote attackers to cause a denial of servic ...) - lldpd 0.7.19-1 [jessie] - lldpd 0.7.11-2+deb8u1 [wheezy] - lldpd <not-affected> (Vulnerable code not present) [squeeze] - lldpd <not-affected> (Vulnerable code not present) NOTE: https://github.com/vincentbernat/lldpd/commit/793526f8884455f43daecd0a2c46772388417a00 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/18/2 CVE-2015-XXXX [cakephp: XML class SSRF vulnerability] - cakephp 2.6.7-1 (bug #832283) [jessie] - cakephp <no-dsa> (Minor issue) @@ -5455,9 +5455,9 @@ CVE-2015-7810 (libbluray MountManager class has a time-of-check time-of-use (TOC [jessie] - libbluray <no-dsa> (Minor issue, too intrusive to backport) [wheezy] - libbluray <no-dsa> (Minor issue) NOTE: CVE was assigned specific to the Fedora packages, cf. - NOTE: http://www.openwall.com/lists/oss-security/2015/10/12/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/12/7 NOTE: Salvatored asked if Debian needs a separate CVE: - NOTE: http://www.openwall.com/lists/oss-security/2015/10/13/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/13/6 NOTE: No reply, so we'll just use the same ID NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=959434 CVE-2015-7808 (The vB_Api_Hook::decodeArguments method in vBulletin 5 Connect 5.1.2 t ...) @@ -5703,20 +5703,20 @@ CVE-2015-7758 (Gummi 0.6.5 allows local users to write to arbitrary files via a - gummi 0.6.5-6 (bug #756432) [jessie] - gummi 0.6.5-3+deb8u1 [wheezy] - gummi 0.6.3-1.2+deb7u2 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/08/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/08/4 CVE-2015-7740 (Huawei P7 before P7-L00C17B851, P7-L05C00B851, and P7-L09C92B851 and P ...) NOT-FOR-US: ARM Mali GPU driver CVE-2015-7545 (The (1) git-remote-ext and (2) unspecified other remote helper program ...) {DSA-3435-1} - git 1:2.6.1-1 [squeeze] - git <not-affected> (git 1.7.2 did not have git-remote-ext yet) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/06/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/06/1 CVE-2015-7747 (Buffer overflow in the afReadFrames function in audiofile (aka libaudi ...) - audiofile 0.3.6-3 (bug #801102) [jessie] - audiofile 0.3.6-2+deb8u1 [wheezy] - audiofile <no-dsa> (Minor issue) [squeeze] - audiofile <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/06/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/06/2 CVE-2015-7705 (The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4 ...) - ntp 1:4.2.8p4+dfsg-3 [jessie] - ntp <no-dsa> (Default config not affected) @@ -5820,10 +5820,10 @@ CVE-2015-7713 (OpenStack Compute (Nova) before 2014.2.4 (juno) and 2015.1.x befo [jessie] - nova <no-dsa> (Minor issue) [wheezy] - nova <no-dsa> (Minor issue) NOTE: <=2014.2.3, >=2015.1.0, <=2015.1.1 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/05/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/05/10 CVE-2015-XXXX [Remotely triggerable buffer overflow in OpenSMTPD] - opensmtpd 5.7.3p1-1 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/04/2 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/10/04/2 NOTE: Fixed with 5.7.3 upstream release CVE-2015-7687 (Use-after-free vulnerability in OpenSMTPD before 5.7.2 allows remote a ...) - opensmtpd 5.7.3p1-1 (bug #800787) @@ -5833,7 +5833,7 @@ CVE-2015-7686 (Algorithmic complexity vulnerability in Address.pm in the Email-A [jessie] - libemail-address-perl <no-dsa> (Minor issue) [wheezy] - libemail-address-perl <no-dsa> (Minor issue) [squeeze] - libemail-address-perl <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/10/02/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/02/13 NOTE: Possibility of DoS vs. usability issue for Email::Address NOTE: Mitigation: https://github.com/Perl-Email-Project/Email-Address/commit/aeaf0d7f1b0897b54cb246b8ac15d3ef177e5cae CVE-2015-7671 @@ -5954,7 +5954,7 @@ CVE-2015-7612 (Multiple cross-site request forgery (CSRF) vulnerabilities in the NOT-FOR-US: McAfee CVE-2015-7665 (Tails before 1.7 includes the wget program but does not prevent automa ...) NOT-FOR-US: wget as used in Tails - NOTE: http://www.openwall.com/lists/oss-security/2015/10/01/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/01/10 CVE-2015-7613 (Race condition in the IPC object implementation in the Linux kernel th ...) {DSA-3372-1 DLA-325-1} - linux 4.2.3-1 @@ -5976,7 +5976,7 @@ CVE-2015-7673 (io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its a {DSA-3378-1 DLA-434-1} - gdk-pixbuf 2.32.0-1 - gtk+2.0 2.21.5-1 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/01/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/01/3 NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e @@ -5985,11 +5985,11 @@ CVE-2015-8875 (Multiple integer overflows in the (1) pixops_composite_nearest, ( {DSA-3589-1 DLA-450-1} - gdk-pixbuf 2.34.0-1 NOTE: Fixed by: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22 (2.33.1) - NOTE: http://www.openwall.com/lists/oss-security/2016/05/12/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/12/3 CVE-2015-7674 (Integer overflow in the pixops_scale_nearest function in pixops/pixops ...) {DSA-3378-1 DLA-450-1 DLA-434-1} - gdk-pixbuf 2.32.1-1 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/01/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/01/4 NOTE: Fix for CVE-2015-7674: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa (2.32.1) NOTE: Additional hardening against further overflows (but not part of the CVE assignment): https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22 (2.33.1) NOTE: The CVE is only assigned for the overflow in the pixops_scale_nearest function. @@ -6123,7 +6123,7 @@ CVE-2015-7575 (Mozilla Network Security Services (NSS) before 3.20.2, as used in NOTE: https://gitlab.com/gnutls/gnutls/commit/7d9d5c61f8445dc9e9ca47bb575c77cef17da17a NOTE: https://gitlab.com/gnutls/gnutls/commit/0e3fc7881d37246fc2d51dc404cad95b205c0e1e NOTE: https://gitlab.com/gnutls/gnutls/commit/6822a37947d4e38c45b1afc0121cda35ba897182 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/05/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/05/8 NOTE: http://www.mitls.org/pages/attacks/SLOTH CVE-2015-7574 REJECTED @@ -6194,7 +6194,7 @@ CVE-2015-7554 (The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows - tiff 4.0.7-7 (bug #809066; bug #842043; bug #850316) [jessie] - tiff 4.0.3-12.3+deb8u4 - tiff3 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2015/12/26/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/26/7 NOTE: SUSE seem to have a fix (disputed): https://bugzilla.suse.com/show_bug.cgi?id=960341 NOTE: Reproducer file here: https://bugzilla.suse.com/attachment.cgi?id=665389 NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2564 @@ -6680,7 +6680,7 @@ CVE-2015-8076 (The index_urlfetch function in index.c in Cyrus IMAP 2.3.x before - cyrus-imapd-2.4 2.4.17+nocaldav-2 [jessie] - cyrus-imapd-2.4 2.4.17+nocaldav-0~deb8u1 [wheezy] - cyrus-imapd-2.4 <no-dsa> (Minor issue; can be fixed alone in a future DLA) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/29/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/29/2 NOTE: https://cyrus.foundation/cyrus-imapd/commit/?id=07de4ff1bf2fa340b9d77b8e7de8d43d47a33921 NOTE: https://cyrus.foundation/cyrus-imapd/commit/?id=c21e179c1f6b968fe69bebe079176714e511587b CVE-2015-7383 (Multiple cross-site scripting (XSS) vulnerabilities in Web Reference D ...) @@ -6743,7 +6743,7 @@ CVE-2015-XXXX [DoS] NOTE: No CVE will be assigned for behaviour change between 1.907 and 1.908 NOTE: See CVE-2015-7686 for the underlying CWE-407 ("Algorithmic Complexity") NOTE: issue still present in 1.908 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/02/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/02/13 CVE-2015-7359 (The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in ...) NOT-FOR-US: TrueCrypt CVE-2015-7358 (The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7. ...) @@ -6889,7 +6889,7 @@ CVE-2015-7296 (Securifi Almond devices with firmware before AL1-R201EXP10-L304-W NOT-FOR-US: Securifi Almond devices CVE-2015-7294 (ldapauth-fork before 2.3.3 allows remote attackers to perform LDAP inj ...) NOT-FOR-US: NodeJS ldapauth - NOTE: http://www.openwall.com/lists/oss-security/2015/09/18/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/18/4 NOTE: https://github.com/vesse/node-ldapauth-fork/issues/21 NOTE: https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4 NOTE: https://nodesecurity.io/advisories/19 @@ -7039,7 +7039,7 @@ CVE-2015-7295 (hw/virtio/virtio.c in the Virtual Network Device (virtio-net) sup - qemu-kvm <removed> [wheezy] - qemu-kvm <no-dsa> (Minor issue; can be fixed along in a later DSA) [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/18/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/18/5 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg04729.html NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg04730.html NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg04731.html @@ -7727,7 +7727,7 @@ CVE-2015-7236 (Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c - rpcbind 0.2.1-6.1 (bug #799307) NOTE: https://bugzilla.suse.com/show_bug.cgi?id=946204 NOTE: http://www.spinics.net/lists/linux-nfs/msg53045.html - NOTE: http://www.openwall.com/lists/oss-security/2015/09/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/17/1 CVE-2015-6961 (Open redirect vulnerability in gluon/tools.py in Web2py 2.9.11 allows ...) - web2py 2.12.3-1 [jessie] - web2py <ignored> (Minor issue) @@ -7783,10 +7783,10 @@ CVE-2015-7989 (Cross-site scripting (XSS) vulnerability in the user list table i {DSA-3383-1 DSA-3375-1 DLA-321-1} - wordpress 4.3.1+dfsg-1 (bug #799140) NOTE: https://github.com/WordPress/WordPress/commit/f91a5fd10ea7245e5b41e288624819a37adf290a - NOTE: http://www.openwall.com/lists/oss-security/2015/10/26/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/26/7 CVE-2015-7337 (The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x ...) - ipython <not-affected> (Affects versions 3.0 to 3.2.1) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/16/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/16/3 CVE-2015-7940 (The Bouncy Castle Java library before 1.51 does not validate a point i ...) {DSA-3417-1 DLA-361-1} - bouncycastle 1.51-1 (bug #802671) @@ -7815,7 +7815,7 @@ CVE-2015-8871 (Use-after-free vulnerability in the opj_j2k_write_mco function in NOTE: https://github.com/uclouvain/openjpeg/commit/940100c28ae28931722290794889cf84a92c5f6f NOTE: https://github.com/uclouvain/openjpeg/issues/563 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1263359 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/15/4 CVE-2015-6930 RESERVED CVE-2015-6929 (Multiple cross-site scripting (XSS) vulnerabilities in Nokia Networks ...) @@ -8006,13 +8006,13 @@ CVE-2015-6908 (The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2 - openldap 2.4.42+dfsg-2 (bug #798622) NOTE: http://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commitdiff;h=6fe51a9ab04fd28bbc171da3cf12f1c1040d6629 NOTE: http://www.openldap.org/its/index.cgi/Software%20Bugs?id=8240;selectid=8240 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/11/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/11/2 CVE-2015-7312 (Multiple race conditions in the Advanced Union Filesystem (aufs) aufs3 ...) - linux 4.2.1-1 (bug #796036) [jessie] - linux 3.16.7-ckt11-1+deb8u4 [wheezy] - linux <not-affected> (Vulnerable code not present) - linux-2.6 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/10/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/10/3 NOTE: http://sourceforge.net/p/aufs/mailman/message/34449209/ NOTE: For Linux kernel with aufs aufs3-mmap.patch or aufs4-mmap.patch mmap patch CVE-2015-6855 (hw/ide/core.c in QEMU does not properly restrict the commands accepted ...) @@ -8021,7 +8021,7 @@ CVE-2015-6855 (hw/ide/core.c in QEMU does not properly restrict the commands acc - qemu-kvm <removed> [squeeze] - qemu <end-of-life> (Not supported in Squeeze LTS) [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/10/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/10/1 NOTE: Fix commit: http://git.qemu.org/?p=qemu.git;a=commit;h=d9033e1d3aa666c5071580617a57bd853c5d794a NOTE: exec_cmd introduced in http://git.qemu.org/?p=qemu.git;a=commit;h=7cff87ff6ab117799e32e42c2e4dc4c0588e583a NOTE: cmd_table introduced in http://git.qemu.org/?p=qemu.git;a=commit;h=844505b12e722d9ba7060480e766351fc6313501 @@ -8127,34 +8127,34 @@ CVE-2015-XXXX [hardening for RSA-CRT leak] - libgcrypt20 1.6.4-3 [jessie] - libgcrypt20 <no-dsa> (Minor issue; additional hardening) NOTE: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=b85c8d6645039fc9d403791750510e439731d479 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/09/08/5 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/09/08/5 NOTE: Thread on oss-security to clarify if this should be CVE-2015-5738 or a new CVE CVE-2015-6838 (The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP be ...) {DSA-3358-1 DLA-341-1} - php5 5.6.13+dfsg-1 - hhvm 3.12.1+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=69782 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/07/5 NOTE: Fixed in 5.5.45 and 5.6.13 NOTE: https://github.com/facebook/hhvm/commit/f358ec0e905df41feaa9dc75f4dee814cfe5a60a CVE-2015-6837 (The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP be ...) {DSA-3358-1 DLA-341-1} - php5 5.6.13+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=69782 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/07/5 NOTE: Fixed in 5.5.45 and 5.6.13 CVE-2015-6836 (The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ...) {DSA-3358-1 DLA-341-1} - php5 5.6.13+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=70388 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/07/5 NOTE: Fixed in 5.5.45 and 5.6.13 CVE-2015-6835 (The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, an ...) {DSA-3358-1} - php5 5.6.13+dfsg-1 [squeeze] - php5 <no-dsa> (Too intrusive to backport) NOTE: https://bugs.php.net/bug.php?id=70219 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/07/5 NOTE: Fixed in 5.5.45 and 5.6.13 CVE-2015-6834 (Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x be ...) {DSA-3358-1 DLA-341-1} @@ -8162,18 +8162,18 @@ CVE-2015-6834 (Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5 NOTE: https://bugs.php.net/bug.php?id=70172 NOTE: https://bugs.php.net/bug.php?id=70365 NOTE: https://bugs.php.net/bug.php?id=70366 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/07/5 NOTE: Fixed in 5.5.45 and 5.6.13 CVE-2015-7225 (Tinfoil Devise-two-factor before 2.0.0 does not strictly follow sectio ...) - ruby-devise-two-factor 2.0.0-1 (bug #798466) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/06/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/06/2 CVE-2015-8777 (The process_envvars function in elf/rtld.c in the GNU C Library (aka g ...) {DSA-3480-1 DLA-316-1} - glibc 2.21-1 (bug #798316; bug #801691) [jessie] - glibc 2.19-18+deb8u2 - eglibc <removed> [squeeze] - eglibc 2.11.3-4+deb6u7 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/05/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/05/8 NOTE: Upstream bug https://sourceware.org/bugzilla/show_bug.cgi?id=18928 NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=a014cecd82b71b70a6a843e250e06b541ad524f7 CVE-2015-6815 (The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 ...) @@ -8182,7 +8182,7 @@ CVE-2015-6815 (The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4 [squeeze] - qemu <end-of-life> (Not supported in Squeeze LTS) - qemu-kvm <removed> [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) - NOTE: http://www.openwall.com/lists/oss-security/2015/09/04/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/04/4 NOTE: Upstream fix: https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html CVE-2015-6816 (ganglia-web before 3.7.1 allows remote attackers to bypass authenticat ...) - ganglia-web <unfixed> (unimportant; bug #798213) @@ -8190,7 +8190,7 @@ CVE-2015-6816 (ganglia-web before 3.7.1 allows remote attackers to bypass authen [squeeze] - ganglia <not-affected> (affected code not present) NOTE: See README.Debian.security, only supported behind an authenticated HTTP zone, #702776 NOTE: starting with 3.6.0-1 the web front is no longer built from src:ganglia so marking this version as fixed - NOTE: http://www.openwall.com/lists/oss-security/2015/09/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/04/2 NOTE: https://github.com/ganglia/ganglia-web/issues/267 CVE-2015-6817 (PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows r ...) - pgbouncer 1.6.1-1 @@ -8199,7 +8199,7 @@ CVE-2015-6817 (PgBouncer 1.6.x before 1.6.1, when configured with auth_user, all [squeeze] - pgbouncer <not-affected> (Introduced in 1.6) NOTE: http://web.archive.org/web/20150905195759/http://pgbouncer.github.io/2015/09/pgbouncer-1-6-1/ NOTE: https://github.com/pgbouncer/pgbouncer/issues/69 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/04/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/04/3 CVE-2015-XXXX [val_dane_check: usage DANE-TA(2) may bypass cert validation entirely] [experimental] - dnsval 2.1-1 - dnsval 2.0-2 (bug #797470) @@ -8211,7 +8211,7 @@ CVE-2015-XXXX [Memory corruption] [squeeze] - libvncserver 0.9.7-2+deb6u2 NOTE: workaround entry for DLA-380-1 until/if CVE assigned NOTE: https://github.com/LibVNC/libvncserver/commit/804335f9d296440bb708ca844f5d89b58b50b0c6 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/09/03/8 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/09/03/8 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=706087#c1 notes that the fix breaks ABI CVE-2015-6938 (Cross-site scripting (XSS) vulnerability in the file browser in notebo ...) - ipython 2.4.1-1 (low; bug #798886) @@ -8219,7 +8219,7 @@ CVE-2015-6938 (Cross-site scripting (XSS) vulnerability in the file browser in n [wheezy] - ipython <no-dsa> (Minor issue) [squeeze] - ipython <not-affected> (Vulnerable code not present) NOTE: Affected versions: 0.12 <= x <= 4.0 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/02/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/02/3 CVE-2015-6804 RESERVED CVE-2015-6803 @@ -8477,12 +8477,12 @@ CVE-2015-6806 (The MScrollV function in ansi.c in GNU screen 4.3.1 and earlier d {DSA-3352-1 DLA-305-1} - screen 4.3.1-2 (bug #797624) NOTE: https://savannah.gnu.org/bugs/?45713 - NOTE: http://www.openwall.com/lists/oss-security/2015/09/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/09/01/1 CVE-2015-6749 (Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis- ...) {DLA-1010-1 DLA-317-1} - vorbis-tools 1.4.0-7 (bug #797461) [jessie] - vorbis-tools 1.4.0-6+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/29/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/29/1 NOTE: https://trac.xiph.org/ticket/2212 CVE-2015-6741 RESERVED @@ -8499,7 +8499,7 @@ CVE-2015-6748 (Cross-site scripting (XSS) vulnerability in jsoup before 1.8.3. . NOTE: https://github.com/jhy/jsoup/pull/582 NOTE: https://hibernate.atlassian.net/browse/HV-1012 NOTE: https://issues.jboss.org/browse/WFLY-5223 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/28/3 CVE-2015-6726 RESERVED CVE-2015-6725 (The ANSendForSharedReview method in Adobe Reader and Acrobat 10.x befo ...) @@ -8958,36 +8958,36 @@ CVE-2015-6661 (Drupal 6.x before 6.37 and 7.x before 7.39 allows remote attacker - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2015-003 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/21/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/21/5 CVE-2015-6660 (The Form API in Drupal 6.x before 6.37 and 7.x before 7.39 does not pr ...) {DSA-3346-1} - drupal7 7.39-1 - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2015-003 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/21/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/21/5 CVE-2015-6659 (SQL injection vulnerability in the SQL comment filtering system in the ...) {DSA-3346-1} - drupal7 7.39-1 NOTE: https://www.drupal.org/SA-CORE-2015-003 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/21/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/21/5 CVE-2015-6658 (Cross-site scripting (XSS) vulnerability in the Autocomplete system in ...) {DSA-3346-1} - drupal7 7.39-1 - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2015-003 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/21/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/21/5 CVE-2015-6665 (Cross-site scripting (XSS) vulnerability in the Ajax handler in Drupal ...) {DSA-3346-1} - drupal7 7.39-1 NOTE: https://www.drupal.org/SA-CORE-2015-003 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/21/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/21/5 CVE-2015-6673 (Use-after-free vulnerability in Decoder.cpp in libpgf before 6.15.32. ...) {DLA-2035-1} - libpgf 6.14.12-3.2 (bug #798032) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/19/14 - NOTE: Details on the CVE assignment: http://www.openwall.com/lists/oss-security/2015/08/25/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/19/14 + NOTE: Details on the CVE assignment: https://www.openwall.com/lists/oss-security/2015/08/25/9 NOTE: https://sourceforge.net/p/libpgf/code/147/ NOTE: https://sourceforge.net/p/libpgf/code/148/ CVE-2015-6527 (The php_str_replace_in_subject function in ext/standard/string.c in PH ...) @@ -9026,7 +9026,7 @@ CVE-2015-6833 (Directory traversal vulnerability in the PharData class in PHP be {DSA-3344-1 DLA-341-1} - php5 5.6.12+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=70019 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/19/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/19/3 NOTE: Fixed upstream in 5.4.44 and 5.6.12 CVE-2015-6831 (Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5 ...) {DSA-3344-1 DLA-341-1} @@ -9035,13 +9035,13 @@ CVE-2015-6831 (Multiple use-after-free vulnerabilities in SPL in PHP before 5.4. NOTE: https://bugs.php.net/bug.php?id=70168 NOTE: https://bugs.php.net/bug.php?id=70166 NOTE: https://bugs.php.net/bug.php?id=70155 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/19/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/19/3 NOTE: Fixed upstream in 5.4.44 and 5.6.12 CVE-2015-6832 (Use-after-free vulnerability in the SPL unserialize implementation in ...) {DSA-3344-1 DLA-341-1} - php5 5.6.12+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=70068 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/19/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/19/3 NOTE: Fixed upstream in 5.4.44 and 5.6.12 CVE-2015-6505 RESERVED @@ -9563,7 +9563,7 @@ CVE-2015-6526 (The perf_callchain_user_64 function in arch/powerpc/perf/callchai [wheezy] - linux 3.2.71-1 - linux-2.6 <removed> [squeeze] - linux-2.6 <not-affected> (powerpc not supported in Squeeze LTS) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/18/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/18/4 NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a5cbce421a283e6aea3c4007f141735bf9da8c3 (v4.1-rc1) CVE-2015-6252 (The vhost_dev_ioctl function in drivers/vhost/vhost.c in the Linux ker ...) {DSA-3364-1} @@ -10140,7 +10140,7 @@ CVE-2015-5986 (openpgpkey_61.c in named in ISC BIND 9.9.7 before 9.9.7-P3 and 9. CVE-2015-6496 (conntrackd in conntrack-tools 1.4.2 and earlier does not ensure that t ...) {DSA-3341-1 DLA-295-1} - conntrack 1:1.4.2-3 (bug #796103) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/14/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/14/4 NOTE: http://bugzilla.netfilter.org/show_bug.cgi?id=910 NOTE: https://git.netfilter.org/conntrack-tools/commit/?id=c392c159605956c7bd4a264ab4490e2b2704c0cd CVE-2015-5985 @@ -10191,26 +10191,26 @@ CVE-2015-6506 (Cross-site scripting (XSS) vulnerability in the cryptography inte [jessie] - request-tracker4 4.2.8-3+deb8u1 [wheezy] - request-tracker4 <not-affected> (Vulnerable code not present) NOTE: https://github.com/bestpractical/rt/commit/36a461947b00b105336adb4997d1c7767d8484c4 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/13/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/13/8 CVE-2015-6565 (sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY de ...) - openssh <not-affected> (Vulnerable code introduce in V_6_8_P1) NOTE: https://anongit.mindrot.org/openssh.git/commit/?id=6f941396b6835ad18018845f515b0c4fe20be21a NOTE: Issue introduced with https://anongit.mindrot.org/openssh.git/commit/?id=a5883d4eccb94b16c355987f58f86a7dee17a0c2 (V_6_8_P1) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/12/1 CVE-2015-6563 (The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD pla ...) {DLA-1500-1} - openssh 1:6.9p1-1 (bug #795711) [wheezy] - openssh <no-dsa> (Minor issue) [squeeze] - openssh <no-dsa> (Minor issue) NOTE: https://anongit.mindrot.org/openssh.git/commit/?id=d4697fe9a28dab7255c60433e4dd23cf7fce8a8b - NOTE: http://www.openwall.com/lists/oss-security/2015/08/11/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/11/9 CVE-2015-6564 (Use-after-free vulnerability in the mm_answer_pam_free_ctx function in ...) {DLA-1500-1} - openssh 1:6.9p1-1 (bug #795711) [wheezy] - openssh <no-dsa> (Minor issue) [squeeze] - openssh <no-dsa> (Minor issue) NOTE: https://anongit.mindrot.org/openssh.git/commit/?id=5e75f5198769056089fb06c4d738ab0e5abc66f7 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/11/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/11/9 CVE-2015-6737 (Cross-site scripting (XSS) vulnerability in the Widgets extension for ...) NOT-FOR-US: Widgets extension for MediaWiki NOTE: https://phabricator.wikimedia.org/T88964 @@ -10271,7 +10271,7 @@ CVE-2015-5960 (Mozilla Firefox OS before 2.2 allows physically proximate attacke NOT-FOR-US: Mozilla Firefox OS CVE-2015-6520 (IPPUSBXD before 1.22 listens on all interfaces, which allows remote at ...) - ippusbxd 1.22-1 (bug #795162) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/11/1 NOTE: https://github.com/tillkamppeter/ippusbxd/commit/46844402bca7a38fc224483ba6f0a93c4613203f NOTE: https://github.com/tillkamppeter/ippusbxd/commit/a632841f8e65d402e13e81921515f5a1e2736c82 CVE-2015-XXXX [publicfile-installer: insecure use of /tmp] @@ -10282,12 +10282,12 @@ CVE-2015-XXXX [net/http: broken trailers don't close a server connection] [wheezy] - golang <no-dsa> (Minor issue) NOTE: https://github.com/golang/go/issues/12027 NOTE: https://github.com/golang/go/commit/26049f6f9171d1190f3bbe05ec304845cfe6399f - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/08/06/2 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/08/06/2 CVE-2015-6251 (Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4 ...) {DSA-3334-1} - gnutls28 3.3.17-1 (bug #795068) - gnutls26 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/10/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/10/1 NOTE: https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12 NOTE: http://www.gnutls.org/security.html#GNUTLS-SA-2015-3 NOTE: _gnutls_x509_dn_to_string() introduced in 3.1.10 via: @@ -10754,7 +10754,7 @@ CVE-2015-5745 (Buffer overflow in the send_control_msg function in hw/char/virti [squeeze] - qemu <not-affected> (Vulnerable code introduced later) - qemu-kvm <removed> [squeeze] - qemu-kvm <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/06/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/06/3 NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=7882080388be5088e72c425b02223c02e6cb4295 (v2.4.0-rc3) NOTE: Introduced in: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=98b19252cf1bd97c54bc4613f3537c5ec0aae263 (v0.13.0-rc0) NOTE: Patch for wheezy needs change since uses iov_from_buf: @@ -10975,7 +10975,7 @@ CVE-2015-8383 (PCRE before 8.38 mishandles certain repeated conditional groups, [wheezy] - pcre3 <not-affected> (vulnerable coded introduce in 8.34) [squeeze] - pcre3 <not-affected> (vulnerable code introduced in 8.34) NOTE: Fixed in 8.38 - NOTE: http://www.openwall.com/lists/oss-security/2015/11/29/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/29/1 NOTE: Fixed by http://vcs.pcre.org/pcre?view=revision&revision=1557 NOTE: Introduced by/first bad commit: http://vcs.pcre.org/pcre?view=revision&revision=1365 CVE-2015-8382 (The match function in pcre_exec.c in PCRE before 8.37 mishandles the / ...) @@ -10986,7 +10986,7 @@ CVE-2015-8382 (The match function in pcre_exec.c in PCRE before 8.37 mishandles NOTE: http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510 NOTE: https://bugs.exim.org/show_bug.cgi?id=1537 NOTE: Fixed upstream in upstream release pcre-8.37 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/04/2 CVE-2015-XXXX [more to CVE-2015-2059] - libidn 1.32-1 [jessie] - libidn 1.29-1+deb8u1 @@ -11005,26 +11005,26 @@ CVE-2015-XXXX [Sidekiq::Web lacks CSRF protection] NOTE: Fix released in sidekiq 3.4.2 NOTE: Follow-up fix: https://github.com/mperham/sidekiq/commit/75a3524c919857aac16e0541b0cb107f48d00694 NOTE: Follow-up commit not included in 3.4.2~dfsg-1 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/08/01/2 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/08/01/2 CVE-2015-XXXX [XSS via job arguments display class in Sidekiq::Web] - ruby-sidekiq 3.4.2~dfsg-3 [jessie] - ruby-sidekiq <no-dsa> (Minor issue) NOTE: https://github.com/mperham/sidekiq/pull/2309 NOTE: Fixed by https://github.com/mperham/sidekiq/commit/54766f336620ca0ce3b0b87a7a56382496e64b61 NOTE: Fix released in sidekiq 3.4.0 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/08/01/2 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/08/01/2 CVE-2015-XXXX [XSS via queue name in Sidekiq::Web] - ruby-sidekiq 3.4.2~dfsg-3 [jessie] - ruby-sidekiq <no-dsa> (Minor issue) NOTE: https://github.com/mperham/sidekiq/issues/2330 NOTE: Fixed by https://github.com/mperham/sidekiq/commit/2178d66b6686fbf4430223c34c184a64c9906828 NOTE: Fix released in sidekiq 3.4.0 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/08/01/2 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/08/01/2 CVE-2015-5707 (Integer overflow in the sg_start_req function in drivers/scsi/sg.c in ...) {DSA-3329-1 DLA-310-1} - linux 4.1.3-1 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2015/08/01/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/01/6 NOTE: Probably introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=10db10d144c0248f285242f79daf6b9de6b00a62 (v2.6.28-rc1) NOTE: Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81 (v4.1-rc1) NOTE: Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee (v4.1-rc1) @@ -11033,7 +11033,7 @@ CVE-2015-5706 (Use-after-free vulnerability in the path_openat function in fs/na [jessie] - linux 3.16.7-ckt11-1+deb8u3 [wheezy] - linux <not-affected> (Introduced in v3.11-rc1) - linux-2.6 <not-affected> (Introduced in v3.11-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/01/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/01/5 NOTE: Introduced by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=60545d0d4610b02e55f65d141c95b18ccf855b6e (v3.11-rc1) NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f15133df088ecadd141ea1907f2c96df67c729f0 (v4.1-rc3) CVE-2015-5702 @@ -11050,7 +11050,7 @@ CVE-2015-5704 (scripts/licensecheck.pl in devscripts before 2.15.7 allows local [wheezy] - devscripts <not-affected> (Vulnerable code not present) [squeeze] - devscripts <not-affected> (Vulnerable code not present) NOTE: Introduced in https://anonscm.debian.org/cgit/collab-maint/devscripts.git/commit/?id=025ad4ea8ba92d32bd698a83149f782c17f78bf0 (v2.15.5) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/01/1 CVE-2015-5699 (The Switch Configuration Tools Backend (clcmd_server) in Cumulus Linux ...) NOT-FOR-US: Cumulus Linux NOTE: https://lists.cumulusnetworks.com/pipermail/cumulus-security-announce/2015-July/000002.html @@ -11234,7 +11234,7 @@ CVE-2015-5697 (The get_bitmap_file function in drivers/md/md.c in the Linux kern - linux 4.1.3-1 - linux-2.6 <removed> NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16 (v4.2-rc6) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/28/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/28/2 CVE-2015-5620 RESERVED CVE-2015-5619 (Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack out ...) @@ -11425,13 +11425,13 @@ CVE-2015-XXXX [integer overflow] [jessie] - freexl 1.0.0g-1+deb8u2 [wheezy] - freexl 1.0.0b-1+deb7u2 NOTE: For the issue fixed in DSA-3310-1 not yet CVEified - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/06/7 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/06/7 CVE-2015-XXXX [SQL Injection in host_templates.php] - cacti 0.8.8e+ds1-1 [jessie] - cacti 0.8.8b+dfsg-8+deb8u2 [wheezy] - cacti 0.8.8a+dfsg-5+deb7u6 [squeeze] - cacti 0.8.7g-1+squeeze7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/18/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/18/4 NOTE: http://bugs.cacti.net/view.php?id=2584 NOTE: http://svn.cacti.net/viewvc?view=rev&revision=7731 CVE-2015-XXXX [SQL Injection in graph_templates.php] @@ -11439,7 +11439,7 @@ CVE-2015-XXXX [SQL Injection in graph_templates.php] [jessie] - cacti 0.8.8b+dfsg-8+deb8u2 [wheezy] - cacti 0.8.8a+dfsg-5+deb7u6 [squeeze] - cacti 0.8.7g-1+squeeze7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/18/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/18/4 NOTE: http://bugs.cacti.net/view.php?id=2583 NOTE: http://svn.cacti.net/viewvc?view=rev&revision=7731 CVE-2015-XXXX [SQL Injection in data_templates.php] @@ -11447,7 +11447,7 @@ CVE-2015-XXXX [SQL Injection in data_templates.php] [jessie] - cacti 0.8.8b+dfsg-8+deb8u2 [wheezy] - cacti 0.8.8a+dfsg-5+deb7u6 [squeeze] - cacti 0.8.7g-1+squeeze7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/18/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/18/4 NOTE: http://bugs.cacti.net/view.php?id=2582 NOTE: http://svn.cacti.net/viewvc?view=rev&revision=7731 CVE-2015-XXXX [SQL Injection in cdef.php] @@ -11455,7 +11455,7 @@ CVE-2015-XXXX [SQL Injection in cdef.php] [jessie] - cacti 0.8.8b+dfsg-8+deb8u2 [wheezy] - cacti 0.8.8a+dfsg-5+deb7u6 [squeeze] - cacti 0.8.7g-1+squeeze7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/18/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/18/4 NOTE: http://bugs.cacti.net/view.php?id=2580 NOTE: http://svn.cacti.net/viewvc?view=rev&revision=7731 CVE-2015-XXXX [SQL Injection Vulnerability in data sources] @@ -11463,7 +11463,7 @@ CVE-2015-XXXX [SQL Injection Vulnerability in data sources] [jessie] - cacti 0.8.8b+dfsg-8+deb8u2 [wheezy] - cacti 0.8.8a+dfsg-5+deb7u6 [squeeze] - cacti 0.8.7g-1+squeeze7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/18/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/18/4 NOTE: http://bugs.cacti.net/view.php?id=2579 NOTE: http://svn.cacti.net/viewvc?view=rev&revision=7731 CVE-2015-XXXX [SQL Injection Vulnerability in graph items and graph template items] @@ -11471,7 +11471,7 @@ CVE-2015-XXXX [SQL Injection Vulnerability in graph items and graph template ite [jessie] - cacti 0.8.8b+dfsg-8+deb8u2 [wheezy] - cacti 0.8.8a+dfsg-5+deb7u6 [squeeze] - cacti 0.8.7g-1+squeeze7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/07/18/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/07/18/4 NOTE: http://bugs.cacti.net/view.php?id=2574 NOTE: http://svn.cacti.net/viewvc?view=rev&revision=7731 CVE-2015-5590 (Stack-based buffer overflow in the phar_fix_filepath function in ext/p ...) @@ -11531,7 +11531,7 @@ CVE-2015-5516 (Memory leak in the last hop kernel module in F5 BIG-IP LTM, GTM, CVE-2015-6240 (The chroot, jail, and zone connection plugins in ansible before 1.9.2 ...) {DLA-1923-1} - ansible 1.9.2+dfsg-1 (low) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/14/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/14/3 CVE-2015-5515 (The Views Bulk Operations (VBO) module 6.x-1.x and 7.x-3.x before 7.x- ...) NOT-FOR-US: Drupal addon not packaged in Debian CVE-2015-5514 (Cross-site scripting (XSS) vulnerability in the Migrate module 7.x-2.x ...) @@ -11658,7 +11658,7 @@ CVE-2015-5607 (Cross-site request forgery in the REST API in IPython 2 and 3. .. NOTE: https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0 (2.x) NOTE: https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816 (3.x) NOTE: Affected versions: 0.12 <= version <= 3.2.0 - NOTE: http://www.openwall.com/lists/oss-security/2015/07/12/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/12/4 CVE-2015-5461 (Open redirect vulnerability in the Redirect function in stageshow_redi ...) NOT-FOR-US: Redirect function in stageshow_redirect.php in the StageShow plugin for WordPress CVE-2015-5460 (Cross-site scripting (XSS) vulnerability in app/views/events/_menu.htm ...) @@ -11848,13 +11848,13 @@ CVE-2015-8041 (Multiple integer overflows in the NDEF record parser in hostapd b [squeeze] - wpasupplicant <not-affected> (0.7.0-v2.4 with with CONFIG_WPS_NFC=y) - hostapd <removed> [squeeze] - hostapd <not-affected> (v0.7.0-v2.4 with CONFIG_WPS_NFC=y) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/08/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/08/3 NOTE: http://w1.fi/security/2015-5/ CVE-2015-5395 (Cross-site request forgery (CSRF) vulnerability in SOGo before 3.1.0. ...) - sogo 3.2.4-0.2 (bug #796197) [wheezy] - sogo <end-of-life> (not supported in Wheezy LTS) NOTE: https://lists.debian.org/debian-lts/2016/05/msg00197.html - NOTE: http://www.openwall.com/lists/oss-security/2015/07/07/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/07/10 NOTE: http://www.sogo.nu/bugs/view.php?id=3246 NOTE: https://github.com/inverse-inc/sogo/commit/582baf2960969c73f98643e46cfb49432c30b711 (SOGo-3.1.0) CVE-2015-5470 (The label decompression functionality in PowerDNS Recursor before 3.6. ...) @@ -11865,24 +11865,24 @@ CVE-2015-5470 (The label decompression functionality in PowerDNS Recursor before - pdns-recursor 3.7.3-1 [wheezy] - pdns-recursor <not-affected> (3.5 and up affected) [squeeze] - pdns-recursor <not-affected> (3.5 and up affected) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/07/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/07/6 NOTE: https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/ NOTE: Patch: http://downloads.powerdns.com/patches/2015-01/rec-3.7.2.patch CVE-2015-5383 (Roundcube Webmail 1.1.x before 1.1.2 allows remote attackers to obtain ...) - roundcube <not-affected> (protection is done in apache config in binary package) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/06/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/06/10 NOTE: http://trac.roundcube.net/ticket/1490378 CVE-2015-5382 (program/steps/addressbook/photo.inc in Roundcube Webmail before 1.0.6 ...) - roundcube 1.1.2+dfsg.1-1 (bug #791643) [wheezy] - roundcube <not-affected> (Vulnerable code not present) [squeeze] - roundcube <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/06/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/06/10 NOTE: http://trac.roundcube.net/ticket/1490379 CVE-2015-5381 (Cross-site scripting (XSS) vulnerability in program/include/rcmail.php ...) - roundcube 1.1.2+dfsg.1-1 (bug #791643) [wheezy] - roundcube <not-affected> (Vulnerable code not present) [squeeze] - roundcube <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/06/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/06/10 NOTE: http://trac.roundcube.net/ticket/1490417 CVE-2015-5400 (Squid before 3.5.6 does not properly handle CONNECT method peer respon ...) {DSA-3327-1 DLA-286-1} @@ -11893,13 +11893,13 @@ CVE-2015-5400 (Squid before 3.5.6 does not properly handle CONNECT method peer r NOTE: http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13856.patch (3.5) NOTE: http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch (3.4) NOTE: http://www.squid-cache.org/Advisories/SQUID-2015_2.txt - NOTE: http://www.openwall.com/lists/oss-security/2015/07/06/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/06/8 NOTE: In squeeze's squid3 the code is structured differently but the bug still appears to be present. NOTE: For squid 2.x all versions are affected, cf. comment by upstream in NOTE: https://bugs.debian.org/793128#12 CVE-2015-5380 (The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in ...) - nodejs <not-affected> (Only affects 0.12.x) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/05/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/05/1 CVE-2015-5365 (Cross-site scripting (XSS) vulnerability in Zurmo CRM 3.0.2 allows rem ...) NOT-FOR-US: Zurmo CRM CVE-2015-5363 (The SRX Network Security Daemon (nsd) in Juniper SRX Series services g ...) @@ -12105,7 +12105,7 @@ CVE-2015-5311 (PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allow [wheezy] - pdns <not-affected> (Only 3.4.4 and later affected) [squeeze] - pdns <not-affected> (Only 3.4.4 and later affected) - pdns-recursor <not-affected> (recursor not affected) - NOTE: http://www.openwall.com/lists/oss-security/2015/11/09/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/11/09/3 CVE-2015-5310 (The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not prop ...) {DSA-3397-1} - wpa 2.3-2.3 (bug #804707) @@ -12476,7 +12476,7 @@ CVE-2015-5221 (Use-after-free vulnerability in the mif_process_cmpt function in - jasper <removed> (bug #796253) [wheezy] - jasper <no-dsa> (Minor issue) [squeeze] - jasper <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/08/20/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/20/4 NOTE: Fixed by https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3 CVE-2015-5220 (The Web Console in Red Hat Enterprise Application Platform (EAP) befor ...) NOT-FOR-US: JBoss EAP @@ -12707,7 +12707,7 @@ CVE-2015-5162 (The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1. - nova 2:13.0.0-1 (low) [jessie] - nova <no-dsa> (Minor issue) [wheezy] - nova <no-dsa> (Minor issue) - NOTE: Patches: http://www.openwall.com/lists/oss-security/2016/10/06/8 + NOTE: Patches: https://www.openwall.com/lists/oss-security/2016/10/06/8 CVE-2015-5161 (The Zend_Xml_Security::scan in ZendXml before 1.0.1 and Zend Framework ...) {DSA-3340-1 DLA-302-1} - zendframework 1.12.14+dfsg-1 @@ -12940,12 +12940,12 @@ CVE-2015-5352 (The x11_open_helper function in channels.c in ssh in OpenSSH befo {DLA-1500-1 DLA-288-1} - openssh 1:6.9p1-1 (bug #790798) [wheezy] - openssh <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/01/7 NOTE: https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=1bf477d3cdf1a864646d59820878783d42357a1d CVE-2015-5147 (Stack-based buffer overflow in the header_anchor function in the HTML ...) - ruby-redcarpet <not-affected> (Affects v3.3.0 - v3.3.1) NOTE: https://github.com/vmg/redcarpet/commit/2cee777c1e5babe8a1e2683d31ea75cc4afe55fb - NOTE: http://www.openwall.com/lists/oss-security/2015/06/29/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/29/3 CVE-2015-5081 (Cross-site request forgery (CSRF) vulnerability in django CMS before 3 ...) - python-django-cms <itp> (bug #516183) CVE-2015-5073 (Heap-based buffer overflow in the find_fixedlength function in pcre_co ...) @@ -12956,7 +12956,7 @@ CVE-2015-5073 (Heap-based buffer overflow in the find_fixedlength function in pc NOTE: https://bugs.exim.org/show_bug.cgi?id=1651 NOTE: Fixed by: http://vcs.pcre.org/pcre?view=revision&revision=1571 (8.38) NOTE: Introduced in http://vcs.pcre.org/pcre?view=revision&revision=454 (8.00) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/26/1 CVE-2015-5068 (XML external entity (XXE) vulnerability in SAP Mobile Platform 3 allow ...) NOT-FOR-US: SAP CVE-2015-5067 (The (1) Cross-System Tools and (2) Data Transfer Workbench in SAP NetW ...) @@ -13999,7 +13999,7 @@ CVE-2015-4707 (Cross-site scripting (XSS) vulnerability in IPython before 3.2 al [wheezy] - ipython <not-affected> (Problematic code introduced in rel-2.0.0) [squeeze] - ipython <not-affected> (Problematic code introduced in rel-2.0.0) NOTE: https://github.com/ipython/ipython/commit/1fcc9943c000ab553ebc029db99ecbd0536960d6 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/22/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/22/4 CVE-2015-4706 (Cross-site scripting (XSS) vulnerability in IPython 3.x before 3.2 all ...) - ipython <not-affected> (Only affects 3.x) CVE-2015-4704 (Directory traversal vulnerability in the Download Zip Attachments plug ...) @@ -14118,21 +14118,21 @@ CVE-2015-4642 (The escapeshellarg function in ext/standard/exec.c in PHP before - php5 <not-affected> (Windows specific) NOTE: https://bugs.php.net/bug.php?id=69646 NOTE: https://git.php.net/?p=php-src.git;a=commitdiff;h=d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/18/3 CVE-2015-4643 (Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP b ...) {DSA-3344-1 DLA-307-1} - php5 5.6.11+dfsg-1 NOTE: Fixed in 5.6.10 / 5.5.26 / 5.4.42 NOTE: https://bugs.php.net/bug.php?id=69545#1431550655 NOTE: https://git.php.net/?p=php-src.git;a=commitdiff;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/18/3 CVE-2015-4644 (The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgs ...) {DSA-3344-1 DLA-307-1} - php5 5.6.11+dfsg-1 NOTE: Fixed in 5.6.10 / 5.5.26 / 5.4.42 NOTE: https://bugs.php.net/bug.php?id=69667 NOTE: https://git.php.net/?p=php-src.git;a=commitdiff;h=2cc4e69cc6d8dbc4b3568ad3dd583324a7c11d64 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/18/3 CVE-2015-4639 (Cross-site scripting (XSS) vulnerability in opac-addbybiblionumber.pl ...) NOT-FOR-US: Koha CVE-2015-4638 (The FastL4 virtual server in F5 BIG-IP LTM, AAM, AFM, Analytics, APM, ...) @@ -14497,7 +14497,7 @@ CVE-2015-4491 (Integer overflow in the make_filter_table function in pixops/pixo NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=752297 NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=ffec86ed5010c5a2be14f47b33bcf4ed3169a199 NOTE: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=8dba67cb4f38d62a47757741ad41e3f245b4a32a - NOTE: http://www.openwall.com/lists/oss-security/2015/07/17/17 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/17/17 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2015-88/ NOTE: gtk+2.0 2.21.5-1 removed the embedded copy of gdk-pixbuf and build-depends on external gdk-pixbuf CVE-2015-4490 (The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in M ...) @@ -14653,7 +14653,7 @@ CVE-2015-4556 (The string-translate* procedure in the data-structures unit in CH [jessie] - chicken <no-dsa> (Minor issue) [wheezy] - chicken <no-dsa> (Minor issue) [squeeze] - chicken <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/15/1 CVE-2015-2967 (Cross-site scripting (XSS) vulnerability in settings.php in Cacti befo ...) {DSA-3295-1 DLA-255-1} - cacti 0.8.8d+ds1-1 @@ -15225,7 +15225,7 @@ CVE-2015-4692 (The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the L [jessie] - linux 3.16.7-ckt11-1+deb8u3 [wheezy] - linux <not-affected> (Vulnerable code not present) - linux-2.6 <not-affected> (vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/10/6 NOTE: Vulnerable function introduced in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=66450a21f99636af4fafac2afd33f1a40631bc3a (v3.10-rc1) CVE-2015-4625 (Integer overflow in the authentication_agent_new_cookie function in Po ...) [experimental] - policykit-1 0.113-1 @@ -15237,7 +15237,7 @@ CVE-2015-4625 (Integer overflow in the authentication_agent_new_cookie function NOTE: http://lists.freedesktop.org/archives/polkit-devel/2015-June/000425.html NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=90837 NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=90832 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/08/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/08/3 NOTE: http://cgit.freedesktop.org/polkit/commit/?id=ea544ffc18405237ccd95d28d7f45afef49aca17 NOTE: http://cgit.freedesktop.org/polkit/commit/?id=493aa5dc1d278ab9097110c1262f5229bbaf1766 NOTE: http://cgit.freedesktop.org/polkit/commit/?id=fb5076b7c05d01a532d593a4079a29cf2d63a228 @@ -15254,7 +15254,7 @@ CVE-2015-4410 (The Moped::BSON::ObjecId.legal? method in rubygem-moped before co NOTE: Fix: https://github.com/mongodb/mongo-ruby-driver/commit/bb544c2f6fd62940f04ddc1abeeaa3f23c1a9ade (1.x-stable) NOTE: http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html NOTE: https://sources.debian.org/src/ruby-bson/1.10.0-1/lib/bson/types/object_id.rb/#L54 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/06/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/06/1 CVE-2015-4338 (Static code injection vulnerability in the XCloner plugin 3.1.2 for Wo ...) NOT-FOR-US: WordPress plugin xclonerbackupandrestore CVE-2015-4337 (Cross-site scripting (XSS) vulnerability in the XCloner plugin 3.1.2 f ...) @@ -15268,23 +15268,23 @@ CVE-2015-4335 (Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers [squeeze] - redis <not-affected> (Lua support introduced in version 2.6.0) NOTE: http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/ NOTE: Patch: https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/05/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/05/3 CVE-2015-XXXX [Null pointer access in inflatehd tool] - nghttp2 <unfixed> (unimportant) NOTE: Upstream report: https://github.com/tatsuhiro-t/nghttp2/issues/235 NOTE: Git commit: https://github.com/tatsuhiro-t/nghttp2/commit/3572e7c6343cb85fc21f5667a7ed0902cf5305cf - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/06/03/20 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/06/03/20 NOTE: inflatehd not installed into the Debian binary packages CVE-2015-5523 (The ParseValue function in lexer.c in tidy before 4.9.31 allows remote ...) {DSA-3309-1 DLA-273-1} - tidy 20091223cvs-1.5 (bug #792571) NOTE: https://github.com/htacg/tidy-html5/issues/217#issuecomment-108565501 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/04/2 CVE-2015-5522 (Heap-based buffer overflow in the ParseValue function in lexer.c in ti ...) {DSA-3309-1 DLA-273-1} - tidy 20091223cvs-1.5 (bug #792571) NOTE: https://github.com/htacg/tidy-html5/issues/217 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/04/2 CVE-2015-6593 REJECTED CVE-2015-4179 (Multiple cross-site request forgery (CSRF) vulnerabilities in the Code ...) @@ -15369,7 +15369,7 @@ CVE-2015-5366 (The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux - linux-2.6 <removed> NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=beb39db59d14990e401e235faf66a6b9b31240b0 (v4.1-rc7) NOTE: http://web.archive.org/web/20160309082241/https://twitter.com/grsecurity/status/605854034260426753 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/30/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/30/13 CVE-2015-5364 (The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kerne ...) {DSA-3313-1 DLA-310-1} - linux 4.0.7-1 @@ -15377,17 +15377,17 @@ CVE-2015-5364 (The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux - linux-2.6 <removed> NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=beb39db59d14990e401e235faf66a6b9b31240b0 (v4.1-rc7) NOTE: http://web.archive.org/web/20160309082241/https://twitter.com/grsecurity/status/605854034260426753 - NOTE: http://www.openwall.com/lists/oss-security/2015/06/30/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/30/13 CVE-2015-XXXX [uudecode: stack out of bounds read access] - sharutils <unfixed> (unimportant) NOTE: Negligible security impact - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/06/02/8 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/06/02/8 CVE-2015-4167 (The udf_read_inode function in fs/udf/inode.c in the Linux kernel befo ...) {DSA-3313-1 DSA-3290-1 DLA-246-1} - linux 4.0.2-1 - linux-2.6 <removed> NOTE: Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23b133bdc452aa441fcb9b82cbf6dd05cfd342d0 (v4.0-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/02/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/02/6 CVE-2015-4140 (Cross-site request forgery (CSRF) vulnerability in the WP Smiley plugi ...) NOT-FOR-US: WordPress plugin wp-smiley CVE-2015-4139 (Cross-site scripting (XSS) vulnerability in smilies4wp.php in the WP S ...) @@ -15421,7 +15421,7 @@ CVE-2015-4178 (The fs_pin implementation in the Linux kernel before 4.0.5 does n - linux-2.6 <not-affected> (Introduced and fixed in 4.1-rc1 upstream) NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1 (v4.1-rc1) NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=820f9f147dcce2602eefd9b575bbbd9ea14f0953 (v4.1-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/29/5 CVE-2015-4177 (The collect_mounts function in fs/namespace.c in the Linux kernel befo ...) - linux <not-affected> (Commit was applied to 4.0.2 as well but fixed in Debian by two subsequent commits) NOTE: Debian both applies "mnt: Fail collect_mounts when applied to unmounted mounts" @@ -15430,7 +15430,7 @@ CVE-2015-4177 (The collect_mounts function in fs/namespace.c in the Linux kernel - linux-2.6 <not-affected> (Introduced and fixed in 4.1-rc1 upstream) NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce07d891a0891d3c0d0c2d73d577490486b809e1 (v4.1-rc1) NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae (v4.1-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/29/5 CVE-2015-4126 RESERVED CVE-2015-4125 @@ -15605,20 +15605,20 @@ CVE-2015-XXXX [hwclock(8) SUID privilege escalation] - util-linux 2.27-1 (unimportant; bug #786804) NOTE: hwclock is not installed suid in Debian NOTE: https://github.com/karelzak/util-linux/commit/687cc5d58942b24a9f4013c68876d8cbea907ab1 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/26/10 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/05/26/10 CVE-2015-4082 (attic before 0.15 does not confirm unencrypted backups with the user, ...) - attic 0.16-1 (bug #787435) [jessie] - attic <no-dsa> (Minor issue) NOTE: https://github.com/jborg/attic/issues/271 NOTE: https://github.com/jborg/attic/commit/78f9ad1faba7193ca7f0acccbc13b1ff6ebf9072 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/25/3 CVE-2015-4170 (Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem. ...) - linux 3.13.4-1 [wheezy] - linux <not-affected> (commit 4898e640caf03fdbaf2122d5a33949bf3e4a5b34 not backported) - linux-2.6 <not-affected> (commit 4898e640caf03fdbaf2122d5a33949bf3e4a5b34 not backported) NOTE: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf872776fc84128bb779ce2b83a37c884c3203ae (v3.13-rc5) NOTE: Affected code was introduced by the rewrite