Skip to content

Instantly share code, notes, and snippets.

@higebu
Last active September 10, 2017 22:33
Show Gist options
  • Save higebu/f33d14b5e575cd8079ced76532d50f42 to your computer and use it in GitHub Desktop.
Save higebu/f33d14b5e575cd8079ced76532d50f42 to your computer and use it in GitHub Desktop.
vuls to vyos
vyos117 Total: 199 (High:38 Medium:135 Low:26 ?:0) 106 updatable packages

Vuls to VyOS

Scan VyOS vulnerability with using wheezy repo.

Install Vuls

https://github.com/future-architect/vuls

Prepare VyOS

  • Add wheezy repo

    set system package repository community url http://dev.packages.vyos.net/legacy/repos/vyos
    set system package repository wheezy url http://ftp.jp.debian.org/debian/
    set system package repository wheezy components main contrib non-free
    set system package repository wheezy distribution wheezy
    set system package repository security url http://security.debian.org/
    set system package repository security components main contrib non-free
    set system package repository security distribution wheezy/updates
    commit
    save
    cat <<EOF | sudo tee -a /etc/apt/source.list
    deb-src http://security.debian.org/ wheezy/updates main contrib non-free # security #
    deb-src http://ftp.jp.debian.org/debian/ wheezy main contrib non-free # wheezy #
    EOF
    sudo apt-get update
    sudo apt-get install debian-keyring debian-archive-keyring
    

Run Vuls

  • Create config.toml

    [servers]
    
    [servers.vyos117]
    host         = "{vyos_ip_addr}"
    port        = "22"
    user        = "vyos"
    keyPath     = "{full_path_to_private_key}"
    cpeNames = [
      "cpe:/o:debian:debian_linux:6.0.10",
      "cpe:/a:tedfelix:acpid2:2.0.7",
      "cpe:/a:eject:eject:2.1.5",
      "cpe:/a:gnupg:gnupg:1.4.10",
      "cpe:/a:gnu:privacy_guard:1.4.10",
      "cpe:/a:conntrack-tools_project:conntrack-tools:1.0.1",
      "cpe:/a:gnu:grub2:1.98",
      "cpe:/a:gnu:glibc:2.11.3",
      "cpe:/a:xmlsoft:libxml:2.7.8",
      "cpe:/a:w1.fi:hostapd:1.1",
      "cpe:/a:iproute2_project:iproute2:3.12.0",
      "cpe:/a:netfilter_core_team:iptables:1.4.10",
      "cpe:/a:libcap:libcap:2.19",
      "cpe:/o:linux:linux_kernel:3.13.11",
      "cpe:/a:net-snmp:net-snmp:5.7.2",
      "cpe:/a:ntp:ntp:4.2.6.p2",
      "cpe:/a:openssl:openssl:0.9.8zf",
      "cpe:/a:openvpn:openvpn:2.1.3",
      "cpe:/a:quagga:quagga:0.99.20.1",
      "cpe:/a:litech:router_advertisement_daemon:1.15",
      "cpe:/a:squid-cache:squid:3.1.6",
      "cpe:/a:ssh:secure_shell:5.5p1",
      "cpe:/a:todd_miller:sudo:1.7.4p4",
      "cpe:/a:gnu:tar:1.23",
      "cpe:/a:squidguard:squidguard:1.4.0",
      "cpe:/a:strongswan:strongswan:4.5.2",
      "cpe:/a:vmware:tools:9.4.0",
      "cpe:/a:w1.fi:wpa_supplicant:1.1",
    ]
    
