summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2016
Commit message (Collapse)AuthorAgeFilesLines
* Typo fixHenri Salo2021-09-241-2/+2
|
* automatic updatesecurity tracker role2021-09-231-0/+2
|
* Reassociate some of the Mattermost NFUs to the ITP'ed entriesSalvatore Bonaccorso2021-09-221-23/+23
|
* openssh unimportantMoritz Muehlenhoff2021-09-161-3/+2
|
* Mark CVE-2016-20012/openssh as no-dsa for bullseye and busterSalvatore Bonaccorso2021-09-161-0/+2
|
* Add CVE-2016-20012/opensshSalvatore Bonaccorso2021-09-161-1/+2
|
* automatic updatesecurity tracker role2021-09-161-0/+2
|
* Track fixed version for CVE-2016-10345/passenger via unstableSalvatore Bonaccorso2021-08-171-1/+1
|
* Update notes for mupdfNeil Williams2021-08-061-2/+0
|
* Clarify 49c364ab for mupdfNeil Williams2021-08-061-2/+2
| | | | | | Vulnerable C code exists in the source package but this is neither compiled nor packaged in stretch. Set <ignored> in preference to <not-affected>.
* mupdf - binary from jstest_main.c is not packagedNeil Williams2021-08-051-0/+2
| | | | | As with wheezy, the mujstest binary is not included in the binary packages in Debian.
* Add fixed version via experimetnal for CVE-2016-11086/ruby-oauthSalvatore Bonaccorso2021-08-041-0/+1
|
* Update inormation on some older CVEs to make tracking a bit more consistentSalvatore Bonaccorso2021-07-101-8/+6
|
* Track fixed version for several uclibc issuesSalvatore Bonaccorso2021-07-031-3/+3
|
* Add tracking bug for old uclibc issuesSalvatore Bonaccorso2021-07-031-3/+3
|
* Switch several git.videolan.org references to access via httpsSalvatore Bonaccorso2021-06-021-9/+9
|
* Mark CVE-2016-20011/libgrss as ignored for stretchUtkarsh Gupta2021-05-301-0/+1
|
* buster/bullseye triageMoritz Muehlenhoff2021-05-261-0/+2
|
* Add Debian bug reference for CVE-2016-20011/libgrssSalvatore Bonaccorso2021-05-261-1/+1
|
* Replace isc-dhcp git repository reference with URLs to gitlab instanceSalvatore Bonaccorso2021-05-261-1/+1
|
* Add CVE-2016-20011/libgrssSalvatore Bonaccorso2021-05-261-1/+3
|
* automatic updatesecurity tracker role2021-05-261-0/+2
|
* Process some more NFUsSalvatore Bonaccorso2021-05-051-1/+1
|
* automatic updatesecurity tracker role2021-05-051-0/+2
|
* automatic updatesecurity tracker role2021-04-271-1/+1
|
* CVE-2016-5007/libspring-java: precisionSylvain Beucler2021-04-121-1/+1
|
* automatic updatesecurity tracker role2021-04-091-40/+40
|
* bullseye triageMoritz Muehlenhoff2021-03-221-0/+1
|
* Fix two typosSalvatore Bonaccorso2021-03-201-1/+1
|
* new leptonlib issuesMoritz Muehlenhoff2021-03-121-1/+1
| | | | NFUs
* automatic updatesecurity tracker role2021-03-121-0/+2
|
* automatic updatesecurity tracker role2021-03-051-1/+1
|
* automatic updatesecurity tracker role2021-03-021-71/+71
|
* Mark CVE-2016-2568 ignored for bullseyeSalvatore Bonaccorso2021-02-281-0/+1
|
* Mark CVE-2016-10127 as no-dsa for bullseyeSalvatore Bonaccorso2021-02-281-0/+1
|
* mujs entered the archive, recheck some older CVEsSalvatore Bonaccorso2021-02-181-13/+28
|
* automatic updatesecurity tracker role2021-02-151-2/+2
|
* Remove no-dsa tags for upcoming busybox update in Stretch.Markus Koschany2021-02-151-2/+0
|
* Strip no-dsa tags for wavpack for jessieUtkarsh Gupta2021-01-141-1/+0
|
* Ignore CVE-2016-7964/dokuwiki for bullseyeSalvatore Bonaccorso2021-01-021-0/+1
|
* Process NFUsSalvatore Bonaccorso2021-01-011-8/+8
|
* automatic updatesecurity tracker role2021-01-011-0/+16
|
* Replace dropbear repository reference with working URLSalvatore Bonaccorso2020-12-311-4/+4
| | | | | Apparently repository moved from https://secure.ucc.asn.au/hg/dropbear to https://hg.ucc.asn.au/dropbear and so replace previous references.
* Process some NFUsSalvatore Bonaccorso2020-12-311-5/+5
|
* automatic updatesecurity tracker role2020-12-311-10/+10
|
* bullseye triageMoritz Muehlenhoff2020-12-271-1/+4
|
* Track fixed version via unstable for CVE-2016-7151/capstoneSalvatore Bonaccorso2020-12-201-1/+1
|
* bullseye triageMoritz Muehlenhoff2020-12-181-0/+1
|
* Update information on CVE-2016-11086Salvatore Bonaccorso2020-12-151-10/+5
| | | | | Mark it as unimportant as it does not affect the binary packages in Debian (by default, unless a user has removed the certificates).
* Declared CVE-2016-11086 as minor issue since the problem is exploitable if ↵Ola Lundqvist2020-12-151-0/+11
| | | | /etc/ssl/certs/ca-certificates.crt does not exist. However this file normally exists since ruby-oath depends on ruby who in turn depend on ca-certificates package which generates this file. This means that in Debian this file always eists unless the admin has intentionally removed it. So the package is vulnerable but typically not in Debian. Updating this vulnerability could even cause a regression because some server admin may intentionally have removed this file to not check the certificate.

© 2014-2024 Faster IT GmbH | imprint | privacy policy