in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4898e640caf03fdbaf2122d5a33949bf3e4a5b34 (v3.11-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/26/1 CVE-2015-4065 (Cross-site scripting (XSS) vulnerability in shared/shortcodes/inbound- ...) NOT-FOR-US: WordPress plugin landing-pages CVE-2015-4064 (SQL injection vulnerability in modules/module.ab-testing.php in the La ...) @@ -15655,7 +15655,7 @@ CVE-2015-4054 (PgBouncer before 1.5.5 allows remote attackers to cause a denial NOTE: https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573 (master) NOTE: https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5 (stable-1.5) NOTE: https://github.com/pgbouncer/pgbouncer/issues/42 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/21/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/21/2 CVE-2015-8147 REJECTED CVE-2015-8146 @@ -15701,7 +15701,7 @@ CVE-2015-4027 (The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scan CVE-2015-4047 (racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause ...) {DSA-3272-1 DLA-234-1} - ipsec-tools 1:0.8.2+20140711-3 (bug #785778) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/20/1 CVE-2015-4023 RESERVED CVE-2015-4020 (RubyGems 2.0.x before 2.0.17, 2.2.x before 2.2.5, and 2.4.x before 2.4 ...) @@ -15746,7 +15746,7 @@ CVE-2015-4041 (The keycompare_mb function in sort.c in sort in GNU Coreutils thr NOTE: http://pkgs.fedoraproject.org/cgit/coreutils.git/plain/coreutils-i18n.patch CVE-2015-4035 (scripts/xzgrep.in in xzgrep 5.2.x before 5.2.0, before 5.0.0 does not ...) - xz-utils <not-affected> (Affects 4.999.9beta) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/18/7 CVE-2015-4010 (Cross-site request forgery (CSRF) vulnerability in the Encrypted Conta ...) NOT-FOR-US: Encrypted Contact Form plugin for WordPress CVE-2015-4009 @@ -15855,7 +15855,7 @@ CVE-2015-4024 (Algorithmic complexity vulnerability in the multipart_buffer_head - php5 5.6.9+dfsg-1 [squeeze] - php5 <no-dsa> (Too intrusive to backport) NOTE: https://bugs.php.net/bug.php?id=69364 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/18/2 NOTE: Fixed upstream in 5.4.41, 5.5.25, 5.6.9 - hhvm 3.11.0+dfsg-1 NOTE: HHVM fix: https://github.com/facebook/hhvm/commit/6188457bd90ed2f3516e778dca8e91536d91802e @@ -15863,14 +15863,14 @@ CVE-2015-4022 (Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in {DSA-3280-1 DLA-307-1} - php5 5.6.9+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=69545 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/18/2 NOTE: Fixed upstream in 5.4.41, 5.5.25, 5.6.9 CVE-2015-4021 (The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41 ...) {DSA-3280-1 DLA-307-1} - php5 5.6.9+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=69453 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=c27f012b7a447e59d4a704688971cbfa7dddaa74 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/17/2 and http://www.openwall.com/lists/oss-security/2015/05/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/17/2 and https://www.openwall.com/lists/oss-security/2015/05/18/2 NOTE: Fixed upstream in 5.4.41, 5.5.25, 5.6.9 CVE-2015-3987 (Multiple unquoted Windows search path vulnerabilities in the (1) Clien ...) NOT-FOR-US: McAfee @@ -16043,7 +16043,7 @@ CVE-2015-3909 CVE-2015-3908 (Ansible before 1.9.2 does not verify that the server hostname matches ...) {DLA-1923-1} - ansible 1.9.2+dfsg-1 (low) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/14/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/14/4 NOTE: Fixed in commit https://github.com/ansible/ansible/commit/be7c59c7bbe2c7cfaad0151c42693ebd0ea4243f CVE-2015-3907 (CodeIgniter Rest Server (aka codeigniter-restserver) 2.7.1 allows XXE ...) NOT-FOR-US: CodeIgniter Rest Server @@ -16251,12 +16251,12 @@ CVE-2015-4036 (Array index error in the tcm_vhost_make_tpg function in drivers/v - linux-2.6 <removed> [squeeze] - linux-2.6 <not-affected> (Vulnerable code not present) NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=59c816c1f24df0204e01851431d3bab3eb76719c (v4.0-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/13/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/13/4 CVE-2015-3988 (Multiple cross-site scripting (XSS) vulnerabilities in OpenStack Dashb ...) - horizon 2015.1.0-2 (bug #786741) [jessie] - horizon <not-affected> (Vulnerable code not present) [wheezy] - horizon <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/12/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/12/9 CVE-2015-3886 (libinfinity before 0.6.6-1 does not validate expired SSL certificates, ...) - libinfinity 0.6.6-1 (bug #783601) [jessie] - libinfinity 0.6.6-1~deb8u1 @@ -16264,7 +16264,7 @@ CVE-2015-3886 (libinfinity before 0.6.6-1 does not validate expired SSL certific [squeeze] - libinfinity <not-affected> (vulnerable code not present) NOTE: https://github.com/gobby/libinfinity/commit/c97f870f5ae13112988d9f8ad464b4f679903706 NOTE: https://github.com/gobby/gobby/issues/61 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/12/1 CVE-2015-3815 (The detect_version function in wiretap/logcat.c in the Android Logcat ...) {DSA-3277-1} - wireshark 1.12.5+g5819e5b-1 @@ -16695,20 +16695,20 @@ CVE-2015-3880 (Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x befo [squeeze] - phpbb3 <no-dsa> (Minor issue) NOTE: https://wiki.phpbb.com/Release_Highlights/3.0.14 NOTE: Patch: https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/12/2 CVE-2015-XXXX [pdf2djvu: insecure use of /tmp when executing c44] - pdf2djvu 0.7.21-1 (bug #784889) [jessie] - pdf2djvu 0.7.17-4+deb8u1 [wheezy] - pdf2djvu 0.7.12-2+deb7u1 [squeeze] - pdf2djvu <no-dsa> (Minor issue) NOTE: https://bitbucket.org/jwilk/pdf2djvu/issue/103 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/09/7 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/05/09/7 CVE-2015-XXXX [didjvu: insecure use of /tmp when executing c44] - didjvu 0.4-1 (bug #784888) [jessie] - didjvu 0.2.8-1+deb8u1 [wheezy] - didjvu 0.2.3-2+deb7u1 NOTE: https://bitbucket.org/jwilk/didjvu/issue/8 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/09/7 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/05/09/7 CVE-2015-4146 (The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 thro ...) {DSA-3397-1} - wpa 2.3-2.2 (bug #787371) @@ -16719,7 +16719,7 @@ CVE-2015-4146 (The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 NOTE: http://w1.fi/security/2015-4/ NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4145 (The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...) {DSA-3397-1} - wpa 2.3-2.2 (bug #787371) @@ -16731,7 +16731,7 @@ CVE-2015-4145 (The EAP-pwd server and peer implementation in hostapd and wpa_sup NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4144 (The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...) {DSA-3397-1} - wpa 2.3-2.2 (bug #787371) @@ -16743,7 +16743,7 @@ CVE-2015-4144 (The EAP-pwd server and peer implementation in hostapd and wpa_sup NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0003-EAP-pwd-peer-Fix-Total-Length-parsing-for-fragment-r.patch NOTE: http://w1.fi/security/2015-4/0004-EAP-pwd-server-Fix-Total-Length-parsing-for-fragment.patch - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4143 (The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...) {DSA-3397-1} - wpa 2.3-2.2 (bug #787371) @@ -16753,7 +16753,7 @@ CVE-2015-4143 (The EAP-pwd server and peer implementation in hostapd and wpa_sup NOTE: http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt NOTE: http://w1.fi/security/2015-4/0001-EAP-pwd-peer-Fix-payload-length-validation-for-Commi.patch NOTE: http://w1.fi/security/2015-4/0002-EAP-pwd-server-Fix-payload-length-validation-for-Com.patch - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/5 CVE-2015-4142 (Integer underflow in the WMM Action frame parser in hostapd 0.5.5 thro ...) {DSA-3397-1 DLA-260-1} - wpa 2.3-2.2 (bug #787373) @@ -16762,7 +16762,7 @@ CVE-2015-4142 (Integer underflow in the WMM Action frame parser in hostapd 0.5.5 - hostapd <removed> NOTE: http://w1.fi/security/2015-3/ NOTE: http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt - NOTE: http://www.openwall.com/lists/oss-security/2015/05/09/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/09/5 CVE-2015-4141 (The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplican ...) {DSA-3397-1} - wpa 2.3-2.2 (bug #787372) @@ -16772,7 +16772,7 @@ CVE-2015-4141 (The WPS UPnP function in hostapd, when using WPS AP, and wpa_supp [squeeze] - hostapd <not-affected> (Affects 0.7.0-v2.4 with CONFIG_WPS_UPNP=y in the build configuration and upnp_iface parameter on runtime) NOTE: http://w1.fi/security/2015-2/ NOTE: http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt - NOTE: http://www.openwall.com/lists/oss-security/2015/05/09/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/09/4 CVE-2015-XXXX [incorrect parsing of from header when assigning pgp keys] - semi 1.14.7~0.20120428-17 (bug #784712) [jessie] - semi 1.14.7~0.20120428-14+deb8u1 @@ -16832,18 +16832,18 @@ CVE-2015-3632 (Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1.5 allo NOT-FOR-US: Foxit Reader, Enterprise Reader, PhantomPDF CVE-2015-3631 (Docker Engine before 1.6.1 allows local users to set arbitrary Linux S ...) - docker.io 1.6.1+dfsg1-1 (bug #784726) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/10 CVE-2015-3630 (Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, ...) - docker.io 1.6.1+dfsg1-1 (bug #784726) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/10 CVE-2015-3629 (Libcontainer 1.6.0, as used in Docker Engine, allows local users to es ...) - docker.io 1.6.1+dfsg1-1 (bug #784726) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/10 CVE-2015-3628 (The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Cont ...) NOT-FOR-US: F5 CVE-2015-3627 (Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor ...) - docker.io 1.6.1+dfsg1-1 (bug #784726) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/07/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/07/10 CVE-2015-3626 (Cross-site scripting (XSS) vulnerability in the DHCP Monitor page in t ...) NOT-FOR-US: Fortinet FortiOS CVE-2015-3625 (The NVIDIA GPU driver for FreeBSD R352 before 352.09, 346 before 346.7 ...) @@ -17183,7 +17183,7 @@ CVE-2015-3905 (Buffer overflow in the set_cs_start function in t1disasm.c in t1u - t1utils 1.38-4 (bug #779274) [wheezy] - t1utils <no-dsa> (Minor issue) NOTE: https://github.com/kohler/t1utils/issues/4 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/13/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/13/9 CVE-2015-XXXX [crashes on crafted upack packed file] - clamav 0.98.7+dfsg-1 [jessie] - clamav 0.98.7+dfsg-0+deb8u1 @@ -17191,14 +17191,14 @@ CVE-2015-XXXX [crashes on crafted upack packed file] [squeeze] - clamav 0.98.7+dfsg-0+deb6u1 NOTE: https://github.com/vrtadmin/clamav-devel/commit/a18af359decd270f5088e80e2ee2866c62e0843e NOTE: https://github.com/vrtadmin/clamav-devel/commit/ed56f56c1f1529bda877ddd116ae7bc064667c73 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/03/3 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/05/03/3 CVE-2015-XXXX [crash during algorithmic detection on crafted PE file] - clamav 0.98.7+dfsg-1 [jessie] - clamav 0.98.7+dfsg-0+deb8u1 [wheezy] - clamav 0.98.7+dfsg-0+deb7u1 [squeeze] - clamav 0.98.7+dfsg-0+deb6u1 NOTE: https://github.com/vrtadmin/clamav-devel/commit/a7bdfb4f0d3210eeab49280726ff3ea6d703280e - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/05/03/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/05/03/4 CVE-2015-XXXX [BUG/MAJOR: http: don't read past buffer's end in http_replace_value] - haproxy 1.5.12-1 [jessie] - haproxy <no-dsa> (Minor issue) @@ -17213,7 +17213,7 @@ CVE-2015-XXXX [BUG/MAJOR: http: prevent risk of reading past end with balance ur NOTE: For squeeze, the above commit message implies that the fix does not need to be backported to version 1.4 and indeed, the code already contains a (different) check that limits the value of "len". CVE-2015-4017 (Salt before 2014.7.6 does not verify certificates when connecting via ...) - salt <not-affected> (Vulnerable code not present in the version in Debian stable/unstable) - NOTE: http://www.openwall.com/lists/oss-security/2015/05/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/02/1 CVE-2015-3646 (OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014 ...) - keystone 2015.1.0-1 [jessie] - keystone <no-dsa> (Minor issue) @@ -17357,7 +17357,7 @@ CVE-2015-3420 (The ssl-proxy-openssl.c function in Dovecot before 2.2.17, when S [jessie] - dovecot 1:2.2.13-12~deb8u1 [wheezy] - dovecot <not-affected> (Problematic patch introducing the issue not applied) [squeeze] - dovecot <not-affected> (Vulnerable code not present & not reproducible) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/26/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/26/3 NOTE: Patch: http://web.archive.org/web/20150907231530/http://hg.dovecot.org/dovecot-2.2/rev/86f535375750 NOTE: Segfault reproducible if using openssl/1.0.2a-1 from sid. NOTE: http://dovecot.org/pipermail/dovecot/2015-April/100579.html @@ -17370,7 +17370,7 @@ CVE-2015-3440 (Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php - wordpress 4.2.1+dfsg-1 (bug #783554) NOTE: http://klikki.fi/adv/wordpress2.html NOTE: https://wordpress.org/news/2015/04/wordpress-4-2-1/ - NOTE: http://www.openwall.com/lists/oss-security/2015/04/27/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/27/4 NOTE: https://core.trac.wordpress.org/changeset/32299 CVE-2015-XXXX [Some plugins were vulnerable to an SQL injection vulnerability] - wordpress 4.2+dfsg-1 (bug #783347) @@ -17378,17 +17378,17 @@ CVE-2015-XXXX [Some plugins were vulnerable to an SQL injection vulnerability] [wheezy] - wordpress 3.6.1+dfsg-1~deb7u6 [squeeze] - wordpress 3.6.1+dfsg-1~deb6u6 NOTE: https://wordpress.org/news/2015/04/wordpress-4-1-2/ - NOTE: http://www.openwall.com/lists/oss-security/2015/04/26/2 - NOTE: To be decided: http://www.openwall.com/lists/oss-security/2015/04/28/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/26/2 + NOTE: To be decided: https://www.openwall.com/lists/oss-security/2015/04/28/7 CVE-2015-XXXX [files with invalid or unsafe names could be uploaded] - wordpress 4.2+dfsg-1 (bug #783347) [jessie] - wordpress 4.1+dfsg-1+deb8u1 [wheezy] - wordpress <not-affected> (File upload vulnerability only in WordPress 4.1 and higher) [squeeze] - wordpress <not-affected> (File upload vulnerability only in WordPress 4.1 and higher) NOTE: https://wordpress.org/news/2015/04/wordpress-4-1-2/ - NOTE: http://www.openwall.com/lists/oss-security/2015/04/26/2 - NOTE: To be decided: http://www.openwall.com/lists/oss-security/2015/04/28/7 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/06/10/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/26/2 + NOTE: To be decided: https://www.openwall.com/lists/oss-security/2015/04/28/7 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/06/10/11 CVE-2015-3439 (Cross-site scripting (XSS) vulnerability in the Ephox (formerly Moxiec ...) {DSA-3250-1 DLA-236-1} - wordpress 4.2+dfsg-1 (bug #783347) @@ -17402,7 +17402,7 @@ CVE-2015-3438 (Multiple cross-site scripting (XSS) vulnerabilities in WordPress CVE-2015-3451 (The _clone function in XML::LibXML before 2.0119 does not properly set ...) {DSA-3243-1 DLA-214-1} - libxml-libxml-perl 2.0116+dfsg-2 (bug #783443) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/25/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/25/2 NOTE: https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30 NOTE: https://bitbucket.org/shlomif/perl-xml-libxml/commits/915f1dbaf21c5f3c21d7c519c70fd93859e47152 CVE-2015-3418 (The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserv ...) @@ -17609,7 +17609,7 @@ CVE-2015-3339 (Race condition in the prepare_binprm function in fs/exec.c in the - linux 3.16.7-ckt9-3 - linux-2.6 <removed> NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b01fc86b9f425899f8a3a8fc1c47d73c2c20543 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/20/1 CVE-2015-7942 (The xmlParseConditionalSections function in parser.c in libxml2 does n ...) {DSA-3430-1 DLA-334-1} - libxml2 2.9.3+dfsg1-1 (bug #802827) @@ -17621,15 +17621,15 @@ CVE-2015-7941 (libxml2 2.9.2 does not properly stop parsing invalid input, which {DSA-3430-1 DLA-266-1} - libxml2 2.9.2+really2.9.1+dfsg1-0.1 (bug #783010) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=744980 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/19/5 - NOTE: http://www.openwall.com/lists/oss-security/2015/10/22/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/19/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/10/22/5 NOTE: https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (v2.9.3) NOTE: https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489 (v2.9.3) CVE-2015-8710 (The htmlParseComment function in HTMLparser.c in libxml2 allows attack ...) {DSA-3430-1 DLA-266-1} - libxml2 2.9.2+really2.9.1+dfsg1-0.1 (bug #782985) NOTE: Added workaround item to reflect entry fixed status, remove once CVE assigned - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/04/19/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/04/19/4 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=746048 NOTE: https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c CVE-2015-3328 @@ -17656,8 +17656,8 @@ CVE-2015-3330 (The php_handler function in sapi/apache2handler/sapi_apache2.c in NOTE: https://bugs.php.net/bug.php?id=69218 NOTE: https://bugs.php.net/bug.php?id=68486 NOTE: Fixed by: https://git.php.net/?p=php-src.git;a=commit;h=809610f5ea38a83b284e1125d1fff129bdd615e7 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/17/3 - NOTE: For details on scope of the CVE assignment: http://www.openwall.com/lists/oss-security/2015/04/17/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/17/3 + NOTE: For details on scope of the CVE assignment: https://www.openwall.com/lists/oss-security/2015/04/17/7 CVE-2015-3319 (Hotspot Express hotEx Billing Manager 73 does not include the HTTPOnly ...) NOT-FOR-US: Hotspot Express hotEx Billing Manager CVE-2015-3318 (CA Common Services, as used in CA Client Automation r12.5 SP01, r12.8, ...) @@ -17684,7 +17684,7 @@ CVE-2015-3329 (Multiple stack-based buffer overflows in the phar_set_inode funct - php5 5.6.9+dfsg-1 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=f59b67ae50064560d7bfcdb0d6a8ab284179053c NOTE: https://bugs.php.net/bug.php?id=69441 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/16/22 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/16/22 NOTE: Fixed in 5.6.8 and 5.4.40 CVE-2015-3315 (Automatic Bug Reporting Tool (ABRT) allows local users to read, change ...) NOT-FOR-US: abrt is Red Hat / Fedora specific @@ -17884,7 +17884,7 @@ CVE-2015-3251 (Apache CloudStack before 4.5.2 might allow remote authenticated a NOT-FOR-US: Apache CloudStack CVE-2015-3250 (Apache Directory LDAP API before 1.0.0-M31 allows attackers to conduct ...) - apache-directory-api 1.0.0~M20-3 (bug #791957) - NOTE: http://www.openwall.com/lists/oss-security/2015/07/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/07/5 CVE-2015-3249 (The HTTP/2 experimental feature in Apache Traffic Server 5.3.x before ...) - trafficserver 5.3.1-1 [wheezy] - trafficserver <not-affected> (HTTP2 support does not exist) @@ -18657,7 +18657,7 @@ CVE-2015-3306 (The mod_copy module in ProFTPD 1.3.5 allows remote attackers to r {DSA-3263-1} - proftpd-dfsg 1.3.5-2 (bug #782781) [squeeze] - proftpd-dfsg <not-affected> (mod_copy not available in version 1.3.3) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/15/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/15/2 NOTE: https://github.com/proftpd/proftpd/pull/109 NOTE: http://bugs.proftpd.org/show_bug.cgi?id=4169 NOTE: https://cxsecurity.com/issue/WLB-2015040075 @@ -18666,7 +18666,7 @@ CVE-2015-3331 (The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-in - linux 3.16.7-ckt9-3 (bug #782561) - linux-2.6 <removed> [squeeze] - linux-2.6 <not-affected> (Vulnerable code introduced in v2.6.38-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/14/16 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/14/16 NOTE: Fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ccfe8c3f7e52ae83155cb038753f4c75b774ca8a (v4.0-rc5) NOTE: Introduced by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0bd82f5f6355775fbaf7d3c664432ce1b862be1e (v2.6.38-rc1) CVE-2015-3332 (A certain backport in the TCP Fast Open implementation for the Linux k ...) @@ -18674,34 +18674,34 @@ CVE-2015-3332 (A certain backport in the TCP Fast Open implementation for the Li [jessie] - linux 3.16.7-ckt9-3~deb8u1 [wheezy] - linux <not-affected> (TCP Fast Open introduced in v3.6-rc1) - linux-2.6 <not-affected> (TCP Fast Open introduced in v3.6-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/14/14 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/14/14 NOTE: http://thread.gmane.org/gmane.linux.network/359588 CVE-2015-3310 (Buffer overflow in the rc_mksid function in plugins/radius/util.c in P ...) {DSA-3228-1 DLA-205-1} - ppp 2.4.6-3.1 (bug #782450) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/13/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/13/4 NOTE: Patch: https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=17;filename=ppp_2.4.6-3.1-nmu.diff;att=1;bug=782450 CVE-2015-5621 (The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlie ...) {DSA-4154-1 DLA-1317-1} - net-snmp 5.7.3+dfsg-1.1 (bug #788964) [squeeze] - net-snmp <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/13/1 NOTE: Upstream patch: https://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/ NOTE: https://sourceforge.net/p/net-snmp/bugs/2615/ (currently not public) CVE-2015-4085 (Directory traversal vulnerability in node/hooks/express/tests.js in Et ...) - etherpad-lite <itp> (bug #576998) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/11/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/11/10 CVE-2015-3297 (Directory traversal vulnerability in node/utils/Minify.js in Etherpad ...) - etherpad-lite <itp> (bug #576998) CVE-2015-3010 (ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.cl ...) - ceph-deploy <not-affected> (Fixed with initial upload to Debian) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/09/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/09/9 CVE-2015-3405 (ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 d ...) {DSA-3223-1 DLA-192-1} - ntp 1:4.2.6.p5+dfsg-7 NOTE: https://bugs.ntp.org/show_bug.cgi?id=2797 NOTE: Patch: http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=55199296N2gFqH1Hm5GOnhrk9Ypygg - NOTE: http://www.openwall.com/lists/oss-security/2015/04/09/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/09/5 CVE-2015-3008 (Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x be ...) {DSA-3700-1 DLA-455-1} - asterisk 1:13.7.2~dfsg-1 (bug #782411) @@ -18843,7 +18843,7 @@ CVE-2015-3026 (Icecast before 2.4.2, when a stream_auth handler is defined for U [wheezy] - icecast2 <not-affected> (stream_auth introduced in 2.3.3) [squeeze] - icecast2 <not-affected> (stream_auth introduced in 2.3.3) NOTE: https://trac.xiph.org/ticket/2191 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/08/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/08/8 CVE-2015-3030 (The web interface in McAfee Advanced Threat Defense (MATD) before 3.4. ...) NOT-FOR-US: McAfee Advanced Threat Defense CVE-2015-3029 (The web interface in McAfee Advanced Threat Defense (MATD) before 3.4. ...) @@ -18858,25 +18858,25 @@ CVE-2015-3406 (The PGP signature parsing in Module::Signature before 0.74 allows {DSA-3261-1 DLA-264-1} - libmodule-signature-perl 0.78-1 (bug #783451) NOTE: Upstream fix: https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f - NOTE: http://www.openwall.com/lists/oss-security/2015/04/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/07/1 NOTE: Changes might needed in libtest-signature-perl, need further investigation CVE-2015-3407 (Module::Signature before 0.74 allows remote attackers to bypass signat ...) {DSA-3261-1 DLA-264-1} - libmodule-signature-perl 0.78-1 (bug #783451) NOTE: Upstream fix: https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f - NOTE: http://www.openwall.com/lists/oss-security/2015/04/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/07/1 NOTE: libtest-signature-perl needed to be updated CVE-2015-3408 (Module::Signature before 0.74 allows remote attackers to execute arbit ...) {DSA-3261-1 DLA-264-1} - libmodule-signature-perl 0.78-1 (bug #783451) NOTE: Upstream fix: https://github.com/audreyt/module-signature/commit/8a9164596fa5952d4fbcde5aa1c7d1c7bc85372f - NOTE: http://www.openwall.com/lists/oss-security/2015/04/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/07/1 NOTE: Changes might needed in libtest-signature-perl, need further investigation CVE-2015-3409 (Untrusted search path vulnerability in Module::Signature before 0.75 a ...) {DSA-3261-1 DLA-264-1} - libmodule-signature-perl 0.78-1 (bug #783451) NOTE: Upstream fix: https://github.com/audreyt/module-signature/commit/c41e8885b862b9fce2719449bc9336f0bea658ef - NOTE: http://www.openwall.com/lists/oss-security/2015/04/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/07/1 NOTE: Changes might needed in libtest-signature-perl, need further investigation CVE-2015-2921 RESERVED @@ -19054,12 +19054,12 @@ CVE-2015-2929 (The Hidden Service (HS) client implementation in Tor before 0.2.4 {DSA-3216-1 DLA-187-1} - tor 0.2.5.12-1 NOTE: https://trac.torproject.org/projects/tor/ticket/15601 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/06/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/06/5 CVE-2015-2928 (The Hidden Service (HS) server implementation in Tor before 0.2.4.27, ...) {DSA-3216-1 DLA-187-1} - tor 0.2.5.12-1 NOTE: https://trac.torproject.org/projects/tor/ticket/15600 - NOTE: http://www.openwall.com/lists/oss-security/2015/04/06/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/06/5 CVE-2015-2837 RESERVED CVE-2015-2836 @@ -19077,12 +19077,12 @@ CVE-2015-2927 (node 0.3.2 and URONode before 1.0.5r3 allows remote attackers to [jessie] - node <no-dsa> (Minor issue) [squeeze] - node <no-dsa> (Minor issue) [wheezy] - node <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/03/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/03/10 CVE-2015-XXXX [caja automounts USB flash drives and CD/DVD drives while session is locked] - caja 1.8.2-4 (bug #781608) [jessie] - caja 1.8.2-3+deb8u1 NOTE: https://github.com/mate-desktop/caja/issues/398 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/04/03/12 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/04/03/12 CVE-2015-3013 (ownCloud Server before 5.0.19, 6.x before 6.0.7, and 7.x before 7.0.5 ...) {DSA-3244-1} [experimental] - owncloud 7.0.5+dfsg-1 @@ -19179,12 +19179,12 @@ CVE-2015-2830 (arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does - linux 3.16.7-ckt9-1 - linux-2.6 <removed> NOTE: Upstream commit: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=956421fbb74c3a6261903f3836c0740187cf038b (v4.0-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/02/1 CVE-2015-XXXX [Signature Bypass in several JSON Web Token Libraries] - pyjwt 1.3.0-1 (bug #781640) [jessie] - pyjwt 0.2.1-1+deb8u1 NOTE: Added workaround item to reflect entry fixed status, remove once CVE assigned - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/04/01/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/04/01/4 NOTE: https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/ NOTE: ruby-jwt not directly affected, see https://github.com/jwt/ruby-jwt/issues/76 CVE-2015-2810 (Integer overflow in the HwpApp::CHncSDS_Manager function in Hancom Off ...) @@ -19207,7 +19207,7 @@ CVE-2015-2831 (Buffer overflow in das_watchdog 0.9.0 allows local users to execu {DSA-3221-1 DLA-194-1} - das-watchdog 0.9.0-3.1 (bug #781806) NOTE: Upstream commit: https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/8 CVE-2015-2805 (Cross-site request forgery (CSRF) vulnerability in sec/content/sec_asa ...) NOT-FOR-US: Alcatel-Lucent OmniSwitch CVE-2015-2804 (The management web interface in Alcatel-Lucent OmniSwitch 6450, 6250, ...) @@ -19248,71 +19248,71 @@ CVE-2015-2931 (Incomplete blacklist vulnerability in includes/upload/UploadBase. [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2932 (Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x b ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2933 (Cross-site scripting (XSS) vulnerability in the Html class in MediaWik ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2934 (MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2935 (MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2936 (MediaWiki 1.24.x before 1.24.2, when using PBKDF2 for password hashing ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2937 (MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2938 (Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2939 (Cross-site scripting (XSS) vulnerability in the Scribunto extension fo ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2940 (Cross-site request forgery (CSRF) vulnerability in the CheckUser exten ...) - mediawiki 1:1.19.20+dfsg-2.3 [wheezy] - mediawiki <end-of-life> (Not supported in Wheezy LTS) [squeeze] - mediawiki <end-of-life> (Not supported in Squeeze LTS) NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2941 (Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, ...) - mediawiki 1:1.19.20+dfsg-2.3 (unimportant) NOTE: HHVM not packaged in Debian NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2942 (MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 ...) - mediawiki 1:1.19.20+dfsg-2.3 (unimportant) NOTE: HHVM not packaged in Debian NOTE: https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - NOTE: http://www.openwall.com/lists/oss-security/2015/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/01/1 CVE-2015-2786 (Unspecified vulnerability in MyBB (aka MyBulletinBoard) before 1.8.4 h ...) NOT-FOR-US: MyBB CVE-2015-2784 (The papercrop gem before 0.3.0 for Ruby on Rails does not properly han ...) @@ -19376,14 +19376,14 @@ CVE-2015-2793 (Cross-site scripting (XSS) vulnerability in templates/openid-sele - ikiwiki 3.20141016.2 (bug #781483) [wheezy] - ikiwiki 3.20120629.2 [squeeze] - ikiwiki <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/30/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/30/5 CVE-2015-2806 (Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4. ...) {DSA-3220-1 DLA-195-1} [experimental] - libtasn1-6 4.4-1 - libtasn1-6 4.2-3 - libtasn1-3 <removed> NOTE: https://gitlab.com/gnutls/libtasn1/commit/4d4f992826a4962790ecd0cce6fbba4a415ce149 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/29/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/29/4 NOTE: Only in the asn1 definition parser, not in the asn1 parser itself NOTE: https://lists.gnu.org/archive/html/help-libtasn1/2015-01/msg00000.html CVE-2015-2787 (Use-after-free vulnerability in the process_nested_data function in ex ...) @@ -19393,7 +19393,7 @@ CVE-2015-2787 (Use-after-free vulnerability in the process_nested_data function CVE-2015-2782 (Buffer overflow in Open-source ARJ archiver 3.10.22 allows remote atta ...) {DSA-3213-1 DLA-188-1} - arj 3.10.22-13 (bug #774015) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/28/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/28/5 CVE-2015-2756 (QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict a ...) {DSA-3259-1 DLA-479-1} - xen 4.2.0~rc2-1 (bug #781620) @@ -20535,35 +20535,35 @@ CVE-2015-6674 (Buffer underflow vulnerability in the Debian inspircd package bef {DSA-3226-1 DLA-276-1} - inspircd 2.0.16-1 (bug #780880) NOTE: Correct fix: https://github.com/inspircd/inspircd/commit/ed28c1ba666b39581adb860bf51cdde43c84cc89 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/29/5 CVE-2015-2788 (Multiple stack-based buffer overflows in the ib_fill_isqlda function i ...) {DSA-3219-1} - libdbd-firebird-perl 1.18-2 (bug #780925) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/30/4 CVE-2015-4148 (The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5 ...) {DLA-307-1} - php5 5.6.7+dfsg-1 [wheezy] - php5 5.4.39-0+deb7u1 NOTE: https://bugs.php.net/bug.php?id=69085 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/20/14 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/20/14 CVE-2015-4147 (The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, ...) {DLA-307-1} - php5 5.6.7+dfsg-1 [wheezy] - php5 5.4.39-0+deb7u1 NOTE: https://bugs.php.net/bug.php?id=69085 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/20/14 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/20/14 CVE-2015-2779 (Stack consumption vulnerability in the message splitting functionality ...) - quassel 1:0.10.0-2.3 (bug #781024) [wheezy] - quassel <not-affected> (According to upstream issue isn't triggerable in 0.8) [squeeze] - quassel <not-affected> (According to upstream issue isn't triggerable in 0.6) NOTE: https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/20/12 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/20/12 CVE-2015-2778 (Quassel before 0.12-rc1 uses an incorrect data-type size when splittin ...) - quassel 1:0.10.0-2.3 (bug #781024) [wheezy] - quassel <not-affected> (According to upstream issue isn't triggerable in 0.8) [squeeze] - quassel <not-affected> (According to upstream issue isn't triggerable in 0.6) NOTE: https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/20/12 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/20/12 CVE-2015-2348 (The move_uploaded_file implementation in ext/standard/basic_functions. ...) {DSA-3198-1 DLA-444-1} - php5 5.6.7+dfsg-1 @@ -20621,7 +20621,7 @@ CVE-2015-2749 (Open redirect vulnerability in Drupal 6.x before 6.35 and 7.x bef - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2015-001 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/19/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/19/5 CVE-2015-2329 (Cross-site scripting (XSS) vulnerability in the WooCommerce plugin bef ...) NOT-FOR-US: WooCommerce plugin for WordPress CVE-2015-2328 (PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related ...) @@ -20635,7 +20635,7 @@ CVE-2015-2328 (PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and rel [squeeze] - pcre3 <no-dsa> (Minor issue) NOTE: https://bugs.exim.org/show_bug.cgi?id=1515 NOTE: Fixed by: http://vcs.pcre.org/pcre?view=revision&revision=1498 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/31/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/31/4 CVE-2015-2327 (PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern ...) - mongodb <removed> (unimportant) NOTE: CVE for bundled version of pcre3 in mongodb @@ -20647,7 +20647,7 @@ CVE-2015-2327 (PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pat [squeeze] - pcre3 <no-dsa> (Minor issue) NOTE: https://bugs.exim.org/show_bug.cgi?id=1503 NOTE: Fixed by: http://vcs.pcre.org/pcre?view=revision&revision=1495 - NOTE: http://www.openwall.com/lists/oss-security/2015/05/31/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/05/31/5 CVE-2015-2326 (The pcre_compile2 function in PCRE before 8.37 allows context-dependen ...) - pcre3 2:8.35-7.2 (bug #783285) [jessie] - pcre3 2:8.35-3.3+deb8u1 @@ -20702,7 +20702,7 @@ CVE-2015-2666 (Stack-based buffer overflow in the get_matching_model_microcode f - linux-2.6 <not-affected> (Introduced in 3.9) NOTE: Introduced by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ec400ddeff200b068ddc6c70f7321f49ecf32ed5 (v3.9-rc1) NOTE: Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4 (v4.0-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/18/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/18/7 CVE-2015-2684 (Shibboleth Service Provider (SP) before 2.5.4 allows remote authentica ...) {DSA-3207-1 DLA-259-1} - shibboleth-sp2 2.5.3+dfsg-2 @@ -20712,7 +20712,7 @@ CVE-2015-2672 (The xsave/xrstor implementation in arch/x86/include/asm/xsave.h i - linux-2.6 <not-affected> NOTE: Introduced by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f31a9f7c71691569359fa7fb8b0acaa44bce0324 (v3.17-rc1) NOTE: Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit?id=06c8173eb92bbfc03a0fe8bb64315857d0badd06 (v4.0-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2015/03/18/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/18/6 CVE-2015-2331 (Integer overflow in the _zip_cdir_new function in zip_dirent.c in libz ...) {DSA-3198-1 DLA-212-1} - php5 5.6.7+dfsg-1 (bug #780713) @@ -20721,7 +20721,7 @@ CVE-2015-2331 (Integer overflow in the _zip_cdir_new function in zip_dirent.c in [squeeze] - libzip <not-affected> (Vulnerable code introduced with added Zip64 support in 0.11) NOTE: https://bugs.php.net/bug.php?id=69253 NOTE: https://github.com/php/php-src/commit/ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/18/1 NOTE: libzip patch: http://hg.nih.at/libzip/rev/9f11d54f692e CVE-2015-2330 (Late TLS certificate verification in WebKitGTK+ prior to 2.6.6 allows ...) - webkitgtk 2.4.9-1 (unimportant) @@ -20791,7 +20791,7 @@ CVE-2015-8903 (The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x - imagemagick 8:6.8.9.9-6 (low) [jessie] - imagemagick 8:6.8.9.9-5+deb8u1 [squeeze] - imagemagick <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/20/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/20/4 NOTE: http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26933 NOTE: http://web.archive.org/web/20150428140926/http://trac.imagemagick.org/changeset/17856 CVE-2015-8902 (The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6. ...) @@ -20800,7 +20800,7 @@ CVE-2015-8902 (The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x befo - imagemagick 8:6.8.9.9-6 (low) [jessie] - imagemagick 8:6.8.9.9-5+deb8u1 [squeeze] - imagemagick <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/20/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/20/4 NOTE: http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26932 NOTE: http://web.archive.org/web/20150428145652/http://trac.imagemagick.org/changeset/17855 CVE-2015-8901 (ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a ...) @@ -20809,7 +20809,7 @@ CVE-2015-8901 (ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to ca - imagemagick 8:6.8.9.9-6 [jessie] - imagemagick 8:6.8.9.9-5+deb8u1 [squeeze] - imagemagick <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/20/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/20/4 NOTE: http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26931 CVE-2015-8900 (The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x a ...) {DLA-960-1} @@ -20817,7 +20817,7 @@ CVE-2015-8900 (The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and - imagemagick 8:6.8.9.9-6 [jessie] - imagemagick 8:6.8.9.9-5+deb8u1 [squeeze] - imagemagick <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/20/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/20/4 NOTE: http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26929 NOTE: http://web.archive.org/web/20150501030131/http://trac.imagemagick.org/changeset/17845 NOTE: http://web.archive.org/web/20150429001241/http://trac.imagemagick.org/changeset/17846 @@ -20849,7 +20849,7 @@ CVE-2015-2674 (Restkit allows man-in-the-middle attackers to spoof TLS servers b [wheezy] - python-restkit <ignored> (Minor issue) [squeeze] - python-restkit <no-dsa> (Minor issue) NOTE: https://github.com/benoitc/restkit/issues/140 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/12/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/12/9 CVE-2015-2283 RESERVED CVE-2015-2282 (Stack-based buffer overflow in the LZC decompression implementation (C ...) @@ -20957,12 +20957,12 @@ CVE-2015-2301 (Use-after-free vulnerability in the phar_rename_archive function - php5 5.6.6+dfsg-1 NOTE: https://bugs.php.net/bug.php?id=68901 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b - NOTE: http://www.openwall.com/lists/oss-security/2015/03/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/10/6 CVE-2015-2265 (The remove_bad_chars function in utils/cups-browsed.c in cups-filters ...) - cups-filters 1.0.61-5 (bug #780267) [wheezy] - cups-filters <not-affected> (vulnerable code not present) NOTE: https://bugs.linuxfoundation.org/show_bug.cgi?id=1265 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/09/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/09/5 CVE-2015-2241 (Cross-site scripting (XSS) vulnerability in the contents function in a ...) - python-django 1.7.6-1 [wheezy] - python-django <not-affected> (Only affects 1.7.x and 1.8.x) @@ -21091,7 +21091,7 @@ CVE-2015-2675 (The OAuth implementation in librest before 0.7.93 incorrectly tru [squeeze] - librest <not-affected> (rest_proxy_call_get_url not yet used) NOTE: Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=742644 NOTE: Commit: https://git.gnome.org/browse/librest/commit/?id=b50ace7738ea038 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/04/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/04/6 CVE-2015-2204 (Evergreen before 2.5.9, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 all ...) NOT-FOR-US: Evergreen library CVE-2015-2203 (Evergreen 2.5.9, 2.6.7, and 2.7.4 allows remote authenticated users wi ...) @@ -21361,7 +21361,7 @@ CVE-2015-XXXX [MATTA-2015-002: Enforce acceptable range for Diffie-Hellman serve [wheezy] - putty 0.62-9+deb7u2 [squeeze] - putty 0.60+2010-02-20-1+squeeze3 NOTE: temporary workaround until CVE assigned to explitly tag for wheezy+squeeze - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/27/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/02/27/4 NOTE: http://advisories.mageia.org/MGASA-2015-0098.html CVE-2015-2172 (DokuWiki before 2014-05-05d and before 2014-09-29c does not properly c ...) - dokuwiki 0.0.20140929.d-1 (bug #779547) @@ -21375,7 +21375,7 @@ CVE-2015-2158 (Off-by-one error in the pngcrush_measure_idat function in pngcrus - pngcrush <not-affected> (Vulnerable code not present) NOTE: Introduced by http://sourceforge.net/p/pmt/code/ci/e1a36a9639e2db16494d90459c7c2b78677a20bf/ (1.7.83) NOTE: Fixed by: http://sourceforge.net/p/pmt/code/ci/a1ce646d00a400fd9ec321ab5cb522f40b7bdfe6/ (1.7.84) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/28/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/28/6 CVE-2015-2157 (The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY ...) {DSA-3190-1 DLA-173-1} - putty 0.63-10 (bug #779488) @@ -21431,7 +21431,7 @@ CVE-2015-8984 (The fnmatch function in the GNU C Library (aka glibc or libc6) be [wheezy] - eglibc 2.13-38+deb7u9 NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=18032 NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/26/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/26/5 CVE-2015-2079 RESERVED CVE-2015-2078 (The SDK for Komodia Redirector with SSL Digestor, as used in Lavasoft ...) @@ -21519,7 +21519,7 @@ CVE-2015-8983 (Integer overflow in the _IO_wstr_overflow function in libio/wstro NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=17269 NOTE: Fixed upstream in 2.22 NOTE: Fixed by: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/22/15 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/22/15 CVE-2015-8477 (Cross-site scripting (XSS) vulnerability in Redmine before 2.6.2 allow ...) - redmine 3.0~20140825-5 (low) [squeeze] - redmine <end-of-life> (Redmine not supported because of rails) @@ -21986,7 +21986,7 @@ CVE-2015-1852 (The s3_token middleware in OpenStack keystonemiddleware before 1. CVE-2015-1851 (OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 ...) {DSA-3292-1} - cinder 2015.1.0+2015.06.16.git26.9634b76ba5-1 (bug #788996) - NOTE: http://www.openwall.com/lists/oss-security/2015/06/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2015/06/13/1 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1231817 NOTE: https://bugs.launchpad.net/cinder/+bug/1415087 CVE-2015-1850 @@ -22614,7 +22614,7 @@ CVE-2015-XXXX [incorrect memory management in Gtk2::Gdk::Display::list_devices] NOTE: CVE needs to be added to data/D[SL]A/list NOTE: https://mail.gnome.org/archives/gtk-perl-list/2015-January/msg00039.html NOTE: https://bugs.mageia.org/show_bug.cgi?id=15173 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/20/14 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/02/20/14 CVE-2015-XXXX [Linux ASLR mmap weakness: Reducing entropy by half] - linux 4.0.2-1 [jessie] - linux 3.16.7-ckt17-1 @@ -22631,7 +22631,7 @@ CVE-2015-2060 (cabextract before 1.6 does not properly check for leading slashes [jessie] - cabextract <no-dsa> (Minor issue) [wheezy] - cabextract <no-dsa> (Minor issue) [squeeze] - cabextract <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/18/3 NOTE: Upstream commit: http://sourceforge.net/p/libmspack/code/217 NOTE: CVE assigned for issue were path traversal occurs because the unpatched NOTE: code does neither of the following: 1) checking for slashes after decoding @@ -22642,7 +22642,7 @@ CVE-2015-2297 (nanohttp in libcsoap allows remote attackers to cause a denial of [squeeze] - libcsoap <no-dsa> (Minor issue) [wheezy] - libcsoap <no-dsa> (Minor issue) NOTE: CVE assigned only for the null pointer dereference, not all issues in - NOTE: http://www.openwall.com/lists/oss-security/2015/02/17/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/17/2 CVE-2015-2091 (The authentication hook (mgs_hook_authz) in mod-gnutls 0.5.10 and earl ...) {DSA-3177-1 DLA-170-1} - mod-gnutls 0.6-1.3 (bug #578663) @@ -22716,7 +22716,7 @@ CVE-2015-1592 (Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro - movabletype-opensource <removed> [squeeze] - movabletype-opensource <end-of-life> (Not supported in Squeeze LTS) NOTE: https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html - NOTE: http://www.openwall.com/lists/oss-security/2015/02/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/12/2 CVE-2015-1572 (Heap-based buffer overflow in closefs.c in the libext2fs library in e2 ...) {DSA-3166-1 DLA-162-1} - e2fsprogs 1.42.12-1.1 (bug #778948) @@ -22772,7 +22772,7 @@ CVE-2015-2305 (Integer overflow in the regcomp implementation in the Henry Spenc NOTE: No security impact in nvi/vigor and openrpt NOTE: http://www.kb.cert.org/vuls/id/695940 NOTE: https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/ - NOTE: http://www.openwall.com/lists/oss-security/2015/02/16/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/16/8 CVE-2015-XXXX [insecure storage of password in the NUT-monitor app] - nut 2.7.2-2 (low; bug #777706) [wheezy] - nut <no-dsa> (Minor issue) @@ -22959,7 +22959,7 @@ CVE-2015-2046 (Cross-site scripting (XSS) vulnerability in MantisBT 1.2.13 and l [squeeze] - mantis <end-of-life> (Unsupported in squeeze-lts) NOTE: Upstream patch: https://github.com/mantisbt/mantisbt/commit/6defeed5 (1.2.x) NOTE: https://www.mantisbt.org/bugs/view.php?id=19301 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/09/10 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/09/10 NOTE: CVE for specific portion of the original May 2014 adm_config_report.php discovery NOTE: that remains present in version 1.2.18 and 1.2.19 CVE-2015-XXXX [fails to detect silent driver failure to change MAC] @@ -22970,17 +22970,17 @@ CVE-2015-9101 (The fill_buffer_resample function in util.c in libmp3lame.a in LA - lame 3.99.5+repack1-6 (bug #777161) [wheezy] - lame 3.99.5+repack1-3+deb7u1 [squeeze] - lame <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/12/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/12/8 CVE-2015-9100 (The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3. ...) - lame 3.99.5+repack1-6 (bug #777160) [wheezy] - lame 3.99.5+repack1-3+deb7u1 [squeeze] - lame <no-dsa> (minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/12/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/12/8 CVE-2015-9099 (The lame_init_params function in lame.c in libmp3lame.a in LAME 3.99.5 ...) - lame 3.99.5+repack1-6 (bug #775959) [wheezy] - lame 3.99.5+repack1-3+deb7u1 [squeeze] - lame <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/12/8 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/12/8 CVE-2015-XXXX [denial of service under memory stress] - libhtp 1:0.5.25-1 (bug #777522) [squeeze] - libhtp <no-dsa> (Minor issue) @@ -22989,11 +22989,11 @@ CVE-2015-XXXX [denial of service under memory stress] CVE-2015-2058 (c2s/c2s.c in Jabber Open Source Server 2.3.2 and earlier truncates dat ...) - jabberd2 2.3.3-1 (bug #779154) NOTE: https://github.com/jabberd2/jabberd2/issues/85 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/09/13 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/09/13 CVE-2015-2059 (The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in ...) {DSA-3578-1 DLA-476-1 DLA-277-1} - libidn 1.31-1 (medium) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/23/25 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/23/25 NOTE: Patch: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c2796581c27213962c77f5a8571a598f9a2e NOTE: This could be attributed to a misuse of a (poorly documented) API NOTE: but since upstream provided a patch it makes more sense to fix @@ -23014,20 +23014,20 @@ CVE-2015-1546 (Double free vulnerability in the get_vrFilter function in servers CVE-2015-2785 (The GIF encoder in Byzanz allows remote attackers to cause a denial of ...) - byzanz <unfixed> (unimportant; bug #778261) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=852481 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/06/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/06/11 NOTE: Only applies to debug recordings, negligable security impact CVE-2015-8837 (Stack-based buffer overflow in the isofs_real_readdir function in isof ...) {DSA-3551-1 DLA-323-1} - fuseiso 20070708-3.2 (bug #779047) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=863091 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=862211 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/06/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/06/7 CVE-2015-8836 (Integer overflow in the isofs_real_read_zf function in isofs.c in Fuse ...) {DSA-3551-1 DLA-323-1} - fuseiso 20070708-3.2 (bug #779047) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=863102 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=861358 - NOTE: http://www.openwall.com/lists/oss-security/2015/02/06/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/06/7 CVE-2015-1547 (The NeXTDecode function in tif_next.c in LibTIFF allows remote attacke ...) {DSA-3273-1 DLA-610-1 DLA-221-1} - tiff 4.0.3-12.1 (bug #777390) @@ -23161,21 +23161,21 @@ CVE-2015-XXXX [Invalid read in ensure_filepath] - cabextract 1.4-5 [wheezy] - cabextract <no-dsa> (Minor issue) [squeeze] - cabextract <no-dsa> (Minor issue) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/03/12 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/02/03/12 NOTE: Starting with 1.4-5 cabextract uses the mspack system library CVE-2015-XXXX [Invalid read in create_output_name] - libmspack 0.5-1 - cabextract 1.4-5 [wheezy] - cabextract <no-dsa> (Minor issue) [squeeze] - cabextract <no-dsa> (Minor issue) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/03/12 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/02/03/12 NOTE: Starting with 1.4-5 cabextract uses the mspack system library CVE-2015-1465 (The IPv4 implementation in the Linux kernel before 3.18.8 does not pro ...) - linux 3.16.7-ckt7-1 [wheezy] - linux <not-affected> (Introduced in 3.16) - linux-2.6 <not-affected> (Introduced in 3.16) NOTE: Upstream patch: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df4d92549f23e1c037e83323aff58a21b3de7fe0 (v3.19-rc7) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/02/2 CVE-2015-1473 (The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka gli ...) {DSA-3169-1 DLA-165-1} - glibc 2.19-15 (bug #777197) @@ -23224,7 +23224,7 @@ CVE-2015-1430 (Buffer overflow in xymon 4.3.17-1. ...) [squeeze] - xymon <not-affected> (Vulnerable code not present) [wheezy] - xymon <not-affected> (Vulnerable code not present) NOTE: Upstream patch: http://sourceforge.net/p/xymon/code/7483/ - NOTE: http://www.openwall.com/lists/oss-security/2015/01/30/17 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/30/17 CVE-2015-1425 (JAKWEB Gecko CMS has Multiple Input Validation Vulnerabilities ...) NOT-FOR-US: JAKWEB Gecko CMS CVE-2015-1424 (Cross-site request forgery (CSRF) vulnerability in Gecko CMS 2.2 and 2 ...) @@ -23241,7 +23241,7 @@ CVE-2015-1589 (Directory traversal vulnerability in arCHMage 0.2.4 allows remote - archmage 1:0.2.4-4 (bug #776164) [squeeze] - archmage <no-dsa> (Minor issue) [wheezy] - archmage <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/12/9 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/12/9 CVE-2015-1419 (Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote at ...) - vsftpd 3.0.2-18 (unimportant; bug #776922) [jessie] - vsftpd 3.0.2-17+deb8u1 @@ -23254,7 +23254,7 @@ CVE-2015-1417 (The inet module in FreeBSD 10.2x before 10.2-PRERELEASE, 10.2-BET NOTE: kfreebsd not covered by security support in Jessie CVE-2015-1416 (Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 ...) - patch 2.5-1 - NOTE: http://www.openwall.com/lists/oss-security/2015/08/02/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/08/02/6 NOTE: CVE assignment applies as well to GNU patch before 2.3 and 2.2.5 CVE-2015-1415 (The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configur ...) NOT-FOR-US: FreeBSD installer @@ -23543,7 +23543,7 @@ CVE-2015-1379 (The signal handler implementations in socat before 1.7.3.0 and 2. - socat 1.7.2.4-2 (bug #776234) [wheezy] - socat <no-dsa> (Minor issue) [squeeze] - socat <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/01/24/6 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/24/6 NOTE: Upstream advisory: http://www.dest-unreach.org/socat/contrib/socat-secadv6.txt CVE-2015-1378 (cmdlineopts.clp in grml-debootstrap in Debian 0.54, 0.68.x before 0.68 ...) - grml-debootstrap 0.68.1 (low; bug #776502) @@ -23556,7 +23556,7 @@ CVE-2015-1395 (Directory traversal vulnerability in GNU patch versions which sup [wheezy] - patch <not-affected> (Support for git-style patches added in 