  • Run configtest

    vuls configtest -ssh-native-insecure vyos117
    
  • Run scan

    vuls scan -ssh-native-insecure vyos117
    
  • Run report

    vuls report -format-one-line-text
    
{"ScannedAt":"2017-08-24T15:08:16.162992718+09:00","Lang":"en","ServerName":"vyos117","Family":"debian","Release":"6.0.10","Container":{"ContainerID":"","Name":"","Image":"","Type":""},"Platform":{"Name":"other","InstanceID":""},"ScannedCves":[{"CveID":"CVE-2014-4655","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8086","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3609","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2014-4617","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveID":"CVE-2014-3686","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2012-2663","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:netfilter_core_team:iptables:1.4.10"]},{"CveID":"CVE-2016-5342","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-2776","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2014-4653","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-5206","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-7970","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8884","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-4555","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2013-4402","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveID":"CVE-2015-4145","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2014-0206","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2011-0008","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2014-4508","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-1791","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveID":"CVE-2014-9221","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2014-0484","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"acpi-support-base","Version":"0.137-5+deb6u2","Release":"","NewVersion":"0.140-5+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2015-4141","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2014-3690","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-5706","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8104","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openvpn:openvpn:2.1.3"]},{"CveID":"CVE-2013-6075","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2010-5321","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3647","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9322","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3611","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2012-2388","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2014-3687","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9584","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9585","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2065","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-4052","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2015-4143","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2014-1738","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3610","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-6321","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:tar:1.23"]},{"CveID":"CVE-2016-5344","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-2338","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2016-4476","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1"]},{"CveID":"CVE-2016-2066","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2068","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-7312","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3158","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"ppp","Version":"2.4.5-4+deb6u1","Release":"","NewVersion":"2.4.5-5.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2012-6085","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveID":"CVE-2011-4099","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:libcap:libcap:2.19"]},{"CveID":"CVE-2014-5045","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-5343","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2061","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-0189","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2014-7141","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2015-7547","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-1739","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4654","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3534","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4027","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-4051","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2015-4171","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2016-5328","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:vmware:tools:9.4.0"]},{"CveID":"CVE-2013-4242","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveID":"CVE-2015-0235","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2015-4146","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2016-7079","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:vmware:tools:9.4.0"]},{"CveID":"CVE-2016-2063","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-1792","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveID":"CVE-2014-5207","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-7825","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-0571","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2064","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-3948","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2014-0106","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2015-3310","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"ppp","Version":"2.4.5-4+deb6u1","Release":"","NewVersion":"2.4.5-5.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-8133","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9644","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2011-1095","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2015-0569","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-2877","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2010-3431","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2010-3853","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2011-1089","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-0196","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3122","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-3673","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-7975","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-4556","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2011-3148","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2013-4351","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveID":"CVE-2013-4237","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-5077","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-0570","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2012-1820","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:quagga:quagga:0.99.20.1"]},{"CveID":"CVE-2016-2569","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2016-4054","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2011-1658","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-0475","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-3144","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4323","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4652","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-7826","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8369","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8989","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-2207","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2013-4332","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2013-4458","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-7142","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2016-4053","