2.7) [squeeze] - patch <not-affected> (Support for git-style patches added in 2.7) NOTE: Upstream report: https://savannah.gnu.org/bugs/?44059 - NOTE: http://www.openwall.com/lists/oss-security/2015/01/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/24/2 CVE-2015-1370 (Incomplete blacklist vulnerability in marked 0.3.2 and earlier for Nod ...) - node-marked 0.3.6+dfsg-1 (unimportant) NOTE: https://nodesecurity.io/advisories/marked_vbscript_injection @@ -24112,18 +24112,18 @@ CVE-2015-1396 (A Directory Traversal vulnerability exists in the GNU patch befor - patch 2.7.3-1 (bug #775901) [wheezy] - patch <not-affected> (Not affected by CVE-2015-1196 and no incomplete fix applied) [squeeze] - patch <not-affected> (Not affected by CVE-2015-1196 and no incomplete fix applied) - NOTE: http://www.openwall.com/lists/oss-security/2015/01/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/24/3 CVE-2015-1353 REJECTED CVE-2015-4471 (Off-by-one error in the lzxd_decompress function in lzxd.c in libmspac ...) - libmspack 0.5-1 (bug #775499) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2015-4470 (Off-by-one error in the inflate function in mszipd.c in libmspack befo ...) - libmspack 0.5-1 (bug #775498) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2015-4472 (Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack befor ...) - libmspack 0.5-1 (bug #775687) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2015-1591 (The kamailio build in kamailio before 4.2.0-2 process allows local use ...) - kamailio 4.2.0-2 (bug #775681) NOTE: https://github.com/kamailio/kamailio/issues/48 @@ -24410,7 +24410,7 @@ CVE-2015-1051 (Open redirect vulnerability in the Context UI module in the Conte CVE-2015-2304 (Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 a ...) {DSA-3180-1 DLA-166-1} - libarchive 3.1.2-11 (bug #778266) - NOTE: http://www.openwall.com/lists/oss-security/2015/01/16/7 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/16/7 NOTE: Patch: https://github.com/libarchive/libarchive/commit/59357157706d47c365b2227739e17daba3607526 CVE-2015-1200 (Race condition in pxz 4.999.99 Beta 3 uses weak file permissions for t ...) - pxz 4.999.99~beta3+git659fc9b-3 (bug #775306) @@ -24709,8 +24709,8 @@ CVE-2015-5700 (mktexlsr revision 22855 through revision 36625 as packaged in tex - texlive-bin 2014.20140926.35254-5 (bug #775139) [wheezy] - texlive-bin <no-dsa> (Minor issue) [squeeze] - texlive-bin <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/23/22 - NOTE: http://www.openwall.com/lists/oss-security/2015/07/28/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/23/22 + NOTE: https://www.openwall.com/lists/oss-security/2015/07/28/5 NOTE: https://www.tug.org/svn/texlive/trunk/Build/source/texk/kpathsea/mktexlsr?r1=19613&r2=22885 CVE-2015-1196 (GNU patch 2.7.1 allows remote attackers to write to arbitrary files vi ...) - patch 2.7.1-7 (bug #775227) @@ -24846,7 +24846,7 @@ CVE-2015-0881 (CRLF injection vulnerability in Squid before 3.1.1 allows remote [squeeze] - squid <no-dsa> (Minor issue) [wheezy] - squid <no-dsa> (Minor issue) - squid3 3.1.1-1 - NOTE: http://www.openwall.com/lists/oss-security/2015/03/01/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/03/01/2 NOTE: Patch: http://www.squid-cache.org/Versions/v3/3.1/changesets/b9619.patch NOTE: https://jvn.jp/en/jp/JVN64455813/index.html CVE-2015-0880 (Buffer overflow in CREAR AL-Mail32 before 1.13d allows remote attacker ...) @@ -25705,13 +25705,13 @@ CVE-2015-1197 (cpio 2.11, when using the --no-absolute-filenames option, allows NOTE: Regression in upstream's handling of patch https://bugs.debian.org/946267 CVE-2015-4469 (The chmd_read_headers function in chmd.c in libmspack before 0.5 does ...) - libmspack 0.4-3 (bug #774726) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2015-4468 (Multiple integer overflows in the search_chunk function in chmd.c in l ...) - libmspack 0.4-3 (bug #774726) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2015-4467 (The chmd_init_decomp function in chmd.c in libmspack before 0.5 does n ...) - libmspack 0.4-3 (bug #774725) - NOTE: http://www.openwall.com/lists/oss-security/2015/02/03/11 + NOTE: https://www.openwall.com/lists/oss-security/2015/02/03/11 CVE-2015-9275 (ARC 5.21q allows directory traversal via a full pathname in an archive ...) - arc 5.21q-6 (low; bug #774527) [stretch] - arc 5.21q-4+deb9u1 @@ -25723,7 +25723,7 @@ CVE-2015-XXXX [saves unknown host's fingerprint in known_hosts without any promp [jessie] - lftp 4.6.0-1+deb8u1 [squeeze] - lftp <no-dsa> (Minor issue) [wheezy] - lftp <no-dsa> (Minor issue) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/03/12/10 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/03/12/10 CVE-2015-0564 (Buffer underflow in the ssl_decrypt_record function in epan/dissectors ...) {DSA-3141-1 DLA-198-1} - wireshark 1.12.1+g01b65bf-3 (bug #776135) @@ -25972,7 +25972,7 @@ CVE-2015-0480 (Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, a - openjdk-8 8u45-b14-1 - openjdk-7 7u79-2.5.5-1 (bug #774953) - openjdk-6 6b35-1.13.7-1 - NOTE: http://www.openwall.com/lists/oss-security/2015/01/16/2 + NOTE: https://www.openwall.com/lists/oss-security/2015/01/16/2 CVE-2015-0479 (Unspecified vulnerability in the XDK and XDB - XML Database component ...) NOT-FOR-US: Oracle CVE-2015-0478 (Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u ...) diff --git a/data/CVE/2016.list b/data/CVE/2016.list index df9a87fe45..3df4bff04f 100644 --- a/data/CVE/2016.list +++ b/data/CVE/2016.list @@ -2066,12 +2066,12 @@ CVE-2016-10252 (Memory leak in the IsOptionMember function in MagickCore/option. CVE-2016-10251 (Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in Jas ...) {DSA-3827-1 DLA-920-1} - jasper <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/11/04/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/04/11 NOTE: https://github.com/mdadams/jasper/commit/1f0dfe5a42911b6880a1445f13f6d615ddb55387 NOTE: https://github.com/asarubbo/poc/blob/master/00029-jasper-uninitvalue-jpc_pi_nextcprl CVE-2016-10248 (The jpc_tsfb_synthesize function in jpc_tsfb.c in JasPer before 1.900. ...) - jasper <removed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2016/10/20/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/20/5 NOTE: Not suitable for code injection, hardly denial of service NOTE: https://github.com/mdadams/jasper/commit/2e82fa00466ae525339754bb3ab0a0474a31d4bd CVE-2016-10247 (Buffer overflow in the my_getline function in jstest_main.c in Mujstes ...) @@ -2079,13 +2079,13 @@ CVE-2016-10247 (Buffer overflow in the my_getline function in jstest_main.c in M [wheezy] - mupdf <not-affected> (Vulnerable code not present) NOTE: Although jstest_main.c compiled during build and mujstest is created NOTE: it is not included in the produced binary packages - NOTE: http://www.openwall.com/lists/oss-security/2016/10/16/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/16/19 CVE-2016-10246 (Buffer overflow in the main function in jstest_main.c in Mujstest in A ...) - mupdf <unfixed> (unimportant) [wheezy] - mupdf <not-affected> (Vulnerable code not present) NOTE: Although jstest_main.c compiled during build and mujstest is created NOTE: it is not included in the produced binary packages - NOTE: http://www.openwall.com/lists/oss-security/2016/10/16/20 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/16/20 CVE-2016-10245 (Insufficient sanitization of the query parameter in templates/html/sea ...) {DLA-1812-1} - doxygen 1.8.12-1 @@ -2252,28 +2252,28 @@ CVE-2016-10197 (The search_make_new function in evdns.c in libevent before 2.1.6 {DSA-3789-1 DLA-824-1} - libevent 2.0.21-stable-3 (bug #854092) NOTE: https://github.com/libevent/libevent/issues/332 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/17 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/17 CVE-2016-10196 (Stack-based buffer overflow in the evutil_parse_sockaddr_port function ...) {DSA-3789-1 DLA-824-1} - libevent 2.0.21-stable-3 (bug #854092) NOTE: https://github.com/libevent/libevent/issues/318 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/17 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/17 CVE-2016-10195 (The name_parse function in evdns.c in libevent before 2.1.6-beta allow ...) {DSA-3789-1 DLA-824-1} - libevent 2.0.21-stable-3 (bug #854092) NOTE: https://github.com/libevent/libevent/issues/317 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/17 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/17 CVE-2016-10199 (The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-p ...) {DSA-3820-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775451 CVE-2016-10198 (The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacpars ...) {DSA-3820-1 DLA-2225-1 DLA-828-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <removed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775450 CVE-2016-XXXX [iio-sensor-proxy: insecure dbus policy] - iio-sensor-proxy 2.0-4 (bug #853951) @@ -2281,19 +2281,19 @@ CVE-2016-10192 (Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10 - ffmpeg 7:3.2.2-1 - libav <not-affected> (Vulnerable code not present in libav, only in ffmpeg) NOTE: Patch: https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/12 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/12 CVE-2016-10191 (Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before 2 ...) {DLA-1611-1} - ffmpeg 7:3.2.2-1 - libav <removed> NOTE: Patch: https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/12 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/12 CVE-2016-10190 (Heap-based buffer overflow in libavformat/http.c in FFmpeg before 2.8. ...) {DLA-1611-1} - ffmpeg 7:3.2.2-1 - libav <removed> NOTE: Patch: https://github.com/FFmpeg/FFmpeg/commit/2a05c8f813de6f2278827734bf8102291e7484aa - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/12 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/12 CVE-2016-10193 (The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to e ...) NOT-FOR-US: espeak-ruby Ruby gem CVE-2016-10194 (The festivaltts4r gem for Ruby allows remote attackers to execute arbi ...) @@ -2329,7 +2329,7 @@ CVE-2016-10189 (BitlBee before 3.5 allows remote attackers to cause a denial of - bitlbee 3.5-1 NOTE: https://bugs.bitlbee.org/ticket/1282 NOTE: Fixed by: https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f (3.5) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/30/4 NOTE: When fixing this CVE make sure to apply as well NOTE: https://github.com/bitlbee/bitlbee/commit/30d598ce7cd3f136ee9d7097f39fa9818a272441 NOTE: to not open CVE-2017-5668 @@ -2338,14 +2338,14 @@ CVE-2016-10188 (Use-after-free vulnerability in bitlbee-libpurple before 3.5 all - bitlbee 3.5-1 NOTE: https://bugs.bitlbee.org/ticket/1281 NOTE: Fixed by: https://github.com/bitlbee/bitlbee/commit/ea902752503fc5b356d6513911081ec932d804f2 (3.5) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/30/4 CVE-2016-10187 (The E-book viewer in calibre before 2.75 allows remote attackers to re ...) {DLA-859-1} - calibre 2.75.1+dfsg-1 (low; bug #853004) [jessie] - calibre <no-dsa> (Minor issue) NOTE: Upstream report: https://launchpad.net/bugs/1651728 NOTE: Upstream fix: https://github.com/kovidgoyal/calibre/commit/3a89718664cb8cce0449d1758eee585ed0d0433c - NOTE: http://www.openwall.com/lists/oss-security/2017/01/29/8 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/29/8 CVE-2016-10173 (Directory traversal vulnerability in the minitar before 0.6 and archiv ...) {DSA-3778-1 DLA-808-1} - ruby-minitar 0.5.4-3.1 (bug #853075) @@ -2382,7 +2382,7 @@ CVE-2016-10166 (Integer underflow in the _gdContributionsAlloc function in gd_in - libgd2 2.2.4-1 [wheezy] - libgd2 <not-affected> (Vulnerable code not present) NOTE: https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/26/1 CVE-2016-10167 (The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Li ...) {DSA-3777-1 DLA-804-1} - php7.1 7.1.1-1 (unimportant) @@ -2393,7 +2393,7 @@ CVE-2016-10167 (The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graph NOTE: Fixed in PHP 7.1.1, 7.0.15, 5.6.30 - libgd2 2.2.4-1 NOTE: https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f - NOTE: http://www.openwall.com/lists/oss-security/2017/01/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/26/1 CVE-2016-10168 (Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) bef ...) {DSA-3777-1 DLA-804-1} - php7.1 7.1.1-1 (unimportant) @@ -2404,7 +2404,7 @@ CVE-2016-10168 (Integer overflow in gd_io.c in the GD Graphics Library (aka libg NOTE: Fixed in PHP 7.1.1, 7.0.15, 5.6.30 - libgd2 2.2.4-1 NOTE: https://github.com/libgd/libgd/commit/69d2fd2c597ffc0c217de1238b9bf4d4bceba8e6 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/26/1 CVE-2016-10165 (The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) all ...) {DSA-3774-1 DLA-803-1} - lcms2 2.8-4 (bug #852627) @@ -2414,7 +2414,7 @@ CVE-2016-10164 (Multiple integer overflows in libXpm before 3.5.12, when a progr {DSA-3772-1 DLA-801-1} - libxpm 1:3.5.12-1 NOTE: Fixed by: https://cgit.freedesktop.org/xorg/lib/libXpm/commit/?id=d1167418f0fd02a27f617ec5afd6db053afbe185 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/22/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/22/2 CVE-2016-10163 (Memory leak in the vrend_renderer_context_create_internal function in ...) - virglrenderer 0.6.0-1 (bug #852603) NOTE: https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7 (0.6.0) @@ -2530,7 +2530,7 @@ CVE-2016-10146 (Multiple memory leaks in the caption and label handling code in {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.0+dfsg-2 (bug #851380) NOTE: https://github.com/ImageMagick/ImageMagick/commit/aeff00de228bc5a158c2a975ab47845d8a1db456 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 CVE-2016-10140 (Information disclosure and authentication bypass vulnerability exists ...) {DLA-806-1} - zoneminder 1.30.4+dfsg-1 (bug #851710) @@ -2541,12 +2541,12 @@ CVE-2016-10144 (coders/ipl.c in ImageMagick allows remote attackers to have unsp {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851485) NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 CVE-2016-10145 (Off-by-one error in coders/wpg.c in ImageMagick allows remote attacker ...) {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851483) NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/d23beebe7b1179fb75db1e85fbca3100e49593d9 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 CVE-2016-10141 (An integer overflow vulnerability was observed in the regemit function ...) NOT-FOR-US: MuJS CVE-2016-10133 (Heap-based buffer overflow in the js_stackoverflow function in jsrun.c ...) @@ -2588,7 +2588,7 @@ CVE-2016-10127 (PySAML2 allows remote attackers to conduct XML external entity ( NOTE: https://github.com/rohe/pysaml2/issues/366 NOTE: A proper fix for this issue would be to fix the underlying issue in src:libxml2 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1411794#c12 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/19/5 (for the scope of the CVE) + NOTE: https://www.openwall.com/lists/oss-security/2017/01/19/5 (for the scope of the CVE) CVE-2016-10149 (XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier a ...) {DSA-3759-1} - python-pysaml2 3.0.0-5 (bug #850716) @@ -2598,7 +2598,7 @@ CVE-2016-10134 (SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 befo {DSA-3802-1} - zabbix 1:3.0.4+dfsg-1 (bug #850936) NOTE: https://support.zabbix.com/browse/ZBX-11023 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/12/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/12/4 CVE-2016-10124 (An issue was discovered in Linux Containers (LXC) before 2016-02-22. W ...) - lxc 1:2.0.0-1 [jessie] - lxc <no-dsa> (Minor issue) @@ -2607,35 +2607,35 @@ CVE-2016-10124 (An issue was discovered in Linux Containers (LXC) before 2016-02 NOTE: https://github.com/lxc/lxc/commit/5eacdc3dbd0e45abf3cc90cf0216a7f8ee560abf (lxc-2.0.0.rc2) CVE-2016-10123 (Firejail allows --chroot when seccomp is not supported, which might al ...) - firejail 0.9.38-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/a23ac1bf390fa4c3db4ea31e6ee6100a9c511d59 (0.9.38-rc1) CVE-2016-10122 (Firejail does not properly clean environment variables, which allows l ...) - firejail 0.9.44.2-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/3b81e1f2c331644ced87d26a943b22eed6242b8f NOTE: https://github.com/netblue30/firejail/commit/72bc0e145c67da24e555d868086953148c52b5fc NOTE: In 0.9.44-bugfixes: https://github.com/netblue30/firejail/commit/e847207df28e181a8f590ade825b5f06d4fadf17 (0.9.44.2) NOTE: In 0.9.44-bugfixes: https://github.com/netblue30/firejail/commit/18f6e9dc9b304f7aca291c3edce5122562b1e36c (0.9.44.2) CVE-2016-10121 (Firejail uses weak permissions for /dev/shm/firejail and possibly othe ...) - firejail 0.9.38-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/1cab02f5ae3c90c01fae4d1c16381820b757a3a6 (0.9.38) CVE-2016-10120 (Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, ( ...) - firejail 0.9.38-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/cd0ecfc7a7b30abde20db6dea505cd8c58e7c046 (0.9.38-rc1) CVE-2016-10119 (Firejail uses 0777 permissions when mounting /tmp, which allows local ...) - firejail 0.9.38-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/aa28ac9e09557b833f194f594e2940919d940d1f (0.9.38) CVE-2016-10118 (Firejail allows local users to truncate /etc/resolv.conf via a chroot ...) - firejail 0.9.44.2-1 (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/6144229605177764b7f3f3450c1a47f56595dc9e NOTE: In 0.9.44-bugfixes: https://github.com/netblue30/firejail/commit/8b5b444c766b8d0592346decc6ed4a6d345e4f67 (0.9.44.2) CVE-2016-10117 (Firejail does not restrict access to --tmpfs, which allows local users ...) - firejail 0.9.38-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/4 NOTE: https://github.com/netblue30/firejail/commit/678cd1495457318dad39178bb646ba1b96332ddb (0.9.38-rc1) CVE-2016-10116 (NETGEAR Arlo base stations with firmware 1.7.5_6178 and earlier, Arlo ...) NOT-FOR-US: NETGEAR @@ -2678,7 +2678,7 @@ CVE-2016-10109 (Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a - pcsc-lite 1.8.20-1 NOTE: https://anonscm.debian.org/cgit/pcsclite/PCSC.git/commit/?id=697fe05967af7ea215bcd5d5774be587780c9e22 NOTE: https://anonscm.debian.org/cgit/pcsclite/PCSC.git/commit/?id=3aaab9d998b5deb16a246cc7517e44144d281d3b - NOTE: http://www.openwall.com/lists/oss-security/2017/01/03/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/03/2 CVE-2016-10098 (An issue was discovered on SendQuick Entera and Avera devices before 2 ...) NOT-FOR-US: SendQuick Entera and Avera devices CVE-2016-10097 (XML External Entity (XXE) Vulnerability in /SSOPOST/metaAlias/%realm%/ ...) @@ -2786,8 +2786,8 @@ CVE-2016-10040 (Stack-based buffer overflow in QXmlSimpleReader in Qt 4.8.5 allo [jessie] - qt4-x11 <ignored> (Minor issue) [wheezy] - qt4-x11 <ignored> (Minor issue) - qtbase-opensource-src 5.2.0+dfsg-7 - NOTE: CVE assignment specific to http://www.openwall.com/lists/oss-security/2016/12/24/2 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/24/1 + NOTE: CVE assignment specific to https://www.openwall.com/lists/oss-security/2016/12/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/24/1 NOTE: https://github.com/qt/qtbase/commit/f1053d94f59f053ce4acad9320df14f1fbe4faac CVE-2016-10039 (Directory traversal in /connectors/index.php in MODX Revolution before ...) NOT-FOR-US: MODX Revolution @@ -2812,7 +2812,7 @@ CVE-2016-10033 (The mailSend function in the isMail transport in PHPMailer befor - libphp-phpmailer 5.2.14+dfsg-2.1 (bug #849365) NOTE: https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html NOTE: Fixed by: https://github.com/PHPMailer/PHPMailer/commit/4835657cd639fbd09afd33307cef164edf807cdc#diff-ace81e501931d8763b49f2410cf3094dR1449 - NOTE: Fix potentially incomplete, cf http://www.openwall.com/lists/oss-security/2016/12/28/1 + NOTE: Fix potentially incomplete, cf https://www.openwall.com/lists/oss-security/2016/12/28/1 NOTE: When updating libphp-phpmailer for CVE-2016-10033 make sure to apply the NOTE: complete patch to not make libphp-phpmailer affected by CVE-2016-10045. NOTE: https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html @@ -2862,7 +2862,7 @@ CVE-2016-10026 (ikiwiki 3.20161219 does not properly check if a revision changes - ikiwiki 3.20161219 NOTE: http://ikiwiki.info/bugs/rcs_revert_can_bypass_authorization_if_affected_files_were_renamed/ NOTE: Fix: http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=9cada49ed6ad24556dbe9861ad5b0a9f526167f9 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/7 NOTE: When fixing this issue make sure to apply the complete correct fix to NOTE: not open ikiwiki to be vulnerable for CVE-2016-9645. CVE-2016-10025 (VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD v ...) @@ -2880,7 +2880,7 @@ CVE-2016-10028 (The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c [wheezy] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-12/msg01903.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/1 NOTE: Marked as unimportant, since 1:2.8+dfsg-2 reverted the support for NOTE: virtio gpu (virglrenderer) and opengl, but the affected code is NOTE: still present. @@ -2892,7 +2892,7 @@ CVE-2016-10029 (The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=acfc4846508a02cc4c83aa27799fd7 (v2.7.0-rc0) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=2fe760554eb3769d70f608a158474f (v2.7.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/2 CVE-2016-9999 RESERVED CVE-2016-9996 @@ -2973,7 +2973,7 @@ CVE-2016-9954 (The backtrack compilation code in the Irregex package (aka IrRegu [stretch] - chicken <no-dsa> (Minor issue) [jessie] - chicken <no-dsa> (Minor issue) [wheezy] - chicken <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/14/18 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/14/18 NOTE: https://github.com/ashinn/irregex/commit/a16ffc86eca15fca9e40607d41de3cea9cf868f1 NOTE: For chicken vulnerable code in ./irregex-core.scm CVE-2016-9953 (The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30 ...) @@ -3047,7 +3047,7 @@ CVE-2016-10003 (Incorrect HTTP Request header comparison in Squid HTTP Proxy 3.5 NOTE: Vulnerable Squid Versions: NOTE: 3.5.0.1 up to and including 3.5.22 NOTE: 4.0.1 up to and including 4.0.16 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/17/1 CVE-2016-10002 (Incorrect processing of responses to If-None-Modified HTTP conditional ...) {DSA-3745-1 DLA-763-1} - squid3 3.5.23-1 (bug #848493) @@ -3063,7 +3063,7 @@ CVE-2016-10002 (Incorrect processing of responses to If-None-Modified HTTP condi NOTE: 3.1.10 up to and including 3.1.23 NOTE: 3.2.0.3 up to and including 3.5.22 NOTE: 4.0.1 up to and including 4.0.16 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/17/1 CVE-2016-582384 REJECTED CVE-2016-9964 (redirect() in bottle.py in bottle 0.12.10 doesn't filter a "\r\n" sequ ...) @@ -3075,37 +3075,37 @@ CVE-2016-9963 (Exim before 4.87.1 might allow remote attackers to obtain the pri {DSA-3747-1 DLA-762-1} - exim4 4.88~RC6-2 NOTE: https://bugs.exim.org/show_bug.cgi?id=1996 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/16/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/16/1 NOTE: https://exim.org/static/doc/CVE-2016-9963.txt CVE-2016-9961 (game-music-emu before 0.6.1 mishandles unspecified integer values. ...) {DSA-3735-1 DLA-750-1} - game-music-emu 0.6.0-4 (bug #848071) NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/15/1 CVE-2016-9960 (game-music-emu before 0.6.1 allows local users to cause a denial of se ...) {DSA-3735-1 DLA-750-1} - game-music-emu 0.6.0-4 (bug #848071) NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/15/1 CVE-2016-9959 (game-music-emu before 0.6.1 allows remote attackers to generate out of ...) {DSA-3735-1 DLA-750-1} - game-music-emu 0.6.0-4 (bug #848071) NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/15/1 CVE-2016-9958 (game-music-emu before 0.6.1 allows remote attackers to write to arbitr ...) {DSA-3735-1 DLA-750-1} - game-music-emu 0.6.0-4 (bug #848071) NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/15/1 CVE-2016-9957 (Stack-based buffer overflow in game-music-emu before 0.6.1. ...) {DSA-3735-1 DLA-750-1} - game-music-emu 0.6.0-4 (bug #848071) NOTE: http://scarybeastsecurity.blogspot.de/2016/12/redux-compromising-linux-using-snes.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/15/1 CVE-2016-9956 (The route manager in FlightGear before 2016.4.4 allows remote attacker ...) {DSA-3742-1} - flightgear 1:2016.4.3+dfsg-1 (bug #848114) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/14/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/14/11 CVE-2016-9951 (An issue was discovered in Apport before 2.20.4. A malicious Apport cr ...) NOT-FOR-US: Apport CVE-2016-9950 (An issue was discovered in Apport before 2.20.4. There is a path trave ...) @@ -3146,7 +3146,7 @@ CVE-2016-9955 (The SimpleSAML_XML_Validator class constructor in SimpleSAMLphp b [jessie] - simplesamlphp <no-dsa> (Minor issue) NOTE: https://simplesamlphp.org/security/201612-02 NOTE: https://github.com/simplesamlphp/simplesamlphp/commit/a2326d75dd14accaac162dd2cb30aaefcc1f9205 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/14/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/14/7 CVE-2016-9939 (Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its A ...) {DSA-3748-1 DLA-766-1} - libcrypto++ 5.6.4-5 (bug #848009) @@ -3174,7 +3174,7 @@ CVE-2016-9936 (The unserialize implementation in ext/standard/var.c in PHP 7.x b NOTE: Fixed in PHP 7.0.14 and 7.1.0 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72978 NOTE: Fixed by: https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9935 (The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5. ...) {DSA-3737-1 DLA-818-1} - php7.0 7.0.14-1 @@ -3182,7 +3182,7 @@ CVE-2016-9935 (The php_wddx_push_element function in ext/wddx/wddx.c in PHP befo NOTE: Fixed in PHP 5.6.29 and 7.0.14 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73631 NOTE: Fixed by: https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9934 (ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remo ...) {DSA-3732-1 DLA-818-1} - php7.0 7.0.13-1 @@ -3190,7 +3190,7 @@ CVE-2016-9934 (ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows NOTE: Fixed in PHP 5.6.28, 7.0.13 and 7.1.0 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73331 NOTE: Fixed by: https://github.com/php/php-src/commit/6045de69c7dedcba3eadf7c4bba424b19c81d00d - NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9933 (Stack consumption vulnerability in the gdImageFillToBorder function in ...) {DSA-3751-1 DSA-3732-1 DLA-758-1} - libgd2 2.2.2-29-g3c2b605-1 (bug #849038) @@ -3205,7 +3205,7 @@ CVE-2016-9933 (Stack consumption vulnerability in the gdImageFillToBorder functi NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72696 NOTE: Fixed by: https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd - NOTE: http://www.openwall.com/lists/oss-security/2016/12/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/12/2 CVE-2016-9937 (An issue was discovered in Asterisk Open Source 13.12.x and 13.13.x be ...) - asterisk <not-affected> (Introduced in 13.12.0 but fixed with first version to unstable based on 13.12.1) NOTE: Vulnerability introduced in 13.12.0, but the first upload to unstable @@ -3411,7 +3411,7 @@ CVE-2016-9912 (Quick Emulator (Qemu) built with the Virtio GPU Device emulator s [wheezy] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05043.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/12 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/12 CVE-2016-9916 (Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows ...) {DLA-1497-1} - qemu 1:2.8+dfsg-1 (bug #847496) @@ -3421,7 +3421,7 @@ CVE-2016-9916 (Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) al NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=898ae90a44551d25b8e956fd87372d303c82fe68 (v2.8.0-rc2) NOTE: Proxy filesystem driver introduced in: http://git.qemu.org/?p=qemu.git;a=commit;h=4c793dda22213a7aba8e4d9a814e8f368a5f8bf7 (v1.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/11 CVE-2016-9915 (Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows ...) {DLA-1497-1} - qemu 1:2.8+dfsg-1 (bug #847496) @@ -3431,7 +3431,7 @@ CVE-2016-9915 (Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) a NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=971f406b77a6eb84e0ad27dcc416b663765aee30 (v2.8.0-rc2) NOTE: handle based fs driver introduced in: http://git.qemu.org/?p=qemu.git;a=commit;h=5f5422258e1f50f871bafcc5bfb2b498f414a310 (v1.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/11 NOTE: proxy driver not included during compilation in wheezy, see debian-lts ML: https://lists.debian.org/debian-lts/2016/12/msg00136.html CVE-2016-9914 (Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local ...) {DLA-1497-1} @@ -3441,7 +3441,7 @@ CVE-2016-9914 (Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows l [wheezy] - qemu-kvm <no-dsa> (proxy and handle drivers not included during compilation) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=702dbcc274e2ca43be20ba64c758c0ca57dab91d (v2.8.0-rc2) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/11 NOTE: proxy and handle drivers not included during compilation in wheezy, so the cleanup function is never implemented: NOTE: see debian-lts ML: https://lists.debian.org/debian-lts/2016/12/msg00136.html CVE-2016-9913 (Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p ...) @@ -3451,13 +3451,13 @@ CVE-2016-9913 (Memory leak in the v9fs_device_unrealize_common function in hw/9p - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg03278.html NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=4774718e5c194026ba5ee7a28d9be49be3080e42 (v2.8.0-rc2) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/11 CVE-2016-9911 (Quick Emulator (Qemu) built with the USB EHCI Emulation support is vul ...) {DLA-1497-1 DLA-765-1 DLA-764-1} - qemu 1:2.8+dfsg-1 (bug #847951) - qemu-kvm <removed> NOTE: http://git.qemu.org/?p=qemu.git;a=commitdiff;h=791f97758e223de3290592d169f (v2.8.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/10 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/10 CVE-2016-9907 (Quick Emulator (Qemu) built with the USB redirector usb-guest support ...) {DLA-1497-1} - qemu 1:2.8+dfsg-1 (bug #847953) @@ -3466,7 +3466,7 @@ CVE-2016-9907 (Quick Emulator (Qemu) built with the USB redirector usb-guest sup [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg01379.html NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=07b026fd82d6cf11baf7d7c603c4f5f6070b35bf - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/3 NOTE: Leakage introduced after 1.2.50: http://git.qemu.org/?p=qemu.git;a=commit;h=fc3f6e1b106abcf6b8cf487ac8f8e5fc2fd86776 CVE-2016-9908 (Quick Emulator (Qemu) built with the Virtio GPU Device emulator suppor ...) - qemu 1:2.8+dfsg-1 (bug #847400) @@ -3474,7 +3474,7 @@ CVE-2016-9908 (Quick Emulator (Qemu) built with the Virtio GPU Device emulator s [wheezy] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: http://lists.gnu.org/archive/html/qemu-devel/2016-11/msg00059.html - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/2 CVE-2016-9920 (steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2 ...) {DLA-737-1} - roundcube 1.2.3+dfsg.1-1 (bug #847287) @@ -3487,14 +3487,14 @@ CVE-2016-9910 (The serializer in html5lib before 0.99999999 might allow remote a [wheezy] - html5lib <no-dsa> (Minor issue) NOTE: Fixed by: https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7 NOTE: https://www.sourceclear.com/registry/security/cross-site-scripting-xss-/python/sid-3068 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/5 CVE-2016-9909 (The serializer in html5lib before 0.99999999 might allow remote attack ...) - html5lib 0.999999999-1 [jessie] - html5lib <no-dsa> (Minor issue) [wheezy] - html5lib <no-dsa> (Minor issue) NOTE: Fixed by: https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7 NOTE: https://www.sourceclear.com/registry/security/cross-site-scripting-xss-/python/sid-3068 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/06/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/06/5 CVE-2016-9839 (In MapServer before 7.0.3, OGR driver error messages are too verbose a ...) {DLA-734-1} - mapserver 7.0.3-1 @@ -3632,8 +3632,8 @@ CVE-2016-9844 (Buffer overflow in the zi_short function in zipinfo.c in Info-Zip - unzip 6.0-21 (bug #847486) [jessie] - unzip 6.0-16+deb8u3 NOTE: https://launchpad.net/bugs/1643750 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/05/13 - NOTE: Proposed patch in http://www.openwall.com/lists/oss-security/2016/12/05/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/05/13 + NOTE: Proposed patch in https://www.openwall.com/lists/oss-security/2016/12/05/19 CVE-2016-XXXX [tiffcrop: divide-by-zero in readSeparateStripsIntoBuffer when BitsPerSample is missing] - tiff 4.0.7-2 (unimportant; bug #846838) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2619 @@ -3751,7 +3751,7 @@ CVE-2016-9814 (The validateSignature method in the SAML2\Utils class in SimpleSA NOTE: https://github.com/simplesamlphp/saml2/pull/81 NOTE: https://github.com/simplesamlphp/saml2/commit/7008b0916426212c1cc2fc238b38ab9ebff0748c NOTE: only exploitable in hard to achieve conditions - NOTE: http://www.openwall.com/lists/oss-security/2016/12/03/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/03/5 CVE-2016-9754 (The ring_buffer_resize function in kernel/trace/ring_buffer.c in the p ...) - linux 4.6.1-1 [jessie] - linux 3.16.39-1 @@ -3946,7 +3946,7 @@ CVE-2016-9775 (The postrm script in the tomcat6 package before 6.0.45+dfsg-1~deb NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API - tomcat6 6.0.41-3 NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie - NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/02/5 CVE-2016-9774 (The postinst script in the tomcat6 package before 6.0.45+dfsg-1~deb7u4 ...) {DSA-3739-1 DSA-3738-1 DLA-753-1 DLA-746-1} - tomcat8 8.5.8-2 (bug #845393) @@ -3954,7 +3954,7 @@ CVE-2016-9774 (The postinst script in the tomcat6 package before 6.0.45+dfsg-1~d NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API - tomcat6 6.0.41-3 NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie - NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/02/5 CVE-2016-9777 (KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does ...) - linux 4.8.15-1 [jessie] - linux <not-affected> (Vulnerable code introduced later) @@ -3962,7 +3962,7 @@ CVE-2016-9777 (KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1400804 NOTE: Fixed by: https://git.kernel.org/linus/81cdb259fb6d8c1c4ecfeea389ff5a73c07f5755 (v4.9-rc7) NOTE: Introduced in: https://git.kernel.org/linus/af1bae5497b98cb99d6b0492e6981f060420a00c (v4.8-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/02/2 CVE-2016-9776 (QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Contro ...) {DLA-1497-1} - qemu 1:2.8+dfsg-1 (bug #846797) @@ -4066,7 +4066,7 @@ CVE-2016-9772 (OpenAFS 1.6.19 and earlier allows remote attackers to obtain sens NOTE: https://www.openafs.org/pages/security/OPENAFS-SA-2016-003.txt NOTE: Upstream patch: https://www.openafs.org/pages/security/openafs-sa-2016-003-master.patch (master) NOTE: Upstream patch: https://www.openafs.org/pages/security/openafs-sa-2016-003.patch - NOTE: http://www.openwall.com/lists/oss-security/2016/12/01/12 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/01/12 CVE-2016-9685 (Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the ...) - linux 4.5.1-1 [jessie] - linux 3.16.36-1 @@ -4085,7 +4085,7 @@ CVE-2016-9646 (ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder CVE-2016-9643 (The regex code in Webkit 2.4.11 allows remote attackers to cause a den ...) - webkitgtk 2.14.6-1 (unimportant) NOTE: Not covered by security support - NOTE: http://www.openwall.com/lists/oss-security/2016/11/26/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/26/2 CVE-2016-9642 (JavaScriptCore in WebKit allows attackers to cause a denial of service ...) - webkitgtk <removed> (unimportant) NOTE: Not covered by security support @@ -4151,7 +4151,7 @@ CVE-2016-9603 (A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx - xen 4.4.0-1 NOTE: Xen switched to qemu-system in 4.4.0-1 NOTE: https://xenbits.xen.org/xsa/advisory-211.html - NOTE: http://www.openwall.com/lists/oss-security/2017/03/14/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/14/2 NOTE: Upstream patch http://git.qemu-project.org/?p=qemu.git;a=commit;h=50628d3479e4f9aa97e323506856e394fe7ad7a6 CVE-2016-9602 (Qemu before version 2.9 is vulnerable to an improper link following wh ...) {DLA-1497-1 DLA-1035-1 DLA-965-1} @@ -4159,7 +4159,7 @@ CVE-2016-9602 (Qemu before version 2.9 is vulnerable to an improper link followi - qemu-kvm <removed> NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1413929 NOTE: The original proposed patch does not fix the issue, cf. - NOTE: http://www.openwall.com/lists/oss-security/2017/01/17/14 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/17/14 NOTE: Upstream patchset: https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06225.html NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1035 NOTE: If fixing this issue for older suites, then make sure not to open the @@ -4228,7 +4228,7 @@ CVE-2016-9584 (libical allows remote attackers to cause a denial of service (use - libical <removed> (bug #852034) [stretch] - libical <ignored> (Minor issue) [jessie] - libical <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/15/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/15/5 NOTE: Upstream ticket: https://github.com/libical/libical/issues/253 CVE-2016-9583 (An out-of-bounds heap read vulnerability was found in the jpc_pi_nextp ...) - jasper <removed> (unimportant) @@ -4336,7 +4336,7 @@ CVE-2016-9562 (SAP NetWeaver AS JAVA 7.4 allows remote attackers to cause a Deni NOT-FOR-US: SAP CVE-2016-9561 (The che_configure function in libavcodec/aacdec_template.c in FFmpeg b ...) - ffmpeg 7:3.2.4-1 (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2016/12/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/08/1 NOTE: non-issue, legitimate media file. If a server application uses libav* on untrusted media NOTE: files, it needs to set resource limits CVE-2016-9554 (The Sophos Web Appliance Remote / Secure Web Gateway server (version 4 ...) @@ -4555,7 +4555,7 @@ CVE-2016-9866 (An issue was discovered in phpMyAdmin. When the arg_separator is CVE-2016-9639 (Salt before 2015.8.11 allows deleted minions to read or write to minio ...) - salt 2016.3.0+ds-1 [jessie] - salt <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/11/25/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/25/2 CVE-2016-9813 (The _parse_pat function in the mpegts parser in GStreamer before 1.10. ...) {DSA-3818-1} - gst-plugins-bad1.0 1.10.2-1 (low) @@ -4796,7 +4796,7 @@ CVE-2016-9928 (MCabber before 1.0.4 is vulnerable to roster push attacks, which - mcabber 0.10.2-1.1 (bug #845258) NOTE: https://bitbucket.org/McKael/mcabber-crew/commits/6e1ead98930d7dd0a520ad17c720ae4908429033/raw NOTE: Similar issue for mcabber as for gajim in CVE-2015-8688 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/09/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/09/5 CVE-2016-XXXX [Rorster vulnerability similar to CVE-2015-8688] - slixmpp 1.2.2-1 NOTE: Similar issue for mcabber as for gajim in CVE-2015-8688 (but should get a seprate CVE) @@ -4817,19 +4817,19 @@ CVE-2016-10071 (coders/mat.c in ImageMagick before 6.9.4-0 allows remote attacke NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545366 NOTE: https://github.com/ImageMagick/ImageMagick/issues/131 NOTE: https://github.com/ImageMagick/ImageMagick/commit/f3b483e8b054c50149912523b4773687e18afe25 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10070 (Heap-based buffer overflow in the CalcMinMax function in coders/mat.c ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845246) NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545366 NOTE: https://github.com/ImageMagick/ImageMagick/issues/131 NOTE: https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10069 (coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845244) NOTE: https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-9559 (coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.5+dfsg-1 (bug #845243) @@ -4853,46 +4853,46 @@ CVE-2016-10068 (The MSL interpreter in ImageMagick before 6.9.6-4 allows remote - imagemagick 8:6.9.6.5+dfsg-1 (bug #845241) NOTE: https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30797 NOTE: https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10058 (Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagi ...) - imagemagick 8:6.9.6.5+dfsg-1 (bug #845239) [jessie] - imagemagick <not-affected> (Vulnerable code using layer_info[i].info introduced later) [wheezy] - imagemagick <not-affected> (Vulnerable code using layer_info[i].info introduced later) NOTE: https://github.com/ImageMagick/ImageMagick/commit/4ec444f4eab88cf4bec664fafcf9cab50bc5ff6a - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10067 (magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845213) NOTE: https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10066 (Buffer overflow in the ReadVIFFImage function in coders/viff.c in Imag ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845213) NOTE: https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10065 (The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0. ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845212) NOTE: https://github.com/ImageMagick/ImageMagick/issues/129 NOTE: https://github.com/ImageMagick/ImageMagick/commit/134463b926fa965571aa4febd61b810be5e7da05 NOTE: https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1545183 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10064 (Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845202) NOTE: https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10063 (Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845198) NOTE: https://github.com/ImageMagick/ImageMagick/commit/2bb6941a2d557f26a2f2049ade466e118eeaab91 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10062 (The ReadGROUP4Image function in coders/tiff.c in ImageMagick does not ...) {DSA-3799-1 DLA-868-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #849439) NOTE: https://github.com/ImageMagick/ImageMagick/issues/196 NOTE: https://github.com/ImageMagick/ImageMagick/issues/352 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 NOTE: CVE is for the fwrite issue in ReadGROUP4Image. This was NOTE: specifically noted at the beginning of issues/196, but not fixed in NOTE: either of these commits 933e96f01a8c889c7bf5ffd30020e86a02a046e7 nor @@ -4904,19 +4904,19 @@ CVE-2016-10061 (The ReadGROUP4Image function in coders/tiff.c in ImageMagick bef - imagemagick 8:6.9.6.2+dfsg-2 (bug #845196) NOTE: https://github.com/ImageMagick/ImageMagick/commit/4e914bbe371433f0590cefdf3bd5f3a5710069f9 NOTE: https://github.com/ImageMagick/ImageMagick/issues/196 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10060 (The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagi ...) {DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845196) [jessie] - imagemagick <not-affected> (Vulnerable code not present) NOTE: https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7 NOTE: https://github.com/ImageMagick/ImageMagick/issues/196 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10059 (Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows ...) {DSA-3726-1 DLA-756-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #845195) NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/58cf5bf4fade82e3b510e8f3463a967278a3e410 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-9448 (The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attacke ...) - tiff <not-affected> (Vulnerable code introduced by fix for CVE-2016-9297) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2593 @@ -5121,23 +5121,23 @@ CVE-2016-9452 (The transliterate mechanism in Drupal 8.x before 8.2.3 allows rem - drupal8 <itp> (bug #756305) - drupal7 <not-affected> (Only affects Drupal 8) NOTE: https://www.drupal.org/SA-CORE-2016-005 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/18/8 CVE-2016-9451 (Confirmation forms in Drupal 7.x before 7.52 make it easier for remote ...) {DSA-3718-1 DLA-715-1} - drupal7 7.52-1 NOTE: https://www.drupal.org/SA-CORE-2016-005 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/18/8 CVE-2016-9450 (The user password reset form in Drupal 8.x before 8.2.3 allows remote ...) - drupal8 <itp> (bug #756305) - drupal7 <not-affected> (Only affects Drupal 8) NOTE: https://www.drupal.org/SA-CORE-2016-005 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/18/8 CVE-2016-9449 (The taxonomy module in Drupal 7.x before 7.52 and 8.x before 8.2.3 mig ...) {DSA-3718-1 DLA-715-1} - drupal8 <itp> (bug #756305) - drupal7 7.52-1 NOTE: https://www.drupal.org/SA-CORE-2016-005 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/18/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/18/8 CVE-2016-9443 (An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3 ...) - w3m 0.5.3-30 [jessie] - w3m 0.5.3-19+deb8u1 @@ -5376,7 +5376,7 @@ CVE-2016-9400 (The CClient::ProcessServerPacket method in engine/client/client.c [wheezy] - teeworlds <end-of-life> (Games are not supported in Wheezy) NOTE: https://www.teeworlds.com/?page=news&id=12086 NOTE: https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62 (0.6.4-release) - NOTE: http://www.openwall.com/lists/oss-security/2016/11/16/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/16/8 CVE-2016-9321 RESERVED CVE-2016-9320 @@ -5504,13 +5504,13 @@ CVE-2016-9447 (The ROM mappings in the NSF decoder in gstreamer 0.10.x allow rem NOTE: http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html CVE-2016-9299 (The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allow ...) - jenkins <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/11/12/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/12/4 CVE-2016-9298 (Heap overflow in the WaveletDenoiseImage function in MagickCore/fx.c i ...) - imagemagick 8:6.9.6.5+dfsg-1 (bug #844211) [jessie] - imagemagick <not-affected> (Vulnerable code not present) [wheezy] - imagemagick <not-affected> (Vulnerable code not present) NOTE: https://github.com/ImageMagick/ImageMagick/issues/296 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/13/1 CVE-2016-9300 REJECTED CVE-2016-9301 @@ -5523,7 +5523,7 @@ CVE-2016-9297 (The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote at - tiff3 <removed> [wheezy] - tiff3 <not-affected> (Unreproducible) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2590 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/12/2 NOTE: Patch https://github.com/vadz/libtiff/commit/30c9234c7fd0dd5e8b1e83ad44370c875a0270ed NOTE: Reproducible with valgrind in wheezy with 4.0.2-6+deb7u7 NOTE: Reproducible with valgrind in jessie with 4.0.3-12.3+deb8u1 @@ -5579,7 +5579,7 @@ CVE-2016-9532 (Integer overflow in the writeBufferToSeparateStrips function in t [wheezy] - tiff3 <not-affected> (Tools not shipped by tiff3) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2592 NOTE: Patch: https://github.com/vadz/libtiff/commit/21d39de1002a5e69caa0574b2cc05d795d6fbfad - NOTE: http://www.openwall.com/lists/oss-security/2016/11/11/14 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/11/14 CVE-2016-9296 (A null pointer dereference bug affects the 16.02 and many old versions ...) - p7zip 16.02+dfsg-2 (unimportant; bug #844344) [jessie] - p7zip <not-affected> (Vulnerable code with potential NULL pointer dereference introduced later) @@ -5681,7 +5681,7 @@ CVE-2016-9243 (HKDF in cryptography before 1.5.2 returns an empty byte-string if [jessie] - python-cryptography 0.6.1-1+deb8u1 NOTE: Upstream bug: https://github.com/pyca/cryptography/issues/3211 NOTE: Upstream commit: https://github.com/pyca/cryptography/commit/b924696b2e8731f39696584d12cceeb3aeb2d874 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/08/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/08/6 CVE-2016-9242 (Multiple SQL injection vulnerabilities in the update method in framewo ...) NOT-FOR-US: Exponent CMS CVE-2016-9241 @@ -5894,7 +5894,7 @@ CVE-2016-9179 (lynx: It was found that Lynx doesn't parse the authority componen - lynx 2.8.9dev11-1 (bug #843258) - lynx-cur <removed> [jessie] - lynx-cur <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/11/03/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/03/4 NOTE: Slight mitigation and documentation improvement was done in 2.8.9dev.10 upstream NOTE: the uplaod to unstable as 2.8.9dev10-1 CVE-2016-9644 (The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the L ...) @@ -5905,7 +5905,7 @@ CVE-2016-9644 (The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in NOTE: 548acf19234dbda5a52d5a8e7e205af46e9da840 (added in 4.6), as such NOTE: src:linux was never affected. 1c109fabbd5 also wasn't backported to NOTE: the 3.2 and 3.16 LTS series - NOTE: http://www.openwall.com/lists/oss-security/2016/11/03/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/03/2 CVE-2016-9178 (The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the L ...) {DLA-772-1} - linux 4.7.5-1 @@ -5931,7 +5931,7 @@ CVE-2016-9181 (perl-Image-Info: When parsing an SVG file, external entity expans NOTE: https://rt.cpan.org/Public/Bug/Display.html?id=118099 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1379556 NOTE: Upstream commit: https://github.com/eserte/image-info/commit/781625b643bc05ba92127a4554de7910f3f2f8e6 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/02/1 NOTE: Older versions of libimage-info-perl only can use XML::Simple. NOTE: Controlling XXE processing behavior in XML::Simple is not really NOTE: possible (see https://rt.cpan.org/Ticket/Display.html?id=83794), @@ -5945,7 +5945,7 @@ CVE-2016-9180 (perl-XML-Twig: The option to `expand_external_ents`, documented a [wheezy] - libxml-twig-perl <no-dsa> (Minor issue, new flag would require changes to applications too, not worth the effort) NOTE: https://rt.cpan.org/Public/Bug/Display.html?id=118097 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1379553 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/02/1 NOTE: Release 3.50 adds a no_xxe flag which will fail to parse files with external entities. NOTE: 2016-12-13: The corresponding changes is not in the public git repository yet: https://github.com/mirod/xmltwig/commits/master CVE-2016-9136 (Artifex Software, Inc. MuJS before a0ceaf5050faf419401fe1b83acfa950ec8 ...) @@ -5994,7 +5994,7 @@ CVE-2016-9139 (Cross-site scripting (XSS) vulnerability in Open Ticket Request S - otrs2 5.0.14-1 (bug #843091) [jessie] - otrs2 3.3.18-1+deb8u1 NOTE: https://community.otrs.com/security-advisory-2016-02-security-update-otrs - NOTE: http://www.openwall.com/lists/oss-security/2016/11/01/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/01/5 NOTE: upstream fix likely https://github.com/OTRS/otrs/commit/6578a8bcf82529461302291ab3fcb500363b005a CVE-2016-9120 (Race condition in the ion_ioctl function in drivers/staging/android/io ...) - linux 4.6.1-1 (unimportant) @@ -6071,33 +6071,33 @@ CVE-2016-9107 (The OTR plugin for Gajim sends information in cleartext when usin - gajim-otr <itp> (bug #722130) NOTE: Upstream bug: https://trac-plugins.gajim.org/ticket/145 NOTE: Upstream fix: https://trac-plugins.gajim.org/changeset/c7c2e519ed63377bc943dd01c4661b0fe49321ae - NOTE: http://www.openwall.com/lists/oss-security/2016/10/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/30/2 CVE-2016-9106 (Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Qu ...) {DLA-1599-1 DLA-698-1 DLA-689-1} - qemu 1:2.8+dfsg-1 (bug #842463) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02623.html - NOTE: http://www.openwall.com/lists/oss-security/2016/10/28/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/28/4 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=fdfcc9aeea1492f4b819a24c94dfb678145b1bf9 CVE-2016-9105 (Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Qui ...) {DLA-1599-1 DLA-698-1 DLA-689-1} - qemu 1:2.8+dfsg-1 (bug #842463) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02608.html - NOTE: http://www.openwall.com/lists/oss-security/2016/10/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/28/3 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=4c1586787ff43c9acd18a56c12d720e3e6be9f7c CVE-2016-9104 (Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xat ...) {DLA-1599-1 DLA-698-1 DLA-689-1} - qemu 1:2.8+dfsg-1 (bug #842463) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02942.html - NOTE: http://www.openwall.com/lists/oss-security/2016/10/28/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/28/2 CVE-2016-9103 (The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emula ...) {DLA-1599-1 DLA-698-1 DLA-689-1} - qemu 1:2.8+dfsg-1 (bug #842463) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01790.html - NOTE: http://www.openwall.com/lists/oss-security/2016/10/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/28/1 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=eb687602853b4ae656e9236ee4222609f3a6887d CVE-2016-9102 (Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU ( ...) {DLA-1599-1 DLA-698-1 DLA-689-1} @@ -6105,7 +6105,7 @@ CVE-2016-9102 (Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in Q - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg01861.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1389550 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/27/15 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/27/15 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=ff55e94d23ae94c8628b0115320157c763eb3e06 CVE-2016-9101 (Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows l ...) {DLA-1599-1 DLA-698-1 DLA-689-1} @@ -6113,7 +6113,7 @@ CVE-2016-9101 (Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) all - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg03024.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1389538 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/27/14 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/27/14 NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=2634ab7fe29b3f75d0865b719caf8f310d634aae (v2.8.0-rc0) CVE-2016-9088 RESERVED @@ -6549,12 +6549,12 @@ CVE-2016-8911 (IBM Kenexa LMS on Cloud 13.1 and 13.2 - 13.2.4 could allow a remo CVE-2016-9016 (Firejail 0.9.38.4 allows local users to execute arbitrary commands out ...) - firejail 0.9.44-1 NOTE: https://github.com/netblue30/firejail/commit/46dc2b34f1fbbc4597b4ff9f6a3cb28b2d500d1b - NOTE: http://www.openwall.com/lists/oss-security/2016/10/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/25/3 CVE-2016-9011 (The wmf_malloc function in api.c in libwmf 0.2.8.4 allows remote attac ...) {DLA-694-1} - libwmf 0.2.8.4-10.6 (bug #842090) [jessie] - libwmf 0.2.8.4-10.3+deb8u2 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/9 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/18/9 NOTE: https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c NOTE: Reproducer: https://github.com/asarubbo/poc/blob/master/00015-libwmf-memalloc-wmf_malloc NOTE: Proposed patch: https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=842090;filename=libwmf-0.2.8.4-CVE-2016-9011-debian.patch;msg=10 @@ -7045,13 +7045,13 @@ CVE-2016-8910 (The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU ( - qemu 1:2.8+dfsg-1 (bug #841955) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg05495.html - NOTE: http://www.openwall.com/lists/oss-security/2016/10/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/24/2 CVE-2016-8909 (The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick ...) {DLA-1599-1 DLA-698-1 DLA-689-1} - qemu 1:2.8+dfsg-1 (bug #841950) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg04717.html - NOTE: http://www.openwall.com/lists/oss-security/2016/10/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/24/1 CVE-2016-XXXX [Privilege escalation possible to other user than root] - bash <unfixed> (unimportant; bug #841856) NOTE: This is strongly related to the problem described in CVE-2016-7543 and the correction @@ -7063,7 +7063,7 @@ CVE-2016-10249 (Integer overflow in the jpc_dec_tiledecode function in jpc_dec.c NOTE: Fixed by: https://github.com/mdadams/jasper/commit/988f8365f7d8ad8073b6786e433d34c553ecf568 (version-1.900.12) NOTE: https://blogs.gentoo.org/ago/2016/10/23/jasper-heap-based-buffer-overflow-in-jpc_dec_tiledecode-jpc_dec-c/ NOTE: Reproducer: https://github.com/asarubbo/poc/blob/master/00001-jasper-heapoverflow-jpc_dec_tiledecode - NOTE: http://www.openwall.com/lists/oss-security/2016/10/23/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/23/7 CVE-2016-10250 (The jp2_colr_destroy function in jp2_cod.c in JasPer before 1.900.13 a ...) - jasper <not-affected> (Incomplete fix for CVE-206-8887 not applied) NOTE: Reproducer: https://github.com/asarubbo/poc/blob/master/00002-jasper-NULLptr-jp2_colr_destroy @@ -7127,7 +7127,7 @@ CVE-2016-8859 (Multiple integer overflows in the TRE library and musl libc allow [jessie] - tre 0.8.0-4+deb8u1 - musl 1.1.15-2 (bug #842171) [jessie] - musl 1.1.5-2+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/19/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/19/1 NOTE: other issues may still be present in tre after this: https://github.com/laurikari/tre/issues/37 NOTE: musl patch: http://git.musl-libc.org/cgit/musl/commit/?id=c3edc06d1e1360f3570db9155d6b318ae0d0f0f7, not released yet CVE-2016-8858 (** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x ...) @@ -7144,21 +7144,21 @@ CVE-2016-8862 (The AcquireMagickMemory function in MagickCore/memory.c in ImageM NOTE: The initial patch was initiall meant to be incomplete and resulted in CVE-2016-8866. So when fixing NOTE: this CVE make sure to fix it completely to not open up CVE-2016-8866. NOTE: The "incomplete fix" though is not a real problem, cf. https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30908#p140255 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/17/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/17/4 CVE-2016-8860 (Tor before 0.2.8.9 and 0.2.9.x before 0.2.9.4-alpha had internal funct ...) {DSA-3694-1 DLA-663-1} - tor 0.2.8.9-1 NOTE: https://trac.torproject.org/projects/tor/ticket/20384 NOTE: https://blog.torproject.org/blog/tor-0289-released-important-fixes NOTE: https://gitweb.torproject.org/tor.git/commit/?id=3cea86eb2fbb65949673eb4ba8ebb695c87a57ce - NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/18/11 CVE-2016-9138 (PHP through 5.6.27 and 7.x through 7.0.12 mishandles property modifica ...) {DSA-3732-1} - php7.0 7.0.12-1 - php5 <removed> [wheezy] - php5 <not-affected> (Vulnerable code not present in version 5.4.45) NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147 - NOTE: http://www.openwall.com/lists/oss-security/2016/11/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/01/7 CVE-2016-9137 (Use-after-free vulnerability in the CURLFile implementation in ext/cur ...) {DSA-3698-1} - php7.0 7.0.12-1 @@ -7167,7 +7167,7 @@ CVE-2016-9137 (Use-after-free vulnerability in the CURLFile implementation in ex NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73147 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=0e6fe3a4c96be2d3e88389a5776f878021b4c59f NOTE: Fixed in 7.0.12, 5.6.27 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/18/1 CVE-2016-8673 (A vulnerability has been identified in SIMATIC CP 343-1 Advanced (incl ...) NOT-FOR-US: Siemens SIMATIC CP CVE-2016-8672 (A vulnerability has been identified in SIMATIC CP 343-1 Advanced (incl ...) @@ -7248,7 +7248,7 @@ CVE-2016-8690 (The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer bef {DLA-1583-1} - jasper <removed> (low; bug #841112) [wheezy] - jasper <no-dsa> (Minor issue) - NOTE: CVE ID for the first and fifth items of http://www.openwall.com/lists/oss-security/2016/08/23/6 post + NOTE: CVE ID for the first and fifth items of https://www.openwall.com/lists/oss-security/2016/08/23/6 post NOTE: https://blogs.gentoo.org/ago/2016/10/16/jasper-two-null-pointer-dereference-in-bmp_getdata-bmp_dec-c/ NOTE: The original fix is incomplete resulting in two follow ups CVE-2016-8884 and NOTE: CVE-2016-8885. @@ -7304,7 +7304,7 @@ CVE-2016-8670 (Integer signedness error in the dynamicGetbuf function in gd_io_d - libgd2 2.2.3-87-gd0fec80-1 (bug #840805) NOTE: PHP Bug: https://bugs.php.net/bug.php?id=73280 NOTE: https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/15/1 CVE-2016-8671 (The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not prop ...) - matrixssl <not-affected> (Incomplete fix for CVE-2016-6887 not applied) NOTE: https://blog.fuzzing-project.org/54-Update-on-MatrixSSL-miscalculation-incomplete-fix-for-CVE-2016-6887.html @@ -7561,11 +7561,11 @@ CVE-2016-8612 (Apache HTTP Server mod_cluster before version httpd 2.4.23 is vul - libapache2-mod-cluster <itp> (bug #731410) CVE-2016-8611 (A vulnerability was found in Openstack Glance. No limits are enforced ...) - glance <unfixed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2016/10/27/16 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/27/16 CVE-2016-8610 (A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 thro ...) {DSA-3773-1 DLA-814-1} - openssl 1.0.2j-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/24/3 NOTE: Fixed by: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1384743 mentions countermeasures in gnutls NOTE: https://gitlab.com/gnutls/gnutls/commit/1ffb827e45721ef56982d0ffd5c5de52376c428e @@ -7594,7 +7594,7 @@ CVE-2016-8596 (Buffer overflow in the csp_can_process_frame in csp_if_can.c in t NOTE: https://github.com/GomSpace/libcsp/pull/81/commits/4435fbed4090ff3cd090a61517430fe8a3924cd8 CVE-2016-8595 (The gsm_parse function in libavcodec/gsm_parser.c in FFmpeg before 3.1 ...) - ffmpeg 7:3.1.5-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/08/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/08/2 NOTE: https://github.com/FFmpeg/FFmpeg/commit/987690799dd86433bf98b897aaa4c8d93ade646d CVE-2016-8594 RESERVED @@ -7604,7 +7604,7 @@ CVE-2016-8666 (The IP stack in the Linux kernel before 4.6 allows remote attacke [wheezy] - linux <not-affected> (Vulnerable code introduced later) NOTE: Fixed by: https://git.kernel.org/linus/fac8e0f579695a3ecbc4d3cac369139d7f819971 NOTE: Introduced by: htttps://git.kernel.org/linus/bf5a755f5e9186406bbf50f4087100af5bd68e40 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/13/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/13/11 CVE-2016-8660 (The XFS subsystem in the Linux kernel through 4.8.2 allows local users ...) - linux <unfixed> (unimportant) [jessie] - linux <not-affected> (Vulnerable code not present) @@ -7841,7 +7841,7 @@ CVE-2016-XXXX [dbus format string vulnerability] NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=98157 NOTE: Versions affected: dbus >= 1.4.0 NOTE: Fixed in: dbus >= 1.11.6, 1.10.x >= 1.10.12, 1.8.x >= 1.8.22 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/10/9 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/10/10/9 NOTE: In Debian CVE-2015-0245 was already fixed, and this issue is NOTE: not believed to be exploitable in practice, because the relevant NOTE: message is ignored unless it comes from the owner of the bus name @@ -7882,7 +7882,7 @@ CVE-2016-8679 (The _dwarf_get_size_of_val function in libdwarf/dwarf_util.c in L - dwarfutils 20161001-2 (bug #840958) [jessie] - dwarfutils <no-dsa> (Minor issue) [wheezy] - dwarfutils <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/10/08/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/08/11 NOTE: https://sourceforge.net/p/libdwarf/code/ci/2d14a7792889e33bc542c28d0f3792964c46214f/#diff-13 NOTE: https://sourceforge.net/p/libdwarf/code/ci/efe48cad0693d6994d9a7b561e1c3833b073a624/#diff-2 NOTE: Same fix as CVE-2016-8681 but different issue @@ -7890,7 +7890,7 @@ CVE-2016-8680 (The _dwarf_get_abbrev_for_code function in dwarf_util.c in libdwa - dwarfutils 20161001-2 (bug #840960) [jessie] - dwarfutils <no-dsa> (Minor issue) [wheezy] - dwarfutils <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/10/08/12 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/08/12 NOTE: https://sourceforge.net/p/libdwarf/code/ci/268c1f18d1d28612af3b72d7c670076b1b88e51c/tree/libdwarf/dwarf_util.c?diff=0b28b923c3bd9827d1d904feed2abadde4fa5de2 CVE-2016-8681 (The _dwarf_get_abbrev_for_code function in dwarf_util.c in libdwarf 20 ...) - dwarfutils 20161001-2 (bug #840961) @@ -7898,7 +7898,7 @@ CVE-2016-8681 (The _dwarf_get_abbrev_for_code function in dwarf_util.c in libdwa [wheezy] - dwarfutils <no-dsa> (Minor issue) NOTE: https://sourceforge.net/p/libdwarf/code/ci/2d14a7792889e33bc542c28d0f3792964c46214f/#diff-13 NOTE: https://sourceforge.net/p/libdwarf/code/ci/efe48cad0693d6994d9a7b561e1c3833b073a624/#diff-2 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/08/13 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/08/13 CVE-2016-8602 (The .sethalftone5 function in psi/zht2.c in Ghostscript before 9.21 al ...) {DSA-3691-1 DLA-674-1} - ghostscript 9.19~dfsg-3.1 (bug #840451) @@ -8149,29 +8149,29 @@ CVE-2016-7979 (Ghostscript before 9.21 might allow remote attackers to bypass th NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697190 NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697190#c0 NOTE: Patch: https://git.ghostscript.com/?p=ghostpdl.git;h=875a0095f37626a721c7ff57d606a0f95af03913 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/05/19 CVE-2016-7978 (Use-after-free vulnerability in Ghostscript 9.20 might allow remote at ...) {DSA-3691-1 DLA-674-1} - ghostscript 9.19~dfsg-3.1 (bug #839845) NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697179 NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0 NOTE: Patch: https://git.ghostscript.com/?p=ghostpdl.git;h=6f749c0c44e7b9e09737b9f29edf29925a34f0cf - NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/05/7 CVE-2016-7977 (Ghostscript before 9.21 might allow remote attackers to bypass the SAF ...) {DSA-3691-1 DLA-674-1} - ghostscript 9.19~dfsg-3.1 (high; bug #839841) NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169 - NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/29/28 + NOTE: Reproducer: https://www.openwall.com/lists/oss-security/2016/09/29/28 NOTE: Patch: https://git.ghostscript.com/?p=ghostpdl.git;h=8abd22010eb4db0fb1b10e430d5f5d83e015ef70 - NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/05/7 CVE-2016-7976 (The PS Interpreter in Ghostscript 9.18 and 9.20 allows remote attacker ...) {DSA-3691-1 DLA-674-1} - ghostscript 9.19~dfsg-3.1 (high; bug #839260) NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178 - NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/30/8 + NOTE: Reproducer: https://www.openwall.com/lists/oss-security/2016/09/30/8 NOTE: Patch: https://git.ghostscript.com/?p=ghostpdl.git;h=6d444c273da5499a4cd72f21cb6d4c9a5256807d - NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/05/7 CVE-2016-1000247 [mpg123 memory overread] {DLA-655-1} - mpg123 1.23.8-1 (low; bug #838960) @@ -8187,7 +8187,7 @@ CVE-2016-XXXX [nspr, nss: unprotected environment variables] [wheezy] - nss 2:3.26-1+debu7u1 NOTE: Workaround entry for DSA-3688-1/DLA-677-1 until CVE is assigned NOTE: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.22.1_release_notes - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/02/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/10/02/4 CVE-2016-8390 (An exploitable out of bounds write vulnerability exists in the parsing ...) NOT-FOR-US: Hopper Disassembler CVE-2016-8389 (An exploitable integer-overflow vulnerability exists within Iceni Argu ...) @@ -8456,7 +8456,7 @@ CVE-2016-7553 (The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak pe [jessie] - irssi 0.8.17-1+deb8u2 NOTE: Fixed by: https://github.com/irssi/scripts.irssi.org/commit/f1b1eb154baa684fad5d65bf4dff79c8ded8b65a NOTE: https://irssi.org/2016/09/22/buf.pl-update/ - NOTE: http://www.openwall.com/lists/oss-security/2016/09/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/24/1 CVE-2016-1000242 RESERVED CVE-2016-1000241 @@ -8519,7 +8519,7 @@ CVE-2016-7466 (Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=b53dd4495ced2432a0b652ea895e651d07336f7e NOTE: The usb_xhci_exit and thus the patched code was introduced in: NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=53c30545fb34c43c84d62ea1c2b0dc6b53303c34 (v2.2.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/09/19/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/19/8 CVE-2016-8280 (Directory traversal vulnerability in Huawei eSight before V300R003C20S ...) NOT-FOR-US: Huawei eSight UMS CVE-2016-8279 (The video driver in Huawei Mate S smartphones with software CRR-TL00 b ...) @@ -8647,7 +8647,7 @@ CVE-2016-7423 (The mptsas_process_scsi_io_request function in QEMU (aka Quick Em - qemu-kvm <not-affected> (Vulnerable code introduced later) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03604.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1376776 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/16/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/16/5 NOTE: LSI SAS1068 (mptsas) device support added in NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=e351b82611293683c4cabe4b69b7552bde5d4e2a (v2.6.0-rc0) NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=670e56d3ed2918b3861d9216f2c0540d9e9ae0d5 @@ -8659,7 +8659,7 @@ CVE-2016-7422 (The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (ak NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03546.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1376755 NOTE: Introduced by: http://git.qemu.org/?p=qemu.git;a=commit;h=3b3b0628217e2726069990ff9942a5d6d9816bd7 (v2.6.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/09/16/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/16/4 CVE-2016-7421 (The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU ...) {DLA-1599-1} - qemu 1:2.7+dfsg-1 (bug #838147) @@ -8667,7 +8667,7 @@ CVE-2016-7421 (The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in - qemu-kvm <not-affected> (Vulnerable code not present, introduced after 1.5) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg03609.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1376731 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/16/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/16/3 NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=d251157ac1928191af851d199a9ff255d330bec9 CVE-2016-8220 (Pivotal Gemfire for PCF, versions 1.6.x prior to 1.6.5.0 and 1.7.x pri ...) NOT-FOR-US: Pivotal @@ -8716,7 +8716,7 @@ CVE-2016-7444 (The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in Gnu NOTE: http://lists.gnutls.org/pipermail/gnutls-devel/2016-September/008146.html NOTE: Upstream fix: https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1374266 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/18/3 CVE-2016-8200 RESERVED CVE-2016-8199 @@ -9326,7 +9326,7 @@ CVE-2016-7954 (Bundler 1.x might allow remote attackers to inject arbitrary Ruby [stretch] - bundler <ignored> (Minor issue, too intrusive to backport) [jessie] - bundler <ignored> (Minor issue, too intrusive to backport) [wheezy] - bundler <no-dsa> (Minor issue, too intrusive to backport) - NOTE: http://www.openwall.com/lists/oss-security/2016/10/04/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/10/04/5 NOTE: There is no plan from upstream to address this for bundler 1.x NOTE: due to lockfile format. CVE-2016-7953 (Buffer underflow in X.org libXvMC before 1.0.10 allows remote X server ...) @@ -10334,7 +10334,7 @@ CVE-2016-7543 (Bash before 4.4 allows local users to execute arbitrary commands {DLA-680-1} - bash 4.4-1 [jessie] - bash 4.3-11+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/26/9 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/26/9 NOTE: Default shell is dash which is not vulnerable, but bash in Jessie and NOTE: Wheezy are affected. NOTE: Fixed by (4.3): https://ftp.gnu.org/pub/gnu/bash/bash-4.3-patches/bash43-048 @@ -11352,7 +11352,7 @@ CVE-2016-7405 (The qstr method in the PDO driver in the ADOdb Library for PHP be NOTE: https://github.com/ADOdb/ADOdb/commit/bd9eca9 NOTE: Issue only with the PDO driver and only if queries built by inlining NOTE: the quoted string (not recommended). - NOTE: http://www.openwall.com/lists/oss-security/2016/09/07/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/07/8 CVE-2016-7154 (Use-after-free vulnerability in the FIFO event channel code in Xen 4.4 ...) {DSA-3663-1} - xen 4.6.0-1 @@ -11421,7 +11421,7 @@ CVE-2016-7155 (hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local gu [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00050.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1373462 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/06/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/06/2 NOTE: Vulnerable code introduced after version 1.5: http://wiki.qemu.org/ChangeLog/1.5 CVE-2016-7156 (The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (ak ...) {DLA-1599-1} @@ -11431,7 +11431,7 @@ CVE-2016-7156 (The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEM [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg00772.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1373478 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/06/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/06/3 NOTE: Vulnerable code introduced after version 1.5: http://wiki.qemu.org/ChangeLog/1.5 CVE-2016-7157 (The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 func ...) - qemu 1:2.6+dfsg-3.1 (bug #837603) @@ -11441,7 +11441,7 @@ CVE-2016-7157 (The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: Upstream patches: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04295.html NOTE: Upstream patches: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg04296.html - NOTE: http://www.openwall.com/lists/oss-security/2016/09/06/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/06/4 NOTE: Vulnerable code introduced after version 2.6: http://wiki.qemu.org/ChangeLog/2.6 CVE-2016-7140 (Multiple cross-site scripting (XSS) vulnerabilities in the ZMI page in ...) NOT-FOR-US: Plone @@ -11465,20 +11465,20 @@ CVE-2016-7145 (The m_authenticate function in ircd/m_authenticate.c in nefarious NOT-FOR-US: Nefarious 2 CVE-2016-7144 (The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3 ...) - unrealircd <itp> (bug #515130) - NOTE: http://www.openwall.com/lists/oss-security/2016/09/04/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/04/3 NOTE: unrealircd reportedly vulnerable, and ircd-seven reportedly not vulnerable CVE-2016-7143 (The m_authenticate function in modules/m_sasl.c in Charybdis before 3. ...) {DSA-3661-1} - charybdis 3.5.3-1 (bug #836714) [wheezy] - charybdis <no-dsa> (unsupported) NOTE: charybdis patch: https://github.com/charybdis-ircd/charybdis/commit/818a3fda944b26d4814132cee14cfda4ea4aa824 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/04/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/04/3 CVE-2016-7142 (The m_sasl module in InspIRCd before 2.0.23, when used with a service ...) {DSA-3662-1} - inspircd 2.0.23-1 (bug #836706) [wheezy] - inspircd <end-of-life> (not supported in Wheezy) NOTE: http://www.inspircd.org/2016/09/03/v2023-released.html - NOTE: http://www.openwall.com/lists/oss-security/2016/09/04/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/04/3 CVE-2016-7120 RESERVED CVE-2016-7134 (ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a l ...) @@ -11486,14 +11486,14 @@ CVE-2016-7134 (ext/curl/interface.c in PHP 7.x before 7.0.10 does not work aroun - php5 <not-affected> (Only affects PHP 7) NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72674 NOTE: Fixed in 7.0.10 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/72dbb7f416160f490c4e9987040989a10ad431c7?w=1 CVE-2016-7133 (Zend/zend_alloc.c in PHP 7.x before 7.0.10, when open_basedir is enabl ...) - php7.0 7.0.10-1 - php5 <not-affected> (Only affects PHP 7) NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72742 NOTE: Fixed in 7.0.10 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/c2a13ced4272f2e65d2773e2ea6ca11c1ce4a911?w=1 CVE-2016-7132 (ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remo ...) {DSA-3689-1 DLA-749-1} @@ -11501,7 +11501,7 @@ CVE-2016-7132 (ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72799 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 NOTE: 72790 and 72799 are associated with the same commit. Not all of the NOTE: commit is about the pop issue in 72799. @@ -11511,7 +11511,7 @@ CVE-2016-7131 (ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72790 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/a14fdb9746262549bbbb96abb87338bacd147e1b?w=1 NOTE: Cf. as well https://bugs.php.net/bug.php?id=72799 NOTE: 72790 and 72799 are associated with the same commit. Not all of the @@ -11522,7 +11522,7 @@ CVE-2016-7130 (The php_wddx_pop_element function in ext/wddx/wddx.c in PHP befor - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72750 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/698a691724c0a949295991e5df091ce16f899e02?w=1 CVE-2016-7129 (The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5. ...) {DSA-3689-1 DLA-749-1} @@ -11530,7 +11530,7 @@ CVE-2016-7129 (The php_wddx_process_data function in ext/wddx/wddx.c in PHP befo - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72749 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/426aeb2808955ee3d3f52e0cfb102834cdb836a5?w=1 CVE-2016-7128 (The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before ...) {DSA-3689-1 DLA-749-1} @@ -11538,7 +11538,7 @@ CVE-2016-7128 (The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP b - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72627 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/6dbb1ee46b5f4725cc6519abf91e512a2a10dfed?w=1 CVE-2016-7127 (The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and ...) {DSA-3689-1} @@ -11547,7 +11547,7 @@ CVE-2016-7127 (The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.2 - php5 5.6.26+dfsg-1 (unimportant) NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72730 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/1bd103df00f49cf4d4ade2cfe3f456ac058a4eae?w=1 CVE-2016-7126 (The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6. ...) {DSA-3689-1} @@ -11556,7 +11556,7 @@ CVE-2016-7126 (The imagetruecolortopalette function in ext/gd/gd.c in PHP before - php5 5.6.26+dfsg-1 (unimportant) NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72697 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/b6f13a5ef9d6280cf984826a5de012a32c396cd4?w=1 CVE-2016-7125 (ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips ...) {DSA-3689-1 DLA-628-1} @@ -11564,7 +11564,7 @@ CVE-2016-7125 (ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72681 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 NOTE: Scope of CVE also includes the "The similar issue also exist in session php_binary NOTE: handler" part of 72681. @@ -11574,7 +11574,7 @@ CVE-2016-7124 (ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x befo - php5 5.6.26+dfsg-1 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=72663 NOTE: Fixed in 7.0.10, 5.6.25 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/02/5 NOTE: https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1 CVE-2016-7123 (Cross-site request forgery (CSRF) vulnerability in the admin web inter ...) - mailman 2.1.15-1 @@ -11602,34 +11602,34 @@ CVE-2016-10057 (Buffer overflow in the WriteGROUP4Image function in coders/tiff. {DSA-3675-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #836172) NOTE: https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10056 (Buffer overflow in the sixel_decode function in coders/sixel.c in Imag ...) {DSA-3675-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #836172) NOTE: https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10055 (Buffer overflow in the WritePDBImage function in coders/pdb.c in Image ...) {DSA-3675-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #836172) NOTE: https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10054 (Buffer overflow in the WriteMAPImage function in coders/map.c in Image ...) {DSA-3675-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #836172) NOTE: https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10053 (The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9 ...) {DSA-3675-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #836171) [wheezy] - imagemagick <not-affected> (Vulnerability likely introduced in a version after 6.7.7.10) NOTE: https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-7118 (fs/fcntl.c in the "aufs 3.2.x+setfl-debian" patch in the linux-image p ...) {DLA-609-1} - linux <not-affected> NOTE: Bit of complicated tracking information. For jessie the affected version is not in any yet NOTE: released version, thus should be n/a. wheezy OTOH, has already the issue in a released version. Issue then was fixed in 3.2.81-2 in DLA-609-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/31/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/31/1 CVE-2016-7116 (Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick E ...) {DLA-1599-1 DLA-619-1 DLA-618-1} - qemu 1:2.6+dfsg-3.1 (bug #836502) @@ -12213,14 +12213,14 @@ CVE-2016-6889 CVE-2016-6881 (The zlib_refill function in libavformat/swfdec.c in FFmpeg before 3.1. ...) - ffmpeg 7:3.1.3-1 (unimportant) - libav <not-affected> - NOTE: http://www.openwall.com/lists/oss-security/2016/09/26/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/26/6 NOTE: https://github.com/FFmpeg/FFmpeg/commit/4770eac6 NOTE: Vulnerable code not present in any Libav version. CVE-2016-6902 (lshell 0.9.16 allows remote authenticated users to break out of a limi ...) - lshell <removed> (bug #834949) [wheezy] - lshell <not-affected> (Vulnerable code not present) NOTE: https://github.com/ghantoos/lshell/issues/147 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/22/15 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/22/15 NOTE: As for 2016-08-23 https://github.com/ghantoos/lshell/issues/147#issuecomment-241366750 ist still NOTE: as well under the scope of CVE-2016-6902, until "there is further vendor followup NOTE: about issues/147" and possibly a new/additional CVE assignment. @@ -12228,7 +12228,7 @@ CVE-2016-6903 (lshell 0.9.16 allows remote authenticated users to break out of a - lshell <removed> (bug #834946) [wheezy] - lshell <not-affected> (Vulnerable code not present) NOTE: https://github.com/ghantoos/lshell/issues/149 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/22/15 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/22/15 CVE-2016-6897 (Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_ ...) - wordpress 4.6.1+dfsg-1 (bug #837090) [jessie] - wordpress <not-affected> (wp_ajax_update_plugin function introduced in 4.2) @@ -12366,7 +12366,7 @@ CVE-2016-6866 (slock allows attackers to bypass the screen lock via vectors invo {DLA-598-1} - suckless-tools 41-1 [jessie] - suckless-tools 40-1+deb8u2 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/18/22 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/18/22 NOTE: http://s1m0n.dft-labs.eu/files/slock/ NOTE: Starting with 41-1 slock.c got patched to use PAM, cf. #739629 NOTE: and with the patch readpw(dpy, pws) is not called anymore, and @@ -12441,7 +12441,7 @@ CVE-2016-6812 (The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x NOT-FOR-US: Apache CXF CVE-2016-6811 (In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn use ...) - hadoop <itp> (bug #793644) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/01/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/01/2 CVE-2016-6810 (In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scri ...) - activemq 5.14.2+dfsg-1 (unimportant) NOTE: Admin console not enabled in the Debian package, see #702670 @@ -12526,7 +12526,7 @@ CVE-2016-10052 (Buffer overflow in the WriteProfile function in coders/jpeg.c in {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #834501) NOTE: https://github.com/ImageMagick/ImageMagick/commit/9e187b73a8a1290bb0e1a1c878f8be1917aa8742 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-6792 RESERVED CVE-2016-6791 (An elevation of privilege vulnerability in the Qualcomm sound driver c ...) @@ -12790,7 +12790,7 @@ CVE-2016-10051 (Use-after-free vulnerability in the ReadPWPImage function in cod - imagemagick 8:6.9.6.2+dfsg-2 (bug #834183) NOTE: https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=30245 NOTE: https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-6833 (Use-after-free vulnerability in the vmxnet3_io_bar0_write function in ...) {DLA-1497-1} - qemu 1:2.6+dfsg-3.1 (bug #834904) @@ -12799,7 +12799,7 @@ CVE-2016-6833 (Use-after-free vulnerability in the vmxnet3_io_bar0_write functio [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, vmxnet3 introduced in 1.5) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8 NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html - NOTE: http://www.openwall.com/lists/oss-security/2016/08/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/12/1 CVE-2016-6834 (The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in ...) {DLA-1599-1} - qemu 1:2.6+dfsg-3.1 (bug #834905) @@ -12808,7 +12808,7 @@ CVE-2016-6834 (The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt. [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, packet abstraction introduced in 1.5) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=ead315e43ea0c2ca3491209c6c8db8ce3f2bbe05 NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01601.html - NOTE: http://www.openwall.com/lists/oss-security/2016/08/11/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/11/8 CVE-2016-6835 (The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in ...) {DLA-1497-1} - qemu 1:2.6+dfsg-3.1 (bug #835031) @@ -12816,7 +12816,7 @@ CVE-2016-6835 (The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt. - qemu-kvm <removed> [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, vmxnet3 introduced in 1.5) NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html - NOTE: http://www.openwall.com/lists/oss-security/2016/08/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/11/7 CVE-2016-6836 (The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka ...) {DLA-1599-1} - qemu 1:2.6+dfsg-3.1 (bug #834944) @@ -12825,7 +12825,7 @@ CVE-2016-6836 (The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present, vmxnet3 introduced in 1.5) NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg02108.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1366369 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/11/5 CVE-2016-6671 (The raw_decode function in libavcodec/rawdec.c in FFmpeg before 3.1.2 ...) - ffmpeg 7:3.1.2-1 CVE-2016-6670 (Huawei S7700, S9300, S9700, and S12700 devices with software before V2 ...) @@ -12943,30 +12943,30 @@ CVE-2016-10050 (Heap-based buffer overflow in the ReadRLEImage function in coder {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #833744) NOTE: https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10049 (Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageM ...) {DSA-3652-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #833743) [wheezy] - imagemagick <not-affected> (Vulnerability likely introduced in a version after 6.7.7.10) NOTE: https://github.com/ImageMagick/ImageMagick/commit/3e9165285eda6e1bb71172031d3048b51bb443a4 NOTE: https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=29710 - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10048 (Directory traversal vulnerability in magick/module.c in ImageMagick 6. ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.5.7+dfsg-1 (bug #833735) NOTE: https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10047 (Memory leak in the NewXMLTree function in magick/xml-tree.c in ImageMa ...) {DSA-3652-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #833732) [wheezy] - imagemagick <not-affected> (Vulnerable code not present in version 6.7.7.10) NOTE: https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-10046 (Heap-based buffer overflow in the DrawImage function in magick/draw.c ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #833730) NOTE: https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f - NOTE: http://www.openwall.com/lists/oss-security/2016/12/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/12/20/3 CVE-2016-6887 (The pstm_exptmod function in MatrixSSL 3.8.6 and earlier does not prop ...) - matrixssl <removed> [wheezy] - matrixssl <end-of-life> (not supported in Wheezy) @@ -13145,65 +13145,65 @@ CVE-2016-7514 (The ReadPSDChannelPixels function in coders/psd.c in ImageMagick NOTE: https://github.com/ImageMagick/ImageMagick/commit/6f1879d498bcc5cce12fe0c5decb8dbc0f608e5d NOTE: https://github.com/ImageMagick/ImageMagick/commit/e14fd0a2801f73bdc123baf4fbab97dec55919eb NOTE: https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7515 (The ReadRLEImage function in coders/rle.c in ImageMagick allows remote ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832461) NOTE: https://bugs.launchpad.net/bugs/1533445 NOTE: https://github.com/ImageMagick/ImageMagick/issues/82 NOTE: https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7516 (The ReadVIFFImage function in coders/viff.c in ImageMagick allows remo ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832467) NOTE: https://bugs.launchpad.net/bugs/1533452 NOTE: https://github.com/ImageMagick/ImageMagick/issues/77 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7517 (The EncodeImage function in coders/pict.c in ImageMagick allows remote ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832467) NOTE: https://bugs.launchpad.net/bugs/1533449 NOTE: https://github.com/ImageMagick/ImageMagick/issues/80 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7518 (The ReadSUNImage function in coders/sun.c in ImageMagick allows remote ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832467) NOTE: https://bugs.launchpad.net/bugs/1533447 NOTE: https://github.com/ImageMagick/ImageMagick/issues/81 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7519 (The ReadRLEImage function in coders/rle.c in ImageMagick allows remote ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832467) NOTE: https://bugs.launchpad.net/bugs/1533445 NOTE: https://github.com/ImageMagick/ImageMagick/issues/82 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7520 (Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remot ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832469) NOTE: https://bugs.launchpad.net/bugs/1537213 NOTE: https://github.com/ImageMagick/ImageMagick/issues/90 NOTE: https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7521 (Heap-based buffer overflow in coders/psd.c in ImageMagick allows remot ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832474) NOTE: https://bugs.launchpad.net/bugs/1537418 NOTE: https://github.com/ImageMagick/ImageMagick/issues/92 NOTE: https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7522 (The ReadPSDImage function in MagickCore/locale.c in ImageMagick allows ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832475) NOTE: https://bugs.launchpad.net/bugs/1537419 NOTE: https://github.com/ImageMagick/ImageMagick/issues/93 NOTE: https://github.com/ImageMagick/ImageMagick/commit/4b1b9c0522628887195bad3a6723f7000b0c9a58 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7523 (coders/meta.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832478) NOTE: https://bugs.launchpad.net/bugs/1537420 NOTE: https://github.com/ImageMagick/ImageMagick/issues/94 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7524 (coders/meta.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832478) @@ -13216,7 +13216,7 @@ CVE-2016-7525 (Heap-based buffer overflow in coders/psd.c in ImageMagick allows NOTE: https://bugs.launchpad.net/bugs/1537424 NOTE: https://github.com/ImageMagick/ImageMagick/issues/98 NOTE: https://github.com/ImageMagick/ImageMagick/commit/5f16640725b1225e6337c62526e6577f0f88edb8 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7526 (coders/wpg.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832482) @@ -13224,21 +13224,21 @@ CVE-2016-7526 (coders/wpg.c in ImageMagick allows remote attackers to cause a de NOTE: https://github.com/ImageMagick/ImageMagick/issues/102 NOTE: https://github.com/ImageMagick/ImageMagick/commit/b6ae2f9e0ab13343c0281732d479757a8e8979c7 NOTE: https://github.com/ImageMagick/ImageMagick/commit/d9b2209a69ee90d8df81fb124eb66f593eb9f599 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7527 (coders/wpg.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832482) NOTE: https://bugs.launchpad.net/bugs/1542115 NOTE: https://github.com/ImageMagick/ImageMagick/issues/122 NOTE: https://github.com/ImageMagick/ImageMagick/commit/a251039393f423c7858e63cab6aa98d17b8b7a41 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7528 (The ReadVIFFImage function in coders/viff.c in ImageMagick allows remo ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832483) NOTE: https://bugs.launchpad.net/bugs/1537425 NOTE: https://github.com/ImageMagick/ImageMagick/issues/99 NOTE: https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7529 (coders/xcf.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832504) @@ -13247,7 +13247,7 @@ CVE-2016-7529 (coders/xcf.c in ImageMagick allows remote attackers to cause a de NOTE: https://github.com/ImageMagick/ImageMagick/issues/104 NOTE: https://github.com/ImageMagick/ImageMagick/issues/103 NOTE: https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7530 (The quantum handling code in ImageMagick allows remote attackers to ca ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832506) @@ -13258,74 +13258,74 @@ CVE-2016-7530 (The quantum handling code in ImageMagick allows remote attackers NOTE: https://github.com/ImageMagick/ImageMagick/commit/c4e63ad30bc42da691f2b5f82a24516dd6b4dc70 NOTE: https://github.com/ImageMagick/ImageMagick/issues/110 NOTE: https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7531 (MagickCore/memory.c in ImageMagick allows remote attackers to cause a ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832633) NOTE: https://bugs.launchpad.net/bugs/1539061 NOTE: https://bugs.launchpad.net/bugs/1542112 NOTE: https://github.com/ImageMagick/ImageMagick/issues/107 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7532 (coders/psd.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832776) NOTE: https://bugs.launchpad.net/bugs/1539066 NOTE: https://github.com/ImageMagick/ImageMagick/issues/109 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7533 (The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832780) NOTE: https://bugs.launchpad.net/bugs/1542114 NOTE: https://github.com/ImageMagick/ImageMagick/issues/120 NOTE: https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7534 (The generic decoder in ImageMagick allows remote attackers to cause a ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832785) NOTE: https://bugs.launchpad.net/bugs/1542785 NOTE: https://github.com/ImageMagick/ImageMagick/issues/126 NOTE: https://github.com/ImageMagick/ImageMagick/commit/430403b0029b37decf216d57f810899cab2317dd - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7535 (coders/psd.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832787) NOTE: https://bugs.launchpad.net/bugs/1545180 NOTE: https://github.com/ImageMagick/ImageMagick/issues/128 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7536 (magick/profile.c in ImageMagick allows remote attackers to cause a den ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832789) NOTE: https://bugs.launchpad.net/bugs/1545367 NOTE: https://github.com/ImageMagick/ImageMagick/issues/130 NOTE: https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7537 (MagickCore/memory.c in ImageMagick allows remote attackers to cause a ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832791) NOTE: https://bugs.launchpad.net/bugs/1553366 NOTE: https://github.com/ImageMagick/ImageMagick/issues/143 NOTE: https://github.com/ImageMagick/ImageMagick/commit/424d40ebfcde48bb872eba75179d3d73704fdf1f - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7538 (coders/psd.c in ImageMagick allows remote attackers to cause a denial ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #832793) NOTE: https://bugs.launchpad.net/bugs/1556273 NOTE: https://github.com/ImageMagick/ImageMagick/issues/148 NOTE: https://github.com/ImageMagick/ImageMagick/commit/53c1dcd34bed85181b901bfce1a2322f85a59472 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7539 (Memory leak in AcquireVirtualMemory in ImageMagick before 7 allows rem ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #833101) NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/4e81ce8b07219c69a9aeccb0f7f7b927ca6db74c NOTE: http://www.imagemagick.org/discourse-server/viewtopic.php?f=2&t=28946 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-7540 (coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to ...) {DSA-3652-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #827643) [wheezy] - imagemagick <not-affected> (RGF coder is not present in version 6.7.7.10) NOTE: https://bugs.launchpad.net/bugs/1594060 NOTE: https://github.com/ImageMagick/ImageMagick/pull/223 - NOTE: http://www.openwall.com/lists/oss-security/2016/08/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/08/07/1 CVE-2016-6603 (ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to bypas ...) NOT-FOR-US: ZOHO WebNMS CVE-2016-6602 (ZOHO WebNMS Framework 5.2 and 5.2 SP1 use a weak obfuscation algorithm ...) @@ -13564,7 +13564,7 @@ CVE-2016-6494 (The client in MongoDB uses world-readable permissions on .dbshell {DLA-588-1} - mongodb 1:2.6.12-3 (bug #832908) [jessie] - mongodb 1:2.4.10-5+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/29/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/29/4 CVE-2016-6491 (Buffer overflow in the Get8BIMProperty function in MagickCore/property ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #833099) @@ -13576,7 +13576,7 @@ CVE-2016-6489 (The RSA and DSA decryption code in Nettle makes it easier for att NOTE: https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003093.html NOTE: https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3 NOTE: Original patch had some unintended side effects: https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003104.html - NOTE: Cf. http://www.openwall.com/lists/oss-security/2016/07/30/2 + NOTE: Cf. https://www.openwall.com/lists/oss-security/2016/07/30/2 NOTE: Additionally needed: https://git.lysator.liu.se/nettle/nettle/commit/52b9223126b3f997c00d399166c006ae28669068 NOTE: GnuTLS needs an update when/before src:nettle is fixed to continue working with patched src:nettle for CVE-2016-6489 NOTE: but not a vulnerability in GnuTLS. Needs https://gitlab.com/gnutls/gnutls/commit/186dc9c2012003587a38d7f4d03edd8da5fe989f @@ -13592,7 +13592,7 @@ CVE-2016-6513 (epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshar NOTE: https://www.wireshark.org/security/wnpa-sec-2016-49.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12663 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=347f071f1b9180563c28b0f3d0627b91eb456c72 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6512 (epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an ov ...) - wireshark 2.0.5+ga3be9c6-1 [jessie] - wireshark <not-affected> (Only affects 2.x) @@ -13601,7 +13601,7 @@ CVE-2016-6512 (epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits NOTE: https://www.wireshark.org/security/wnpa-sec-2016-48.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2193bea3212d74e2a907152055e27d409b59485e - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6511 (epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 a ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0.5+ga3be9c6-1 @@ -13609,7 +13609,7 @@ CVE-2016-6511 (epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2. NOTE: https://www.wireshark.org/security/wnpa-sec-2016-47.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=56706427f53cc64793870bf072c2c06248ae88f3 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6510 (Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0.5+ga3be9c6-1 @@ -13617,7 +13617,7 @@ CVE-2016-6510 (Off-by-one error in epan/dissectors/packet-rlc.c in the RLC disse NOTE: https://www.wireshark.org/security/wnpa-sec-2016-46.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=47a5fa850b388fcf4ea762073806f01b459820fe - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6509 (epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12. ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0.5+ga3be9c6-1 @@ -13625,7 +13625,7 @@ CVE-2016-6509 (epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark NOTE: https://www.wireshark.org/security/wnpa-sec-2016-45.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5a469ddc893f7c1912d0e15cc73bd3011e6cc2fb - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6508 (epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0.5+ga3be9c6-1 @@ -13633,7 +13633,7 @@ CVE-2016-6508 (epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1. NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=6cf9616df68a4db7e436bb77392586ff9ad84feb NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13. - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6507 (epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12. ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0 @@ -13642,7 +13642,7 @@ CVE-2016-6507 (epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=b5a10743258bd016c07ebf6479137fda3d172a0f NOTE: Affects 1.12.0 to 1.12.12, fixed 1.12.13 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6506 (epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0.5+ga3be9c6-1 @@ -13650,7 +13650,7 @@ CVE-2016-6506 (epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1. NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=a9d5256890c9189c7461bfce6ed6edce5d861499 NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 , fixed in 2.0.5, 1.12.13 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6505 (epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wiresha ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0.5+ga3be9c6-1 @@ -13658,7 +13658,7 @@ CVE-2016-6505 (epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wi NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=94e97e45cf614c7bb8fe90c23df52910246b2c95 NOTE: Affects 2.0.0 to 2.0.4, 1.12.0 to 1.12.12, fixed in 2.0.5, 1.12.13. - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6504 (epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1 ...) {DSA-3648-1 DLA-595-1} - wireshark 2.0 @@ -13667,13 +13667,13 @@ CVE-2016-6504 (epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wiresh NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12576 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9eacbb4d48df647648127b9258f9e5aeeb0c7d99 NOTE: Affects 1.12.0 to 1.12.12, fixed in 1.12.13. - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6503 (The CORBA IDL dissectors in Wireshark 2.x before 2.0.5 on 64-bit Windo ...) - wireshark <not-affected> (Only affects Wireshark on Windows) NOTE: https://www.wireshark.org/security/wnpa-sec-2016-39.html NOTE: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12495 NOTE: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=581a17af40b84ef0c9e7f41ed0795af345b61ce1 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/28/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/28/3 CVE-2016-6490 (The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Qui ...) - qemu 1:2.6+dfsg-3.1 (bug #832767) [jessie] - qemu <not-affected> (Vulnerable code not present) @@ -14163,13 +14163,13 @@ CVE-2016-6351 (The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emula - qemu-kvm <removed> NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=926cde5f3e4d2504ed161ed0cb771ac7cad6fd11 (v2.7.0-rc0) NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=cc96677469388bad3d66479379735cf75db069e3 (v2.7.