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2013-2777","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2014-2284","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:net-snmp:net-snmp:5.7.2"]},{"CveID":"CVE-2011-4096","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2015-1863","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2011-1098","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2011-1155","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-4171","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-1775","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2014-4611","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-7842","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9410","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2010-2951","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2012-0064","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"xkb-data","Version":"1.8-2","Release":"","NewVersion":"2.5.1-3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-1737","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4608","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4943","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8134","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-2944","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2011-3149","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-3688","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4157","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-0128","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2011-0010","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2014-1419","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"acpi-support-base","Version":"0.137-5+deb6u2","Release":"","NewVersion":"0.140-5+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-7209","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"mime-support","Version":"3.48-1+deb6u1","Release":"","NewVersion":"3.52-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2010-3072","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2016-5340","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-6270","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2015-8023","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveID":"CVE-2016-7080","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:vmware:tools:9.4.0"]},{"CveID":"CVE-2011-4578","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:tedfelix:acpid2:2.0.7"]},{"CveID":"CVE-2014-4322","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9529","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-1350","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2854","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-1789","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveID":"CVE-2014-9112","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"cpio","Version":"2.11-4+deb6u2","Release":"","NewVersion":"2.11+dfsg-0.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-4014","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-0239","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-1914","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2016-2571","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2011-2483","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"whois","Version":"5.0.10","Release":"","NewVersion":"5.1.1~deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2010-4051","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2012-4412","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2013-7421","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-9090","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-5621","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:net-snmp:net-snmp:5.7.2"]},{"CveID":"CVE-2015-1788","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveID":"CVE-2015-3294","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"dnsmasq","Version":"2.55-2+deb6u1","Release":"","NewVersion":"2.62-3+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"dnsmasq-base","Version":"2.55-2+deb6u1","Release":"","NewVersion":"2.62-3+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2013-4576","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveID":"CVE-2015-8370","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:grub2:1.98"]},{"CveID":"CVE-2013-4788","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-4656","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2059","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-1790","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveID":"CVE-2016-2570","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2010-3316","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2011-1154","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2011-1071","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-3646","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-7841","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8559","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-0573","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-5707","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2010-3430","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2010-4052","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2015-4142","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2016-2062","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-8160","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-0568","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2067","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2853","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-2037","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"cpio","Version":"2.11-4+deb6u2","Release":"","NewVersion":"2.11+dfsg-0.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2014-6040","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-3145","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-4144","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveID":"CVE-2014-7284","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-0572","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2013-1776","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveID":"CVE-2010-3435","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveID":"CVE-2011-1659","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2012-4424","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveID":"CVE-2014-7283","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2015-8551","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2016-5870","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2017-5972","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2011-3205","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveID":"CVE-2011-2777","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:tedfelix:acpid2:2.0.7"]},{"CveID":"CVE-2014-4667","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveID":"CVE-2014-4699","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]}],"KnownCves":[{"CveDetail":{"CveID":"CVE-2015-0235","Nvd":{"Summary":"Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"","Score":10,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2015-0090.