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/25/14 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/25/14 NOTE: According to maintainer the fix relies on the fix for CVE-2016-4439 CVE-2016-6350 (OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (N ...) NOT-FOR-US: OpenBSD CVE-2016-6349 (The machinectl command in oci-register-machine allows local users to l ...) NOT-FOR-US: oci-register-machine - NOTE: http://www.openwall.com/lists/oss-security/2016/07/26/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/26/5 NOTE: Requirement is that docker containers would register themselves to NOTE: to systemd-machined by oci-register-machine (not packaged in Debian, NOTE: and https://github.com/projectatomic/docker/commit/a307e90141ba31b378bc31bb7720ed141f47cd9b @@ -14541,11 +14541,11 @@ CVE-2016-6263 (The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libi - libidn 1.33-1 NOTE: https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html NOTE: Test / Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555 (libidn-1-33) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/20/6 CVE-2016-6262 (idn in libidn before 1.33 might allow remote attackers to obtain sensi ...) - libidn <not-affected> (Incomplete fix for CVE-2015-8948 not applied) NOTE: Follow-up fix for CVE-2015-8948: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 (libidn-1-33) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/20/6 CVE-2016-6261 (The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allo ...) {DSA-3658-1 DLA-582-1} - libidn 1.33-1 @@ -14553,7 +14553,7 @@ CVE-2016-6261 (The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 NOTE: Test: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=9a1a7e15d0706634971364493fbb06e77e74726c (libidn-1-33) NOTE: Fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d (libidn-1-33) NOTE: Follow-up memory leak fix: http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4 (libidn-1-33) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/20/6 CVE-2016-6249 (F5 BIG-IP 12.0.0 and 11.5.0 - 11.6.1 REST requests which timeout durin ...) NOT-FOR-US: F5 CVE-2016-1000037 (Pagure: XSS possible in file attachment endpoint ...) @@ -14577,7 +14577,7 @@ CVE-2016-6250 (Integer overflow in the ISO9660 writer in libarchive before 3.2.1 - libarchive 3.2.1-1 (low) NOTE: https://github.com/libarchive/libarchive/issues/711 NOTE: Fixed by: https://github.com/libarchive/libarchive/commit/3014e19820ea53c15c90f9d447ca3e668a0b76c6 (v3.2.1) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/20/1 CVE-2016-6252 (Integer overflow in shadow 4.2.1 allows local users to gain privileges ...) {DSA-3793-1} - shadow 1:4.4-1 (bug #832170) @@ -14682,7 +14682,7 @@ CVE-2016-6255 (Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attac - libupnp 1:1.6.19+git20160116-1.1 (bug #831857) NOTE: https://twitter.com/mjg59/status/755062278513319936 NOTE: Proposed fix: https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd - NOTE: http://www.openwall.com/lists/oss-security/2016/07/18/13 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/18/13 CVE-2016-6233 (The (1) order and (2) group methods in Zend_Db_Select in the Zend Fram ...) - zendframework 1.12.19+dfsg-1 [jessie] - zendframework <not-affected> (introduced after 1.12.9) @@ -14810,12 +14810,12 @@ CVE-2016-6905 (The read_image_tga function in gd_tga.c in the GD Graphics Librar NOTE: https://github.com/libgd/libgd/commit/5a3f19e962b507560c9206965087db4dc0ad107f NOTE: Fixed by: https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186 NOTE: followed by: https://github.com/libgd/libgd/commit/01c61f8ab110a77ae64b5ca67c244c728c506f03 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/12/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/12/4 CVE-2016-6352 (The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows ...) {DLA-2043-1} - gdk-pixbuf 2.35.4-1 (bug #832496) [wheezy] - gdk-pixbuf <not-affected> (Fails with ENOMEM, no crash) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/13/11 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/13/11 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=769170 NOTE: Fixed by: https://git.gnome.org/browse/gdk-pixbuf/commit/?id=88af50a864195da1a4f7bda5f02539704fbda599 CVE-2016-6224 (ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap ...) @@ -14823,7 +14823,7 @@ CVE-2016-6224 (ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted NOTE: Actually due to an incomplete fix of LP#1447282 NOTE: https://launchpad.net/bugs/1597154 NOTE: https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/882 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/13/2 CVE-2016-6214 (gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows re ...) {DSA-3619-1} - libgd2 2.2.2-29-g3c2b605-1 @@ -14831,12 +14831,12 @@ CVE-2016-6214 (gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allo NOTE: https://github.com/libgd/libgd/issues/247#issuecomment-232084241 NOTE: https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7 NOTE: Different issue than CVE-2016-6132 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/13/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/13/5 CVE-2016-6223 (The TIFFReadRawStrip1 and TIFFReadRawTile1 functions in tif_read.c in ...) {DSA-3762-1 DLA-693-1 DLA-610-1} - tiff 4.0.6-2 (bug #842270) - tiff3 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/07/13/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/13/3 NOTE: Upstream patch: https://github.com/vadz/libtiff/commit/0ba5d8814a17a64bdb8d9035f4c533f3f3f4b496 CVE-2016-1000023 REJECTED @@ -14894,7 +14894,7 @@ CVE-2016-6187 (The apparmor_setprocattr function in security/apparmor/lsm.c in t [wheezy] - linux <not-affected> (Vulnerable code introduced later) NOTE: Introduced by: https://git.kernel.org/linus/bb646cdb12e75d82258c2f2e7746d5952d3e321a (v4.5-rc1) NOTE: Fixed by: https://git.kernel.org/linus/30a46a4647fd1df9cf52e43bf467f0d9265096ca (v4.7-rc7) - NOTE: http://www.openwall.com/lists/oss-security/2016/07/09/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/09/1 CVE-2016-XXXX [GNUTLS-SA-2016-2: certificate verification issue] - gnutls28 3.4.14-1 (unimportant) NOTE: http://gnutls.org/security.html#GNUTLS-SA-2016-2 @@ -15835,13 +15835,13 @@ CVE-2016-5844 (Integer overflow in the ISO parser in libarchive before 3.2.1 all CVE-2016-5842 (MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote atta ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #831034) - NOTE: Details: http://www.openwall.com/lists/oss-security/2016/06/23/1 + NOTE: Details: https://www.openwall.com/lists/oss-security/2016/06/23/1 NOTE: https://github.com/ImageMagick/ImageMagick/commit/d8ab7f046587f2e9f734b687ba7e6e10147c294b NOTE: Reproducer http://bugs.fi/media/afl/imagemagick/CVE-2016-5842.jpg CVE-2016-5841 (Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 ...) {DSA-3652-1 DLA-731-1} - imagemagick 8:6.9.6.2+dfsg-2 (bug #831034) - NOTE: Details: http://www.openwall.com/lists/oss-security/2016/06/23/1 + NOTE: Details: https://www.openwall.com/lists/oss-security/2016/06/23/1 NOTE: https://github.com/ImageMagick/ImageMagick/commit/d8ab7f046587f2e9f734b687ba7e6e10147c294b NOTE: Reproducer http://bugs.fi/media/afl/imagemagick/CVE-2016-5841.jpg CVE-2016-5829 (Multiple heap-based buffer overflows in the hiddev_ioctl_usage functio ...) @@ -15889,7 +15889,7 @@ CVE-2016-5824 (libical 1.0 allows remote attackers to cause a denial of service NOTE: Related upstream ticket: https://github.com/libical/libical/issues/251 NOTE: Whilst the upstream commits in issues/251 fix the issue of #251 itself NOTE: they do not fix the bugzilla.mozilla.org case 1275400 which was assigned - NOTE: in http://www.openwall.com/lists/oss-security/2016/06/25/4 + NOTE: in https://www.openwall.com/lists/oss-security/2016/06/25/4 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2019-03/#CVE-2016-5824 NOTE: thunderbird uses embedded libical copy CVE-2016-5823 (The icalproperty_new_clone function in libical 0.47 and 1.0 allows rem ...) @@ -16045,7 +16045,7 @@ CVE-2016-5742 (SQL injection vulnerability in the XML-RPC interface in Movable T {DLA-532-1} - movabletype-opensource <removed> NOTE: https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html - NOTE: http://www.openwall.com/lists/oss-security/2016/06/22/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/06/22/3 NOTE: https://github.com/movabletype/movabletype/commit/42113544e7d8ebf6064b7b01b921734b667a1682 CVE-2016-5737 (The Gerrit configuration in the Openstack Puppet module for Gerrit (ak ...) NOT-FOR-US: Openstack-infra puppet-gerrit module @@ -16856,7 +16856,7 @@ CVE-2016-6211 (The User module in Drupal 7.x before 7.44 allows remote authentic {DSA-3604-1 DLA-550-1} - drupal7 7.44-1 NOTE: https://www.drupal.org/SA-CORE-2016-002 - NOTE: http://www.openwall.com/lists/oss-security/2016/07/13/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/07/13/4 NOTE: https://gist.github.com/lamby/4697fea399f3f01ca6de3ce9ed79fce7 tarball diff NOTE: https://gist.github.com/lamby/dbeda4d49f48a32aa0dd4b3ed7f06a13 filtered diff CVE-2016-5636 (Integer overflow in the get_data function in zipimport.c in CPython (a ...) @@ -17197,7 +17197,7 @@ CVE-2016-5339 RESERVED CVE-2016-5361 (programs/pluto/ikev1.c in libreswan before 3.17 retransmits in initial ...) - libreswan <not-affected> (Fixed before initial upload to Debian) - NOTE: Possibly the CVE should be rejected: http://www.openwall.com/lists/oss-security/2016/06/13/1 + NOTE: Possibly the CVE should be rejected: https://www.openwall.com/lists/oss-security/2016/06/13/1 NOTE: MITRE has not assigned the CVE to the protocol flaw, but specific to libreswan, but as NOTE: Huzaifa Sidhpurwala <huzaifas@redhat.com> pointed out that is not a libreswan issue, rather NOTE: the protocol is flawed. @@ -17638,7 +17638,7 @@ CVE-2016-4456 (The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 all - gnutls28 3.4.13-1 [jessie] - gnutls28 <not-affected> (Introduced in 3.4.12) NOTE: http://gnutls.org/security.html#GNUTLS-SA-2016-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/06/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/06/07/2 CVE-2016-1000002 (gdm3 3.14.2 and possibly later has an information leak before screen l ...) - gdm3 <unfixed> (low; bug #849432) [buster] - gdm3 <ignored> (Minor issue) @@ -17717,7 +17717,7 @@ CVE-2016-XXXX [doesn't remove metadata in embedded images in PDFs] NOTE: Workaround entry for DLA-650-1/DSA-3708-1 until/if CVE is assigned NOTE: https://0xacab.org/mat/mat/issues/11067 NOTE: Patch in 0.6.1-3 disabled PDF support - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/06/02/5 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/06/02/5 CVE-2016-5239 (The gnuplot delegate functionality in ImageMagick before 6.9.4-0 and G ...) {DSA-3580-1 DLA-1456-1 DLA-486-1 DLA-484-1} - graphicsmagick 1.3.24-1 @@ -18042,7 +18042,7 @@ CVE-2016-5157 (Heap-based buffer overflow in the opj_dwt_interleave_v function i [jessie] - openjpeg2 2.1.0-2+deb8u3 - chromium-browser 53.0.2785.89-1 [wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy) - NOTE: http://www.openwall.com/lists/oss-security/2016/09/08/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/08/8 NOTE: https://github.com/uclouvain/openjpeg/pull/823 CVE-2016-5156 (extensions/renderer/event_bindings.cc in the event bindings in Google ...) {DSA-3660-1} @@ -18208,7 +18208,7 @@ CVE-2016-5126 (Heap-based buffer overflow in the iscsi_aio_ioctl function in blo NOTE: https://lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1340924 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/30/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/30/6 CVE-2016-XXXX [CSRF protection for POST requests] - postfixadmin 2.93-2 (bug #825151) [jessie] - postfixadmin <no-dsa> (Minor issue) @@ -18221,7 +18221,7 @@ CVE-2016-5118 (The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 a - imagemagick 8:6.8.9.9-7.1 (bug #825799) - graphicsmagick 1.3.24-1 (bug #825800) NOTE: fixed by http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/ae3928faa858 - NOTE: patch available at http://www.openwall.com/lists/oss-security/2016/05/29/7 + NOTE: patch available at https://www.openwall.com/lists/oss-security/2016/05/29/7 CVE-2016-5116 (gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used ...) {DSA-3619-1} - libgd2 2.2.1-1 @@ -18232,7 +18232,7 @@ CVE-2016-5116 (gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as - php5 <removed> (unimportant) NOTE: PHP bug: https://bugs.php.net/bug.php?id=72115 NOTE: Starting with 5.4.0-1 Debian uses the system copy of libgd - NOTE: http://www.openwall.com/lists/oss-security/2016/05/29/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/29/3 CVE-2016-5115 (The avcodec_decode_audio4 function in libavcodec in libavformat 57.34. ...) - libav <removed> (low) [jessie] - libav <no-dsa> (Minor issue) @@ -18277,7 +18277,7 @@ CVE-2016-5108 (Buffer overflow in the DecodeAdpcmImaQT function in modules/codec {DSA-3598-1} - vlc 2.2.3-2 (bug #825728) [wheezy] - vlc <end-of-life> (Unsupported in wheezy-lts) - NOTE: Details: http://www.openwall.com/lists/oss-security/2016/05/27/3 + NOTE: Details: https://www.openwall.com/lists/oss-security/2016/05/27/3 NOTE: https://git.videolan.org/?p=vlc.git;a=commit;h=458ed62bbeb9d1bddf7b8df104e14936408a3db9 CVE-2016-5090 RESERVED @@ -18618,33 +18618,33 @@ CVE-2016-4552 (Cross-site scripting (XSS) vulnerability in Roundcube Webmail bef [wheezy] - roundcube <not-affected> (vulnerable code not present) NOTE: https://github.com/roundcube/roundcubemail/issues/5240 NOTE: https://github.com/roundcube/roundcubemail/pull/5241 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/25/8 CVE-2016-5096 (Integer overflow in the fread function in ext/standard/file.c in PHP b ...) {DSA-3602-1 DLA-533-1} - php5 5.6.22+dfsg-1 NOTE: PHP bug: https://bugs.php.net/bug.php?id=72114 NOTE: Fixed in 5.6.22, 5.5.36 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/25/3 CVE-2016-5095 (Integer overflow in the php_escape_html_entities_ex function in ext/st ...) {DSA-3602-1 DLA-533-1} - php5 5.6.22+dfsg-1 NOTE: PHP bug: https://bugs.php.net/bug.php?id=72135 NOTE: Fixed in 5.6.22, 5.5.36 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/25/3 NOTE: For the additional issue reported in the "[2016-05-17 12:55 UTC]" comment CVE-2016-5094 (Integer overflow in the php_html_entities function in ext/standard/htm ...) {DSA-3602-1 DLA-533-1} - php5 5.6.22+dfsg-1 NOTE: PHP bug: https://bugs.php.net/bug.php?id=72135 NOTE: Fixed in 5.6.22, 5.5.36 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/25/3 CVE-2016-5093 (The get_icu_value_internal function in ext/intl/locale/locale_methods. ...) {DSA-3602-1 DLA-533-1} - php7.0 7.0.7-1 - php5 5.6.22+dfsg-1 NOTE: PHP bug: https://bugs.php.net/bug.php?id=72241 NOTE: Fixed in 7.0.7, 5.6.22, 5.5.36 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/25/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/25/3 CVE-2016-5091 (Extbase in TYPO3 4.3.0 before 6.2.24, 7.x before 7.6.8, and 8.1.1 allo ...) - typo3-src <removed> [wheezy] - typo3-src <end-of-life> (Not supported in Wheezy LTS) @@ -18794,7 +18794,7 @@ CVE-2016-5117 (OpenNTPD before 6.0p1 does not validate the CN for HTTPS constrai - openntpd 1:6.0p1-1 (bug #825856; unimportant) [jessie] - openntpd <not-affected> (Vulnerable code introduced later) [wheezy] - openntpd <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2016/05/23/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/23/2 NOTE: Authenticated TLS "contraints" introduced in 2015-03-24 OpenNTPD 5.7p4 NOTE: Option is not enabled at buildtime. CVE-2016-4964 (The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Qu ...) @@ -19258,7 +19258,7 @@ CVE-2016-4762 (WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, i NOT-FOR-US: Webkit as used by Apple CVE-2016-4761 (WebKitGTK+ before 2.14.0: A use-after-free vulnerability can allow rem ...) - webkitgtk <removed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2016/11/04/14 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/04/14 NOTE: Not covered by security support CVE-2016-4760 (WebKit in Apple iOS before 10, iTunes before 12.5.1 on Windows, and Sa ...) NOT-FOR-US: Webkit as used by Apple @@ -19721,14 +19721,14 @@ CVE-2016-4567 (Cross-site scripting (XSS) vulnerability in flash/FlashMediaEleme NOTE: Fixed by: https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e NOTE: Vulnerable code present, but Flash Player disabled in Debian NOTE: See 0004-Deactivate-Flash-and-Silverlight.patch - NOTE: http://www.openwall.com/lists/oss-security/2016/05/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/07/2 CVE-2016-4566 (Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plup ...) - wordpress 4.5.2+dfsg-1 (bug #823640) [jessie] - wordpress <not-affected> (Vulnerable code not present) [wheezy] - wordpress <not-affected> (Vulnerable code not present) NOTE: https://wordpress.org/news/2016/05/wordpress-4-5-2/ NOTE: Fixed by: https://core.trac.wordpress.org/changeset/37382 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/07/2 CVE-2016-4568 (drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4. ...) - linux 4.5.3-1 [jessie] - linux <not-affected> (Vulnerable code introduced in 4.4) @@ -19753,7 +19753,7 @@ CVE-2016-4561 (Cross-site scripting (XSS) vulnerability in the cgierror function {DSA-3571-1 DLA-463-1} - ikiwiki 3.20160506 NOTE: http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/06/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/06/8 CVE-2016-4547 (Samsung devices with Android KK(4.4), L(5.0/5.1), or M(6.0) allow atta ...) NOT-FOR-US: Samsung Android component CVE-2016-4546 (Samsung devices with Android KK(4.4) or L(5.0/5.1) allow local users t ...) @@ -19762,13 +19762,13 @@ CVE-2016-4570 (The mxmlDelete function in mxml-node.c in mxml 2.9, 2.7, and poss {DLA-1641-1} - mxml 2.9-1 (bug #825855) [wheezy] - mxml <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/05/07/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/07/8 NOTE: https://github.com/michaelrsweet/mxml/commit/d8c0ba900728d47523d76ba4acf33176cd04647c CVE-2016-4571 (The mxml_write_node function in mxml-file.c in mxml 2.9, 2.7, and poss ...) {DLA-1641-1} - mxml 2.9-2 (bug #825855) [wheezy] - mxml <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/05/07/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/07/8 NOTE: https://github.com/michaelrsweet/mxml/commit/5f74dc212497332d05882660db130a37d2f458eb CVE-2016-4558 (The BPF subsystem in the Linux kernel before 4.5.5 mishandles referenc ...) - linux 4.5.3-1 @@ -19785,7 +19785,7 @@ CVE-2016-4557 (The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c NOTE: Fixed by: https://git.kernel.org/linus/8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7 (v4.6-rc6) NOTE: Introduced by: https://git.kernel.org/linus/0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (v3.18-rc1) NOTE: Exploitable since: https://git.kernel.org/linus/1be7f75d1668d6296b80bf35dcf6762393530afc (v4.4-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2016/05/06/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/06/4 CVE-2016-4556 (Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x ...) {DSA-3625-1 DLA-478-1} - squid3 3.5.19-1 (bug #823968) @@ -19997,7 +19997,7 @@ CVE-2016-4539 (The xml_parse_into_struct function in ext/xml/xml.c in PHP before NOTE: https://bugs.php.net/bug.php?id=72099 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=dccda88f27a084bcbbb30198ace12b4e7ae961cc NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 NOTE: HHVM fix: https://github.com/facebook/hhvm/commit/7290b3bbcaa1e10a8d807fab3242204e9ec3a015 CVE-2016-4537 (The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6 ...) {DSA-3602-1 DLA-499-1} @@ -20006,7 +20006,7 @@ CVE-2016-4537 (The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35 NOTE: https://bugs.php.net/bug.php?id=72093 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4538 (The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6 ...) {DSA-3602-1 DLA-628-1} - php7.0 7.0.6-1 @@ -20014,7 +20014,7 @@ CVE-2016-4538 (The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35 NOTE: https://bugs.php.net/bug.php?id=72093 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=d650063a0457aec56364e4005a636dc6c401f9cd NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4540 (The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c i ...) {DSA-3602-1 DLA-499-1} - php7.0 7.0.6-1 @@ -20022,7 +20022,7 @@ CVE-2016-4540 (The grapheme_stripos function in ext/intl/grapheme/grapheme_strin NOTE: https://bugs.php.net/bug.php?id=72061 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4541 (The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in ...) {DSA-3602-1 DLA-499-1} - php7.0 7.0.6-1 @@ -20030,7 +20030,7 @@ CVE-2016-4541 (The grapheme_strpos function in ext/intl/grapheme/grapheme_string NOTE: https://bugs.php.net/bug.php?id=72061 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=fd9689745c44341b1bd6af4756f324be8abba2fb NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4542 (The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5 ...) {DSA-3602-1 DLA-499-1} - php7.0 7.0.6-1 @@ -20038,7 +20038,7 @@ CVE-2016-4542 (The exif_process_IFD_TAG function in ext/exif/exif.c in PHP befor NOTE: https://bugs.php.net/bug.php?id=72094 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4543 (The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before ...) {DSA-3602-1 DLA-499-1} - php7.0 7.0.6-1 @@ -20046,7 +20046,7 @@ CVE-2016-4543 (The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP b NOTE: https://bugs.php.net/bug.php?id=72094 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4544 (The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP befor ...) {DSA-3602-1 DLA-499-1} - php7.0 7.0.6-1 @@ -20054,7 +20054,7 @@ CVE-2016-4544 (The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP NOTE: https://bugs.php.net/bug.php?id=72094 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=082aecfc3a753ad03be82cf14f03ac065723ec92 NOTE: Fixed in 7.0.6, 5.6.21, 5.5.35 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/21 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/21 CVE-2016-4536 (The client in OpenAFS before 1.6.17 does not properly initialize the ( ...) {DLA-493-1} - openafs 1.6.17-1 @@ -20258,12 +20258,12 @@ CVE-2016-4423 (The attemptAuthentication function in Component/Security/Http/Fir NOTE: https://symfony.com/blog/cve-2016-4423-large-username-storage-in-session CVE-2016-XXXX [XSS] - dotclear <removed> - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/05/04/9 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/05/04/9 CVE-2016-4482 (The proc_connectinfo function in drivers/usb/core/devio.c in the Linux ...) {DSA-3607-1 DLA-516-1} - linux 4.5.5-1 NOTE: http://www.spinics.net/lists/linux-usb/msg140243.html - NOTE: http://www.openwall.com/lists/oss-security/2016/05/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/04/2 NOTE: Fixed by: https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114ee CVE-2016-4483 (The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 all ...) {DSA-3593-1 DLA-503-1} @@ -20404,19 +20404,19 @@ CVE-2016-4478 (Buffer overflow in the xmlrpc_char_encode function in modules/tra {DSA-3586-1} - atheme-services 7.0.7-2 NOTE: https://github.com/atheme/atheme/commit/87580d767868360d2fed503980129504da84b63e - NOTE: http://www.openwall.com/lists/oss-security/2016/05/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/02/2 CVE-2016-4425 (Jansson 2.7 and earlier allows context-dependent attackers to cause a ...) {DSA-3577-1 DLA-471-1} - jansson 2.7-5 (bug #823238) NOTE: https://github.com/akheron/jansson/issues/282 NOTE: https://github.com/akheron/jansson/pull/284 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/01/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/01/5 CVE-2016-4422 (The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth mi ...) {DSA-3567-1} - libpam-sshauth 0.4.1-2 NOTE: Introduced in: https://bazaar.launchpad.net/~ltsp-upstream/ltsp/libpam-sshauth/revision/93/src/pam_sshauth.c NOTE: Fixed in: https://bazaar.launchpad.net/~ltsp-upstream/ltsp/libpam-sshauth/revision/114 - NOTE: http://www.openwall.com/lists/oss-security/2016/05/01/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/01/2 CVE-2016-4414 (The onReadyRead function in core/coreauthhandler.cpp in Quassel before ...) - quassel 1:0.12.4-2 (bug #826402) [jessie] - quassel 1:0.10.0-2.3+deb8u3 @@ -20424,7 +20424,7 @@ CVE-2016-4414 (The onReadyRead function in core/coreauthhandler.cpp in Quassel b NOTE: https://github.com/quassel/quassel/blob/f64ac93/src/core/coreauthhandler.cpp#L100 NOTE: Introduced by: https://github.com/quassel/quassel/commit/d1bf207 (0.10.0) NOTE: Fixed by: https://github.com/quassel/quassel/commit/e67887343c433cc35bc26ad6a9392588f427e746 (0.12.4) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/30/2 CVE-2016-4349 (Untrusted search path vulnerability in Cisco WebEx Productivity Tools ...) NOT-FOR-US: Cisco CVE-2016-4352 (Integer overflow in the demuxer function in libmpdemux/demux_gif.c in ...) @@ -20434,7 +20434,7 @@ CVE-2016-4352 (Integer overflow in the demuxer function in libmpdemux/demux_gif. [jessie] - mplayer2 <no-dsa> (Minor issue) NOTE: https://trac.mplayerhq.hu/ticket/2295 NOTE: Fixed in Revision r37857 upstream - NOTE: http://www.openwall.com/lists/oss-security/2016/04/29/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/29/3 CVE-2016-4341 (NetApp Clustered Data ONTAP before 8.3.2P7 allows remote attackers to ...) NOT-FOR-US: NetApp CVE-2016-4339 @@ -21020,7 +21020,7 @@ CVE-2016-4074 (The jv_dump_term function in jq 1.5 allows remote attackers to ca - jq 1.5+dfsg-1.1 (low; bug #822456) [jessie] - jq 1.4-2.1+deb8u1 NOTE: https://github.com/stedolan/jq/issues/1136 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/24/3 CVE-2016-4069 (Cross-site request forgery (CSRF) vulnerability in Roundcube Webmail b ...) {DLA-613-1} - roundcube 1.1.5+dfsg.1-1 (bug #822333) @@ -21028,7 +21028,7 @@ CVE-2016-4069 (Cross-site request forgery (CSRF) vulnerability in Roundcube Webm NOTE: https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115 NOTE: https://github.com/roundcube/roundcubemail/commit/4a408843b0ef816daf70a472a02b78cd6073a4d5 NOTE: https://github.com/roundcube/roundcubemail/commit/699af1e5206ed9114322adaa3c25c1c969640a53 (release-1.1) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/23/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/23/3 CVE-2016-4068 (Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1 ...) {DLA-537-1} - roundcube 1.2.1+dfsg.1-1 @@ -21175,7 +21175,7 @@ CVE-2016-3955 (The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c {DSA-3607-1 DLA-516-1} - linux 4.5.2-1 NOTE: Upstream commit: https://git.kernel.org/linus/b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb (v4.6-rc3) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/19/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/19/1 CVE-2016-4038 (Array index error in the msm_sensor_config function in kernel/SM-G9008 ...) NOT-FOR-US: Samsung Android driver CVE-2016-4035 @@ -21196,7 +21196,7 @@ CVE-2016-4037 (The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allo [wheezy] - qemu-kvm <no-dsa> (Minor issue) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg02691.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1325129 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/18/3 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=1ae3f2f178087711f9591350abad133525ba93f2 (v2.6.0-rc3) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=a49923d2837d20510d645d3758f1ad87c32d0730 (v2.6.0-rc3) CVE-2016-4030 (Samsung SM-G920F build G920FXXU2COH2 (Galaxy S6), SM-N9005 build N9005 ...) @@ -21258,7 +21258,7 @@ CVE-2016-4024 (Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allow {DSA-3555-1} - imlib2 1.4.8-1 (bug #821732) NOTE: Upstream fix: https://git.enlightenment.org/legacy/imlib2.git/commit/?id=7eba2e4c8ac0e20838947f10f29d0efe1add8227 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/14/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/14/5 CVE-2016-4005 (The Huawei Hilink App application before 3.19.2 for Android does not v ...) NOT-FOR-US: Huawei CVE-2016-4004 (Directory traversal vulnerability in Dell OpenManage Server Administra ...) @@ -21272,7 +21272,7 @@ CVE-2016-4020 (The patch_instruction function in hw/i386/kvmvapic.c in QEMU does - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1313686 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/13/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/13/6 CVE-2016-4000 (Jython before 2.7.1rc1 allows attackers to execute arbitrary code via ...) {DSA-3893-1 DLA-989-1} - jython 2.5.3-17 (bug #864859) @@ -21287,7 +21287,7 @@ CVE-2016-3997 (NetApp Clustered Data ONTAP allows man-in-the-middle attackers to CVE-2016-XXXX [auth bypass] - brltty <not-affected> (Vulnerable code introduced later) NOTE: https://bugzilla.suse.com/show_bug.cgi?id=967436 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/04/12/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/04/12/4 NOTE: Introduced in: https://github.com/brltty/brltty/commit/e62b3c925d03239a372d425fb87b2cac65d8ef19 NOTE: Fixed by: https://github.com/brltty/brltty/commit/74affe7d1401f2b43ad32e18cb78704d22604ad7 CVE-2016-3996 (ClipboardDataMgr in Samsung KNOX 1.0.0 and 2.3.0 does not properly che ...) @@ -21333,7 +21333,7 @@ CVE-2016-4002 (Buffer overflow in the mipsnet_receive function in hw/net/mipsnet [wheezy] - qemu-kvm <no-dsa> (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1326082 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/6 CVE-2016-4001 (Buffer overflow in the stellaris_enet_receive function in hw/net/stell ...) {DLA-1599-1} - qemu 1:2.6+dfsg-1 (bug #821038) @@ -21343,12 +21343,12 @@ CVE-2016-4001 (Buffer overflow in the stellaris_enet_receive function in hw/net/ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1325884 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66 (v2.6.0-rc2) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/4 CVE-2016-4008 (The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 ...) {DSA-3568-1 DLA-495-1} - libtasn1-6 4.8-1 - libtasn1-3 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/3 NOTE: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=f435825c0f527a8e52e6ffbc3ad0bc60531d537e NOTE: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625 CVE-2016-3995 (The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and ...) @@ -21356,13 +21356,13 @@ CVE-2016-3995 (The timing attack protection in Rijndael::Enc::ProcessAndXorBlock [jessie] - libcrypto++ 5.6.1-6+deb8u2 [wheezy] - libcrypto++ 5.6.1-6+deb7u2 NOTE: https://github.com/weidai11/cryptopp/issues/146 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/10/6 NOTE: Initial upload in 5.6.3-5 was incomplete CVE-2016-3994 (The GIF loader in imlib2 before 1.4.9 allows remote attackers to cause ...) {DSA-3555-1} - imlib2 1.4.8-1 (bug #785369) NOTE: https://git.enlightenment.org/legacy/imlib2.git/commit/?id=37a96801663b7b4cd3fbe56cc0eb8b6a17e766a8 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/09/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/09/6 CVE-2016-4070 (** DISPUTED ** Integer overflow in the php_raw_url_encode function in ...) {DSA-3560-1 DLA-499-1} - php7.0 7.0.5-1 @@ -21371,7 +21371,7 @@ CVE-2016-4070 (** DISPUTED ** Integer overflow in the php_raw_url_encode functio NOTE: Fixed in 7.0.5, 5.6.20, 5.5.34 NOTE: https://bugs.php.net/bug.php?id=71798 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=95433e8e339dbb6b5d5541473c1661db6ba2c451 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/7 NOTE: Fix in HHVM: https://github.com/facebook/hhvm/commit/ea6ff01f6c31f1615a935ef96622d623a6277d37 CVE-2016-4071 (Format string vulnerability in the php_snmp_error function in ext/snmp ...) {DSA-3560-1 DLA-499-1} @@ -21380,7 +21380,7 @@ CVE-2016-4071 (Format string vulnerability in the php_snmp_error function in ext NOTE: Fixed in 7.0.5, 5.6.20, 5.5.34 NOTE: https://bugs.php.net/bug.php?id=71704 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=6e25966544fb1d2f3d7596e060ce9c9269bbdcf8 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/7 CVE-2016-4072 (The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x ...) {DSA-3560-1 DLA-499-1} - php7.0 7.0.5-1 @@ -21389,7 +21389,7 @@ CVE-2016-4072 (The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and NOTE: https://bugs.php.net/bug.php?id=71860 NOTE: https://gist.github.com/smalyshev/80b5c2909832872f2ba2 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/7 CVE-2016-4073 (Multiple integer overflows in the mbfl_strcut function in ext/mbstring ...) {DSA-3560-1 DLA-499-1} - php7.0 7.0.5-1 @@ -21398,7 +21398,7 @@ CVE-2016-4073 (Multiple integer overflows in the mbfl_strcut function in ext/mbs NOTE: https://bugs.php.net/bug.php?id=71906 NOTE: https://gist.github.com/smalyshev/d8355c96a657cc5dba70 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/11/7 CVE-2016-3976 (Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through ...) NOT-FOR-US: SAP CVE-2016-3975 (Cross-site scripting (XSS) vulnerability in SAP NetWeaver AS Java 7.1 ...) @@ -21449,7 +21449,7 @@ CVE-2016-3963 (Siemens SCALANCE S613 allows remote attackers to cause a denial o NOT-FOR-US: Siemens CVE-2016-3992 (cronic before 3 allows local users to write to arbitrary files via a s ...) - cronic 3-1 (bug #820331) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/09/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/09/4 CVE-2016-3962 (Stack-based buffer overflow in the NTP time-server interface on Meinbe ...) NOT-FOR-US: Meinberg CVE-2016-3961 (Xen and the Linux kernel through 4.5.x do not properly suppress hugetl ...) @@ -21513,7 +21513,7 @@ CVE-2016-3993 (Off-by-one error in the __imlib_MergeUpdate function in lib/updat {DSA-3555-1} - imlib2 1.4.8-1 (bug #819818) NOTE: https://git.enlightenment.org/legacy/imlib2.git/commit/?id=ce94edca1ccfbe314cb7cd9453433fad404ec7ef - NOTE: http://www.openwall.com/lists/oss-security/2016/04/09/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/09/5 CVE-2016-3948 (Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds ...) {DSA-3625-1} - squid3 3.5.16-1 (bug #819784) @@ -22347,7 +22347,7 @@ CVE-2016-3622 (The fpAcc function in tif_predict.c in the tiff2rgba tool in LibT {DSA-3762-1 DLA-795-1} - tiff 4.0.7-1 (low; bug #820365) - tiff3 <not-affected> (tiff tools not built) - NOTE: http://www.openwall.com/lists/oss-security/2016/04/07/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/07/4 NOTE: Fixed by: https://github.com/vadz/libtiff/commit/92d966a5fcfbdca67957c8c5c47b467aa650b286 CVE-2016-3621 (The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF 4. ...) {DLA-693-1} @@ -22355,7 +22355,7 @@ CVE-2016-3621 (The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTI [jessie] - tiff 4.0.3-12.3+deb8u2 - tiff3 <not-affected> (tiff tools not built) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2565 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/07/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/07/3 NOTE: Utility bmp2tiff has been removed from upstream LibTIFF NOTE: bmp2tiff was removed in 4.0.6-3 and DSA 3762, marking as fixed although technically still present in the source package CVE-2016-3620 (The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTIFF 4. ...) @@ -22364,7 +22364,7 @@ CVE-2016-3620 (The ZIPEncode function in tif_zip.c in the bmp2tiff tool in LibTI [jessie] - tiff 4.0.3-12.3+deb8u2 - tiff3 <not-affected> (tiff tools not built) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2570 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/07/2 NOTE: Utility bmp2tiff has been removed from upstream LibTIFF NOTE: bmp2tiff was removed in 4.0.6-3 and DSA 3762, marking as fixed although technically still present in the source package CVE-2016-3619 (The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff tool in ...) @@ -22373,7 +22373,7 @@ CVE-2016-3619 (The DumpModeEncode function in tif_dumpmode.c in the bmp2tiff too [jessie] - tiff 4.0.3-12.3+deb8u2 - tiff3 <not-affected> (tiff tools not built) NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2567 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/07/1 NOTE: Utility bmp2tiff has been removed from upstream LibTIFF NOTE: bmp2tiff was removed in 4.0.6-3 and DSA 3762, marking as fixed although technically still present in the source package CVE-2016-3618 @@ -22396,7 +22396,7 @@ CVE-2016-3627 (The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and {DSA-3593-1 DLA-503-1} - libxml2 2.9.3+dfsg1-1.1 (bug #819006) NOTE: https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9 (v2.9.4) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/21/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/21/3 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=762100 CVE-2016-3615 (Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 a ...) {DSA-3632-1 DSA-3624-1 DLA-567-1} @@ -23475,7 +23475,7 @@ CVE-2016-3156 (The IPv4 implementation in the Linux kernel before 4.5.2 mishandl {DSA-3607-1} - linux 4.5.1-1 [wheezy] - linux <not-affected> (Not a security issue since containers are not supported) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/15/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/15/3 CVE-2016-3133 RESERVED CVE-2016-3132 (Double free vulnerability in the SplDoublyLinkedList::offsetSet functi ...) @@ -23625,7 +23625,7 @@ CVE-2016-3079 (Multiple cross-site scripting (XSS) vulnerabilities in the Web UI NOT-FOR-US: Red Hat Satellite / Spacewalk CVE-2016-3078 (Multiple integer overflows in php_zip.c in the zip extension in PHP be ...) - php7.0 7.0.6-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/28/1 NOTE: Fixed in 7.0.6 NOTE: https://bugs.php.net/bug.php?id=71923 CVE-2016-3077 (The VersionMapper.fromKernelVersionString method in oVirt Engine allow ...) @@ -23705,12 +23705,12 @@ CVE-2016-XXXX [fscanf format string security bug in flashrom layout code] CVE-2016-3183 (The sycc422_t_rgb function in common/color.c in OpenJPEG before 2.1.1 ...) - openjpeg2 2.1.1-1 (low; bug #818399) [jessie] - openjpeg2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/14/14 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/14/14 NOTE: https://github.com/uclouvain/openjpeg/issues/726 CVE-2016-3182 (The color_esycc_to_rgb function in bin/common/color.c in OpenJPEG befo ...) - openjpeg2 2.1.1-1 [jessie] - openjpeg2 <not-affected> (Vulnerable code not yet present in 2.1.0) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/14/13 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/14/13 NOTE: https://github.com/uclouvain/openjpeg/issues/725 CVE-2016-3181 REJECTED @@ -24175,24 +24175,24 @@ CVE-2016-2860 (The newEntry function in ptserver/ptprocs.c in OpenAFS before 1.6 CVE-2016-3154 (The encoder_contexte_ajax function in ecrire/inc/filtres.php in SPIP 2 ...) {DSA-3518-1} - spip 3.0.22-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/15/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/15/2 NOTE: patch https://core.spip.net/projects/spip/repository/revisions/22903 CVE-2016-3153 (SPIP 2.x before 2.1.19, 3.0.x before 3.0.22, and 3.1.x before 3.1.1 al ...) {DSA-3518-1} - spip 3.0.22-1 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/15/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/15/2 NOTE: patch https://core.spip.net/projects/spip/repository/revisions/22911 CVE-2016-XXXX [Cross-site scripting (XSS) vulnerability in cgit's "txt2html" filter] - cgit 0.12.0.git2.7.0-1 [jessie] - cgit 0.10.2.git2.0.1-3+deb8u1 NOTE: https://git.zx2c4.com/cgit/commit/filters/html-converters/txt2html?id=13c2d3df0440ce04273de3149631a9bd97490c6e - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/03/05/8 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/03/05/8 CVE-2016-3172 (SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier al ...) {DLA-560-1} - cacti 0.8.8g+ds1-2 (bug #818647) [jessie] - cacti 0.8.8b+dfsg-8+deb8u5 NOTE: http://bugs.cacti.net/view.php?id=2667 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/13 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/13 NOTE: Requires authenticated user CVE-2016-3116 (CRLF injection vulnerability in Dropbear SSH before 2016.72 allows rem ...) - dropbear 2016.72-1 @@ -24206,7 +24206,7 @@ CVE-2016-3115 (Multiple CRLF injection vulnerabilities in session.c in sshd in O [wheezy] - openssh <no-dsa> (Minor issue) NOTE: http://www.openssh.com/txt/x11fwd.adv NOTE: Portable OpenSSH 7.2p2 contains a fix for this vulnerability. - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/8 NOTE: Upstream fix: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/session.c.diff?r1=1.281&r2=1.282&sortby=date&f=h CVE-2016-3134 (The netfilter subsystem in the Linux kernel through 4.5.2 does not val ...) {DSA-3607-1 DLA-516-1} @@ -24215,8 +24215,8 @@ CVE-2016-3134 (The netfilter subsystem in the Linux kernel through 4.5.2 does no NOTE: https://code.google.com/p/google-security-research/issues/detail?id=758 NOTE: https://patchwork.ozlabs.org/patch/595575/ NOTE: http://marc.info/?l=netfilter-devel&m=145757134822741&w=2 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/4 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/7 NOTE: Non-privileged user namespaces disabled by default, only vulnerable with sysctl kernel.unprivileged_userns_clone=1 CVE-2016-3135 (Integer overflow in the xt_alloc_table_info function in net/netfilter/ ...) - linux 4.4.6-1 @@ -24224,7 +24224,7 @@ CVE-2016-3135 (Integer overflow in the xt_alloc_table_info function in net/netfi [wheezy] - linux <not-affected> (Vulnerable code not present) NOTE: http://marc.info/?l=netfilter-devel&m=145757136822750&w=2 NOTE: https://patchwork.ozlabs.org/patch/595576/ - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/7 CVE-2016-2859 REJECTED CVE-2016-3124 (The sanitycheck module in SimpleSAMLphp before 1.14.1 allows remote at ...) @@ -24232,7 +24232,7 @@ CVE-2016-3124 (The sanitycheck module in SimpleSAMLphp before 1.14.1 allows remo NOTE: https://simplesamlphp.org/security/201603-01 NOTE: Fixed upstream in 1.14.1 NOTE: https://github.com/simplesamlphp/simplesamlphp/commit/952027dd7f794ff4b2d4f5eddf549c5b5070fa38 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/08/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/08/4 NOTE: Not treated as a security issue, many components in Debian reveal the release in use CVE-2016-2855 (The Huawei Mobile Broadband HL Service 22.001.25.00.03 and earlier use ...) NOT-FOR-US: Huawei @@ -24297,8 +24297,8 @@ CVE-2016-3142 (The phar_parse_zipfile function in zip.c in the PHAR extension in [wheezy] - php5 <no-dsa> (Minor issue, can be fixed in next update round) NOTE: https://bugs.php.net/bug.php?id=71498 NOTE: Fixed in 5.5.33, 5.6.19 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/5 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/13/2 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=a6fdc5bb27b20d889de0cd29318b3968aabb57bd CVE-2016-3141 (Use-after-free vulnerability in wddx.c in the WDDX extension in PHP be ...) {DLA-818-1} @@ -24307,8 +24307,8 @@ CVE-2016-3141 (Use-after-free vulnerability in wddx.c in the WDDX extension in P [wheezy] - php5 <no-dsa> (Minor issue, can be fixed in next update round) NOTE: https://bugs.php.net/bug.php?id=71587 NOTE: Fixed in 5.5.33, 5.6.19 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/10/5 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/10/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/13/1 CVE-2016-2858 (QEMU, when built with the Pseudo Random Number Generator (PRNG) back-e ...) {DLA-1599-1} - qemu 1:2.6+dfsg-1 (bug #817183) @@ -24318,7 +24318,7 @@ CVE-2016-2858 (QEMU, when built with the Pseudo Random Number Generator (PRNG) b NOTE: Upstream patch: http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956 (v2.6.0-rc0) NOTE: Introduced in: http://git.qemu.org/?p=qemu.git;a=commit;h=a9b7b2ad7b075dba5495271706670e5c6b1304bc (v1.3.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1314676 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/04/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/04/1 CVE-2016-8000 REJECTED CVE-2016-2840 (An issue was discovered in Open-Xchange Server 6 / OX AppSuite before ...) @@ -24329,7 +24329,7 @@ CVE-2016-2857 (The net_checksum_calculate function in net/checksum.c in QEMU all - qemu-kvm <removed> NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=362786f14a753d8a5256ef97d7c10ed576d6572b (v2.6.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1296567 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/03/9 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/03/9 CVE-2016-2854 (The aufs module for the Linux kernel 3.x and 4.x does not properly mai ...) - linux 3.18-1~exp1 [jessie] - linux <ignored> (Not exploitable in default configuration) @@ -24634,7 +24634,7 @@ CVE-2016-2841 (The ne2000_receive function in the NE2000 NIC emulation support ( [wheezy] - qemu-kvm <no-dsa> (Minor issue) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190 (v2.6.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1303106 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/02/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/02/8 CVE-2016-2788 (MCollective 2.7.0 and 2.8.x before 2.8.9, as used in Puppet Enterprise ...) - mcollective 2.12.0+dfsg-1 (bug #850968) [jessie] - mcollective <no-dsa> (Minor issue) @@ -25107,7 +25107,7 @@ CVE-2016-2779 (runuser in util-linux allows local users to escape to the parent [wheezy] - util-linux <not-affected> (runuser[.c] not yet present) [squeeze] - util-linux <not-affected> (runuser[.c] not yet present) NOTE: Restricting ioctl on the kernel side seems the better approach, patches have been posted to kernel-hardening list - NOTE: http://www.openwall.com/lists/oss-security/2016/02/27/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/27/1 NOTE: https://marc.info/?l=util-linux-ng&m=145694736107128&w=2 NOTE: 2.31 introduces a new --pty option to separate privileged and unprivileged NOTE: shells (not enabled by default and the cli switch is necessary). @@ -25118,7 +25118,7 @@ CVE-2016-XXXX [Partial SMAP bypass on 64-bit Linux kernels] - linux-2.6 <not-affected> (Introduced in 3.10) NOTE: Introduced by: https://git.kernel.org/linus/63bcff2a307b9bcc712a8251eb27df8b2e117967 (v3.10-rc1) NOTE: Fixed by: https://git.kernel.org/linus/3d44d51bd339766f0178f0cf2e8d048b4a4872aa (v4.5-rc6) - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/26/6 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/02/26/6 CVE-2016-7575 REJECTED CVE-2016-2573 @@ -25229,14 +25229,14 @@ CVE-2016-3162 (The File module in Drupal 7.x before 7.43 and 8.x before 8.0.4 al - drupal7 7.43-1 - drupal6 <not-affected> (Only affects Drupal 7.x and Drupal 8.x) NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3163 (The XML-RPC system in Drupal 6.x before 6.38 and 7.x before 7.43 might ...) {DSA-3498-1} - drupal7 7.43-1 - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3164 (Drupal 6.x before 6.38, 7.x before 7.43, and 8.x before 8.0.4 might al ...) {DSA-3498-1} - drupal8 <itp> (bug #756305) @@ -25244,52 +25244,52 @@ CVE-2016-3164 (Drupal 6.x before 6.38, 7.x before 7.43, and 8.x before 8.0.4 mig - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3165 (The Form API in Drupal 6.x before 6.38 ignores access restrictions on ...) - drupal7 <not-affected> (Only affects Drupal 6) - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3166 (CRLF injection vulnerability in the drupal_set_header function in Drup ...) - drupal7 <not-affected> (Only affects Drupal 6) - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3167 (Open redirect vulnerability in the drupal_goto function in Drupal 6.x ...) - drupal7 <not-affected> (Only affects Drupal 6) - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3168 (The System module in Drupal 6.x before 6.38 and 7.x before 7.43 might ...) {DSA-3498-1} - drupal7 7.43-1 - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3169 (The User module in Drupal 6.x before 6.38 and 7.x before 7.43 allows r ...) {DSA-3498-1} - drupal7 7.43-1 - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3170 (The "have you forgotten your password" links in the User module in Dru ...) {DSA-3498-1} - drupal8 <itp> (bug #756305) - drupal7 7.43-1 - drupal6 <not-affected> (Only affects Drupal 7.x and Drupal 8.x) NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-3171 (Drupal 6.x before 6.38, when used with PHP before 5.4.45, 5.5.x before ...) - drupal7 <not-affected> (Only affects Drupal 6) - drupal6 <removed> [squeeze] - drupal6 <end-of-life> NOTE: https://www.drupal.org/SA-CORE-2016-001 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/24/19 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/24/19 CVE-2016-2541 (Audacity before 2.1.2 allows remote attackers to cause a denial of ser ...) - audacity 2.1.2-1 (unimportant) [jessie] - audacity <not-affected> (Vulnerable code not present) @@ -25528,7 +25528,7 @@ CVE-2016-2538 (Multiple integer overflows in the USB Net device emulator (hw/usb NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1303120 NOTE: Upstream commit: http://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e (v2.6.0-rc0) NOTE: Introduced by: http://git.qemu.org/?p=qemu.git;a=commit;h=6c9f886ceae5b998dc2b9af2bf77666941689bce (v0.10.0) - NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/22/3 CVE-2016-2515 (Hawk before 3.1.3 and 4.x before 4.1.1 allow remote attackers to cause ...) NOT-FOR-US: NodeJS Hawk CVE-2016-2511 (Cross-site scripting (XSS) vulnerability in WebSVN 2.3.3 and earlier a ...) @@ -25814,7 +25814,7 @@ CVE-2016-2391 (The ohci_bus_start function in the USB OHCI emulation support (hw [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=fa1298c2d623522eda7b4f1f721fcb935abb7360 (v2.6.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1304794 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/16/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/16/2 CVE-2016-2390 (The FwdState::connectedToPeer method in FwdState.cc in Squid before 3. ...) - squid 4.1-1 (unimportant) - squid3 3.5.14-1 (unimportant) @@ -26030,7 +26030,7 @@ CVE-2016-2384 (Double free vulnerability in the snd_usbmidi_create function in s - linux 4.4.2-1 - linux-2.6 <removed> NOTE: Fixed by: https://git.kernel.org/linus/07d86ca93db7e5cdf4743564d98292042ec21af7 (v4.5-rc4) - NOTE: http://www.openwall.com/lists/oss-security/2016/02/14/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/14/2 NOTE: https://xairy.github.io/blog/2016/cve-2016-2384 CVE-2016-2383 (The adjust_branches function in kernel/bpf/verifier.c in the Linux ker ...) - linux 4.4.2-1 @@ -26039,7 +26039,7 @@ CVE-2016-2383 (The adjust_branches function in kernel/bpf/verifier.c in the Linu - linux-2.6 <not-affected> (Vulnerable code not present) NOTE: Fixed by: https://git.kernel.org/linus/a1b14d27ed0965838350f1377ff97c93ee383492 (v4.5-rc4) NOTE: Introduced by: https://git.kernel.org/linus/9bac3d6d548e5cc925570b263f35b70a00a00ffd (v4.1-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2016/02/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/14/1 CVE-2016-XXXX [exec functions ignore length but look for NULL termination] - php5 5.6.18+dfsg-1 [jessie] - php5 5.6.19+dfsg-0+deb8u1 @@ -26140,7 +26140,7 @@ CVE-2016-2554 (Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.3 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1305543 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=07c7df68bd68bbe706371fccc77c814ebb335d9e NOTE: Fixed in 5.6.18, 5.5.32, 7.0.3 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/22/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/22/5 CVE-2016-XXXX [Type confusion vulnerability in WDDX packet deserialization] - php5 5.6.18+dfsg-1 [jessie] - php5 5.6.19+dfsg-0+deb8u1 @@ -26192,7 +26192,7 @@ CVE-2016-2324 (Integer overflow in Git before 2.7.4 allows remote attackers to e {DSA-3521-1} - git 1:2.8.0~rc3-1 (bug #818318) NOTE: Removal of path_name: https://github.com/git/git/commit/9831e92bfa833ee9c0ce464bbc2f941ae6c2698d (v2.8.0-rc0) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/16/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/16/2 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=971328#c4 - cgit <not-affected> (path_name function from embedded git is not called) CVE-2016-2323 @@ -26375,7 +26375,7 @@ CVE-2016-2313 (auth_login.php in Cacti before 0.8.8g allows remote authenticated NOTE: http://bugs.cacti.net/view.php?id=2656 NOTE: Upstream fix: http://svn.cacti.net/viewvc?view=rev&revision=7770 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=965930 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/09/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/09/3 NOTE: Only exploitable in non default setup CVE-2016-2312 (Turning all screens off in Plasma-workspace and kscreenlocker while th ...) - plasma-workspace 4:5.4.3-2 (bug #814355) @@ -26450,13 +26450,13 @@ CVE-2016-2224 (The __decode_dotted function in libc/inet/resolv.c in uClibc-ng b - uclibc <unfixed> (unimportant) NOTE: Just for cross-compiling, not used for actual packages NOTE: http://repo.or.cz/uclibc-ng.git/commit/d9c3a16dcab57d6b56225b9a67e9119cc9e2e4ac - NOTE: http://www.openwall.com/lists/oss-security/2016/02/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/05/2 CVE-2016-2225 (The __read_etc_hosts_r function in libc/inet/resolv.c in uClibc-ng bef ...) {DLA-561-1} - uclibc <unfixed> (unimportant) NOTE: Just for cross-compiling, not used for actual packages NOTE: http://repo.or.cz/uclibc-ng.git/commit/6932f2282ba0578d6ca2f21eead920d6b78bc93c - NOTE: http://www.openwall.com/lists/oss-security/2016/02/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/05/2 CVE-2016-2216 (The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 ...) - nodejs 4.3.0~dfsg-1 (unimportant) NOTE: libv8 is not covered by security support @@ -26528,7 +26528,7 @@ CVE-2016-2228 (Cross-site scripting (XSS) vulnerability in horde/templates/topba NOTE: http://lists.horde.org/archives/announce/2016/001140.html NOTE: https://github.com/horde/horde/commit/f03301cf6edcca57121a15e80014c4d0f29d99a0 NOTE: https://github.com/horde/horde/commit/ab07a1b447de34e13983b4d7ceb18b58c3a358d8 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/06/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/06/4 CVE-2016-7028 REJECTED CVE-2016-2199 (Multiple cross-site request forgery (CSRF) vulnerabilities in the Orga ...) @@ -26566,7 +26566,7 @@ CVE-2016-2191 (The bmp_read_rows function in pngxtern/pngxrbmp.c in OptiPNG befo {DSA-3546-1} - optipng 0.7.6-1 (bug #820068) NOTE: https://sourceforge.net/p/optipng/bugs/59/ - NOTE: http://www.openwall.com/lists/oss-security/2016/04/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/04/2 CVE-2016-2190 (Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x ...) - moodle 2.7.13+dfsg-1 CVE-2016-2189 @@ -26836,11 +26836,11 @@ CVE-2016-2117 (The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2 - linux 4.5.2-1 [wheezy] - linux <not-affected> (Issue introduced with v3.10-rc1) NOTE: Introduced in https://git.kernel.org/linus/ec5f061564238892005257c83565a0b58ec79295 (v3.10-rc1) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/16/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/16/7 CVE-2016-2116 (Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900. ...) {DSA-3508-1} - jasper <removed> (bug #816626) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/03/12 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/03/12 CVE-2016-2115 (Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before ...) {DSA-3548-1} - samba 2:4.3.7+dfsg-1 @@ -26939,20 +26939,20 @@ CVE-2016-2533 (Buffer overflow in the ImagingPcdDecode function in PcdDecode.c i - python-imaging <removed> [wheezy] - python-imaging 1.1.7-4+deb7u2 NOTE: https://github.com/python-pillow/Pillow/pull/1706 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/02/5 NOTE: https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4 CVE-2016-2221 (Open redirect vulnerability in the wp_validate_redirect function in wp ...) {DSA-3472-1 DLA-418-1} - wordpress 4.4.2+dfsg-1 (bug #813697) NOTE: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/ NOTE: https://core.trac.wordpress.org/changeset/36444 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/04/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/04/4 CVE-2016-2222 (The wp_http_validate_url function in wp-includes/http.php in WordPress ...) {DSA-3472-1 DLA-418-1} - wordpress 4.4.2+dfsg-1 (bug #813697) NOTE: https://wordpress.org/news/2016/02/wordpress-4-4-2-security-and-maintenance-release/ NOTE: https://core.trac.wordpress.org/changeset/36435 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/04/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/04/4 CVE-2016-2217 (The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does ...) - socat 1.7.3.1-1 (bug #813536) [jessie] - socat <not-affected> (Broken 1024bit DH parameter generated in 1.7.3.0) @@ -26961,7 +26961,7 @@ CVE-2016-2217 (The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 NOTE: The issues is about "In the OpenSSL address implementation the hard coded 1024 bit DH NOTE: p parameter was not prime.". Upstream has generated new parametes (and made it 2048 NOTE: bit long. - NOTE: http://www.openwall.com/lists/oss-security/2016/02/01/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/01/4 NOTE: http://www.dest-unreach.org/socat/contrib/socat-secadv7.html CVE-2016-5114 (sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and ...) {DLA-628-1} @@ -26971,7 +26971,7 @@ CVE-2016-5114 (sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, NOTE: https://bugs.php.net/bug.php?id=70755 NOTE: https://git.php.net/?p=php-src.git;a=commit;h=2721a0148649e07ed74468f097a28899741eb58f NOTE: http://seclists.org/bugtraq/2016/Jan/117 - NOTE: http://www.openwall.com/lists/oss-security/2016/02/02/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/02/02/4 CVE-2016-3197 REJECTED CVE-2016-2092 @@ -26992,7 +26992,7 @@ CVE-2016-2197 (QEMU (aka Quick Emulator) built with an IDE AHCI emulation suppor - qemu-kvm <not-affected> (Vulnerable code introduced later) NOTE: Fixed by: http://git.qemu.org/?p=qemu.git;a=commit;h=99b4cb71069f109b79b27bc629fc0cf0886dbc4b (v2.6.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1302057 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/29/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/29/2 NOTE: Introduced by: http://git.qemu.org/?p=qemu.git;a=commit;h=fc3d8e1138cd0c843d6fd75272633a31be6554ef (v2.3.0-rc2) CVE-2016-2088 (resolver.c in named in ISC BIND 9.10.x before 9.10.3-P4, when DNS cook ...) - bind9 <not-affected> (Introduced in Bind 9.10) @@ -27018,7 +27018,7 @@ CVE-2016-2091 (The dwarf_read_cie_fde_prefix function in dwarf_frame2.c in libdw {DLA-669-1} - dwarfutils 20160507-1 (bug #813148) [jessie] - dwarfutils 20120410-2+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/19/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/19/3 NOTE: Fixed by http://sourceforge.net/p/libdwarf/code/ci/9565964f26966d8391fe2cfa8e6e8e59278c5f91 CVE-2016-2090 (Off-by-one vulnerability in the fgetwln function in libbsd before 0.8. ...) {DLA-2052-1} @@ -27076,13 +27076,13 @@ CVE-2016-XXXX [out of bound read and write issues] [wheezy] - giflib <no-dsa> (Minor issue) [squeeze] - giflib <no-dsa> (Minor issue) NOTE: http://sourceforge.net/p/giflib/bugs/82/ - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/01/26/5 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/01/26/5 NOTE: http://sourceforge.net/p/giflib/code/ci/4cc68b315ff9a378aef6664e1be6b2144ad4a5e6/ CVE-2016-2073 (The htmlParseNameComplex function in HTMLparser.c in libxml2 allows at ...) {DSA-3593-1 DLA-503-1} - libxml2 2.9.3+dfsg1-1.1 (bug #812807) - NOTE: http://www.openwall.com/lists/oss-security/2016/01/25/6 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/26/8 has details + NOTE: https://www.openwall.com/lists/oss-security/2016/01/25/6 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/26/8 has details NOTE: Same fix as CVE-2016-1839 and CVE-2015-8806 CVE-2016-2070 (The tcp_cwnd_reduction function in net/ipv4/tcp_input.c in the Linux k ...) - linux 4.3.5-1 @@ -27207,7 +27207,7 @@ CVE-2016-2069 (Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4. {DSA-3503-1 DLA-412-1} - linux 4.3.5-1 - linux-2.6 <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/01/25/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/25/1 NOTE: https://git.kernel.org/linus/71b3c126e61177eb693423f2e18a1914205b165e (v4.5-rc1) NOTE: https://git.kernel.org/linus/4eaffdd5a5fe6ff9f95e1ab4de1ac904d5e0fa8b (v4.5-rc1) CVE-2016-2053 (The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kerne ...) @@ -27221,7 +27221,7 @@ CVE-2016-2053 (The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux CVE-2016-2049 (examples/consumer/common.php in JanRain PHP OpenID library (aka php-op ...) - php-openid <unfixed> (unimportant) NOTE: sample code only, actual vulnerable code not shipped in package - NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/24/2 NOTE: https://github.com/openid/php-openid/issues/128 CVE-2016-2047 (The ssl_verify_server_cert function in sql-common/client.c in MariaDB ...) {DSA-3557-1 DSA-3453-1 DLA-447-1} @@ -27660,12 +27660,12 @@ CVE-2016-1983 (The client_host function in parsers.c in Privoxy before 3.0.24 al {DSA-3460-1 DLA-398-1} - privoxy 3.0.24-1 NOTE: http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.302&r2=1.303 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/21/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/21/4 CVE-2016-1982 (The remove_chunked_transfer_coding function in filters.c in Privoxy be ...) {DSA-3460-1 DLA-398-1} - privoxy 3.0.24-1 NOTE: http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/filters.c?r1=1.196&r2=1.197 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/21/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/21/4 CVE-2016-1926 (Cross-site scripting (XSS) vulnerability in the charts module in Green ...) NOT-FOR-US: Greenbone Security Assistant CVE-2016-1921 @@ -27701,11 +27701,11 @@ CVE-2016-1981 (QEMU (aka Quick Emulator) built with the e1000 NIC emulation supp NOTE: Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html NOTE: Introduced in http://git.qemu.org/?p=qemu.git;a=commit;h=7c23b8920329180f48b8a147b629d8837709d201 (v0.10.0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1298570 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/19/10 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/19/10 CVE-2016-2037 (The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remo ...) {DSA-3483-1 DLA-415-1} - cpio 2.11+dfsg-5 (bug #812401) - NOTE: http://www.openwall.com/lists/oss-security/2016/01/19/4 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/19/4 NOTE: To reproduce and uncover the issue with unstable version compile with ASAN NOTE: Patch: https://lists.gnu.org/archive/html/bug-cpio/2016-01/msg00005.html NOTE: https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=d36ec5f4e93130efb24fb9678aafd88e8070095b @@ -27713,7 +27713,7 @@ CVE-2016-2050 (The get_abbrev_array_info function in libdwarf-20151114 allows re {DLA-669-1} - dwarfutils 20160507+git20160523.9086738-1 (unimportant) [jessie] - dwarfutils 20120410-2+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/19/9 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/19/9 NOTE: Fixed by http://sourceforge.net/p/libdwarf/code/ci/a05f5e2ae6a5f34daa566975894fc2803d6ec684 NOTE: Reasoning for "unimportant" severity: The affected source code is present NOTE: in dwarfdump/, but in the binary package is installed dwarfdump2/ . @@ -27723,7 +27723,7 @@ CVE-2016-XXXX [Multiple minor security issues] - imagemagick 8:6.8.9.9-7 (bug #811308) [jessie] - imagemagick 8:6.8.9.9-5+deb8u1 [wheezy] - imagemagick 8:6.7.7.10-5+deb7u4 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/02/22/4 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/02/22/4 CVE-2016-1925 (Integer underflow in header.c in lha allows remote attackers to have u ...) - lha <removed> (unimportant) NOTE: Non-free not supported @@ -28798,7 +28798,7 @@ CVE-2016-1578 (Use-after-free vulnerability in Oxide allows remote attackers to CVE-2016-1577 (Double free vulnerability in the jas_iccattrval_destroy function in Ja ...) {DSA-3508-1} - jasper <removed> (bug #816625) - NOTE: http://www.openwall.com/lists/oss-security/2016/03/03/12 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/03/12 CVE-2016-1576 (The overlayfs implementation in the Linux kernel through 4.5.2 does no ...) - linux 4.5.1-1 [jessie] - linux <not-affected> (Vulnerable code not present) @@ -28858,7 +28858,7 @@ CVE-2016-1714 (The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw [squeeze] - qemu-kvm <end-of-life> (Not supported in Squeeze LTS) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1296060 NOTE: Upstream fix: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html - NOTE: http://www.openwall.com/lists/oss-security/2016/01/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/11/7 NOTE: fw_cfg support for guest-side data writes removed in 2.4 (1:2.4+dfsg-1a) NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=023e3148567ac898c7258138f8e86c3c2bb40d07 (v2.4.0-rc0) NOTE: fw_cfg_read removed in: http://git.qemu.org/?p=qemu.git;a=commit;h=6c8d56a2e95712a6206a2671d2b04b2e59cabc0b @@ -28868,7 +28868,7 @@ CVE-2016-1569 (FireBird 2.5.5 allows remote authenticated users to cause a denia [wheezy] - firebird2.5 <not-affected> (Issue introduced in 2.5.5) [squeeze] - firebird2.5 <not-affected> (Issue introduced in 2.5.5) NOTE: http://tracker.firebirdsql.org/browse/CORE-5068 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/10/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/10/2 CVE-2016-1568 (Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with ...) {DSA-3471-1 DSA-3470-1 DSA-3469-1} - qemu 1:2.5+dfsg-2 (bug #810527) @@ -28878,7 +28878,7 @@ CVE-2016-1568 (Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built NOTE: Fixed by: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg01184.html NOTE: ahci emulation added in: http://git.qemu.org/?p=qemu.git;a=commit;h=f6ad2e32f8d833c7f1c75dc084a84a8f02704d64 (v0.14.0-rc0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1288532 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/09/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/09/1 CVE-2016-1563 (NetApp Clustered Data ONTAP 8.3.1 does not properly verify X.509 certi ...) NOT-FOR-US: NetApp CVE-2016-1562 (The REST API in the DTE Energy Insight application before 1.7.8 for An ...) @@ -29088,14 +29088,14 @@ CVE-2016-1564 (Multiple cross-site scripting (XSS) vulnerabilities in wp-include NOTE: https://core.trac.wordpress.org/changeset/36185 NOTE: https://wpvulndb.com/vulnerabilities/8358 NOTE: https://twitter.com/brutelogic/status/685105483397619713 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/08/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/08/3 CVE-2016-1503 (dhcpcd before 6.10.0, as used in Android 4.x before 4.4.4, 5.0.x befor ...) - dhcpcd5 6.10.1-1 (bug #810621) [jessie] - dhcpcd5 <not-affected> (Vulnerable code not present) [wheezy] - dhcpcd5 <not-affected> (Vulnerable code not present) - dhcpcd <not-affected> (Vulnerable code not present) NOTE: https://dev.marples.name/rDHC1475a702df74b120db847991bc011e3441a045b8 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/07/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/07/3 NOTE: dhcpcd 3.2.3-<rev> in squeeze and wheezy differ very much from dhcpcd5 in later Debian versions. CVE-2016-1504 (dhcpcd before 6.10.0 allows remote attackers to cause a denial of serv ...) - dhcpcd5 6.10.1-1 (bug #810620) @@ -29104,12 +29104,12 @@ CVE-2016-1504 (dhcpcd before 6.10.0 allows remote attackers to cause a denial of - dhcpcd <not-affected> (Vulnerable code not present) [squeeze] - dhcpcd <not-affected> (Vulnerable code not present) NOTE: https://dev.marples.name/rDHC33c03b26c01201152774ef92e7b773281b8d8443 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/07/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/07/3 NOTE: dhcpcd 3.2.3-<rev> in squeeze and wheezy differ very much from dhcpcd5 in later Debian versions. CVE-2016-XXXX [Missing normalization] - ruby-rack-attack 4.3.1-1 NOTE: https://github.com/kickstarter/rack-attack/commit/76c2e3143099d938883ae5654527b47e9e6a8977 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/01/07/1 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2016/01/07/1 CVE-2016-1501 (ownCloud Server before 8.0.9 and 8.1.x before 8.1.4 allow remote authe ...) - owncloud 7.0.12~dfsg-2 [jessie] - owncloud 7.0.4+dfsg-4~deb8u4 @@ -29665,7 +29665,7 @@ CVE-2016-1249 (The DBD::mysql module before 4.039 for Perl, when using server-si [jessie] - libdbd-mysql-perl <no-dsa> (Minor issue) [wheezy] - libdbd-mysql-perl <no-dsa> (Minor issue) NOTE: https://github.com/perl5-dbi/DBD-mysql/commit/793b72b1a0baa5070adacaac0e12fd995a6fbabe (4.039) - NOTE: http://www.openwall.com/lists/oss-security/2016/11/16/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/16/1 CVE-2016-1248 (vim before patch 8.0.0056 does not properly validate values for the 'f ...) {DSA-3722-1 DLA-718-1} - vim 2:8.0.0095-1 @@ -29730,7 +29730,7 @@ CVE-2016-1237 (nfsd in the Linux kernel through 4.6.3 allows local users to bypa CVE-2016-1236 (Multiple cross-site scripting (XSS) vulnerabilities in (1) revision.ph ...) {DSA-3572-1 DLA-462-1} - websvn <removed> - NOTE: http://www.openwall.com/lists/oss-security/2016/05/05/22 + NOTE: https://www.openwall.com/lists/oss-security/2016/05/05/22 CVE-2016-1235 (The oarsh script in OAR before 2.5.7 allows remote authenticated users ...) {DSA-3543-1} - oar 2.5.7-1 (bug #819952) @@ -30381,7 +30381,7 @@ CVE-2016-1922 (QEMU (aka Quick Emulator) built with the TPR optimization for 32- [squeeze] - qemu-kvm <end-of-life> (Unsupported in squeeze-lts) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1283934 - NOTE: http://www.openwall.com/lists/oss-security/2016/01/16/1 + NOTE: https://www.openwall.com/lists/oss-security/2016/01/16/1 NOTE: Possibly introduced in http://git.qemu.org/?p=qemu.git;a=commit;h=4917cf44326a1bda2fd7f27303aff7a25ad86518 (v1.6.0-rc0) NOTE: kvmapic introduced after 1.0.50 (http://git.qemu.org/?p=qemu.git;a=commit;h=e5ad936b0fd7dfd7fd7908be6f9f1ca88f63b96b) CVE-2016-0930 (Pivotal Cloud Foundry (PCF) Ops Manager before 1.6.19 and 1.7.x before ...) @@ -31328,7 +31328,7 @@ CVE-2016-0635 (Unspecified vulnerability in the Enterprise Manager Ops Center co CVE-2016-0634 (The expansion of '\h' in the prompt string in bash 4.3 allows remote a ...) - bash 4.4-1 (unimportant) [jessie] - bash 4.3-11+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2016/09/16/8 + NOTE: https://www.openwall.com/lists/oss-security/2016/09/16/8 NOTE: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1507025 NOTE: Fixed bin Bash upstream bash-4.4 NOTE: This doesn't cross any reasonable security boundaries, an attacker with the @@ -32713,39 +32713,39 @@ CVE-2016-1000033 (Shotwell version 0.22.0 (and possibly other versions) is vulne [jessie] - shotwell <no-dsa> (Minor issue) [wheezy] - shotwell <no-dsa> (Minor issue) [squeeze] - shotwell <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/12/04/4 + NOTE: https://www.openwall.com/lists/oss-security/2015/12/04/4 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=754488 CVE-2016-4353 (ber-decoder.c in Libksba before 1.3.3 does not properly handle decoder ...) - libksba 1.3.3-1 (low) [jessie] - libksba 1.3.2-1+deb8u1 [wheezy] - libksba <no-dsa> (Minor issue) [squeeze] - libksba <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/13/5 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/13/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/29/5 NOTE: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=07116a314f4dcd4d96990bbd74db95a03a9f650a CVE-2016-4355 (Multiple integer overflows in ber-decoder.c in Libksba before 1.3.3 al ...) - libksba 1.3.3-1 (low) [jessie] - libksba 1.3.2-1+deb8u1 [wheezy] - libksba <no-dsa> (Minor issue) [squeeze] - libksba <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/13/5 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/13/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/29/5 NOTE: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887 CVE-2016-4354 (ber-decoder.c in Libksba before 1.3.3 uses an incorrect integer data t ...) - libksba 1.3.3-1 (low) [jessie] - libksba 1.3.2-1+deb8u1 [wheezy] - libksba <no-dsa> (Minor issue) [squeeze] - libksba <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/13/5 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/13/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/29/5 NOTE: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887 CVE-2016-4356 (The append_utf8_value function in the DN decoder (dn.c) in Libksba bef ...) - libksba 1.3.3-1 (low) [jessie] - libksba 1.3.2-1+deb8u1 [wheezy] - libksba <no-dsa> (Minor issue) [squeeze] - libksba <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2015/04/13/5 - NOTE: http://www.openwall.com/lists/oss-security/2016/04/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2015/04/13/5 + NOTE: https://www.openwall.com/lists/oss-security/2016/04/29/5 NOTE: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=243d12fdec66a4360fbb3e307a046b39b5b4ffc3 CVE-2016-9675 (openjpeg: A heap-based buffer overflow flaw was found in the patch for ...) - openjpeg 1.5.2-1 @@ -32764,4 +32764,4 @@ CVE-2016-2856 (pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jes [jessie] - glibc 2.19-18+deb8u4 NOTE: http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403 NOTE: http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958 - NOTE: http://www.openwall.com/lists/oss-security/2016/03/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2016/03/07/2 diff --git a/data/CVE/2017.list b/data/CVE/2017.list index f4bea5dbc0..10bf8b1ac7 100644 --- a/data/CVE/2017.list +++ b/data/CVE/2017.list @@ -2329,7 +2329,7 @@ CVE-2017-18019 (In K7 Total Security before 15.1.0.305, user-controlled input to CVE-2017-18018 (In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does no ...) - coreutils <unfixed> (unimportant) NOTE: http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html - NOTE: http://www.openwall.com/lists/oss-security/2018/01/04/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/01/04/3 NOTE: Documentation patches proposed: NOTE: https://lists.gnu.org/archive/html/coreutils/2017-12/msg00072.html NOTE: https://lists.gnu.org/archive/html/coreutils/2017-12/msg00073.html @@ -3086,7 +3086,7 @@ CVE-2017-17840 (An issue was discovered in Open-iSCSI through 2.0.875. A local a [stretch] - open-iscsi <no-dsa> (Minor issue) [jessie] - open-iscsi <ignored> (Minor issue, iscsiuio not built in this version, source affected) [wheezy] - open-iscsi <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/13/2 NOTE: https://bugzilla.opensuse.org/show_bug.cgi?id=1072312 NOTE: Specfic CVE fixed by https://github.com/open-iscsi/open-iscsi/pull/72/commits/b9c33683bdc0aed28ffe31c3f3d50bf5cdf519ea NOTE: But all of the commits in https://github.com/open-iscsi/open-iscsi/pull/72 @@ -3656,7 +3656,7 @@ CVE-2017-17670 (In VideoLAN VLC media player through 2.2.8, there is a type conv - vlc 3.0.0~rc2-1 [jessie] - vlc <end-of-life> (See DSA-4203-1) [wheezy] - vlc <end-of-life> (Not supported in wheezy LTS) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/15/1 NOTE: POC: https://gist.github.com/dyntopia/194d912287656f66dd502158b0cd2e68 CVE-2017-17669 (There is a heap-based buffer over-read in the Exiv2::Internal::PngChun ...) - exiv2 0.27.2-6 (bug #886006) @@ -4389,21 +4389,21 @@ CVE-2017-1000410 (The Linux kernel version 3.3-rc1 and later is affected by a vu {DSA-4082-1 DSA-4073-1} - linux 4.14.7-1 [wheezy] - linux <not-affected> (Vulnerable code introduced in 3.3) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/06/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/06/3 CVE-2017-1000409 (A buffer overflow in glibc 2.5 (released on September 29, 2006) and ca ...) - glibc 2.25-5 (bug #884133) [stretch] - glibc 2.24-11+deb9u4 [jessie] - glibc <no-dsa> (Minor issue) - eglibc <removed> [wheezy] - eglibc <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/11/4 CVE-2017-1000408 (A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached ...) - glibc 2.25-5 (bug #884132) [stretch] - glibc 2.24-11+deb9u4 [jessie] - glibc <no-dsa> (Minor issue) - eglibc <removed> [wheezy] - eglibc <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/11/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/11/4 CVE-2017-17432 (OpenAFS 1.x before 1.6.22 does not properly validate Rx ack packets, w ...) {DSA-4067-1 DLA-1213-1} - openafs 1.6.22-1 (bug #883602) @@ -5785,7 +5785,7 @@ CVE-2017-1000405 (The Linux Kernel versions 2.6.38 through 4.14 have a problemat [jessie] - linux 3.16.51-1 [wheezy] - linux <not-affected> (vulnerable code not present, cf. kernel-sec information) NOTE: Fixed by: https://git.kernel.org/linus/a8f97366452ed491d13cf1e44241bc0b5740b1f0 - NOTE: http://www.openwall.com/lists/oss-security/2017/11/30/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/11/30/1 NOTE: https://github.com/bindecy/HugeDirtyCowPOC CVE-2017-1000404 (The Jenkins Delivery Pipeline Plugin version 1.0.7 and earlier used th ...) NOT-FOR-US: Jenkins plugin @@ -5861,15 +5861,15 @@ CVE-2017-1000163 (The Phoenix Framework versions 1.0.0 through 1.0.4, 1.1.0 thro NOT-FOR-US: Phoenix Framework CVE-2017-1000128 (Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser ...) - exiv2 <not-affected> (Vulnerable code introduced in 0.26; only affected experimental) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/30/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/30/1 NOTE: https://github.com/Exiv2/exiv2/issues/177 CVE-2017-1000127 (Exiv2 0.26 contains a heap buffer overflow in tiff parser ...) - exiv2 <not-affected> (Vulnerable code introduced after 0.25; only affected experimental; bug #888863) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/30/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/30/1 NOTE: https://github.com/Exiv2/exiv2/issues/176 CVE-2017-1000126 (exiv2 0.26 contains a Stack out of bounds read in webp parser ...) - exiv2 <not-affected> (WebP support introduced in 0.26; only affected experimental; bug #888864) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/30/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/30/1 NOTE: https://github.com/Exiv2/exiv2/issues/175 CVE-2017-16879 (Stack-based buffer overflow in the _nc_write_entry function in tinfo/w ...) - ncurses 6.0+20171125-1 (bug #882620) @@ -6822,7 +6822,7 @@ CVE-2017-16612 (libXcursor before 1.1.15 has various integer overflows that coul [stretch] - wayland 1.12.0-1+deb9u1 [jessie] - wayland <no-dsa> (Minor issue) [wheezy] - wayland <not-affected> (vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/11/28/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/11/28/6 NOTE: https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 NOTE: https://marc.info/?l=freedesktop-xorg-announce&m=151188036018262&w=2 NOTE: Wayland: https://bugs.freedesktop.org/show_bug.cgi?id=103961 @@ -6835,7 +6835,7 @@ CVE-2017-16611 (In libXfont before 1.5.4 and libXfont2 before 2.0.3, a local att [jessie] - libxfont <no-dsa> (Minor issue) [wheezy] - libxfont <postponed> (Minor issue) - libxfont1 <removed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2017/11/28/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/11/28/7 NOTE: https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=7b377456f95d2ec3ead40f4fb74ea620191f88c8 NOTE: (for 1.5.x): https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?h=libXfont-1.5-branch&id=5ed8ac0e4f063825b8ecda48e9a111d3ce92e825 NOTE: https://marc.info/?l=freedesktop-xorg-announce&m=151188049718337&w=2 @@ -7523,7 +7523,7 @@ CVE-2017-16355 (In agent/Core/SpawningKit/Spawner.h in Phusion Passenger 5.1.10 [wheezy] - ruby-passenger <not-affected> (Vulnerable code introduced later) NOTE: https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/ NOTE: https://github.com/phusion/passenger/commit/4043718264095cde6623c2cbe8c644541036d7bf - NOTE: http://www.openwall.com/lists/oss-security/2017/11/21/2 and following. + NOTE: https://www.openwall.com/lists/oss-security/2017/11/21/2 and following. NOTE: Problem mitigated in versions prior to 5.0.10 where root privileges were required to NOTE: get the status information. CVE-2017-16354 @@ -7775,8 +7775,8 @@ CVE-2017-1000383 (GNU Emacs version 25.3.1 (and other versions most likely) igno NOTE: Upstream report: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=29182 CVE-2017-1000382 (VIM version 8.0.1187 (and other versions most likely) ignores umask wh ...) - vim <unfixed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2017/10/31/15 - NOTE: Cf. http://www.openwall.com/lists/oss-security/2017/11/01/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/10/31/15 + NOTE: Cf. https://www.openwall.com/lists/oss-security/2017/11/01/4 NOTE: vim creates the .swp file according to the permissions of the file being NOTE: edited, admitely ignoring the umask, so in the reporters case the .swp NOTE: file is readable by others. But that seem to be the intended behaviour. @@ -7794,7 +7794,7 @@ CVE-2017-17051 (An issue was discovered in the default FilterScheduler in OpenSt [stretch] - nova <not-affected> (Fix for CVE-2017-16239 not applied and not affecting 14.x.y) [jessie] - nova <not-affected> (Vulnerable code not present) [wheezy] - nova <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/05/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/05/5 NOTE: https://launchpad.net/bugs/1732976 CVE-2017-16239 (In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x throug ...) {DSA-4056-1} @@ -7803,7 +7803,7 @@ CVE-2017-16239 (In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x [wheezy] - nova <not-affected> (Vulnerble code introduced later) NOTE: https://launchpad.net/bugs/1664931 NOTE: https://security.openstack.org/ossa/OSSA-2017-005.html - NOTE: Regression fix: http://www.openwall.com/lists/oss-security/2017/12/05/4 + NOTE: Regression fix: https://www.openwall.com/lists/oss-security/2017/12/05/4 CVE-2017-16238 RESERVED CVE-2017-16237 (In Vir.IT eXplorer Anti-Virus before 8.5.42, the driver file (VIAGLT64 ...) @@ -9020,7 +9020,7 @@ CVE-2017-15715 (In Apache httpd 2.4.0 to 2.4.29, the expression specified in < {DSA-4164-1} - apache2 2.4.33-1 [wheezy] - apache2 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/6 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/6 CVE-2017-15714 (The BIRT plugin in Apache OFBiz 16.11.01 to 16.11.03 does not escape u ...) NOT-FOR-US: BIRT plugin in Apache OFBiz CVE-2017-15713 (Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before ...) @@ -9032,7 +9032,7 @@ CVE-2017-15711 CVE-2017-15710 (In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29 ...) {DSA-4164-1 DLA-1389-1} - apache2 2.4.33-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/8 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/8 CVE-2017-15709 (When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 ...) - activemq 5.15.3-1 (bug #890352) [stretch] - activemq <no-dsa> (Minor issue) @@ -9072,7 +9072,7 @@ CVE-2017-15700 (A flaw in the org.apache.sling.auth.core.AuthUtil#isRedirectVali NOT-FOR-US: Apache Sling Authentication Service CVE-2017-15699 (A Denial of Service vulnerability was found in Apache Qpid Dispatch Ro ...) - qpid-dispatch <itp> (bug #737776) - NOTE: http://www.openwall.com/lists/oss-security/2018/02/13/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/02/13/5 CVE-2017-15698 (When parsing the AIA-Extension field of a client certificate, Apache T ...) {DSA-4118-1 DLA-1276-1} - tomcat-native 1.2.16-1 @@ -10585,7 +10585,7 @@ CVE-2017-15186 (Double free vulnerability in FFmpeg 3.3.4 and earlier allows rem - ffmpeg 7:3.4-1 - libav <removed> [jessie] - libav <not-affected> (vulnerable code was introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2017/10/20/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/10/20/4 NOTE: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/df62b70de8aaa285168e72fe8f6e740843ca91fa CVE-2017-15185 (plugins/ogg.c in Libmp3splt 0.9.2 calls the libvorbis vorbis_block_cle ...) - mp3splt 2.6.2+20170630-2 @@ -10774,7 +10774,7 @@ CVE-2017-15124 (VNC server implementation in Quick Emulator (QEMU) 2.11.0 and ol [wheezy] - qemu <postponed> (Can be fixed along in later update) - qemu-kvm <removed> [wheezy] - qemu-kvm <postponed> (Can be fixed along in later update) - NOTE: http://www.openwall.com/lists/oss-security/2017/12/19/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/12/19/4 NOTE: https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03705.html NOTE: https://lists.gnu.org/archive/html/qemu-devel/2018-02/msg00796.html CVE-2017-15123 (A flaw was found in the CloudForms web interface, versions 5.8 - 5.10, ...) @@ -10923,7 +10923,7 @@ CVE-2017-15095 (A deserialization flaw was discovered in the jackson-databind in NOTE: This CVE-2017-15095 should be considered to include everything in NOTE: NO_DESER_CLASS_NAMES as of: NOTE: https://github.com/FasterXML/jackson-databind/blob/7093008aa2afe8068e120df850189ae072dfa1b2/src/main/java/com/fasterxml/jackson/databind/deser/BeanDeserializerFactory.java#L43 - NOTE: Details: http://www.openwall.com/lists/oss-security/2017/11/02/3 + NOTE: Details: https://www.openwall.com/lists/oss-security/2017/11/02/3 NOTE: For libjackson-json-java: NOTE: https://github.com/FasterXML/jackson-1/commit/9ac68db819bce7b9546bc4bf1c44f82ca910fa31 CVE-2017-15094 (An issue has been found in the DNSSEC parsing code of PowerDNS Recurso ...) @@ -12030,7 +12030,7 @@ CVE-2017-14745 (The *_get_synthetic_symtab functions in the Binary File Descript CVE-2017-14867 (Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x ...) {DSA-3984-1 DLA-1120-1} - git 1:2.14.2-1 (bug #876854) - NOTE: http://www.openwall.com/lists/oss-security/2017/09/26/9 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/26/9 NOTE: https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u CVE-2017-14744 (UEditor 1.4.3.3 has XSS via the SRC attribute of an IFRAME element. ...) NOT-FOR-US: UEditor @@ -13443,7 +13443,7 @@ CVE-2017-14482 (GNU Emacs before 25.3 allows remote attackers to execute arbitra - emacs25 25.2+1-6 (bug #875447) - emacs24 <removed> (bug #875448) - emacs23 <removed> (bug #875449) - NOTE: http://www.openwall.com/lists/oss-security/2017/09/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/11/1 NOTE: https://debbugs.gnu.org/cgi/bugreport.cgi?bug=28350 NOTE: https://git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-25&id=9ad0fcc54442a9a01d41be19880250783426db70 CVE-2017-14313 (The shibboleth_login_form function in shibboleth.php in the Shibboleth ...) @@ -13775,21 +13775,21 @@ CVE-2017-14161 CVE-2017-14166 (libarchive 3.3.2 allows remote attackers to cause a denial of service ...) {DSA-4360-1 DLA-1600-1 DLA-1092-1} - libarchive 3.2.2-3.1 (bug #874539) - NOTE: http://www.openwall.com/lists/oss-security/2017/09/06/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/06/5 NOTE: https://github.com/libarchive/libarchive/commit/fa7438a0ff4033e4741c807394a9af6207940d71 NOTE: https://github.com/libarchive/libarchive/issues/935 CVE-2017-14165 (The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has ...) - graphicsmagick 1.3.26-9 (unimportant; bug #874724) NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/493da54370aa - NOTE: http://www.openwall.com/lists/oss-security/2017/09/06/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/06/4 NOTE: https://sourceforge.net/p/graphicsmagick/bugs/442/ CVE-2017-14160 (The bark_noise_hybridmp function in psy.c in Xiph.Org libvorbis 1.3.5 ...) {DLA-2013-1} - libvorbis 1.3.6-2 (bug #876780) [stretch] - libvorbis <no-dsa> (Minor issue) [wheezy] - libvorbis <postponed> (Minor issue, can be revisited once fixed upstream) - NOTE: http://www.openwall.com/lists/oss-security/2017/09/21/2 - NOTE: http://www.openwall.com/lists/oss-security/2017/09/21/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/21/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/21/3 NOTE: https://gitlab.xiph.org/xiph/vorbis/issues/2330 NOTE: Upstream fix: https://gitlab.xiph.org/xiph/vorbis/commit/018ca26dece618457dd13585cad52941193c4a25 CVE-2017-14176 (Bazaar through 2.7.0, when Subprocess SSH is used, allows remote attac ...) @@ -13965,18 +13965,18 @@ CVE-2017-14123 (Zoho ManageEngine Firewall Analyzer 12200 has an unrestricted Fi NOT-FOR-US: Zoho ManageEngine CVE-2017-14122 (unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based b ...) - unrar-free 1:0.0.1+cvs20140707-4 (unimportant; bug #874060) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/20/1 NOTE: Crash in CLI tool, no security impact CVE-2017-14121 (The DecodeNumber function in unrarlib.c in unrar 0.0.1 (aka unrar-free ...) - unrar-free 1:0.0.1+cvs20140707-4 (unimportant; bug #874061) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/20/1 NOTE: Crash in CLI tool, no security impact CVE-2017-14120 (unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory tra ...) {DLA-1091-1} - unrar-free 1:0.0.1+cvs20140707-2 (bug #874059) [stretch] - unrar-free <no-dsa> (Minor issue) [jessie] - unrar-free <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/20/1 NOTE: Proposed patch: https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=874059;filename=874059.diff.txt;msg=29 CVE-2017-14119 (In the EyesOfNetwork web interface (aka eonweb) 5.1-0, module\tool_all ...) NOT-FOR-US: EyesOfNetwork (EON) @@ -14041,7 +14041,7 @@ CVE-2017-14103 (The ReadJNGImage and ReadOneJNGImage functions in coders/png.c i [stretch] - graphicsmagick <not-affected> (Incomplete fix for CVE-2017-11403 not applied) [jessie] - graphicsmagick <not-affected> (Incomplete fix for CVE-2017-11403 not applied) NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/98721124e51f - NOTE: http://www.openwall.com/lists/oss-security/2017/09/01/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/01/6 NOTE: https://blogs.gentoo.org/ago/2017/07/12/graphicsmagick-use-after-free-in-closeblob-blob-c/ CVE-2017-14102 (MIMEDefang 2.80 and earlier creates a PID file after dropping privileg ...) - mimedefang 2.83-1 (bug #877363) @@ -15162,7 +15162,7 @@ CVE-2017-13709 (In FlightGear before version 2017.3.1, Main/logger.cxx in the FG - flightgear 1:2017.2.1+dfsg-4 (low; bug #873439) [stretch] - flightgear 1:2016.4.4+dfsg-3+deb9u1 [jessie] - flightgear 3.0.0-5+deb8u3 - NOTE: http://www.openwall.com/lists/oss-security/2017/08/27/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/27/1 CVE-2017-13705 RESERVED CVE-2017-13704 (In dnsmasq before 2.78, if the DNS packet size does not match the expe ...) @@ -17053,39 +17053,39 @@ CVE-2017-12942 (libunrar.a in UnRAR before 5.5.7 has a buffer overflow in the Un [stretch] - unrar-nonfree <no-dsa> (Non-free not supported) [jessie] - unrar-nonfree <no-dsa> (Non-free not supported) [wheezy] - unrar-nonfree <no-dsa> (Non-free not supported) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/6 CVE-2017-12941 (libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpa ...) - unrar-nonfree 1:5.5.8-1 [stretch] - unrar-nonfree <no-dsa> (Non-free not supported) [jessie] - unrar-nonfree <no-dsa> (Non-free not supported) [wheezy] - unrar-nonfree <no-dsa> (Non-free not supported) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/6 CVE-2017-12940 (libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Enco ...) - unrar-nonfree 1:5.5.8-1 [stretch] - unrar-nonfree <no-dsa> (Non-free not supported) [jessie] - unrar-nonfree <no-dsa> (Non-free not supported) [wheezy] - unrar-nonfree <no-dsa> (Non-free not supported) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/6 CVE-2017-12938 (UnRAR before 5.5.7 allows remote attackers to bypass a directory-trave ...) - unrar-nonfree 1:5.5.8-1 [stretch] - unrar-nonfree <no-dsa> (Non-free not supported) [jessie] - unrar-nonfree <no-dsa> (Non-free not supported) [wheezy] - unrar-nonfree <no-dsa> (Non-free not supported) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/2 CVE-2017-12937 (The ReadSUNImage function in coders/sun.c in GraphicsMagick 1.3.26 has ...) {DSA-4321-1 DLA-1401-1 DLA-1082-1} - graphicsmagick 1.3.26-6 (bug #872574) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/5 NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/95d00d55e978 CVE-2017-12936 (The ReadWMFImage function in coders/wmf.c in GraphicsMagick 1.3.26 has ...) {DSA-4321-1 DLA-1456-1 DLA-1082-1} - graphicsmagick 1.3.26-6 (bug #872575) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/3 NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/be898b7c97bd CVE-2017-12935 (The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 mis ...) {DSA-4321-1 DLA-1456-1 DLA-1082-1} - graphicsmagick 1.3.26-6 (bug #872576) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/18/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/18/4 NOTE: Fixed by: http://hg.code.sf.net/p/graphicsmagick/code/rev/cd699a44f188 CVE-2017-12934 (ext/standard/var_unserializer.re in PHP 7.0.x before 7.0.21 and 7.1.x ...) {DSA-4080-1} @@ -17377,7 +17377,7 @@ CVE-2017-12847 (Nagios Core before 4.3.3 creates a nagios.lock PID file after dr - nagios3 <removed> [jessie] - nagios3 <no-dsa> (Minor issue) [wheezy] - nagios3 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/16/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/16/7 NOTE: https://github.com/NagiosEnterprises/nagioscore/issues/404 NOTE: https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752 NOTE: https://github.com/orlitzky/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb @@ -17501,7 +17501,7 @@ CVE-2017-12800 (The EBML_FindNextElement function in ebmlmain.c in libebml2 thro CVE-2017-12836 (CVS 1.12.x, when configured to use SSH for remote repositories, might ...) {DSA-3940-1 DLA-1056-1} - cvs 2:1.12.13+real-24 (bug #871810) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/11/1 CVE-2017-12799 (The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows re ...) - binutils 2.29-9 [stretch] - binutils <ignored> (Minor issue) @@ -17984,13 +17984,13 @@ CVE-2017-12637 (Directory traversal vulnerability in scheduler/ui/js/ffffffffbca CVE-2017-12636 (CouchDB administrative users can configure the database server via HTT ...) {DLA-1252-1} - couchdb <removed> - NOTE: http://www.openwall.com/lists/oss-security/2017/11/14/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/11/14/6 NOTE: Likely patch for 1.2.x: https://github.com/apache/couchdb/commit/9a28df7e9703a1a3420e7616c4d33a523ee06354 NOTE: Possibly needs more updates: https://github.com/apache/couchdb/commit/bf6b6a1c84321baee2c4ad354059a45e0b8fdec7 CVE-2017-12635 (Due to differences in the Erlang-based JSON parser and JavaScript-base ...) {DLA-1252-1} - couchdb <removed> - NOTE: http://www.openwall.com/lists/oss-security/2017/11/14/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/11/14/6 NOTE: Likely patch for 1.2.x: https://github.com/apache/couchdb/commit/3706a77c13a78672e5a3fbde06e7bffd3665f73b CVE-2017-12634 (The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20. ...) NOT-FOR-US: Apache Camel @@ -18040,7 +18040,7 @@ CVE-2017-12621 (During Jelly (xml) file parsing with Apache Xerces, if a custom - jenkins-commons-jelly <removed> [jessie] - jenkins-commons-jelly <ignored> (Minor issue, only used by Jenkins which got removed) [wheezy] - jenkins-commons-jelly <ignored> (Minor issue, only used by Jenkins which got removed) - NOTE: http://www.openwall.com/lists/oss-security/2017/09/27/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/27/6 CVE-2017-12620 (When loading models or dictionaries that contain XML it is possible to ...) NOT-FOR-US: Apache OpenNLP CVE-2017-12619 (Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation whic ...) @@ -19316,7 +19316,7 @@ CVE-2017-12166 (OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnera [jessie] - openvpn <no-dsa> (Minor issue) [wheezy] - openvpn <no-dsa> (Minor issue) NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2017-12166 - NOTE: http://www.openwall.com/lists/oss-security/2017/09/28/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/28/2 NOTE: https://community.openvpn.net/openvpn/changeset/3b1a61e9fb27213c46f76312f4065816bee8ed01/ (master) NOTE: https://community.openvpn.net/openvpn/changeset/c7e259160b28e94e4ea7f0ef767f8134283af255/ (release/2.4) NOTE: https://community.openvpn.net/openvpn/changeset/fce34375295151f548a26c2d0eb30141e427c81a/ (release/2.3) @@ -20719,11 +20719,11 @@ CVE-2017-11656 RESERVED CVE-2017-11655 (A memory leak was found in the way SIPcrack 0.2 handled processing of ...) - sipcrack <unfixed> (unimportant; bug #869803) - NOTE: http://www.openwall.com/lists/oss-security/2017/07/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/07/26/1 NOTE: Negligible security impact CVE-2017-11654 (An out-of-bounds read and write flaw was found in the way SIPcrack 0.2 ...) - sipcrack <unfixed> (unimportant; bug #869803) - NOTE: http://www.openwall.com/lists/oss-security/2017/07/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/07/26/1 NOTE: Negligible security impact CVE-2017-11653 (Razer Synapse 2.20.15.1104 and earlier uses weak permissions for the D ...) NOT-FOR-US: Razer Synapse @@ -21577,7 +21577,7 @@ CVE-2017-11403 (The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3. - graphicsmagick 1.3.26-3 NOTE: http://hg.code.sf.net/p/graphicsmagick/code/rev/d0a76868ca37 NOTE: When fixing this CVE make sure to not make the fix incomplete and open the CVE-2017-14103 - NOTE: issue. See: http://www.openwall.com/lists/oss-security/2017/09/01/6 + NOTE: issue. See: https://www.openwall.com/lists/oss-security/2017/09/01/6 NOTE: The addition required commit is: http://hg.code.sf.net/p/graphicsmagick/code/rev/98721124e51f CVE-2017-11402 (An issue has been discovered on the Belden Hirschmann Tofino Xenon Sec ...) NOT-FOR-US: Belden Hirschmann Tofino Xenon Security Appliance @@ -22628,7 +22628,7 @@ CVE-2017-11105 (The OnePlus 2 Primary Bootloader (PBL) does not validate the SBL NOT-FOR-US: OnePlus CVE-2017-1000050 (JasPer 2.0.12 is vulnerable to a NULL pointer exception in the functio ...) - jasper <removed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/06/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/06/1 NOTE: https://github.com/mdadams/jasper/issues/120 NOTE: Fixed by: https://github.com/mdadams/jasper/commit/58ba0365d911b9f9dd68e9abf826682c0b4f2293 CVE-2017-1002024 (Vulnerability in web application Kind Editor v4.1.12, kindeditor/php/u ...) @@ -22985,7 +22985,7 @@ CVE-2017-1000082 (systemd v233 and earlier fails to safely parse usernames start [wheezy] - systemd <not-affected> (Vulnerable code introduced in systemd-229) NOTE: https://github.com/systemd/systemd/issues/6237 NOTE: Fixed by: https://github.com/systemd/systemd/commit/bb28e68477a3a39796e4999a6cbc6ac6345a9159 - NOTE: http://www.openwall.com/lists/oss-security/2017/07/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/07/02/1 CVE-2017-10977 RESERVED CVE-2017-10976 (When SWFTools 0.9.2 processes a crafted file in ttftool, it can lead t ...) @@ -23051,14 +23051,14 @@ CVE-2017-10972 (Uninitialized data in endianness conversion in the XEvent handli {DSA-3905-1 DLA-1026-1} - xorg-server 2:1.19.3-2 (bug #867492) NOTE: https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced - NOTE: http://www.openwall.com/lists/oss-security/2017/07/06/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/07/06/6 CVE-2017-10971 (In the X.Org X server before 2017-06-19, a user authenticated to an X ...) {DSA-3905-1 DLA-1026-1} - xorg-server 2:1.19.3-2 (bug #867492) NOTE: https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455 NOTE: https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d NOTE: https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c - NOTE: http://www.openwall.com/lists/oss-security/2017/07/06/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/07/06/6 CVE-2017-10969 RESERVED CVE-2017-10968 (In FineCMS through 2017-07-07, application\core\controller\template.ph ...) @@ -25681,7 +25681,7 @@ CVE-2017-10140 (Postfix before 2.11.10, 3.0.x before 3.0.10, 3.1.x before 3.1.6, - db4.0 <removed> - db <removed> [jessie] - db 5.1.29-9+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2017/08/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/12/1 NOTE: Patch as used in Fedora: https://src.fedoraproject.org/rpms/libdb/raw/8047fa8580659fcae740c25e91b490539b8453eb/f/db-5.3.28-cwd-db_config.patch NOTE: and is acknowledged by libdb upstream, cf. https://bugzilla.redhat.com/show_bug.cgi?id=1464032#c9 CVE-2017-10139 @@ -26742,7 +26742,7 @@ CVE-2017-9609 (Cross-site scripting (XSS) vulnerability in Blackcat CMS 1.2 allo CVE-2017-9608 (The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allow ...) {DSA-3957-1} - ffmpeg 7:3.3.3-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/08/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/14/1 NOTE: https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd NOTE: https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89 CVE-2017-9607 (The BL1 FWU SMC handling code in ARM Trusted Firmware before 1.4 might ...) @@ -26770,7 +26770,7 @@ CVE-2017-9605 (The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCT {DSA-3945-1 DSA-3927-1} - linux 4.11.6-1 [wheezy] - linux <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/13/2 NOTE: Fixed by: https://git.kernel.org/linus/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c (v4.12-rc5) CVE-2017-9603 (SQL injection vulnerability in the WP Jobs plugin before 1.5 for WordP ...) NOT-FOR-US: WP Jobs plugin for WordPress @@ -26958,7 +26958,7 @@ CVE-2017-9525 (In the cron package through 3.0pl1-128 on Debian, and through 3.0 - cron 3.0pl1-129 (bug #864466) [stretch] - cron <no-dsa> (Minor issue) [wheezy] - cron <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/08/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/08/3 CVE-2017-9523 (The Sophos Web Appliance before 4.3.2 has XSS in the FTP redirect page ...) NOT-FOR-US: Sophos CVE-2017-9522 (The Time Warner firmware on Technicolor TC8717T devices sets the defau ...) @@ -27194,7 +27194,7 @@ CVE-2017-9445 (In systemd through 233, certain sizes passed to dns_packet_new in [jessie] - systemd <not-affected> (Vulnerable code not present) [wheezy] - systemd <not-affected> (Vulnerable code not present) NOTE: Introduced by: https://github.com/systemd/systemd/commit/a0166609f782da91710dea9183d1bf138538db37 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/27/8 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/27/8 CVE-2017-9444 (BigTree CMS through 4.2.18 has CSRF related to the core\admin\modules\ ...) NOT-FOR-US: BigTree CMS CVE-2017-9443 (** DISPUTED ** BigTree CMS through 4.2.18 allows remote authenticated ...) @@ -27659,7 +27659,7 @@ CVE-2017-1000368 (Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable [buster] - sudo 1.8.19p1-2.1 [stretch] - sudo 1.8.19p1-2.1 [jessie] - sudo 1.8.10p3-1+deb8u5 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/02/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/02/7 NOTE: https://www.sudo.ws/repos/sudo/raw-rev/15a46f4007dd CVE-2017-1000367 (Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an inpu ...) {DSA-3867-1 DLA-970-1} @@ -27667,7 +27667,7 @@ CVE-2017-1000367 (Todd Miller's sudo version 1.8.20 and earlier is vulnerable to [buster] - sudo 1.8.19p1-2 [stretch] - sudo 1.8.19p1-2 NOTE: https://www.sudo.ws/alerts/linux_tty.html - NOTE: http://www.openwall.com/lists/oss-security/2017/05/30/16 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/30/16 NOTE: https://www.sudo.ws/repos/sudo/raw-rev/b5460cbbb11b CVE-2017-9310 (QEMU (aka Quick Emulator), when built with the e1000e NIC emulation su ...) {DSA-3920-1} @@ -28162,7 +28162,7 @@ CVE-2017-9210 (libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial [stretch] - qpdf <no-dsa> (Minor issue) [jessie] - qpdf <no-dsa> (Minor issue) [wheezy] - qpdf <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/23/10 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/23/10 NOTE: https://github.com/qpdf/qpdf/issues/101 CVE-2017-9209 (libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of s ...) [experimental] - qpdf 7.0~b1-1 @@ -28170,7 +28170,7 @@ CVE-2017-9209 (libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial [stretch] - qpdf <no-dsa> (Minor issue) [jessie] - qpdf <no-dsa> (Minor issue) [wheezy] - qpdf <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/23/10 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/23/10 NOTE: https://github.com/qpdf/qpdf/issues/100 CVE-2017-9208 (libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of s ...) [experimental] - qpdf 7.0~b1-1 @@ -28178,7 +28178,7 @@ CVE-2017-9208 (libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial [stretch] - qpdf <no-dsa> (Minor issue) [jessie] - qpdf <no-dsa> (Minor issue) [wheezy] - qpdf <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/23/10 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/23/10 NOTE: https://github.com/qpdf/qpdf/issues/99 CVE-2017-9207 (The iw_get_ui16be function in imagew-util.c:422:24 in libimageworsener ...) NOT-FOR-US: ImageWorsener @@ -28198,7 +28198,7 @@ CVE-2017-9148 (The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x be {DLA-977-1} - freeradius 3.0.12+dfsg-5 (bug #863673) [jessie] - freeradius <not-affected> (Only affects 2.1.1 to 2.1.7 and 3.0 to 3.0.13) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/29/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/29/1 NOTE: http://freeradius.org/security.html#session-resumption-2017 NOTE: https://anonscm.debian.org/cgit/pkg-freeradius/freeradius.git/commit/?id=8d681449aa95ee4388b5e3c266bdb070a264f563 CVE-2017-9147 (LibTIFF 4.0.7 has an invalid read in the _TIFFVGetField function in ti ...) @@ -28340,7 +28340,7 @@ CVE-2017-9116 (In OpenEXR 2.2.0, an invalid read of size 1 in the uncompress fun - openexr 2.2.0-11.1 (bug #864078) [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9115 (In OpenEXR 2.2.0, an invalid write of size 2 in the = operator functio ...) - openexr <unfixed> (bug #873885) @@ -28348,7 +28348,7 @@ CVE-2017-9115 (In OpenEXR 2.2.0, an invalid write of size 2 in the = operator fu [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) [wheezy] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9114 (In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ...) - openexr <unfixed> (bug #873885) @@ -28356,7 +28356,7 @@ CVE-2017-9114 (In OpenEXR 2.2.0, an invalid read of size 1 in the refill functio [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) [wheezy] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9113 (In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels ...) - openexr <unfixed> (low; bug #873885) @@ -28364,14 +28364,14 @@ CVE-2017-9113 (In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadP [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) [wheezy] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9112 (In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ...) {DLA-1083-1} - openexr 2.2.0-11.1 (bug #864078) [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9111 (In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function ...) - openexr <unfixed> (bug #873885) @@ -28379,14 +28379,14 @@ CVE-2017-9111 (In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE func [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) [wheezy] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9110 (In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function ...) {DLA-1083-1} - openexr 2.2.0-11.1 (bug #864078) [stretch] - openexr <no-dsa> (Minor issue) [jessie] - openexr <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/12/5 NOTE: https://github.com/openexr/openexr/issues/232 CVE-2017-9109 (An issue was discovered in adns before 1.5.2. It fails to ignore appar ...) - adns 1.6.0-2 (unimportant) @@ -28561,25 +28561,25 @@ CVE-2017-9050 (libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based {DSA-3952-1 DLA-1008-1} - libxml2 2.9.4+dfsg1-3.1 (bug #863018) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781361 (not public) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1 NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=e26630548e7d138d2c560844c43820b6767251e3 CVE-2017-9049 (libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buff ...) {DSA-3952-1 DLA-1008-1} - libxml2 2.9.4+dfsg1-3.1 (bug #863019) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781205 (not public) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1 NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=e26630548e7d138d2c560844c43820b6767251e3 CVE-2017-9048 (libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buf ...) {DSA-3952-1 DLA-1008-1} - libxml2 2.9.4+dfsg1-3.1 (bug #863021) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781701 (not public) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1 NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=932cc9896ab41475d4aa429c27d9afd175959d74 CVE-2017-9047 (A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g074180 ...) {DSA-3952-1 DLA-1008-1} - libxml2 2.9.4+dfsg1-3.1 (bug #863022) NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781333 (not public) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/15/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1 NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=932cc9896ab41475d4aa429c27d9afd175959d74 CVE-2017-9046 (winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code e ...) NOT-FOR-US: Pegasus Mail @@ -29102,7 +29102,7 @@ CVE-2017-8850 (An issue was discovered on OnePlus One, X, 2, 3, and 3T devices. CVE-2017-8849 (smb4k before 2.0.1 allows local users to gain root privileges by lever ...) {DSA-3951-1 DLA-1002-1} - smb4k 1.2.1-2 (bug #862505) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/10/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/10/3 NOTE: https://www.kde.org/info/security/advisory-20170510-2.txt NOTE: https://github.com/stealth/plasmapulsar NOTE: smb4k 2.0.0: https://commits.kde.org/smb4k/a90289b0962663bc1d247bbbd31b9e65b2ca000e @@ -29301,7 +29301,7 @@ CVE-2017-8806 (The Debian pg_ctlcluster, pg_createcluster, and pg_upgradecluster - postgresql-common 188 CVE-2017-8805 (Debian ftpsync before 20171017 does not use the rsync --safe-links opt ...) - archvsync 20171017 - NOTE: http://www.openwall.com/lists/oss-security/2017/10/17/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/10/17/2 NOTE: https://anonscm.debian.org/cgit/mirror/archvsync.git/commit/?id=d1ca2ab2210990b6dfb664cd6776a41b71c48016 CVE-2017-1000041 REJECTED @@ -29317,7 +29317,7 @@ CVE-2017-8804 (The xdr_bytes and xdr_string functions in the GNU C Library (aka NOTE: This is not a vulnerability in glibc, but a bug in the application, see NOTE: https://sourceware.org/ml/libc-alpha/2017-05/msg00128.html and NOTE: https://sourceware.org/ml/libc-alpha/2017-05/msg00129.html - NOTE: http://www.openwall.com/lists/oss-security/2017/05/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/05/2 NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=21461 CVE-2017-8803 (Notepad++ 7.3.3 (32-bit) with Hex Editor Plugin v0.9.5 might allow use ...) NOT-FOR-US: Notepad++ @@ -29394,7 +29394,7 @@ CVE-2017-8779 (rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc throug - rpcbind 0.2.3-0.6 (bug #861835) - libtirpc 0.2.5-1.2 (bug #861834) - ntirpc 1.4.4-1 (bug #861836) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/04/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/04/1 NOTE: https://github.com/guidovranken/rpcbomb/ CVE-2017-8776 (Quick Heal Internet Security 10.1.0.316, Quick Heal Total Security 10. ...) NOT-FOR-US: Quick Heal Internet Security @@ -30116,7 +30116,7 @@ CVE-2017-8422 (KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local user {DSA-3849-1 DLA-952-1} - kauth 5.28.0-2 - kde4libs 4:4.14.26-2 - NOTE: http://www.openwall.com/lists/oss-security/2017/05/10/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/10/3 NOTE: patch for kauth: https://github.com/KDE/kauth/commit/df875f725293af53399f5146362eb158b4f9216a NOTE: patch for kde4libs: https://github.com/KDE/kdelibs/commit/264e97625abe2e0334f97de17f6ffb52582888ab NOTE: https://www.kde.org/info/security/advisory-20170510-1.txt @@ -30556,7 +30556,7 @@ CVE-2017-8296 (kedpm 0.5 and 1.0 creates a history file in ~/.kedpm/history that [jessie] - kedpm 1.0+deb8u1 NOTE: patch in BTS gives workaround to always prompt for password and do not save NOTE: to database. - NOTE: http://www.openwall.com/lists/oss-security/2017/04/25/9 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/25/9 CVE-2017-8295 (WordPress through 4.7.4 relies on the Host HTTP header for a password- ...) {DSA-3870-1 DLA-975-1} - wordpress 4.7.5+dfsg-2 (bug #862053) @@ -30588,7 +30588,7 @@ CVE-2017-8305 (The UDFclient (before 0.8.8) custom strlcpy implementation has a - udfclient 0.8.8-1 (bug #861347) CVE-2017-8301 (LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_ ...) - libressl <itp> (bug #754513) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/27/11 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/27/11 CVE-2017-8291 (Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remot ...) {DSA-3838-1 DLA-932-1} - ghostscript 9.20~dfsg-3.1 (bug #861295) @@ -30728,7 +30728,7 @@ CVE-2017-8226 (Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have default c NOT-FOR-US: Amcrest CVE-2017-8283 (dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU pat ...) - dpkg 1.18.24 (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/20/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/20/2 CVE-2017-8225 (On Wireless IP Camera (P2P) WIFICAM devices, access to .ini files (con ...) NOT-FOR-US: Wireless IP Camera (P2P) WIFICAM devices CVE-2017-8224 (Wireless IP Camera (P2P) WIFICAM devices have a backdoor root account ...) @@ -31595,13 +31595,13 @@ CVE-2017-7890 (The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c NOTE: https://github.com/libgd/libgd/commit/c613bc169802bb4b639ee2e15c61b25b80a88424 CVE-2017-7888 (Dolibarr ERP/CRM 4.0.4 stores passwords with the MD5 algorithm, which ...) - dolibarr 5.0.4+dfsg3-1 (bug #863544) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/10/6 CVE-2017-7887 (Dolibarr ERP/CRM 4.0.4 has XSS in doli/societe/list.php via the sall p ...) - dolibarr 5.0.4+dfsg3-1 (bug #863544) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/10/6 CVE-2017-7886 (Dolibarr ERP/CRM 4.0.4 has SQL Injection in doli/theme/eldy/style.css. ...) - dolibarr 5.0.4+dfsg3-1 (bug #863544) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/10/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/10/6 CVE-2017-7885 (Artifex jbig2dec 0.13 has a heap-based buffer over-read leading to den ...) {DSA-3855-1 DLA-942-1} - jbig2dec 0.13-4.1 (bug #860460) @@ -32407,7 +32407,7 @@ CVE-2017-7693 (Directory traversal vulnerability in viewer_script.jsp in Riverbe CVE-2017-7692 (SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allo ...) {DSA-3852-1 DLA-941-1} - squirrelmail <removed> - NOTE: http://www.openwall.com/lists/oss-security/2017/04/19/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/19/6 NOTE: https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html CVE-2017-7691 (A code injection vulnerability exists in SAP TREX / Business Warehouse ...) NOT-FOR-US: SAP TREX @@ -32503,7 +32503,7 @@ CVE-2017-7659 (A maliciously constructed HTTP/2 request could cause mod_http2 in [jessie] - apache2 <not-affected> (Vulnerable code not present) [wheezy] - apache2 <not-affected> (Vulnerable code not present) NOTE: HTTP/2 support introduced in 2.4.17 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/19/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/19/5 CVE-2017-7658 (In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP ...) {DSA-4278-1} - jetty <removed> @@ -32642,7 +32642,7 @@ CVE-2017-7616 (Incorrect error handling in the set_mempolicy and mbind compat sy CVE-2017-7615 (MantisBT through 2.3.0 allows arbitrary password reset and unauthentic ...) - mantis <removed> [wheezy] - mantis <end-of-life> (Unsupported in Wheezy LTS) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/16/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/16/2 CVE-2017-7614 (elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as ...) - binutils 2.28-4 (low; bug #859989) [jessie] - binutils <ignored> (Minor issue) @@ -32840,7 +32840,7 @@ CVE-2017-7572 (The _checkPolkitPrivilege function in serviceHelper.py in Back In - backintime 1.1.12-2 (bug #859815) [jessie] - backintime <no-dsa> (Minor issue) [wheezy] - backintime <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/07/2 NOTE: https://github.com/bit-team/backintime/commit/7f208dc547f569b689c888103e3b593a48cd1869 CVE-2017-7571 (public/rolechangeadmin in Faveo 1.9.3 allows CSRF. The impact is obtai ...) NOT-FOR-US: Faveo @@ -32863,7 +32863,7 @@ CVE-2017-7563 (In ARM Trusted Firmware 1.3, RO memory is always executable at AA CVE-2017-7578 (Multiple heap-based buffer overflows in parser.c in libming 0.4.7 allo ...) {DLA-890-1} - ming <removed> - NOTE: http://www.openwall.com/lists/oss-security/2017/04/07/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/07/1 NOTE: https://github.com/libming/libming/issues/68 CVE-2017-7562 (An authentication bypass flaw was found in the way krb5's certauth int ...) - krb5 <not-affected> (Vulnerable code introduced later, cf. #873281) @@ -33002,7 +33002,7 @@ CVE-2017-7533 (Race condition in the fsnotify implementation in the Linux kernel {DSA-3945-1 DSA-3927-1} - linux 4.12.6-1 [wheezy] - linux <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/08/03/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/08/03/2 NOTE: Fixed by: https://git.kernel.org/linus/49d31c2f389acfe83417083e1208422b4091cd9 (v4.13-rc1) CVE-2017-7532 (In Moodle 3.x, course creators are able to change system default setti ...) - moodle <removed> @@ -33060,7 +33060,7 @@ CVE-2017-7522 (OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to [wheezy] - openvpn <not-affected> (x509-track implemented in 2.4.0) NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/426392940c NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/21/6 NOTE: In Debian openvpn is compiled against OpenSSL, thus even affected NOTE: code present. CVE-2017-7521 (OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remo ...) @@ -33074,7 +33074,7 @@ CVE-2017-7521 (OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to NOTE: Fixed by (2.3.x): https://github.com/OpenVPN/openvpn/commit/84e1775961de1c9d2ab32159fc03f758591f5238 NOTE: Fixed by (2.3.x): https://github.com/OpenVPN/openvpn/commit/1dde0cd6e5e6a0f2f45ec9969b7ff1b6537514ad NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/21/6 CVE-2017-7520 (OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to deni ...) {DSA-3900-1 DLA-999-1} - openvpn 2.4.3-1 (bug #865480) @@ -33082,7 +33082,7 @@ CVE-2017-7520 (OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to NOTE: Fixed by (2.4.x): https://github.com/OpenVPN/openvpn/commit/043fe327878eba75efa13794c9845f85c3c629f2 NOTE: Fixed by (2.3.x): https://github.com/OpenVPN/openvpn/commit/f38a4a105979b87ebebe9be1c3d323116d3fb924 NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/21/6 CVE-2017-7519 (In Ceph, a format string flaw was found in the way libradosstriper par ...) {DSA-4339-1} - ceph 12.2.8+dfsg1-1 (bug #864535) @@ -33092,7 +33092,7 @@ CVE-2017-7518 (A flaw was found in the Linux kernel before version 4.12 in the w {DSA-3981-1} - linux 4.11.11-1 [wheezy] - linux <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/23/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/23/5 NOTE: https://www.spinics.net/lists/kvm/msg151817.