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142296726407499\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142721102728110\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722450701342\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142781412222323\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143145428124857\u0026w=2"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0126.html"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2015/Jan/111"},{"Source":"BUGTRAQ","Link":"http://seclists.org/oss-sec/2015/q1/269"},{"Source":"BUGTRAQ","Link":"http://seclists.org/oss-sec/2015/q1/274"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62758"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62812"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62813"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62816"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62865"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62870"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62871"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62879"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62883"},{"Source":"CONFIRM","Link":"http://support.apple.com/kb/HT204942"},{"Source":"CISCO","Link":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21695695"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21695774"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21695835"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21695860"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21696131"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21696243"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21696526"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21696600"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21696602"},{"Source":"CONFIRM","Link":"http://www-01.ibm.com/support/docview.wss?uid=swg21696618"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3142"},{"Source":"CONFIRM","Link":"http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:039"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/534845/100/0/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/72325"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"CONFIRM","Link":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa90"},{"Source":"MISC","Link":"https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability"},{"Source":"CONFIRM","Link":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668"},{"Source":"CONFIRM","Link":"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10671"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10100"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"},{"Source":"CONFIRM","Link":"https://support.apple.com/HT205267"},{"Source":"CONFIRM","Link":"https://support.apple.com/HT205375"},{"Source":"CONFIRM","Link":"https://www.f-secure.com/en/web/labs_global/fsc-2015-1"},{"Source":"MISC","Link":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"},{"Source":"CONFIRM","Link":"https://www.sophos.com/en-us/support/knowledgebase/121879.aspx"}],"PublishedDate":"2015-01-28T14:59:00.063-05:00","LastModifiedDate":"2017-08-08T21:29:01.873-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0235","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2015-0573","Nvd":{"Summary":"drivers/media/platform/msm/broadcast/tsc.c in the TSC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via a crafted application that makes a TSC_GET_CARD_STATUS ioctl call.","Score":10,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-476","References":[{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la//kernel/msm-3.10/commit/?id=e20f20aaed6b6d2fd1667bad9be9ef35103a51df"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/issues-tsc-tspp2-and-buspm-drivers-cve-2015-0573-cve-2016-2441-cve-2016-2442"}],"PublishedDate":"2016-08-07T17:59:02.19-04:00","LastModifiedDate":"2016-08-11T11:05:34.54-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0573","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2063","Nvd":{"Summary":"Stack-based buffer overflow in the supply_lm_input_write function in drivers/thermal/supply_lm_core.c in the MSM Thermal driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted application that sends a large amount of data through the debugfs interface.","Score":10,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/92381"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.10/commit/?id=ab3f46119ca10de87a11fe966b0723c48f27acd4"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/stack-overflow-msm-thermal-driver-allows-kernel-memory-corruption-cve-2016-2063"}],"PublishedDate":"2016-08-07T17:59:04.987-04:00","LastModifiedDate":"2016-11-28T15:03:02.787-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2063","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2065","Nvd":{"Summary":"sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (out-of-bounds write and memory corruption) or possibly have unspecified other impact via a crafted application that makes an ioctl call triggering incorrect use of a parameters pointer.","Score":10,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-787","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/92376"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"}],"PublishedDate":"2016-08-07T17:59:07.66-04:00","LastModifiedDate":"2016-11-28T15:03:06.817-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2065","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-5344","Nvd":{"Summary":"Multiple integer overflows in the MDSS driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service or possibly have unspecified other impact via a large size value, related to mdss_compat_utils.c, mdss_fb.c, and mdss_rotator.c.","Score":10,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-190","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-10-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/92695"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=1d2297267c24f2c44bd0ecb244ddb8bc880a29b7"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/integer-overflow-mdss-driver-cve-2016-5344"}],"PublishedDate":"2016-08-30T13:59:03.503-04:00","LastModifiedDate":"2016-11-28T15:24:40.2-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-5344","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-0569","Nvd":{"Summary":"Heap-based buffer overflow in the private wireless extensions IOCTL implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that establishes a packet filter.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-05-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/77691"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015"}],"PublishedDate":"2016-05-09T06:59:00.187-04:00","LastModifiedDate":"2016-11-28T14:16:55.75-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0569","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-0570","Nvd":{"Summary":"Stack-based buffer overflow in the SET_WPS_IE IOCTL implementation in wlan_hdd_hostapd.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via a crafted application that uses a long WPS IE element.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-05-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/77691"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015"}],"PublishedDate":"2016-05-09T06:59:01.267-04:00","LastModifiedDate":"2016-11-28T14:16:56.783-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0570","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-0571","Nvd":{"Summary":"The WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify authorization for private SET IOCTL calls, which allows attackers to gain privileges via a crafted application, related to wlan_hdd_hostapd.c and wlan_hdd_wext.c.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-284","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-05-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/77691"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/multiple-issues-wlan-driver-allow-local-privilege-escalation-cve-2015"}],"PublishedDate":"2016-05-09T06:59:02.237-04:00","LastModifiedDate":"2016-11-28T14:16:58.313-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0571","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2061","Nvd":{"Summary":"Integer signedness error in the MSM V4L2 video driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (array overflow and memory corruption) via a crafted application that triggers an msm_isp_axi_create_stream call.