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1464473 NOTE: Fixed by: https://git.kernel.org/linus/c8401dda2f0a00cd25c0af6a95ed50e478d25de4 @@ -33126,7 +33126,7 @@ CVE-2017-7508 (OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to {DSA-3900-1} - openvpn 2.4.3-1 (bug #865480) [wheezy] - openvpn <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/21/6 NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 NOTE: Fixed by (master): https://github.com/OpenVPN/openvpn/commit/c3f47077a7756de5929094569421a95aa66f2022 NOTE: Fixed by (2.4.x): https://github.com/OpenVPN/openvpn/commit/ed28cde3d8bf3f1459b2f42f0e27d64801009f92 @@ -33236,7 +33236,7 @@ CVE-2017-7483 (Rxvt 2.7.10 is vulnerable to a denial of service attack by passin [stretch] - rxvt <no-dsa> (Minor issue) [jessie] - rxvt <no-dsa> (Minor issue) [wheezy] - rxvt <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/05/01/15 + NOTE: https://www.openwall.com/lists/oss-security/2017/05/01/15 CVE-2017-7482 (In the Linux kernel before version 4.12, Kerberos 5 tickets decoded wh ...) {DSA-3945-1 DSA-3927-1 DLA-1099-1} - linux 4.11.11-1 @@ -33252,7 +33252,7 @@ CVE-2017-7480 (rkhunter versions before 1.4.4 are vulnerable to file download ov - rkhunter 1.4.4-1 (bug #866677) [stretch] - rkhunter 1.4.2-6+deb9u1 [jessie] - rkhunter 1.4.2-0.4+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/29/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/29/2 NOTE: http://rkhunter.cvs.sourceforge.net/viewvc/rkhunter/rkhunter/files/rkhunter?r1=1.549&r2=1.550&view=patch CVE-2017-7479 (OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reac ...) {DLA-944-1} @@ -33277,7 +33277,7 @@ CVE-2017-7477 (Heap-based buffer overflow in drivers/net/macsec.c in the MACsec - linux 4.9.25-1 [jessie] - linux <not-affected> (Introduced in 4.6) [wheezy] - linux <not-affected> (Introduced in 4.6) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/25/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/25/4 NOTE: Fixed by: https://git.kernel.org/linus/4d6fa57b4dab0d77f4d8e9d9c73d1e63f6fe8fee NOTE: Fixed by: https://git.kernel.org/linus/5294b83086cc1c35b4efeca03644cf9d12282e5b CVE-2017-7476 (Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ ...) @@ -33326,7 +33326,7 @@ CVE-2017-7467 (A buffer overflow flaw was found in the way minicom before versio {DLA-914-1} - minicom 2.7-1.1 (bug #860940) [jessie] - minicom 2.7-1+deb8u1 - NOTE: http://www.openwall.com/lists/oss-security/2017/04/18/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/18/5 CVE-2017-7466 (Ansible before version 2.3 has an input validation vulnerability in th ...) - ansible 2.2.1.0-2 [jessie] - ansible <not-affected> (Vulnerable code not present) @@ -33542,41 +33542,41 @@ CVE-2017-7383 (The PdfFontFactory.cpp:195:62 code in PoDoFo 0.9.5 allows remote {DLA-968-1} - libpodofo 0.9.4-6 (bug #859329) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/01/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/01/3 NOTE: https://github.com/asarubbo/poc/blob/master/00252-podofo-nullptr4 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1848 CVE-2017-7382 (The PdfFontFactory.cpp:200:88 code in PoDoFo 0.9.5 allows remote attac ...) {DLA-968-1} - libpodofo 0.9.4-6 (bug #859329) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/01/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/01/3 NOTE: https://github.com/asarubbo/poc/blob/master/00251-podofo-nullptr3 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1848 CVE-2017-7381 (The doc/PdfPage.cpp:609:23 code in PoDoFo 0.9.5 allows remote attacker ...) {DLA-968-1} - libpodofo 0.9.4-6 (bug #859329) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/01/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/01/3 NOTE: https://github.com/asarubbo/poc/blob/master/00251-podofo-nullptr2 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1848 CVE-2017-7380 (The doc/PdfPage.cpp:614:20 code in PoDoFo 0.9.5 allows remote attacker ...) {DLA-968-1} - libpodofo 0.9.4-6 (bug #859329) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/01/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/01/3 NOTE: https://github.com/asarubbo/poc/blob/master/00250-podofo-nullptr1 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1848 CVE-2017-7379 (The PoDoFo::PdfSimpleEncoding::ConvertToEncoding function in PdfEncodi ...) {DLA-929-1} - libpodofo 0.9.4-5 (bug #859331) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/01/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/01/2 NOTE: upstream fix: https://sourceforge.net/p/podofo/code/1842/ CVE-2017-7378 (The PoDoFo::PdfPainter::ExpandTabs function in PdfPainter.cpp in PoDoF ...) {DLA-968-1} - libpodofo 0.9.4-6 (bug #859330) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/01/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/01/1 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1847 CVE-2017-7377 (The (1) v9fs_create and (2) v9fs_lcreate functions in hw/9pfs/9p.c in ...) {DLA-1497-1 DLA-1035-1 DLA-965-1} @@ -33584,7 +33584,7 @@ CVE-2017-7377 (The (1) v9fs_create and (2) v9fs_lcreate functions in hw/9pfs/9p. - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2017-03/msg05449.html NOTE: http://git.qemu-project.org/?p=qemu.git;a=commitdiff;h=d63fb193e71644a073b77ff5ac6f1216f2f6cf6e - NOTE: http://www.openwall.com/lists/oss-security/2017/04/03/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/03/2 NOTE: For older releases affected code is in hw/9pfs/virtio-9p.c CVE-2017-7376 (Buffer overflow in libxml2 allows remote attackers to execute arbitrar ...) {DSA-3952-1 DLA-1060-1} @@ -33743,7 +33743,7 @@ CVE-2017-7310 (A buffer overflow vulnerability in Import Command in SyncBreeze b CVE-2017-7309 (A cross-site scripting (XSS) vulnerability in the MantisBT Configurati ...) - mantis <removed> [wheezy] - mantis <end-of-life> (Unsupported in Wheezy LTS) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/30/4 CVE-2017-7307 (Riverbed RiOS before 9.0.1 does not properly restrict shell access in ...) NOT-FOR-US: Riverbed RiOS CVE-2017-7306 (** DISPUTED ** Riverbed RiOS through 9.6.0 has a weak default password ...) @@ -33973,7 +33973,7 @@ CVE-2017-7242 (Multiple Cross-Site Scripting (XSS) were discovered in admin/modu CVE-2017-7241 (A cross-site scripting (XSS) vulnerability in the MantisBT Move Attach ...) - mantis <removed> [wheezy] - mantis <end-of-life> (Unsupported in Wheezy LTS) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/30/4 CVE-2017-7240 (An issue was discovered on Miele Professional PST10 devices. The corre ...) NOT-FOR-US: Miele Professional PG 8528 PST10 devices CVE-2017-7239 (Ninka before 1.3.2 might allow remote attackers to obtain sensitive in ...) @@ -34726,7 +34726,7 @@ CVE-2017-6974 (An issue was discovered in certain Apple products. macOS before 1 CVE-2017-6973 (A cross-site scripting (XSS) vulnerability in the MantisBT Configurati ...) - mantis <removed> [wheezy] - mantis <end-of-life> (Unsupported in Wheezy LTS) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/30/4 CVE-2017-6972 (AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 have an e ...) NOT-FOR-US: AlienVault CVE-2017-6971 (AlienVault USM and OSSIM before 5.3.7 and NfSen before 1.3.8 allow rem ...) @@ -34751,7 +34751,7 @@ CVE-2017-6967 (xrdp 0.9.1 calls the PAM function auth_start_session() in an inco NOTE: https://github.com/neutrinolabs/xrdp/issues/350 NOTE: First attempt: https://github.com/neutrinolabs/xrdp/pull/694 NOTE: Followed by: https://github.com/neutrinolabs/xrdp/pull/696 - NOTE: http://www.openwall.com/lists/oss-security/2017/03/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/18/1 NOTE: https://github.com/neutrinolabs/xrdp/pull/696/commits/44129acd210c803fc8bbcfaf1b0db05e5bb4034f CVE-2017-6966 (readelf in GNU Binutils 2.28 has a use-after-free (specifically read-a ...) - binutils 2.28-3 (bug #858263) @@ -36142,7 +36142,7 @@ CVE-2017-6849 (The PoDoFo::PdfColorGray::~PdfColorGray function in PdfColor.cpp [stretch] - libpodofo <no-dsa> (Minor issue) [jessie] - libpodofo <no-dsa> (Minor issue) [wheezy] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/10 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/10 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcolorgraypdfcolorgray-pdfcolor-cpp NOTE: https://sourceforge.net/p/podofo/tickets/8/ NOTE: Same fix as for CVE-2017-6845 @@ -36151,14 +36151,14 @@ CVE-2017-6848 (The PoDoFo::PdfXObject::PdfXObject function in PdfXObject.cpp in - libpodofo 0.9.4-6 (bug #861565) [stretch] - libpodofo <no-dsa> (Minor issue) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/9 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/9 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfxobjectpdfxobject-pdfxobject-cpp NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1846 CVE-2017-6847 (The PoDoFo::PdfVariant::DelayedLoad function in PdfVariant.h in PoDoFo ...) {DLA-968-1} - libpodofo 0.9.4-6 (bug #861564) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/8 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/8 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfvariantdelayedload-pdfvariant-h NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1846 CVE-2017-6846 (The GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace fun ...) @@ -36166,7 +36166,7 @@ CVE-2017-6846 (The GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpac [stretch] - libpodofo <no-dsa> (Minor issue) [jessie] - libpodofo <no-dsa> (Minor issue) [wheezy] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/7 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementsetnonstrokingcolorspace-graphicsstack-h/ NOTE: https://sourceforge.net/p/podofo/tickets/9/ NOTE: Same fix as for CVE-2017-6845 @@ -36178,21 +36178,21 @@ CVE-2017-6845 (The PoDoFo::PdfColor::operator function in PdfColor.cpp in PoDoFo NOTE: The motivation for no-dsa in wheezy is that there are no known NOTE: services that use this library (apart from desktop applications) NOTE: and the worst case is a DoS. - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/6 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-podofopdfcoloroperator-pdfcolor-cpp NOTE: upstream commit: https://sourceforge.net/p/podofo/code/1892 CVE-2017-6844 (Buffer overflow in the PoDoFo::PdfParser::ReadXRefSubsection function ...) {DLA-929-1} - libpodofo 0.9.4-5 (bug #861561) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/5 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-global-buffer-overflow-in-podofopdfparserreadxrefsubsection-pdfparser-cpp NOTE: upstream commit: https://sourceforge.net/p/podofo/code/1840/ CVE-2017-6843 (Heap-based buffer overflow in the PoDoFo::PdfVariant::DelayedLoad func ...) {DLA-968-1} - libpodofo 0.9.4-6 (bug #861560) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/4 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-heap-based-buffer-overflow-in-podofopdfvariantdelayedload-pdfvariant-h NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1844 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1845 @@ -36200,7 +36200,7 @@ CVE-2017-6842 (The ColorChanger::GetColorFromStack function in colorchanger.cpp {DLA-968-1} - libpodofo 0.9.4-6 (bug #861559) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/3 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-colorchangergetcolorfromstack-colorchanger-cpp NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1844 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1845 @@ -36209,7 +36209,7 @@ CVE-2017-6841 (The GraphicsStack::TGraphicsStackElement::~TGraphicsStackElement [stretch] - libpodofo <no-dsa> (Minor issue) [jessie] - libpodofo <no-dsa> (Minor issue) [wheezy] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/2 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-null-pointer-dereference-in-graphicsstacktgraphicsstackelementtgraphicsstackelement-graphicsstack-h NOTE: https://sourceforge.net/p/podofo/tickets/10/ NOTE: Same fix as for CVE-2017-6845 @@ -36217,7 +36217,7 @@ CVE-2017-6840 (The ColorChanger::GetColorFromStack function in colorchanger.cpp {DLA-968-1} - libpodofo 0.9.4-6 (bug #861557) [jessie] - libpodofo <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/02/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/02/1 NOTE: https://blogs.gentoo.org/ago/2017/03/02/podofo-invalid-memory-read-in-colorchangergetcolorfromstack-colorchanger-cpp NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1844 NOTE: upstream commit: http://sourceforge.net/p/podofo/code/1845 @@ -36600,55 +36600,55 @@ CVE-2017-6306 (An issue was discovered in ytnef before 1.9.1. This is related to - libytnef 1.9.1-1 [wheezy] - libytnef <not-affected> (vulnerable code not present) NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6305 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6304 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6303 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6302 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6301 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6300 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6299 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6298 (An issue was discovered in ytnef before 1.9.1. This is related to a pa ...) {DSA-3846-1 DLA-878-1} - libytnef 1.9.1-1 NOTE: https://www.x41-dsec.de/lab/advisories/x41-2017-002-ytnef/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/15/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/15/4 NOTE: fixed in https://github.com/Yeraze/ytnef/commit/b36d6b25b7a546fc28d6c3812124e487987a4910 CVE-2017-6297 (The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does n ...) NOT-FOR-US: MikroTik RouterOS @@ -37205,7 +37205,7 @@ CVE-2017-6060 (Stack-based buffer overflow in jstest_main.c in mujstest in Artif [wheezy] - mupdf <not-affected> (Vulnerable code not present) NOTE: Although jstest_main.c compiled during build and mujstest is created NOTE: it is not included in the produced binary packages - NOTE: http://www.openwall.com/lists/oss-security/2017/02/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/18/1 CVE-2017-6058 (Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU ( ...) - qemu 1:2.8+dfsg-3 (bug #855616) [jessie] - qemu <not-affected> (Vulnerable code not present) @@ -37476,7 +37476,7 @@ CVE-2017-5973 (The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Qu - qemu 1:2.8+dfsg-3 (bug #855611) - qemu-kvm <removed> NOTE: https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg01101.html - NOTE: http://www.openwall.com/lists/oss-security/2017/02/13/11 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/13/11 CVE-2017-5972 (The TCP stack in the Linux kernel 3.x does not properly implement a SY ...) - linux 4.4.2-1 [jessie] - linux <ignored> (Known perfomance limitation) @@ -37493,7 +37493,7 @@ CVE-2017-5969 (** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows r [stretch] - libxml2 <no-dsa> (Minor issue, only a denial-of-service when using recover mode) [jessie] - libxml2 <no-dsa> (Minor issue, only a denial-of-service when using recover mode) [wheezy] - libxml2 <no-dsa> (Minor issue, only a denial-of-service when using recover mode) - NOTE: http://www.openwall.com/lists/oss-security/2016/11/05/3 + NOTE: https://www.openwall.com/lists/oss-security/2016/11/05/3 NOTE: Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=778519 NOTE: Duplicate upstream bug (contains patch): https://bugzilla.gnome.org/show_bug.cgi?id=758422 NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=94691dc884d1a8ada39f073408b4bb92fe7fe882 @@ -37527,7 +37527,7 @@ CVE-2017-5956 (The vrend_draw_vbo function in virglrenderer before 0.6.0 allows - virglrenderer 0.6.0-1 (bug #858255) NOTE: https://cgit.freedesktop.org/virglrenderer/commit/?id=a5ac49940c40ae415eac0cf912eac7070b4ba95d (0.6.0) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1421073 - NOTE: The original fix opens a memory leak: http://www.openwall.com/lists/oss-security/2017/02/24/2 + NOTE: The original fix opens a memory leak: https://www.openwall.com/lists/oss-security/2017/02/24/2 NOTE: Additional patch required: https://bugzilla.suse.com/attachment.cgi?id=715395 CVE-2017-5955 RESERVED @@ -37608,12 +37608,12 @@ CVE-2017-5931 (Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick [wheezy] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2017-01/msg01368.html - NOTE: http://www.openwall.com/lists/oss-security/2017/02/07/8 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/07/8 CVE-2017-5930 (The AliasHandler component in PostfixAdmin before 3.0.2 allows remote ...) - postfixadmin 3.0.2-1 (bug #854742) [jessie] - postfixadmin <not-affected> (Vulnerable code not present) [wheezy] - postfixadmin <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/07/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/07/6 CVE-2017-5929 (QOS.ch Logback before 1.2.0 has a serialization vulnerability affectin ...) {DLA-888-1} - logback 1:1.1.9-3 (bug #857343) @@ -37692,7 +37692,7 @@ CVE-2017-5896 (Heap-based buffer overflow in the fz_subsample_pixmap function in NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=697515 NOTE: Fix https://git.ghostscript.com/?p=mupdf.git;h=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27 NOTE: https://blogs.gentoo.org/ago/2017/02/09/mupdf-use-after-free-in-fz_subsample_pixmap-pixmap-c/ - NOTE: http://www.openwall.com/lists/oss-security/2017/02/10/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/10/1 CVE-2017-5895 RESERVED CVE-2017-5894 @@ -37751,13 +37751,13 @@ CVE-2017-5878 (The AMF unmarshallers in Red5 Media Server before 1.0.8 do not re CVE-2017-5938 (Cross-site scripting (XSS) vulnerability in the nav_path function in l ...) {DSA-3784-1 DLA-820-1} - viewvc 1.1.26-1 (bug #854681) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/08/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/08/7 NOTE: https://github.com/viewvc/viewvc/commit/9dcfc7daa4c940992920d3b2fbd317da20e44aad CVE-2017-5992 (Openpyxl 2.4.1 resolves external entities by default, which allows rem ...) - openpyxl 2.3.0-3 (bug #854442) [jessie] - openpyxl <not-affected> (vulnerable code not present) [wheezy] - openpyxl <not-affected> (vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/07/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/07/5 NOTE: https://bitbucket.org/openpyxl/openpyxl/issues/749 NOTE: https://bitbucket.org/openpyxl/openpyxl/commits/3b4905f428e1 CVE-2017-6059 (Mod_auth_openidc.c in the Ping Identity OpenID Connect authentication ...) @@ -37773,11 +37773,11 @@ CVE-2017-XXXX [irssi memory leak] [jessie] - irssi <not-affected> (support for sasl not present) [wheezy] - irssi <not-affected> (support for sasl not present) NOTE: Patch: https://github.com/irssi/irssi/commit/19c51789967a2f63da033e60f6ef08848b9cd144 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2017/02/05/8 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2017/02/05/8 CVE-2017-XXXX [irssi missing null terminator] - irssi 1.0.1-1 (unimportant) NOTE: Patch: https://github.com/irssi/irssi/pull/619/commits/677fb1f55ca52d0e43c93f7d8361d333ff5bffd6 - NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2017/02/05/8 + NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2017/02/05/8 CVE-2017-5886 (Heap-based buffer overflow in the PoDoFo::PdfTokenizer::GetNextToken f ...) {DLA-929-1} - libpodofo 0.9.4-5 (bug #854604) @@ -37830,17 +37830,17 @@ CVE-2017-5836 (The plist_free_data function in plist.c in libplist allows attack [jessie] - libplist <no-dsa> (Minor issue) [wheezy] - libplist <no-dsa> (pointers are not incorrectly freed and non-string key nodes are officially allowed) NOTE: https://github.com/libimobiledevice/libplist/issues/86 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/6 CVE-2017-5835 (libplist allows attackers to cause a denial of service (large memory a ...) {DLA-2168-1 DLA-840-1} - libplist 1.12+git+1+e37ca00-0.1 (bug #854000) NOTE: https://github.com/libimobiledevice/libplist/issues/88 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/6 CVE-2017-5834 (The parse_dict_node function in bplist.c in libplist allows attackers ...) {DLA-2168-1 DLA-840-1} - libplist 1.12+git+1+e37ca00-0.1 (bug #854000) NOTE: https://github.com/libimobiledevice/libplist/issues/89 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/31/6 CVE-2017-5829 (An access restriction bypass vulnerability in HPE Aruba ClearPass Poli ...) NOT-FOR-US: HPE Aruba ClearPass Policy Manager CVE-2017-5828 (An arbitrary command execution vulnerability in HPE Aruba ClearPass Po ...) @@ -38223,75 +38223,75 @@ CVE-2017-5848 (The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux {DSA-3818-1 DLA-2164-1 DLA-830-1} - gst-plugins-bad1.0 1.10.4-1 (low) - gst-plugins-bad0.10 <unfixed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777957 NOTE: Patch: https://bugzilla.gnome.org/show_bug.cgi?id=777957#c3 CVE-2017-5847 (The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gs ...) {DSA-3821-1 DLA-2226-1 DLA-829-1} - gst-plugins-ugly1.0 1.10.4-1 (low) - gst-plugins-ugly0.10 <removed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777955 NOTE: https://github.com/GStreamer/gst-plugins-ugly/commit/d21017b52a585f145e8d62781bcc1c5fefc7ee37 CVE-2017-5846 (The gst_asf_demux_process_ext_stream_props function in gst/asfdemux/gs ...) {DSA-3821-1 DLA-2226-1 DLA-829-1} - gst-plugins-ugly1.0 1.10.3-1 (low) - gst-plugins-ugly0.10 <removed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777937 CVE-2017-5845 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst- ...) {DSA-3820-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777532 CVE-2017-5844 (The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-medi ...) {DSA-3819-1 DLA-2126-1 DLA-827-1} - gst-plugins-base1.0 1.10.3-1 (low) - gst-plugins-base0.10 <removed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777525 CVE-2017-5843 (Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unr ...) {DSA-3818-1 DLA-2164-1 DLA-830-1} - gst-plugins-bad1.0 1.10.3-1 - gst-plugins-bad0.10 <unfixed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777503 CVE-2017-5842 (The html_context_handle_element function in gst/subparse/samiparse.c i ...) {DSA-3819-1} - gst-plugins-base1.0 1.10.3-1 - gst-plugins-base0.10 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777502 CVE-2017-5841 (The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst- ...) {DSA-3820-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777500 CVE-2017-5840 (The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plug ...) {DSA-3820-1 DLA-2225-1 DLA-828-1} - gst-plugins-good1.0 1.10.3-1 (low) - gst-plugins-good0.10 <removed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777469 CVE-2017-5839 (The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-medi ...) {DSA-3819-1} - gst-plugins-base1.0 1.10.3-1 - gst-plugins-base0.10 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777265 CVE-2017-5838 (The gst_date_time_new_from_iso8601_string function in gst/gstdatetime. ...) {DSA-3822-1} - gstreamer1.0 1.10.3-1 (low) - gstreamer0.10 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777263 CVE-2017-5837 (The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-medi ...) {DSA-3819-1 DLA-2126-1 DLA-827-1} - gst-plugins-base1.0 1.10.3-1 (low) - gst-plugins-base0.10 <removed> (low) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/7 NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=777262 CVE-2017-5851 (The free_options function in options_manager.c in mp3splt 2.6.2 allows ...) - mp3splt <unfixed> (unimportant) @@ -38314,14 +38314,14 @@ CVE-2017-5857 (Memory leak in the virgl_cmd_resource_unref function in hw/displa - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2017-01/msg04615.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1418382 - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/21 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/21 CVE-2017-5856 (Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c i ...) {DLA-1497-1} - qemu 1:2.8+dfsg-3 (bug #853996) [wheezy] - qemu <not-affected> (Vulnerable code not present) - qemu-kvm <removed> [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/01/19 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/01/19 NOTE: http://git.qemu.org/?p=qemu.git;a=commit;h=765a707000e838c30b18d712fe6cb3dd8e0435f3 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1418342 CVE-2017-5855 (The PoDoFo::PdfParser::ReadXRefSubsection function in PdfParser.cpp in ...) @@ -38362,7 +38362,7 @@ CVE-2017-5852 (The PoDoFo::PdfPage::GetInheritedKeyFromObject function in base/P NOTE: further patch for ABI compatibility: https://sourceforge.net/p/podofo/mailman/message/36084628/ CVE-2017-5849 (tiffttopnm in netpbm 10.47.63 does not properly use the libtiff TIFFRG ...) - netpbm-free <not-affected> (vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/02/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/02/2 NOTE: Debian uses an unaffected fork: NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2654#c8 CVE-2017-5850 (httpd in OpenBSD allows remote attackers to cause a denial of service ...) @@ -38422,14 +38422,14 @@ CVE-2017-5663 (In Apache Fineract 0.4.0-incubating, 0.5.0-incubating, and 0.6.0- CVE-2017-5662 (In Apache Batik before 1.9, files lying on the filesystem of the serve ...) {DSA-4215-1 DLA-926-1} - batik 1.9-1 (bug #860566) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/18/1 NOTE: Upstream bug: https://issues.apache.org/jira/browse/BATIK-1139 NOTE: Fixed by: http://svn.apache.org/r1743326 NOTE: Similar issue to CVE-2015-0250 CVE-2017-5661 (In Apache FOP before 2.2, files lying on the filesystem of the server ...) {DSA-3864-1 DLA-927-1} - fop 1:2.1-6 (bug #860567) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/18/2 NOTE: Upstream bug: https://issues.apache.org/jira/browse/FOP-2668 NOTE: Fixed by: http://svn.apache.org/r1769967 NOTE: Fixed by: http://svn.apache.org/r1769968 (fix for Java 6) @@ -38464,13 +38464,13 @@ CVE-2017-5651 (In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the r - tomcat9 <not-affected> (Fixed before initial upload to Debian) - tomcat8 8.5.11-2 (bug #860071) [jessie] - tomcat8 <not-affected> (Only affects 8.5 and later) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/10/21 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/10/21 NOTE: Fixed by: http://svn.apache.org/r1788546 (8.5.x) CVE-2017-5650 (In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handli ...) - tomcat9 <not-affected> (Fixed before initial upload to Debian) - tomcat8 8.5.11-2 (bug #860070) [jessie] - tomcat8 <not-affected> (Only affects 8.5 and later) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/10/22 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/10/22 NOTE: Fixed by: http://svn.apache.org/r1788480 (8.5.x) CVE-2017-5649 (Apache Geode before 1.1.1, when a cluster has enabled security by sett ...) NOT-FOR-US: Apache Geode @@ -38481,7 +38481,7 @@ CVE-2017-5648 (While investigating bug 60718, it was noticed that some calls to - tomcat7 7.0.72-3 NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API - tomcat6 <not-affected> (Only affects 7.0 an later) - NOTE: http://www.openwall.com/lists/oss-security/2017/04/10/23 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/10/23 NOTE: Fixed by: http://svn.apache.org/r1785775 (8.5.x) NOTE: Fixed by: http://svn.apache.org/r1785776 (8.0.x) NOTE: Fixed by: http://svn.apache.org/r1785777 (7.0.x) @@ -38493,7 +38493,7 @@ CVE-2017-5647 (A bug in the handling of the pipelined requests in Apache Tomcat NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API - tomcat6 6.0.41-3 NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie - NOTE: http://www.openwall.com/lists/oss-security/2017/04/10/24 + NOTE: https://www.openwall.com/lists/oss-security/2017/04/10/24 NOTE: Fixed by: http://svn.apache.org/r1788932 (8.5.x) NOTE: Fixed by: http://svn.apache.org/r1788999 (8.0.x) NOTE: Fixed by: http://svn.apache.org/r1789008 (7.0.x) @@ -38512,7 +38512,7 @@ CVE-2017-5644 (Apache POI in versions prior to release 3.15 allows remote attack [stretch] - libapache-poi-java <no-dsa> (Minor issue) [jessie] - libapache-poi-java <no-dsa> (Minor issue) [wheezy] - libapache-poi-java <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2017/03/20/9 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/20/9 CVE-2017-5643 (Apache Camel's Validation Component is vulnerable against SSRF via rem ...) NOT-FOR-US: Apache Camel CVE-2017-5642 (During installation of Ambari 2.4.0 through 2.4.2, Ambari Server artif ...) @@ -38594,14 +38594,14 @@ CVE-2017-5667 (The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in [wheezy] - qemu-kvm <not-affected> (Vulnerable code not present) NOTE: https://lists.gnu.org/archive/html/qemu-devel/2017-01/msg06191.html NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1417559 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/30/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/30/2 CVE-2017-5668 (bitlbee-libpurple before 3.5.1 allows remote attackers to cause a deni ...) - bitlbee 3.5.1-1 (bug #853282) [jessie] - bitlbee <not-affected> (Incomplete fix for CVE-2016-10189 not applied) [wheezy] - bitlbee <not-affected> (Incomplete fix for CVE-2016-10189 not applied) NOTE: https://bugs.bitlbee.org/ticket/1282 NOTE: Fixed by: https://github.com/bitlbee/bitlbee/commit/30d598ce7cd3f136ee9d7097f39fa9818a272441 (3.5.1) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/30/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/30/4 NOTE: This CVE exists because of an incomplete fix for CVE-2016-10189 CVE-2017-5940 (Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS does no ...) - firejail 0.9.44.6-1 @@ -38610,13 +38610,13 @@ CVE-2017-5940 (Firejail before 0.9.44.6 and 0.9.38.x LTS before 0.9.38.10 LTS do NOTE: https://github.com/netblue30/firejail/blob/0.9.44.6/RELNOTES NOTE: https://github.com/netblue30/firejail/commit/38d418505e9ee2d326557e5639e8da49c298858f (0.9.44.6) NOTE: https://github.com/netblue30/firejail/commit/b8a4ff9775318ca5e679183884a6a63f3da8f863 (0.9.44.6) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/29/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/29/4 CVE-2017-5899 (Directory traversal vulnerability in the setuid root helper binary in ...) - s-nail 14.8.16-1 (bug #852934) NOTE: https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160 NOTE: https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f2699449b66dd702a98925bd1b11153a6f7294bf - NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/27/7 CVE-2017-5628 (An issue was discovered in Artifex Software, Inc. MuJS before 8f62ea10 ...) NOT-FOR-US: MuJS CVE-2017-5627 (An issue was discovered in Artifex Software, Inc. MuJS before 4006739a ...) @@ -38625,7 +38625,7 @@ CVE-2017-5617 (The SVG Salamander (aka svgSalamander) library, when used in a we {DSA-3781-1 DLA-816-1} - svgsalamander 1.1.1+dfsg-2 (bug #853134) NOTE: https://github.com/blackears/svgSalamander/issues/11 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/27/3 CVE-2017-5608 (Cross-site scripting (XSS) vulnerability in the image upload function ...) - piwigo <removed> CVE-2017-5600 (The Data Warehouse component in NetApp OnCommand Insight before 7.2.3 ...) @@ -38638,17 +38638,17 @@ CVE-2017-5612 (Cross-site scripting (XSS) vulnerability in wp-admin/includes/cla {DSA-3779-1 DLA-813-1} - wordpress 4.7.2+dfsg-1 (bug #852767) NOTE: https://github.com/WordPress/WordPress/commit/4482f9207027de8f36630737ae085110896ea849 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/27/2 CVE-2017-5611 (SQL injection vulnerability in wp-includes/class-wp-query.php in WP_Qu ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.2+dfsg-1 (bug #852767) NOTE: https://github.com/WordPress/WordPress/commit/85384297a60900004e27e417eac56d24267054cb - NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/27/2 CVE-2017-5610 (wp-admin/includes/class-wp-press-this.php in Press This in WordPress b ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.2+dfsg-1 (bug #852767) NOTE: https://github.com/WordPress/WordPress/commit/21264a31e0849e6ff793a06a17de877dd88ea454 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/27/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/27/2 CVE-2017-5595 (A file disclosure and inclusion vulnerability exists in web/views/file ...) {DLA-1145-1} - zoneminder 1.30.4+dfsg-1 (bug #854733) @@ -38688,17 +38688,17 @@ CVE-2017-6852 (Heap-based buffer overflow in the jpc_dec_decodepkt function in j [jessie] - jasper <no-dsa> (Minor issue) [wheezy] - jasper <no-dsa> (Minor issue) NOTE: Upstream bug: https://github.com/mdadams/jasper/issues/114 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/25/10 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/25/10 NOTE: The POC only triggers an assertion failure but an overflow cannot be observed. CVE-2017-6850 (The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 all ...) - jasper <removed> (unimportant) NOTE: Upstream bug: https://github.com/mdadams/jasper/issues/112 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/25/8 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/25/8 NOTE: Not suitable for code injection, hardly denial of service CVE-2017-6851 (The jas_matrix_bindsub function in jas_seq.c in JasPer 2.0.10 allows r ...) - jasper <removed> (unimportant) NOTE: Upstream bug: https://github.com/mdadams/jasper/issues/113 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/25/9 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/25/9 NOTE: Not suitable for code injection, hardly denial of service CVE-2017-5618 (GNU screen before 4.5.1 allows local users to modify arbitrary files a ...) - screen 4.5.0-3 (bug #852484) @@ -38709,7 +38709,7 @@ CVE-2017-5618 (GNU screen before 4.5.1 allows local users to modify arbitrary fi NOTE: https://savannah.gnu.org/bugs/?50142 NOTE: Introduced in (screen-v4): http://git.savannah.gnu.org/cgit/screen.git/commit/?h=screen-v4&id=5460f5d28c01a9a58e021eb1dffef2965e629d58 NOTE: Introduced in (master): http://git.savannah.gnu.org/cgit/screen.git/commit/?id=c575c40c9bd7653470639da32e06faed0a9b2ec4 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/24/10 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/24/10 CVE-2017-5597 (In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector c ...) {DSA-3811-1 DLA-858-1} - wireshark 2.2.4+gcc3dc1b-1 @@ -38859,19 +38859,19 @@ CVE-2017-5527 (TIBCO Spotfire Server 7.0.X before 7.0.2, 7.5.x before 7.5.1, 7.6 CVE-2017-5616 (Cross-site scripting (XSS) vulnerability in cgiemail and cgiecho allow ...) {DLA-869-1} - cgiemail <removed> (bug #852031) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/20/6 CVE-2017-5615 (cgiemail and cgiecho allow remote attackers to inject HTTP headers via ...) {DLA-869-1} - cgiemail <removed> (bug #852031) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/20/6 CVE-2017-5614 (Open redirect vulnerability in cgiemail and cgiecho allows remote atta ...) {DLA-869-1} - cgiemail <removed> (bug #852031) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/20/6 CVE-2017-5613 (Format string vulnerability in cgiemail and cgiecho allows remote atta ...) {DLA-869-1} - cgiemail <removed> (bug #852031) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/20/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/20/6 CVE-2017-5552 (Memory leak in the virgl_resource_attach_backing function in hw/displa ...) - qemu 1:2.10.0-1 (bug #852119; unimportant) [jessie] - qemu <not-affected> (Vulnerable code not present) @@ -38920,7 +38920,7 @@ CVE-2017-5524 (Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attac NOT-FOR-US: Plone CVE-2017-5537 (The password reset form in Weblate before 2.10.1 provides different er ...) - weblate <itp> (bug #745661) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/18/11 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/18/11 CVE-2017-5526 (Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows l ...) {DLA-1497-1} - qemu 1:2.8+dfsg-2 (bug #851910) @@ -39536,77 +39536,77 @@ CVE-2017-5506 (Double free vulnerability in magick/profile.c in ImageMagick allo {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851383) NOTE: https://github.com/ImageMagick/ImageMagick/issues/354 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 NOTE: https://github.com/ImageMagick/ImageMagick/commit/6235f1f7a9f7b0f83b197f6cd0073dbb6602d0fb CVE-2017-5507 (Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x befo ...) {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851382) NOTE: https://github.com/ImageMagick/ImageMagick/commit/4493d9ca1124564da17f9b628ef9d0f1a6be9738 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 CVE-2017-5508 (Heap-based buffer overflow in the PushQuantumPixel function in ImageMa ...) {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851381) NOTE: https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=31161 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 NOTE: https://github.com/ImageMagick/ImageMagick/commit/379e21cd32483df6e128147af3bc4ce1f82eb9c4 CVE-2017-5509 (coders/psd.c in ImageMagick allows remote attackers to have unspecifie ...) - imagemagick 8:6.9.7.4+dfsg-1 (bug #851377) [jessie] - imagemagick <not-affected> (Vulnerable code not present) [wheezy] - imagemagick <not-affected> (Vulnerable code not present) NOTE: https://github.com/ImageMagick/ImageMagick/issues/350 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 CVE-2017-5510 (coders/psd.c in ImageMagick allows remote attackers to have unspecifie ...) {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851376) NOTE: https://github.com/ImageMagick/ImageMagick/issues/348 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 NOTE: https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9 CVE-2017-5511 (coders/psd.c in ImageMagick allows remote attackers to have unspecifie ...) {DSA-3799-1 DLA-807-1} - imagemagick 8:6.9.7.4+dfsg-1 (bug #851374) NOTE: https://github.com/ImageMagick/ImageMagick/issues/347 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/16/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/16/6 NOTE: https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790 CVE-2017-5487 (wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in t ...) - wordpress 4.7.1+dfsg-1 (bug #851310) [jessie] - wordpress <not-affected> (vulnerable code not present) [wheezy] - wordpress <not-affected> (vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8715 NOTE: https://github.com/WordPress/WordPress/commit/daf358983cc1ce0c77bf6d2de2ebbb43df2add60 CVE-2017-5488 (Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.1+dfsg-1 (bug #851310) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8716 NOTE: https://github.com/WordPress/WordPress/blob/c9ea1de1441bb3bda133bf72d513ca9de66566c2/wp-admin/update-core.php CVE-2017-5489 (Cross-site request forgery (CSRF) vulnerability in WordPress before 4. ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.1+dfsg-1 (bug #851310) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8717 CVE-2017-5490 (Cross-site scripting (XSS) vulnerability in the theme-name fallback fu ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.1+dfsg-1 (bug #851310) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8718 NOTE: https://github.com/WordPress/WordPress/commit/ce7fb2934dd111e6353784852de8aea2a938b359 CVE-2017-5491 (wp-mail.php in WordPress before 4.7.1 might allow remote attackers to ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.1+dfsg-1 (bug #851310) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8719 NOTE: https://github.com/WordPress/WordPress/commit/061e8788814ac87706d8b95688df276fe3c8596a CVE-2017-5492 (Cross-site request forgery (CSRF) vulnerability in the widget-editing ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.1+dfsg-1 (bug #851310) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8720 NOTE: https://github.com/WordPress/WordPress/commit/03e5c0314aeffe6b27f4b98fef842bf0fb00c733 CVE-2017-5493 (wp-includes/ms-functions.php in the Multisite WordPress API in WordPre ...) {DSA-3779-1 DLA-813-1} - wordpress 4.7.1+dfsg-1 (bug #851310) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/14/1 NOTE: https://wpvulndb.com/vulnerabilities/8721 NOTE: https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4 CVE-2017-5356 (Irssi before 0.8.21 allows remote attackers to cause a denial of servi ...) @@ -39650,7 +39650,7 @@ CVE-2017-5341 (The OTV parser in tcpdump before 4.9.0 has a buffer overflow in p - tcpdump 4.9.0-1 CVE-2017-5357 (regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of ...) - ed <not-affected> (Vulnerable code not present, cf #851159) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/12/5 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/12/5 NOTE: The issue is only present from 1.14 onwards, and prior to 1.14.1 since upstream NOTE: changed a malloc'ed buffer for a static one. NOTE: https://lists.gnu.org/archive/html/bug-ed/2017-01/msg00001.html @@ -39972,7 +39972,7 @@ CVE-2017-5207 (Firejail before 0.9.44.4, when running a bandwidth command, allow - firejail 0.9.44.4-1 (bug #850528) NOTE: https://github.com/netblue30/firejail/issues/1023 NOTE: Fixed by: https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc - NOTE: http://www.openwall.com/lists/oss-security/2017/01/07/3 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/07/3 CVE-2017-5206 (Firejail before 0.9.44.4, when running on a Linux kernel before 4.8, a ...) - firejail 0.9.44.4-1 (bug #850558) NOTE: Fixed by: https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e @@ -40018,28 +40018,28 @@ CVE-2017-5196 (Irssi 0.8.18 before 0.8.21 allows remote attackers to cause a den - irssi 0.8.21-1 (bug #850403) [jessie] - irssi <not-affected> (Affects only 0.8.18 and later) [wheezy] - irssi <not-affected> (Affects only 0.8.18 and later) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/2 NOTE: https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d NOTE: https://irssi.org/security/irssi_sa_2017_01.txt CVE-2017-5195 (Irssi 0.8.17 before 0.8.21 allows remote attackers to cause a denial o ...) - irssi 0.8.21-1 (bug #850403) [jessie] - irssi 0.8.17-1+deb8u3 [wheezy] - irssi <not-affected> (Affects only 0.8.17 and later) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/2 NOTE: https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d NOTE: https://irssi.org/security/irssi_sa_2017_01.txt CVE-2017-5194 (Use-after-free vulnerability in Irssi before 0.8.21 allows remote atta ...) {DLA-1217-1} - irssi 0.8.21-1 (bug #850403) [jessie] - irssi 0.8.17-1+deb8u3 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/2 NOTE: https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d NOTE: https://irssi.org/security/irssi_sa_2017_01.txt CVE-2017-5193 (The nickcmp function in Irssi before 0.8.21 allows remote attackers to ...) {DLA-1217-1} - irssi 0.8.21-1 (bug #850403) [jessie] - irssi 0.8.17-1+deb8u3 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/05/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/05/2 NOTE: https://github.com/irssi/irssi/commit/6c6c42e3d1b49d90aacc0b67f8540471cae02a1d NOTE: https://irssi.org/security/irssi_sa_2017_01.txt CVE-2017-5179 (Cross-site scripting (XSS) vulnerability in Tenable Nessus before 6.9. ...) @@ -40132,7 +40132,7 @@ CVE-2017-5136 (An issue was discovered on SendQuick Entera and Avera devices bef NOT-FOR-US: SendQuick Entera and Avera devices CVE-2017-5180 (Firejail before 0.9.44.4 and 0.9.38.x LTS before 0.9.38.8 LTS does not ...) - firejail 0.9.44.2-3 (bug #850160) - NOTE: http://www.openwall.com/lists/oss-security/2017/01/04/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/04/1 NOTE: https://github.com/netblue30/firejail/issues/1020 CVE-2017-5135 (Certain Technicolor devices have an SNMP access-control bypass, possib ...) NOT-FOR-US: Technicolor @@ -40747,19 +40747,19 @@ CVE-2017-5332 (The extract_group_icon_cursor_resource in wrestool/extract.c in i NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1249276 NOTE: Fixed by: http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a NOTE: Fixed by: http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a - NOTE: http://www.openwall.com/lists/oss-security/2017/01/10/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/10/4 NOTE: CVE for "all of 1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a and also the index correction in NOTE: 1a108713ac26215c7568353f6e02e727e6d4b24a." CVE-2017-5331 (Integer overflow in the check_offset function in b/wrestool/fileread.c ...) {DSA-3765-1 DLA-789-1} - icoutils 0.31.1-1 NOTE: Fixed by: http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=4fbe9222fd79ee31b7ec031b0be070a9a400d1d3 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/10/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/10/4 CVE-2017-5208 (Integer overflow in the wrestool program in icoutils before 0.31.1 all ...) {DSA-3756-1 DLA-789-1} - icoutils 0.31.0-4 (bug #850017) NOTE: Fixed by: http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=0d569f458f306b88f60156d60c9cf058125cf173 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/08/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/08/1 CVE-2017-5340 (Zend/zend_hash.c in PHP before 7.0.15 and 7.1.x before 7.1.1 mishandle ...) - php7.1 7.1.1-1 (bug #852022) - php7.0 7.0.15-1 (bug #850158) @@ -44411,7 +44411,7 @@ CVE-2017-3305 (Vulnerability in the MySQL Server component of Oracle MySQL (subc NOTE: issue as well in 5.5 (in 5.5.49) and 5.6 (5.6.30) series resulting in NOTE: opening CVE-2017-3305. NOTE: Cf. https://bugzilla.redhat.com/show_bug.cgi?id=1217506#c22 - NOTE: http://www.openwall.com/lists/oss-security/2017/03/17/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/17/4 CVE-2017-3304 (Vulnerability in the MySQL Cluster component of Oracle MySQL (subcompo ...) - mysql-cluster <itp> (bug #833356) CVE-2017-3303 (Vulnerability in the Oracle XML Gateway component of Oracle E-Business ...) @@ -44427,7 +44427,7 @@ CVE-2017-3302 (Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7. NOTE: Fixed in Oracle MySQL 5.6.21, 5.7.5 NOTE: https://bugs.mysql.com/bug.php?id=70429 NOTE: https://bugs.mysql.com/bug.php?id=63363 - NOTE: http://www.openwall.com/lists/oss-security/2017/01/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2017/01/28/1 CVE-2017-3301 (Vulnerability in the Solaris component of Oracle Sun Systems Products ...) NOT-FOR-US: Solaris CVE-2017-3300 (Vulnerability in the PeopleSoft Enterprise PeopleTools component of Or ...) @@ -44887,7 +44887,7 @@ CVE-2017-3140 (If named is configured to use Response Policy Zones (RPZ) an erro NOTE: Fixed by (master): https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=2648c49be78568ba9f4123d22122f2a649e2e1b7 NOTE: Introduced by: https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=aabcb1fde0ca255ff30f0a5c10cbd39f798cc5b7 NOTE: CVE-2017-3140 is introduced by the upstream change #4377 - NOTE: http://www.openwall.com/lists/oss-security/2017/06/14/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/06/14/4 CVE-2017-3139 (A denial of service flaw was found in the way BIND handled DNSSEC vali ...) - bind9 <not-affected> (RHEL6 specific) CVE-2017-3138 (named contains a feature which allows operators to issue commands to a ...) @@ -44904,7 +44904,7 @@ CVE-2017-3137 (Mistaken assumptions about the ordering of records in the answer {DSA-3854-1 DLA-957-1} - bind9 1:9.10.3.dfsg.P4-12.3 (bug #860225) NOTE: https://kb.isc.org/article/AA-01466 - NOTE: Additional information for backporting patch: http://www.openwall.com/lists/oss-security/2017/04/17/5 + NOTE: Additional information for backporting patch: https://www.openwall.com/lists/oss-security/2017/04/17/5 NOTE: Fixed by (9.10.x): https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=69fd759b4aa02047e42e5cf4227f8257c4547988 NOTE: Fixed by (9.10.x): https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=6841d7b854c15df9ec56cab38da201b315bbcabb (reimplentation) NOTE: Fixed by (9.10.x): https://source.isc.org/cgi-bin/gitweb.cgi?p=bind9.git;a=commitdiff;h=7ab9e8e00775782d474522a5b2bffba8daefefa5 (regression fix) @@ -46046,7 +46046,7 @@ CVE-2017-2671 (The ping_unhash function in net/ipv4/ping.c in the Linux kernel t {DLA-922-1} - linux 4.9.25-1 [jessie] - linux 3.16.43-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/03/24/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/24/6 NOTE: Fixed by: https://git.kernel.org/linus/43a6684519ab0a6c52024b5e25322476cabad893 CVE-2017-2670 (It was found in Undertow before 1.3.28 that with non-clean TCP close, ...) {DSA-3906-1} @@ -46083,7 +46083,7 @@ CVE-2017-2661 (ClusterLabs pcs before version 0.9.157 is vulnerable to a cross-s - pcs 0.9.155+dfsg-2 (bug #858379) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1428948 NOTE: https://github.com/ClusterLabs/pcs/commit/1874a769b5720ae5430f10c6cedd234430bc703f - NOTE: http://www.openwall.com/lists/oss-security/2017/03/23/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/23/2 CVE-2017-2660 REJECTED CVE-2017-2659 (It was found that dropbear before version 2013.59 with GSSAPI leaks wh ...) @@ -46151,7 +46151,7 @@ CVE-2017-2637 (A design flaw issue was found in the Red Hat OpenStack Platform d CVE-2017-2636 (Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.1 ...) {DSA-3804-1 DLA-849-1} - linux 4.9.16-1 - NOTE: http://www.openwall.com/lists/oss-security/2017/03/07/6 + NOTE: https://www.openwall.com/lists/oss-security/2017/03/07/6 NOTE: Fixed by: https://git.kernel.org/linus/82f2341c94d270421f383641b7cd670e474db56b (v4.11-rc2) NOTE: https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html CVE-2017-2635 (A NULL pointer deference flaw was found in the way libvirt from 2.5.0 ...) @@ -46359,20 +46359,20 @@ CVE-2017-2582 (It was found that while parsing the SAML messages the StaxParserU CVE-2017-2581 (An out-of-bounds write vulnerability was found in netpbm before 10.61. ...) - netpbm-free <undetermined> (bug #854978) NOTE: Debian uses an old fork of netpbm - NOTE: http://www.openwall.com/lists/oss-security/2017/02/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/05/7 NOTE: PoC+report attached to #854978 NOTE: Similar code path seems protected by earlier stricter size checks ("object too large") CVE-2017-2580 (An out-of-bounds write vulnerability was found in netpbm before 10.61. ...) - netpbm-free <undetermined> (bug #854978) [jessie] - netpbm-free <not-affected> (pnm/giftopnm.c and bpm/libpm.c rewritten, PoC triggers clean check "Zero byte allocation" missing in later versions) NOTE: Debian uses an old fork of netpbm - NOTE: http://www.openwall.com/lists/oss-security/2017/02/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/05/7 NOTE: PoC+report attached to #854978 CVE-2017-2579 (An out-of-bounds read vulnerability was found in netpbm before 10.61. ...) - netpbm-free <undetermined> (bug #854978) [jessie] - netpbm-free <not-affected> (pnm/giftopnm.c rewritten, PoC triggers clean application error handling) NOTE: Debian uses an old fork of netpbm - NOTE: http://www.openwall.com/lists/oss-security/2017/02/05/7 + NOTE: https://www.openwall.com/lists/oss-security/2017/02/05/7 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1024288 (reproducer) CVE-2017-2577 REJECTED @@ -49870,7 +49870,7 @@ CVE-2017-0903 (RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a po [wheezy] - ruby1.9.1 <not-affected> (Vulnerable code introduced later) - rubygems <removed> [wheezy] - rubygems <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2017/10/10/2 + NOTE: https://www.openwall.com/lists/oss-security/2017/10/10/2 NOTE: https://justi.cz/security/2017/10/07/rubygems-org-rce.html NOTE: Fixed by: https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49 CVE-2017-0902 (RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking v ...) @@ -51135,7 +51135,7 @@ CVE-2017-0359 (diffoscope before 77 writes to arbitrary locations on disk based CVE-2017-0358 (Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write ...) {DSA-3780-1 DLA-815-1} - ntfs-3g 1:2016.2.22AR.1-4 - NOTE: PoC http://www.openwall.com/lists/oss-security/2017/02/04/1 + NOTE: PoC https://www.openwall.com/lists/oss-security/2017/02/04/1 CVE-2017-0357 (A heap-overflow flaw exists in the -tr loader of iucode-tool starting ...) - iucode-tool 2.1.1-1 [jessie] - iucode-tool <not-affected> (Vulnerable code not present) diff --git a/data/CVE/2018.list b/data/CVE/2018.list index c2438df572..af456a8d5a 100644 --- a/data/CVE/2018.list +++ b/data/CVE/2018.list @@ -14318,7 +14318,7 @@ CVE-2018-15919 (Remotely observable behaviour in auth-gss2.c in OpenSSH through [buster] - openssh <ignored> (Minor issue) [stretch] - openssh <ignored> (Minor issue) [jessie] - openssh <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/08/27/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/27/2 CVE-2018-15911 (In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to suppl ...) {DSA-4288-1 DLA-1504-1} - ghostscript 9.22~dfsg-3 (bug #907332) @@ -15788,7 +15788,7 @@ CVE-2018-15350 (Router Default Credentials in Kraftway 24F2XG Router firmware ve CVE-2018-15473 (OpenSSH through 7.7 is prone to a user enumeration vulnerability due t ...) {DSA-4280-1 DLA-1474-1} - openssh 1:7.7p1-4 (bug #906236) - NOTE: http://www.openwall.com/lists/oss-security/2018/08/15/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/15/5 NOTE: https://anongit.mindrot.org/openssh.git/commit/?id=74287f5df9966a0648b4a68417451dd18f079ab8 NOTE: https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 NOTE: PoC at https://bugfuzz.com/stuff/ssh-check-username.py @@ -16686,7 +16686,7 @@ CVE-2018-1000637 (zutils version prior to version 1.8-pre2 contains a Buffer Ove {DLA-1505-1} - zutils 1.7-3 (bug #902936; bug #904819) [stretch] - zutils 1.5-5+deb9u1 - NOTE: http://www.openwall.com/lists/oss-security/2018/08/05/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/05/1 NOTE: https://lists.nongnu.org/archive/html/zutils-bug/2018-08/msg00000.html NOTE: Fixed by: upstream/0001-zcat-buffer-overrun.patch (in 1.7-3) CVE-2018-14938 (An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1. ...) @@ -17391,22 +17391,22 @@ CVE-2018-14679 (An issue was discovered in mspack/chmd.c in libmspack before 0.7 {DSA-4260-1 DLA-1460-1} - libmspack 0.7-1 (bug #904802) NOTE: https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a - NOTE: http://www.openwall.com/lists/oss-security/2018/07/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/26/1 CVE-2018-14680 (An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. ...) {DSA-4260-1 DLA-1460-1} - libmspack 0.7-1 (bug #904801) NOTE: https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a - NOTE: http://www.openwall.com/lists/oss-security/2018/07/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/26/1 CVE-2018-14682 (An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. ...) {DSA-4260-1 DLA-1460-1} - libmspack 0.7-1 (bug #904800) NOTE: https://github.com/kyz/libmspack/commit/4fd9ccaa54e1aebde1e4b95fb0163b699fd7bcc8 - NOTE: http://www.openwall.com/lists/oss-security/2018/07/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/26/1 CVE-2018-14681 (An issue was discovered in kwajd_read_headers in mspack/kwajd.c in lib ...) {DSA-4260-1 DLA-1460-1} - libmspack 0.7-1 (bug #904799) NOTE: https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8 - NOTE: http://www.openwall.com/lists/oss-security/2018/07/26/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/26/1 CVE-2018-14667 (The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression ...) NOT-FOR-US: RichFaces CVE-2018-14666 (An improper authorization flaw was found in the Smart Class feature of ...) @@ -17648,7 +17648,7 @@ CVE-2018-14619 (A flaw was found in the crypto subsystem of the Linux kernel bef [stretch] - linux <not-affected> (Vulnerable code not present) [jessie] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/b32a7dc8aef1882fbf983eb354837488cc9d54dc - NOTE: http://www.openwall.com/lists/oss-security/2018/08/28/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/28/1 CVE-2018-14618 (curl before version 7.61.1 is vulnerable to a buffer overrun in the NT ...) {DSA-4286-1 DLA-1498-1} - curl 7.62.0-1 (bug #908327) @@ -18076,7 +18076,7 @@ CVE-2018-1999023 (The Battle for Wesnoth Project version 1.7.0 through 1.14.3 co [stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1 - wesnoth-1.10 <removed> [jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in Jessie) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/20/1 NOTE: https://github.com/wesnoth/wesnoth/commit/d911268a783467842d38eae7ac1630f1fea41318 (1.14.x) CVE-2018-14505 (mitmweb in mitmproxy v4.0.3 allows DNS Rebinding attacks, related to t ...) - mitmproxy 3.0.4-1 (bug #904293) @@ -18315,7 +18315,7 @@ CVE-2018-14432 (In the Federation component of OpenStack Keystone before 11.0.4, {DSA-4275-1} - keystone 2:13.0.0-7 (bug #904616) [jessie] - keystone <end-of-life> (Not supported in Jessie) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/25/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/25/2 NOTE: https://bugs.launchpad.net/keystone/+bug/1779205 CVE-2018-14431 RESERVED @@ -18391,7 +18391,7 @@ CVE-2018-14403 (MP4NameFirstMatches in mp4util.cpp in MP4v2 2.0.0 mishandles sub - mp4v2 <removed> (bug #904897) [stretch] - mp4v2 <no-dsa> (Minor issue) [jessie] - mp4v2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/18/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/18/3 CVE-2018-14402 (axmldec 1.2.0 has an out-of-bounds write in the jitana::axml_parser::p ...) NOT-FOR-US: axmldec CVE-2018-14401 (CopyData in AxmlParser.c in AXML Parser through 2018-01-04 has an out- ...) @@ -18463,7 +18463,7 @@ CVE-2018-14379 (MP4Atom::factory in mp4atom.cpp in MP4v2 2.0.0 incorrectly uses - mp4v2 <removed> (bug #904898) [stretch] - mp4v2 <no-dsa> (Minor issue) [jessie] - mp4v2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/17/1 CVE-2018-14378 REJECTED CVE-2018-14377 @@ -18877,12 +18877,12 @@ CVE-2018-14326 (In MP4v2 2.0.0, there is an integer overflow (with resultant mem - mp4v2 <removed> (bug #904900) [stretch] - mp4v2 <no-dsa> (Minor issue) [jessie] - mp4v2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/16/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/16/1 CVE-2018-14325 (In MP4v2 2.0.0, there is an integer underflow (with resultant memory c ...) - mp4v2 <removed> (bug #904901) [stretch] - mp4v2 <no-dsa> (Minor issue) [jessie] - mp4v2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/16/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/16/1 CVE-2018-14240 RESERVED CVE-2018-14239 @@ -19264,12 +19264,12 @@ CVE-2018-14055 (ZNC before 1.7.1-rc1 does not properly validate untrusted lines - znc 1.7.1-1 (bug #903787) NOTE: https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e NOTE: https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d - NOTE: http://www.openwall.com/lists/oss-security/2018/07/18/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/18/4 CVE-2018-14056 (ZNC before 1.7.1-rc1 is prone to a path traversal flaw via ../ in a we ...) {DSA-4252-1 DLA-1427-1} - znc 1.7.1-1 (bug #903788) NOTE: https://github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773 - NOTE: http://www.openwall.com/lists/oss-security/2018/07/18/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/18/5 CVE-2018-14053 RESERVED CVE-2018-14052 (An issue has been found in libwav through 2017-04-20. It is a SEGV in ...) @@ -19374,12 +19374,12 @@ CVE-2018-14054 (A double free exists in the MP4StringProperty class in mp4proper - mp4v2 <removed> (bug #903859) [stretch] - mp4v2 <no-dsa> (Minor issue) [jessie] - mp4v2 <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/13/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/13/1 CVE-2018-14036 (Directory Traversal with ../ sequences occurs in AccountsService befor ...) - accountsservice 0.6.45-2 (low; bug #903828) [stretch] - accountsservice <no-dsa> (Minor issue) [jessie] - accountsservice <ignored> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/02/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/02/2 NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=107085 NOTE: https://gitlab.freedesktop.org/accountsservice/accountsservice/commit/f9abd359f71a5bce421b9ae23432f539a067847a CVE-2018-14035 (An issue was discovered in the HDF HDF5 1.8.20 library. There is a hea ...) @@ -20781,7 +20781,7 @@ CVE-2018-13405 (The inode_init_owner function in fs/inode.c in the Linux kernel {DSA-4266-1 DLA-1529-1 DLA-1466-1} - linux 4.17.6-1 NOTE: https://git.kernel.org/linus/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7 - NOTE: http://www.openwall.com/lists/oss-security/2018/07/13/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/13/2 CVE-2018-13404 (The VerifyPopServerConnection resource in Atlassian Jira before versio ...) NOT-FOR-US: Atlassian CVE-2018-13403 (The two-dimensional filter statistics gadget in Atlassian Jira before ...) @@ -22946,7 +22946,7 @@ CVE-2018-12563 (An issue was discovered in Linaro LAVA before 2018.5.post1. Beca NOTE: https://git.linaro.org/lava/lava.git/commit/?id=e24ec39599bc07562ad8bc2a581144b8448cb214 CVE-2018-12562 (An issue was discovered in the cantata-mounter D-Bus service in Cantat ...) - cantata 2.3.0.ds1-2 (bug #901798; unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/18/1 NOTE: The daemon code is part of cantata since version 2.0.0 and it is built NOTE: by default in versions 2.3.0 and 2.3.1. Before 2.3.0 it was only built NOTE: if `-DENABLE_REMOTE_DEVICES=ON` was passed to the cmake invocation. @@ -22954,7 +22954,7 @@ CVE-2018-12562 (An issue was discovered in the cantata-mounter D-Bus service in NOTE: https://github.com/CDrummond/cantata/commit/afc4f8315d3e96574925fb530a7004cc9e6ce3d3 CVE-2018-12561 (An issue was discovered in the cantata-mounter D-Bus service in Cantat ...) - cantata 2.3.0.ds1-2 (bug #901798; unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/18/1 NOTE: The daemon code is part of cantata since version 2.0.0 and it is built NOTE: by default in versions 2.3.0 and 2.3.1. Before 2.3.0 it was only built NOTE: if `-DENABLE_REMOTE_DEVICES=ON` was passed to the cmake invocation. @@ -22962,14 +22962,14 @@ CVE-2018-12561 (An issue was discovered in the cantata-mounter D-Bus service in NOTE: https://github.com/CDrummond/cantata/commit/afc4f8315d3e96574925fb530a7004cc9e6ce3d3 CVE-2018-12560 (An issue was discovered in the cantata-mounter D-Bus service in Cantat ...) - cantata 2.3.0.ds1-2 (bug #901798; unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/18/1 NOTE: The daemon code is part of cantata since version 2.0.0 and it is built NOTE: by default in versions 2.3.0 and 2.3.1. Before 2.3.0 it was only built NOTE: if `-DENABLE_REMOTE_DEVICES=ON` was passed to the cmake invocation. NOTE: 2.3.0.ds1-2 disables the cantata-mounter. CVE-2018-12559 (An issue was discovered in the cantata-mounter D-Bus service in Cantat ...) - cantata 2.3.0.ds1-2 (bug #901798; unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/18/1 NOTE: The daemon code is part of cantata since version 2.0.0 and it is built NOTE: by default in versions 2.3.0 and 2.3.1. Before 2.3.0 it was only built NOTE: if `-DENABLE_REMOTE_DEVICES=ON` was passed to the cmake invocation. @@ -23649,7 +23649,7 @@ CVE-2018-12356 (An issue was discovered in password-store.sh in pass in Simple P NOTE: Introduced in: https://git.zx2c4.com/password-store/commit/?id=ff62f87f41557ab7267defab662324927301485a NOTE: Fixed by: https://git.zx2c4.com/password-store/commit/?id=8683403b77f59c56fcb1f05c61ab33b9fd61a30d NOTE: https://neopg.io/blog/pass-signature-spoof/ - NOTE: http://www.openwall.com/lists/oss-security/2018/06/14/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/14/3 CVE-2018-12355 (Knowage (formerly SpagoBI) 6.1.1 allows XSS via the name or descriptio ...) NOT-FOR-US: Knowage / SpagoBI CVE-2018-12354 (Knowage (formerly SpagoBI) 6.1.1 allows CSRF via every form, as demons ...) @@ -24542,12 +24542,12 @@ CVE-2018-12020 (mainproc.c in GnuPG before 2.2.8 mishandles the original filenam NOTE: https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html NOTE: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=210e402acd3e284b32db1901e43bf1470e659e49 (STABLE-BRANCH-2-2) NOTE: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2326851c60793653069494379b16d84e4c10a0ac (STABLE-BRANCH-1-4) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/13/10 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/13/10 NOTE: https://neopg.io/blog/gpg-signature-spoof/ CVE-2018-12019 (The signature verification routine in Enigmail before 2.0.7 interprets ...) - enigmail 2:2.0.7-1 [jessie] - enigmail <end-of-life> (see https://lists.debian.org/debian-lts-announce/2019/02/msg00002.html) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/13/10 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/13/10 NOTE: https://neopg.io/blog/enigmail-signature-spoof/ CVE-2018-12018 (The GetBlockHeadersMsg handler in the LES protocol implementation in G ...) NOT-FOR-US: Go Ethereum @@ -25181,12 +25181,12 @@ CVE-2018-11771 (When reading a specially crafted ZIP archive, the read method of - libcommons-compress-java 1.18-1 (bug #906301) [stretch] - libcommons-compress-java <no-dsa> (Minor issue) [jessie] - libcommons-compress-java <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/08/16/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/16/2 CVE-2018-11770 (From version 1.3.0 onward, Apache Spark's standalone master exposes a ...) - apache-spark <itp> (bug #802194) CVE-2018-11769 (CouchDB administrative users before 2.2.0 can configure the database s ...) - couchdb <removed> - NOTE: http://www.openwall.com/lists/oss-security/2018/08/08/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/08/2 CVE-2018-11768 (In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1 ...) - hadoop <itp> (bug #793644) CVE-2018-11767 (In Apache Hadoop 2.9.0 to 2.9.1, 2.8.3 to 2.8.4, 2.7.5 to 2.7.6, KMS b ...) @@ -25734,7 +25734,7 @@ CVE-2018-11574 (Improper input validation together with an integer overflow in t [stretch] - ppp <not-affected> (Vulnerable code introduced later) [jessie] - ppp <not-affected> (Vulnerable code introduced later) [wheezy] - ppp <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/11/1 NOTE: https://www.nikhef.nl/~janjust/ppp/ppp-2.4.7-eaptls-mppe-1.101.patch CVE-2018-11573 RESERVED @@ -27394,7 +27394,7 @@ CVE-2018-10938 (A flaw was found in the Linux kernel present since v4.0-rc1 and - linux 4.13.4-1 (unimportant) [jessie] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/40413955ee265a5e42f710940ec78f5450d49149 (4.13-rc5) - NOTE: http://www.openwall.com/lists/oss-security/2018/08/27/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/27/1 CVE-2018-10937 (A cross site scripting flaw exists in the tetonic-console component of ...) NOT-FOR-US: OpenShift CVE-2018-10936 (A weakness was found in postgresql-jdbc before version 42.2.5. It was ...) @@ -27432,7 +27432,7 @@ CVE-2018-10932 (lldptool version 1.0.1 and older can print a raw, unsanitized at NOTE: Terminal emulators need to perform proper escaping CVE-2018-10931 (It was found that cobbler 2.6.x exposed all functions from its Cobbler ...) - cobbler <removed> - NOTE: http://www.openwall.com/lists/oss-security/2018/08/09/9 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/09/9 CVE-2018-10930 (A flaw was found in RPC request using gfs3_rename_req in glusterfs ser ...) {DLA-1510-1} - glusterfs 4.1.4-1 (bug #909215) @@ -27498,7 +27498,7 @@ CVE-2018-10921 (Certain input files may trigger an integer overflow in ttembed i CVE-2018-10920 (Improper input validation bug in DNS resolver component of Knot Resolv ...) - knot-resolver 2.4.1-1 (bug #905325) NOTE: https://www.knot-resolver.cz/2018-08-02-knot-resolver-2.4.1.html - NOTE: http://www.openwall.com/lists/oss-security/2018/08/09/2 (including patch) + NOTE: https://www.openwall.com/lists/oss-security/2018/08/09/2 (including patch) CVE-2018-10919 (The Samba Active Directory LDAP server was vulnerable to an informatio ...) {DSA-4271-1 DLA-1539-1} - samba 2:4.8.4+dfsg-1 @@ -27596,7 +27596,7 @@ CVE-2018-10901 (A flaw was found in Linux kernel's KVM virtualization subsystem. CVE-2018-10900 (Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1 ...) {DSA-4253-1 DLA-1454-1} - network-manager-vpnc 1.2.6-1 (bug #904255) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/20/3 NOTE: https://gitlab.gnome.org/GNOME/NetworkManager-vpnc/commit/07ac18a32b4e361a27ef48ac757d36cbb46e8e12 CVE-2018-10899 (A flaw was found in Jolokia versions from 1.2 to before 1.6.1. Affecte ...) NOT-FOR-US: Jolokia @@ -27614,7 +27614,7 @@ CVE-2018-10896 (The default cloud-init configuration, in cloud-init 0.6.2 and ne NOT-FOR-US: Red Hat-specific packaging flaw of cloud-init default config CVE-2018-10895 (qutebrowser before version 1.4.1 is vulnerable to a cross-site request ...) - qutebrowser 1.4.1-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/07/11/7 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/11/7 NOTE: https://github.com/qutebrowser/qutebrowser/issues/4060 NOTE: Introduced in: https://github.com/qutebrowser/qutebrowser/commit/ffc29ee (v1.0.0) NOTE: Fixed in: https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660 (v1.4.1) @@ -27779,7 +27779,7 @@ CVE-2018-10859 (git-annex is vulnerable to an Information Exposure when decrypti {DLA-1495-1} - git-annex 6.20180626-1 [stretch] - git-annex 6.20170101-1+deb9u2 - NOTE: http://www.openwall.com/lists/oss-security/2018/06/26/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/26/4 NOTE: https://git-annex.branchable.com/security/CVE-2018-10857_and_CVE-2018-10859/ CVE-2018-10858 (A heap-buffer overflow was found in the way samba clients processed ex ...) {DSA-4271-1 DLA-1539-1} @@ -27789,7 +27789,7 @@ CVE-2018-10857 (git-annex is vulnerable to a private data exposure and exfiltrat {DLA-1495-1} - git-annex 6.20180626-1 [stretch] - git-annex 6.20170101-1+deb9u2 - NOTE: http://www.openwall.com/lists/oss-security/2018/06/26/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/26/4 NOTE: https://git-annex.branchable.com/security/CVE-2018-10857_and_CVE-2018-10859/ CVE-2018-10856 (It has been discovered that podman before version 0.6.1 does not drop ...) - libpod <not-affected> (Fixed before initial upload) @@ -29063,14 +29063,14 @@ CVE-2018-1000178 (A heap corruption of type CWE-120 exists in quassel version 0. - quassel 1:0.12.5-1 (bug #896914) NOTE: https://github.com/quassel/quassel/commit/2b777e99fc9f74d4ed21491710260664a1721d1f (master) NOTE: https://github.com/quassel/quassel/commit/18389a713a6810f57ab237b945e8ee03df857b8b (0.12) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/27/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/27/1 CVE-2018-1000179 (A NULL Pointer Dereference of CWE-476 exists in quassel version 0.12.4 ...) {DSA-4189-1} - quassel 1:0.12.5-1 (bug #896915) [wheezy] - quassel <no-dsa> (Minor issue) NOTE: https://github.com/quassel/quassel/commit/e17fca767d60c06ca02bc5898ced04f06d3670bd (master) NOTE: https://github.com/quassel/quassel/commit/08bace4e9ecf08273f094c0c6aa8b3363d38ac3e (0.12) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/27/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/27/1 CVE-2018-10370 RESERVED CVE-2018-10369 (A Cross-site scripting (XSS) vulnerability was discovered on Intelbras ...) @@ -29155,7 +29155,7 @@ CVE-2018-10330 CVE-2018-10361 (An issue was discovered in KTextEditor 5.34.0 through 5.45.0. Insecure ...) - ktexteditor 5.47.0-1 (bug #896836) [stretch] - ktexteditor <not-affected> (Introduced in 5.34.0) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/24/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/24/1 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1033055 NOTE: https://phabricator.kde.org/R39:c81af5aa1d4f6e0f8c44b2e85ca007ba2a1e4590 CVE-2018-10329 (app/tools/mac-lookup/index.php in phpIPAM 1.3.1 has Reflected XSS on / ...) @@ -29906,7 +29906,7 @@ CVE-2018-10058 (The remote management interface of cgminer 4.10.0 and bfgminer 5 [jessie] - cgminer <no-dsa> (Minor issue) - bfgminer <removed> (bug #900930) [jessie] - bfgminer <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/03/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/03/1 NOTE: Mitigated by toolchain hardening to plain crash CVE-2018-10057 (The remote management interface of cgminer 4.10.0 and bfgminer 5.5.0 a ...) - cgminer <unfixed> (bug #900929) @@ -29914,7 +29914,7 @@ CVE-2018-10057 (The remote management interface of cgminer 4.10.0 and bfgminer 5 [jessie] - cgminer <no-dsa> (Minor issue) - bfgminer <removed> (bug #900930) [jessie] - bfgminer <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/03/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/03/1 CVE-2018-10056 RESERVED CVE-2018-10055 (Invalid memory access and/or a heap buffer overflow in the TensorFlow ...) @@ -30358,7 +30358,7 @@ CVE-2018-1000168 (nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contain [jessie] - nghttp2 <not-affected> (Issue introduced in 1.10.0) NOTE: Affected versions: nghttp2 >= 1.10.0 and nghttp2 <= v1.31.0 NOTE: Fixed by: https://github.com/nghttp2/nghttp2/commit/b1bd6035e884b3d83748914a3b5f2a8e52a78a2f - NOTE: http://www.openwall.com/lists/oss-security/2018/04/12/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/12/4 CVE-2018-9858 RESERVED CVE-2018-9857 (PHP Scripts Mall Match Clone Script 1.0.4 has XSS via the search field ...) @@ -31721,7 +31721,7 @@ CVE-2018-9275 (In check_user_token in util.c in the Yubico PAM module (aka pam_y NOTE: https://github.com/Yubico/yubico-pam/issues/136 CVE-2018-1002150 (Koji version 1.12, 1.13, 1.14 and 1.15 contain an incorrect access con ...) - koji <not-affected> (Issue introduced in 1.12.0, cf. #894832) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/04/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/04/1 NOTE: https://docs.pagure.org/koji/CVE-2018-1002150/ NOTE: https://pagure.io/koji/issue/850 NOTE: Fixed by: https://pagure.io/koji/c/ab1ade7 @@ -32708,7 +32708,7 @@ CVE-2018-8897 (A statement in the System Programming Guide of the Intel 64 and I NOTE: Fixed by: https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 (4.16-rc7) - xen 4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6 NOTE: https://xenbits.xen.org/xsa/advisory-260.html - NOTE: http://www.openwall.com/lists/oss-security/2018/05/08/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/08/4 CVE-2018-8896 (In 2345 Security Guard 3.6, the driver file (2345DumpBlock.sys) allows ...) NOT-FOR-US: 2345 Security Guard CVE-2018-8895 (In 2345 Security Guard 3.6, the driver file (2345DumpBlock.sys) allows ...) @@ -33191,7 +33191,7 @@ CVE-2018-8768 (In Jupyter Notebook before 5.4.1, a maliciously forged notebook f [wheezy] - ipython <ignored> (Too invasive to fix) NOTE: After the reupload of ipython to Debian as 4.1.2-1 via experimental NOTE: src:ipython does not provide anymore the Notebook - NOTE: http://www.openwall.com/lists/oss-security/2018/03/15/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/15/2 NOTE: Fixed by: https://github.com/jupyter/notebook/commit/4e79ebb49acac722b37b03f1fe811e67590d3831 NOTE: Ipython in Wheezy lacks sanitization of untrusted HTML completely NOTE: which means in theory this CVE does not apply. However due to the absence of @@ -33202,7 +33202,7 @@ CVE-2018-8768 (In Jupyter Notebook before 5.4.1, a maliciously forged notebook f CVE-2018-8741 (A directory traversal flaw in SquirrelMail 1.4.22 allows an authentica ...) {DSA-4168-1 DLA-1344-1} - squirrelmail <removed> (bug #893202) - NOTE: http://www.openwall.com/lists/oss-security/2018/03/17/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/17/2 NOTE: https://sourceforge.net/p/squirrelmail/bugs/2846/ NOTE: https://sourceforge.net/p/squirrelmail/code/14751/ CVE-2018-8740 (In SQLite through 3.22.0, databases whose schema is corrupted using a ...) @@ -34709,7 +34709,7 @@ CVE-2018-8041 (Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 CVE-2018-8040 (Pages that are rendered using the ESI plugin can have access to the co ...) {DSA-4282-1} - trafficserver 7.1.4+ds-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/08/29/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/29/2 NOTE: https://github.com/apache/trafficserver/pull/3926 NOTE: https://github.com/apache/trafficserver/commit/cea07c03274807c1588dbdf03baa1537d958c92f CVE-2018-8039 (It is possible to configure Apache CXF to use the com.sun.net.ssl impl ...) @@ -34729,7 +34729,7 @@ CVE-2018-8036 (In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefu - libpdfbox2-java 2.0.11-1 (low) [stretch] - libpdfbox-java <no-dsa> (Minor issue) [jessie] - libpdfbox-java <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/29/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/29/2 CVE-2018-8035 (This vulnerability relates to the user's browser processing of DUCC we ...) NOT-FOR-US: UIMA DUCC (subproject of Apache UIMA) NOTE: https://uima.apache.org/security_report#CVE-2018-8035 @@ -34776,7 +34776,7 @@ CVE-2018-8023 (Apache Mesos can be configured to require authentication to call - apache-mesos <itp> (bug #760315) CVE-2018-8022 (A carefully crafted invalid TLS handshake can cause Apache Traffic Ser ...) - trafficserver 7.0.0-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/08/29/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/29/1 NOTE: Only affects 6.x, marking 7.0 as the fixed version NOTE: https://github.com/apache/trafficserver/pull/2147 CVE-2018-8021 (Versions of Superset prior to 0.23 used an unsafe load method from the ...) @@ -34827,14 +34827,14 @@ CVE-2018-8012 (No authentication/authorization is enforced when a server attempt - zookeeper 3.4.10-2 (bug #899332) [wheezy] - zookeeper <ignored> (changes are too intrusive to backport) NOTE: https://issues.apache.org/jira/browse/ZOOKEEPER-1045 - NOTE: http://www.openwall.com/lists/oss-security/2018/05/21/6 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/21/6 NOTE: https://cwiki.apache.org/confluence/display/ZOOKEEPER/Server-Server+mutual+authentication NOTE: https://issues.apache.org/jira/secure/attachment/12840904/ZOOKEEPER-1045-br-3-4.patch CVE-2018-8011 (By specially crafting HTTP requests, the mod_md challenge handler woul ...) - apache2 2.4.34-1 (bug #904107) [stretch] - apache2 <not-affected> (Vulnerable code not present; mod_md module) [jessie] - apache2 <not-affected> (Vulnerable code not present; mod_md module) - NOTE: http://www.openwall.com/lists/oss-security/2018/07/18/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/18/2 NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-8011 CVE-2018-8010 (This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relat ...) - lucene-solr <not-affected> (Do not allow to upload configsets via the API) @@ -34858,14 +34858,14 @@ CVE-2018-8006 (An instance of a cross-site scripting vulnerability was identifie CVE-2018-8005 (When there are multiple ranges in a range request, Apache Traffic Serv ...) {DSA-4282-1} - trafficserver 7.1.4+ds-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/08/29/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/29/4 NOTE: https://github.com/apache/trafficserver/pull/3106 NOTE: https://github.com/apache/trafficserver/pull/3124 NOTE: https://github.com/apache/trafficserver/commit/bbcbb7cf7f25ebfe3a97d792e889de618e41a6a4 CVE-2018-8004 (There are multiple HTTP smuggling and cache poisoning issues when clie ...) {DSA-4282-1} - trafficserver 7.1.4+ds-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/08/29/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/29/5 NOTE: https://github.com/apache/trafficserver/pull/3192 NOTE: https://github.com/apache/trafficserver/pull/3201 NOTE: https://github.com/apache/trafficserver/pull/3231 @@ -36952,7 +36952,7 @@ CVE-2018-1000085 (ClamAV version version 0.99.3 contains a Out of bounds heap me - clamav 0.99.3~beta1+dfsg-1 [stretch] - clamav 0.99.4+dfsg-1+deb9u1 NOTE: https://github.com/Cisco-Talos/clamav-devel/commit/d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6 - NOTE: http://www.openwall.com/lists/oss-security/2017/09/29/4 + NOTE: https://www.openwall.com/lists/oss-security/2017/09/29/4 CVE-2018-1000084 (WOlfCMS WolfCMS version version 0.8.3.1 contains a Stored Cross-Site S ...) NOT-FOR-US: WolfCMS CVE-2018-1000083 (Ajenti version version 2 contains a Improper Error Handling vulnerabil ...) @@ -38363,7 +38363,7 @@ CVE-2018-6790 (An issue was discovered in KDE Plasma Workspace before 5.12.0. da CVE-2018-6789 (An issue was discovered in the base64d function in the SMTP listener i ...) {DSA-4110-1 DLA-1274-1} - exim4 4.90.1-1 (bug #890000) - NOTE: http://www.openwall.com/lists/oss-security/2018/02/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/02/07/2 NOTE: https://exim.org/static/doc/security/CVE-2018-6789.txt NOTE: https://bugs.exim.org/show_bug.cgi?id=2235 NOTE: https://git.exim.org/exim.git/commit/062990cc1b2f9e5d82a413b53c8f0569075de700 @@ -39024,11 +39024,11 @@ CVE-2018-6556 (lxc-user-nic when asked to delete a network interface will uncond CVE-2018-6555 (The irda_setsockopt function in net/irda/af_irda.c and later in driver ...) {DSA-4308-1 DLA-1531-1 DLA-1529-1} - linux 4.17.3-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/09/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/09/04/2 CVE-2018-6554 (Memory leak in the irda_bind function in net/irda/af_irda.c and later ...) {DSA-4308-1 DLA-1715-1 DLA-1531-1 DLA-1529-1} - linux 4.17.3-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/09/04/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/09/04/2 CVE-2018-6553 (The CUPS AppArmor profile incorrectly confined the dnssd backend due t ...) {DSA-4243-1 DLA-1426-1} - cups 2.2.8-5 (bug #903605) @@ -39110,13 +39110,13 @@ CVE-2018-6535 (An issue was discovered in Icinga 2.x through 2.8.1. The lack of [jessie] - icinga2 <no-dsa> (Minor issue) NOTE: https://github.com/Icinga/icinga2/issues/4920 NOTE: https://github.com/Icinga/icinga2/pull/5715 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/22/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/22/3 CVE-2018-6534 (An issue was discovered in Icinga 2.x through 2.8.1. By sending specia ...) - icinga2 2.8.4-1 (low; bug #897301) [stretch] - icinga2 <no-dsa> (Minor issue) [jessie] - icinga2 <no-dsa> (Minor issue) NOTE: https://github.com/Icinga/icinga2/pull/6104 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/22/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/22/3 CVE-2018-6533 (An issue was discovered in Icinga 2.x through 2.8.1. By editing the in ...) - icinga2 2.8.4-1 (low; bug #897301) [stretch] - icinga2 <no-dsa> (Minor issue) @@ -39130,7 +39130,7 @@ CVE-2018-6532 (An issue was discovered in Icinga 2.x through 2.8.1. By sending s [stretch] - icinga2 <no-dsa> (Minor issue) [jessie] - icinga2 <no-dsa> (Minor issue) NOTE: https://github.com/Icinga/icinga2/pull/6103 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/22/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/22/3 CVE-2018-6531 RESERVED CVE-2018-6530 (OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin ...) @@ -42476,7 +42476,7 @@ CVE-2018-5375 (Discuz! DiscuzX X3.4 has XSS via the include\spacecp\spacecp_spac CVE-2018-5702 (Transmission through 2.92 relies on X-Transmission-Session-Id (which i ...) {DSA-4087-1 DLA-1246-1} - transmission 2.92-3 (bug #886990) - NOTE: http://www.openwall.com/lists/oss-security/2018/01/12/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/01/12/1 NOTE: https://github.com/transmission/transmission/pull/468 NOTE: Proposed patch: https://patch-diff.githubusercontent.com/raw/transmission/transmission/pull/468.diff NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1447 @@ -42563,7 +42563,7 @@ CVE-2018-1000001 (In glibc 2.26 and earlier there is confusion in the usage of g [jessie] - glibc <postponed> (Minor issue, can be fixed along in next DSA or preferably point release) - eglibc <removed> [wheezy] - eglibc <postponed> (Minor issue, can be fixed along in next DSA) - NOTE: http://www.openwall.com/lists/oss-security/2018/01/11/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/01/11/5 NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=22679 NOTE: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=52a713fdd0a30e1bd79818e2e3c4ab44ddca1a94 CVE-2018-5345 (A stack-based buffer overflow within GNOME gcab through 0.7.4 can be e ...) @@ -42726,7 +42726,7 @@ CVE-2018-1000022 (Electrum Technologies GmbH Electrum Bitcoin Wallet version pri - electrum 3.0.5-1 (bug #886683) [jessie] - electrum <not-affected> (Only affects >= 2.6) NOTE: https://github.com/spesmilo/electrum/issues/3374 - NOTE: http://www.openwall.com/lists/oss-security/2018/01/10/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/01/10/4 CVE-2018-5300 RESERVED CVE-2018-5299 (A stack-based Buffer Overflow Vulnerability exists in the web server i ...) @@ -46394,7 +46394,7 @@ CVE-2018-3761 (Nextcloud Server before 12.0.8 and 13.0.3 suffer from improper au CVE-2018-3760 (There is an information leak vulnerability in Sprockets. Versions Affe ...) {DSA-4242-1 DLA-1419-1} - ruby-sprockets 3.7.0-1.1 (bug #901913) - NOTE: http://www.openwall.com/lists/oss-security/2018/06/19/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/06/19/2 NOTE: https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f (master) NOTE: https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441 (3.x) NOTE: https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5 (2.x) @@ -48828,7 +48828,7 @@ CVE-2018-2767 (Vulnerability in the MySQL Server component of Oracle MySQL (subc - mysql-5.7 5.7.23-1 (bug #904121) - mysql-5.5 <removed> [wheezy] - mysql-5.5 <postponed> (Wait for next upstream security/bugfix release) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/08/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/08/2 NOTE: Result from an incomplete fix for CVE-2015-3152 and related CVE for NOTE: Oracle products. NOTE: For MariaDB: if one connects to the remote server using the embedded library @@ -51910,11 +51910,11 @@ CVE-2018-1340 (Prior to 1.0.0, Apache Guacamole used a cookie for client-side st CVE-2018-1339 (A carefully crafted (or fuzzed) file can trigger an infinite loop in A ...) - tika 1.18-1 (low; bug #900000) [jessie] - tika <ignored> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/25/7 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/25/7 CVE-2018-1338 (A carefully crafted (or fuzzed) file can trigger an infinite loop in A ...) - tika 1.18-1 [jessie] - tika <not-affected> (BGP parser introduced in 1.7) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/25/6 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/25/6 CVE-2018-1337 (In Apache Directory LDAP API before 1.0.2, a bug in the way the SSL Fi ...) NOT-FOR-US: Apache LDAP API CVE-2018-1336 (An improper handing of overflow in the UTF-8 decoder with supplementar ...) @@ -51933,7 +51933,7 @@ CVE-2018-1336 (An improper handing of overflow in the UTF-8 decoder with supplem CVE-2018-1335 (From Apache Tika versions 1.7 to 1.17, clients could send carefully cr ...) - tika 1.18-1 [jessie] - tika <not-affected> (Server functionality not present) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/25/8 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/25/8 CVE-2018-1334 (In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using ...) - apache-spark <itp> (bug #802194) CVE-2018-1333 (By specially crafting HTTP/2 requests, workers would be allocated 60 s ...) @@ -51942,7 +51942,7 @@ CVE-2018-1333 (By specially crafting HTTP/2 requests, workers would be allocated [jessie] - apache2 <not-affected> (Vulnerable code not present) NOTE: Affects 2.4.18-2.4.33 NOTE: HTTP/2 support introduced in 2.4.17 - NOTE: http://www.openwall.com/lists/oss-security/2018/07/18/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/07/18/1 NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333 CVE-2018-1332 (Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version ...) NOT-FOR-US: Apache Storm @@ -51987,7 +51987,7 @@ CVE-2018-1319 (In Apache Allura prior to 1.8.1, attackers may craft URLs that ca CVE-2018-1318 (Adding method ACLs in remap.config can cause a segfault when the user ...) {DSA-4282-1} - trafficserver 7.1.4+ds-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/08/29/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/08/29/3 NOTE: https://github.com/apache/trafficserver/pull/3195 NOTE: https://github.com/apache/trafficserver/commit/e6dfda305acf85250861ecfa14a7bd6bb2fad5c3 CVE-2018-1317 (In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by de ...) @@ -52002,11 +52002,11 @@ CVE-2018-1313 (In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted networ - derby 10.14.2.0-1 [jessie] - derby <no-dsa> (Minor issue) [stretch] - derby <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/05/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/05/1 CVE-2018-1312 (In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authen ...) {DSA-4164-1 DLA-1389-1} - apache2 2.4.33-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/7 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/7 CVE-2018-1311 (The Apache Xerces-C 3.0.0 to 3.2.2 XML parser contains a use-after-fre ...) - xerces-c <unfixed> (bug #947431) [buster] - xerces-c <postponed> (Minor issue, revisit when fixed upstream) @@ -52023,7 +52023,7 @@ CVE-2018-1309 (Apache NiFi External XML Entity issue in SplitXML processor. Mali CVE-2018-1308 (This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 rela ...) {DSA-4194-1 DLA-1360-1} - lucene-solr 3.6.2+dfsg-12 (bug #896604) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/08/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/08/3 NOTE: https://issues.apache.org/jira/browse/SOLR-11971 NOTE: master: http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/02c693f3 NOTE: branch_7x: http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/739a7933 @@ -52062,18 +52062,18 @@ CVE-2018-1303 (A specially crafted HTTP request header could have crashed the Ap {DSA-4164-1} - apache2 2.4.33-1 [wheezy] - apache2 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/3 CVE-2018-1302 (When an HTTP/2 stream was destroyed after being handled, the Apache HT ...) - apache2 2.4.33-1 [stretch] - apache2 2.4.25-3+deb9u5 [jessie] - apache2 <not-affected> (Vulnerable code not present) [wheezy] - apache2 <not-affected> (Vulnerable code not present) NOTE: HTTP/2 support introduced in 2.4.17 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/5 CVE-2018-1301 (A specially crafted request could have crashed the Apache HTTP Server ...) {DSA-4164-1 DLA-1389-1} - apache2 2.4.33-1 - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/2 CVE-2018-1300 REJECTED CVE-2018-1299 (In Apache Allura before 1.8.0, unauthenticated attackers may retrieve ...) @@ -52090,7 +52090,7 @@ CVE-2018-1297 (When using Distributed Test only (RMI based), Apache JMeter 2.x a [stretch] - jakarta-jmeter <ignored> (Minor issue, too intrusive to backport) [jessie] - jakarta-jmeter <ignored> (Minor issue, too intrusive to backport) [wheezy] - jakarta-jmeter <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/02/11/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/02/11/1 NOTE: https://bz.apache.org/bugzilla/show_bug.cgi?id=62039 CVE-2018-1296 (In Apache Hadoop 3.0.0-alpha1 to 3.0.0, 2.9.0, 2.8.0 to 2.8.3, and 2.5 ...) - hadoop <itp> (bug #793644) @@ -52118,7 +52118,7 @@ CVE-2018-1287 (In Apache JMeter 2.X and 3.X, when using Distributed Test only (R [stretch] - jakarta-jmeter <no-dsa> (Minor issue) [jessie] - jakarta-jmeter <no-dsa> (Minor issue) [wheezy] - jakarta-jmeter <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/02/11/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/02/11/2 NOTE: https://bz.apache.org/bugzilla/show_bug.cgi?id=62039 CVE-2018-1286 (In Apache OpenMeetings 3.0.0 - 4.0.1, CRUD operations on privileged us ...) NOT-FOR-US: Apache OpenMeetings @@ -52135,7 +52135,7 @@ CVE-2018-1283 (In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured t {DSA-4164-1} - apache2 2.4.33-1 [wheezy] - apache2 <not-affected> (Vulnerable code not present) - NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/4 + NOTE: https://www.openwall.com/lists/oss-security/2018/03/24/4 CVE-2018-1282 (This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows ca ...) NOT-FOR-US: Apache Hive CVE-2018-1281 (The clustered setup of Apache MXNet allows users to specify which IP a ...) @@ -52511,48 +52511,48 @@ CVE-2018-1127 (Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immed CVE-2018-1126 (procps-ng before version 3.3.15 is vulnerable to an incorrect integer ...) {DSA-4208-1 DLA-1390-1} - procps 2:3.3.15-1 (bug #899170) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt NOTE: Patch: 0035-proc-alloc.-Use-size_t-not-unsigned-int.patch NOTE: https://gitlab.com/procps-ng/procps/commit/f1077b7a558a5545837aae068422e58f1f9b1d33 CVE-2018-1125 (procps-ng before version 3.3.15 is vulnerable to a stack buffer overfl ...) {DSA-4208-1 DLA-1390-1} - procps 2:3.3.15-1 (bug #899170) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt NOTE: Patch: 0008-pgrep-Prevent-a-potential-stack-based-buffer-overflo.patch NOTE: https://gitlab.com/procps-ng/procps/commit/b51ca2a1f8ca779f7632ade6a0a259ed882fa584 CVE-2018-1124 (procps-ng before version 3.3.15 is vulnerable to multiple integer over ...) {DSA-4208-1 DLA-1390-1} - procps 2:3.3.15-1 (bug #899170) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt NOTE: Patch: 0074-proc-readproc.c-Fix-bugs-and-overflows-in-file2strve.patch NOTE: https://gitlab.com/procps-ng/procps/commit/36c350f07c75aabf747fb833f52a234ae5781b20 CVE-2018-1123 (procps-ng before version 3.3.15 is vulnerable to a denial of service i ...) {DSA-4208-1 DLA-1390-1} - procps 2:3.3.15-1 (bug #899170) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt NOTE: Patch: 0054-ps-output.c-Fix-outbuf-overflows-in-pr_args-etc.patch NOTE: https://gitlab.com/procps-ng/procps/commit/136e3724952827bbae8887a42d9d2b6f658a48ab CVE-2018-1122 (procps-ng before version 3.3.15 is vulnerable to a local privilege esc ...) {DSA-4208-1 DLA-1390-1} - procps 2:3.3.15-1 (bug #899170) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt NOTE: Patch: 0097-top-Do-not-default-to-the-cwd-in-configs_read.patch NOTE: https://gitlab.com/procps-ng/procps/commit/b45c4803dd176f4e3f9d3d47421ddec9bbbe66cd CVE-2018-1121 (procps-ng, procps is vulnerable to a process hiding through race condi ...) - linux <unfixed> (unimportant) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt CVE-2018-1120 (A flaw was found affecting the Linux kernel before version 4.17. By mm ...) {DLA-1423-1} - linux 4.16.12-1 [stretch] - linux 4.9.107-1 [jessie] - linux <ignored> (Too risky to backport) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/17/1 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/17/1 NOTE: https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt NOTE: Fixed by: https://git.kernel.org/linus/7f7ccc2ccc2e70c6054685f5e3522efa81556830 CVE-2018-1119 @@ -52600,7 +52600,7 @@ CVE-2018-1111 (DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and CVE-2018-1110 [Improper Input Validation] RESERVED - knot-resolver 2.3.0-1 (bug #896681) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/23/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/23/2 CVE-2018-1109 RESERVED - node-braces <not-affected> (Vulnerable code introduced in 2.2.0) @@ -52623,7 +52623,7 @@ CVE-2018-1106 (An authentication bypass flaw has been found in PackageKit before - packagekit 1.1.10-1 (bug #896703) [jessie] - packagekit <not-affected> (Issue introduced later) [wheezy] - packagekit <not-affected> (Issue introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/23/3 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/23/3 NOTE: Fixed by: https://github.com/hughsie/PackageKit/commit/7e8a7905ea9abbd1f384f05f36a4458682cd4697 (PACKAGEKIT_1_1_10) NOTE: Introduced by: https://github.com/hughsie/PackageKit/commit/f176976e24e8c17b80eff222572275517c16bdad NOTE: Resulting affected (upstream) versions: >= 1.0.10 up until current 1.1.9 @@ -52695,7 +52695,7 @@ CVE-2018-1089 (389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not pr {DLA-1428-1} - 389-ds-base 1.3.8.2-1 (bug #898138) [stretch] - 389-ds-base <no-dsa> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/07/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/07/2 CVE-2018-1088 (A privilege escalation flaw was found in gluster 3.x snapshot schedule ...) - glusterfs 4.0.2-1 (bug #896128) [stretch] - glusterfs <no-dsa> (Minor issue; can be fixed via point release) @@ -52713,11 +52713,11 @@ CVE-2018-1087 (kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4 - linux 4.15.17-1 [wheezy] - linux <not-affected> (Issue introduced in 3.16) NOTE: Fixed by: https://git.kernel.org/linus/32d43cd391bacb5f0814c2624399a5dad3501d09 (4.16-rc7) - NOTE: http://www.openwall.com/lists/oss-security/2018/05/08/5 + NOTE: https://www.openwall.com/lists/oss-security/2018/05/08/5 CVE-2018-1086 (pcs before versions 0.9.164 and 0.10 is vulnerable to a debug paramete ...) {DSA-4169-1} - pcs 0.9.164-1 (bug #895313) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/09/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/09/2 CVE-2018-1085 (openshift-ansible before versions 3.9.23, 3.7.46 deploys a misconfigur ...) NOT-FOR-US: openshift-ansible CVE-2018-1084 (corosync before version 2.4.4 is vulnerable to an integer overflow in ...) @@ -52725,7 +52725,7 @@ CVE-2018-1084 (corosync before version 2.4.4 is vulnerable to an integer overflo - corosync 2.4.4-1 (bug #895653) [jessie] - corosync <not-affected> (Vulnerable code introduced later) [wheezy] - corosync <not-affected> (Vulnerable code introduced later) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/12/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/12/2 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1552830 NOTE: Fixed by: https://github.com/corosync/corosync/commit/fc1d5418533c1faf21616b282c2559bed7d361c4 NOTE: https://oss.clusterlabs.org/pipermail/users/2018-April/014856.html @@ -52748,7 +52748,7 @@ CVE-2018-1080 (Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAu CVE-2018-1079 (pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escal ...) - pcs 0.9.164-1 (bug #895314) [stretch] - pcs <not-affected> (Vulnerable code introduced in 0.9.157) - NOTE: http://www.openwall.com/lists/oss-security/2018/04/09/2 + NOTE: https://www.openwall.com/lists/oss-security/2018/04/09/2 CVE-2018-1078 (OpenDayLight version Carbon SR3 and earlier contain a vulnerability du ...) NOT-FOR-US: OpenDayLight CVE-2018-1077 (Spacewalk 2.6 contains an API which has an XXE flaw allowing for the d ...) diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 8069b48452..50fd71b19d 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -563,19 +563,19 @@ CVE-2020-24332 (An issue was discovered in TrouSerS through 0.3.14. If the tcsd [stretch] - trousers <ignored> (tss service gets started as non-root user via init script) NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1164472 NOTE: https://sourceforge.net/p/trousers/mailman/message/37015817/ - NOTE: http://www.openwall.com/lists/oss-security/2020/08/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2020/08/14/1 CVE-2020-24331 (An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon ...) - trousers <unfixed> [stretch] - trousers <ignored> (tss service gets started as non-root user via init script) NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1164472 NOTE: https://sourceforge.net/p/trousers/mailman/message/37015817/ - NOTE: http://www.openwall.com/lists/oss-security/2020/08/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2020/08/14/1 CVE-2020-24330 (An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon ...) - trousers <unfixed> [stretch] - trousers <ignored> (tss service gets started as non-root user via init script) NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1164472 NOTE: https://sourceforge.net/p/trousers/mailman/message/37015817/ - NOTE: http://www.openwall.com/lists/oss-security/2020/08/14/1 + NOTE: https://www.openwall.com/lists/oss-security/2020/08/14/1 CVE-2020-24329 RESERVED CVE-2020-24328 @@ -30634,7 +30634,7 @@ CVE-2020-10648 (Das U-Boot through 2020.01 allows attackers to bypass verified b [buster] - u-boot <no-dsa> (Minor issue) [stretch] - u-boot <no-dsa> (Minor issue) [jessie] - u-boot <ignored> (Minor issue) - NOTE: http://www.openwall.com/lists/oss-security/2020/03/18/5 + NOTE: https://www.openwall.com/lists/oss-security/2020/03/18/5 NOTE: https://labs.f-secure.com/advisories/das-u-boot-verified-boot-bypass/ NOTE: https://lists.denx.de/pipermail/u-boot/2020-March/403409.html CVE-2020-10647 |