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-06-01.html"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la//kernel/msm-3.18/commit/id=79db14ca9f791a14be9376a0340ad3b9b9a4d603"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/array-overflow-msm-v4l2-video-driver-allows-kernel-memory-corruption-cve-2016-2061"}],"PublishedDate":"2016-06-12T21:59:00.137-04:00","LastModifiedDate":"2016-06-14T10:15:36.457-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2061","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2062","Nvd":{"Summary":"The adreno_perfcounter_query_group function in drivers/gpu/msm/adreno_perfcounter.c in the Adreno GPU driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, uses an incorrect integer data type, which allows attackers to cause a denial of service (integer overflow, heap-based buffer overflow, and incorrect memory allocation) or possibly have unspecified other impact via a crafted IOCTL_KGSL_PERFCOUNTER_QUERY ioctl call.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-06-01.html"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035766"},{"Source":"CONFIRM","Link":"https://codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=27c95b64b2e4b5ff1288cbaa6e353dd803d71576"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/buffer-overflow-adreno-gpu-msm-driver-cve-2016-2062"}],"PublishedDate":"2016-05-05T17:59:08.347-04:00","LastModifiedDate":"2016-11-30T22:08:32.4-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2062","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2066","Nvd":{"Summary":"Integer signedness error in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application that makes an ioctl call.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-06-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91046"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"}],"PublishedDate":"2016-06-12T21:59:01.247-04:00","LastModifiedDate":"2016-11-28T15:03:08.083-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2066","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2067","Nvd":{"Summary":"drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, mishandles the KGSL_MEMFLAGS_GPUREADONLY flag, which allows attackers to gain privileges by leveraging accidental read-write mappings, aka Qualcomm internal bug CR988993.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-07-01.html"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=410cfa95f0a1cf58819cbfbd896f9aa45b004ac0"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/privilege-escalation-vulnerability-graphics-driver-cve-2016-2067"}],"PublishedDate":"2016-07-10T21:59:32.29-04:00","LastModifiedDate":"2016-07-11T14:29:59.933-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2067","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2068","Nvd":{"Summary":"The MSM QDSP6 audio driver (aka sound driver) for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (integer overflow, and buffer overflow or buffer over-read) via a crafted application that performs a (1) AUDIO_EFFECTS_WRITE or (2) AUDIO_EFFECTS_READ operation, aka Qualcomm internal bug CR1006609.","Score":9.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-07-01.html"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=01ee86da5a0cd788f134e360e2be517ef52b6b00"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.10/commit/?id=9900650540c889f761d102202bc80306ae80ab83"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=2c04c0dab66013b7dfbe4d5a523c2c1d6b5b11d6"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2068-0"}],"PublishedDate":"2016-07-10T21:59:33.29-04:00","LastModifiedDate":"2016-07-11T13:13:52.727-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2068","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3673","Nvd":{"Summary":"The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.","Score":7.8,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9de7922bc709eee2f609cd01d98aaedc4cf5ea74"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3087.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3088.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3089.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722450701342\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722544401658\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0115.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70883"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1147850"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/9de7922bc709eee2f609cd01d98aaedc4cf5ea74"}],"PublishedDate":"2014-11-10T06:55:06.58-05:00","LastModifiedDate":"2016-08-22T22:08:10.26-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3673","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3687","Nvd":{"Summary":"The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.","Score":7.8,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b69040d8e39f20d5215a03502a8e8b4c6ab78395"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3087.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3088.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3089.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722450701342\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722544401658\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0115.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70766"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1155731"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/b69040d8e39f20d5215a03502a8e8b4c6ab78395"}],"PublishedDate":"2014-11-10T06:55:06.627-05:00","LastModifiedDate":"2016-12-21T21:59:16.14-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3687","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2017-5972","Nvd":{"Summary":"The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.","Score":7.8,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"MISC","Link":"http://seclists.org/oss-sec/2017/q1/573"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/96231"},{"Source":"MISC","Link":"https://access.redhat.com/security/cve/cve-2017-5972"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1422081"},{"Source":"MISC","Link":"https://cxsecurity.com/issue/WLB-2017020112"},{"Source":"MISC","Link":"https://githubengineering.com/syn-flood-mitigation-with-synsanity/"},{"Source":"MISC","Link":"https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html"},{"Source":"MISC","Link":"https://security-tracker.debian.org/tracker/CVE-2017-5972"},{"Source":"EXPLOIT-DB","Link":"https://www.exploit-db.com/exploits/41350/"}],"PublishedDate":"2017-02-14T01:59:00.277-05:00","LastModifiedDate":"2017-05-10T21:29:05.96-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2017-5972","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2012-2388","Nvd":{"Summary":"The GMP Plugin in strongSwan 4.2.0 through 4.6.3 allows remote attackers to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka \"RSA signature verification vulnerability.\"","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-287","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00002.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2012/dsa-2483"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/53752"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id?1027110"},{"Source":"CONFIRM","Link":"http://www.strongswan.org/blog/2012/05/31/strongswan-4.6.4-released-%28cve-2012-2388%29.html"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/76013"}],"PublishedDate":"2012-06-27T17:55:02.61-04:00","LastModifiedDate":"2013-10-10T23:43:28.833-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-2388","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2012-2663","Nvd":{"Summary":"extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes this issue less relevant.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"MLIST","Link":"http://www.spinics.net/lists/netfilter-devel/msg21248.html"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=826702"}],"PublishedDate":"2014-02-15T09:57:07.423-05:00","LastModifiedDate":"2014-02-18T14:12:25.143-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-2663","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:netfilter_core_team:iptables:1.4.10"]},{"CveDetail":{"CveID":"CVE-2012-4412","Nvd":{"Summary":"Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=14547"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2012/09/07/9"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1991-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=855385"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"}],"PublishedDate":"2013-10-09T18:55:02.477-04:00","LastModifiedDate":"2017-06-30T21:29:02.747-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-4412","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2014-3158","Nvd":{"Summary":"Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to \"access privileged options\" via a long word in an options file, which triggers a heap-based buffer overflow that \"[corrupts] security-relevant variables.\"","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://advisories.mageia.org/MGASA-2014-0368.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136932.html"},{"Source":"MLIST","Link":"http://marc.info/?l=linux-ppp\u0026m=140764978420764"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3079"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:135"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2429-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1128748"},{"Source":"CONFIRM","Link":"https://github.com/paulusmack/ppp/commit/7658e8257183f062dc01f87969c140707c7e52cb"}],"PublishedDate":"2014-11-15T16:59:00.117-05:00","LastModifiedDate":"2016-10-24T21:59:35.653-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3158","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"ppp","Version":"2.4.5-4+deb6u1","Release":"","NewVersion":"2.4.5-5.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2014-4323","Nvd":{"Summary":"The mdp_lut_hw_update function in drivers/video/msm/mdp.c in the MDP display driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain start and length values within an ioctl call, which allows attackers to gain privileges via a crafted application.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/improper-input-validation-mdp-driver-when-processing-color-maps"}],"PublishedDate":"2014-12-12T06:59:00.063-05:00","LastModifiedDate":"2014-12-12T15:07:12.497-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4323","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7209","Nvd":{"Summary":"run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-77","References":[{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62079"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3114"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/12/31/8"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71797"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/99570"}],"PublishedDate":"2015-01-06T10:59:02.663-05:00","LastModifiedDate":"2017-01-02T21:59:12.327-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7209","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"mime-support","Version":"3.48-1+deb6u1","Release":"","NewVersion":"3.52-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2015-0572","Nvd":{"Summary":"Multiple race conditions in drivers/char/adsprpc.c and drivers/char/adsprpc_compat.c in the ADSPRPC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (zero-value write) or possibly have unspecified other impact via a COMPAT_FASTRPC_IOCTL_INVOKE_FD ioctl call.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-10-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/93312"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=34ad3d34fbff11b8e1210b9da0dac937fb956b61"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=8fb32c3a8147b82e2bb159b3f70d803c9e68899b"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/race-condition-leading-arbitrary-null-write-adsp-using-ioctl-compatfastrpcioctlinvokefd-cve-2015"}],"PublishedDate":"2016-10-10T06:59:00.167-04:00","LastModifiedDate":"2016-11-28T14:16:59.347-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0572","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-5621","Nvd":{"Summary":"The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-19","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1636.html"},{"Source":"CONFIRM","Link":"http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/"},{"Source":"CONFIRM","Link":"http://support.citrix.com/article/CTX209443"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/04/13/1"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/04/16/15"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/07/31/1"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/76380"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1033304"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2711-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1212408"},{"Source":"CONFIRM","Link":"https://sourceforge.net/p/net-snmp/bugs/2615/"}],"PublishedDate":"2015-08-19T11:59:09.46-04:00","LastModifiedDate":"2016-12-23T21:59:29.793-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-5621","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:net-snmp:net-snmp:5.7.2"]},{"CveDetail":{"CveID":"CVE-2016-5343","Nvd":{"Summary":"drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write request, as demonstrated by a voice_svc_send_req buffer overflow.","Score":7.5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-10-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/93330"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6927e2e0af4dcac357be86ba563c9ae12354bb08"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/multiple-memory-corruption-issues-write-operation-qdsp6v2-voice-service-driver-cve-2016-5343"}],"PublishedDate":"2016-10-10T06:59:46.2-04:00","LastModifiedDate":"2016-11-28T15:24:39.2-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-5343","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-0484","Nvd":{"Summary":"The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the \"user's environment.\"","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3020"}],"PublishedDate":"2014-09-22T11:55:07.373-04:00","LastModifiedDate":"2014-09-24T14:50:33.017-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-0484","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"acpi-support-base","Version":"0.137-5+deb6u2","Release":"","NewVersion":"0.140-5+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2014-1737","Nvd":{"Summary":"The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-0771.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3043.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2926"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2928"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/05/09/2"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/67300"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030474"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1094299"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c"}],"PublishedDate":"2014-05-11T17:55:05.81-04:00","LastModifiedDate":"2017-01-06T21:59:43.61-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-1737","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3534","Nvd":{"Summary":"arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a crafted application that makes a ptrace system call.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=dab6cf55f81a6e16b8147aed9a843e1691dcd318"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59790"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60351"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2992"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8"},{"Source":"OSVDB","Link":"http://www.osvdb.org/109546"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68940"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030683"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/95069"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1114089"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/dab6cf55f81a6e16b8147aed9a843e1691dcd318"}],"PublishedDate":"2014-08-01T07:13:09.023-04:00","LastModifiedDate":"2017-01-06T22:00:05.567-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3534","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4322","Nvd":{"Summary":"drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or cause a denial of service (memory corruption) via a crafted application.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/memory-corruption-qseecom-driver-cve-2014-4322"}],"PublishedDate":"2014-12-24T10:59:00.053-05:00","LastModifiedDate":"2014-12-24T12:03:43.347-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4322","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-5206","Nvd":{"Summary":"The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a \"mount -o remount\" command within a user namespace.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a6138db815df5ee542d848318e5dae681590fccd"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/08/13/4"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/69214"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2317-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2318-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1129662"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/a6138db815df5ee542d848318e5dae681590fccd"}],"PublishedDate":"2014-08-18T07:15:27.107-04:00","LastModifiedDate":"2017-01-06T22:00:26.993-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-5206","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9322","Nvd":{"Summary":"arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6f442be2fb22be02cafa606f1769fa1e6f894441"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722450701342\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722544401658\u0026w=2"},{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-04-02.html"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/36266"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/12/15/6"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2491-1"},{"Source":"MISC","Link":"http://www.zerodayinitiative.com/advisories/ZDI-16-170"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1172806"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441"},{"Source":"CONFIRM","Link":"https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5"}],"PublishedDate":"2014-12-17T06:59:02.383-05:00","LastModifiedDate":"2016-08-22T22:08:49.513-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9322","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9410","Nvd":{"Summary":"The vfe31_proc_general function in drivers/media/video/msm/vfe/msm_vfe31.c in the MSM-VFE31 driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate a certain id value, which allows attackers to gain privileges or cause a denial of service (memory corruption) via an application that makes a crafted ioctl call.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/multiple-issues-camera-drivers-cve-2014-9410-cve-2015-0568"}],"PublishedDate":"2016-08-07T17:59:00.127-04:00","LastModifiedDate":"2016-08-11T11:46:01.757-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9410","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9529","Nvd":{"Summary":"Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a3a8784454692dd72e5d5d34dcdab17b4420e74c"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3128"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/06/10"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71880"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1036763"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2511-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2512-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/99641"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1179813"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/a3a8784454692dd72e5d5d34dcdab17b4420e74c"}],"PublishedDate":"2015-01-09T16:59:00.05-05:00","LastModifiedDate":"2017-08-12T21:29:04.083-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9529","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-0568","Nvd":{"Summary":"Use-after-free vulnerability in the msm_set_crop function in drivers/media/video/msm/msm_camera.c in the MSM-Camera driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (memory corruption) via an application that makes a crafted ioctl call.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-416","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/92379"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/multiple-issues-camera-drivers-cve-2014-9410-cve-2015-0568"}],"PublishedDate":"2016-08-07T17:59:01.143-04:00","LastModifiedDate":"2016-11-28T14:16:54.533-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0568","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2059","Nvd":{"Summary":"The msm_ipc_router_bind_control_port function in net/ipc_router/ipc_router_core.c in the IPC router kernel module for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not verify that a port is a client port, which allows attackers to gain privileges or cause a denial of service (race condition and list corruption) by making many BIND_CONTROL_PORT ioctl calls.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-10-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/90230"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035765"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=9e8bdd63f7011dff5523ea435433834b3702398d"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/projects/security-advisories/linux-ipc-router-binding-any-port-control-port-cve-2016-2059"}],"PublishedDate":"2016-05-05T17:59:07.127-04:00","LastModifiedDate":"2016-11-30T22:08:31.32-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2059","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2064","Nvd":{"Summary":"sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted application that makes an ioctl call specifying many commands.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-125","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/92375"},{"Source":"CONFIRM","Link":"https://us.codeaurora.org/cgit/quic/la/kernel/msm-3.18/commit/?id=775fca8289eff931f91ff6e8c36cf2034ba59e88"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/multiple-vulnerabilities-msm-qdsp6-audio-driver-allow-kernel-memory-corruption-cve-2016-2064-cve"}],"PublishedDate":"2016-08-07T17:59:06.317-04:00","LastModifiedDate":"2016-11-28T15:03:04.897-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2064","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-5340","Nvd":{"Summary":"The is_ashmem_file function in drivers/staging/android/ashmem.c in a certain Qualcomm Innovation Center (QuIC) Android patch for the Linux kernel 3.x mishandles pointer validation within the KGSL Linux Graphics Module, which allows attackers to bypass intended access restrictions by using the /ashmem string as the dentry name.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-10-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/92374"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1036763"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=06e51489061e5473b4e2035c79dcf7c27a6f75a6"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/invalid-path-check-ashmem-memory-file-cve-2016-5340"}],"PublishedDate":"2016-08-07T17:59:08.757-04:00","LastModifiedDate":"2017-08-12T21:29:13.617-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-5340","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-5342","Nvd":{"Summary":"Heap-based buffer overflow in the wcnss_wlan_write function in drivers/net/wireless/wcnss/wcnss_wlan.c in the wcnss_wlan device driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact by writing to /dev/wcnss_wlan with an unexpected amount of data.","Score":7.2,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-10-01.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/92693"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/buffer-overflow-vulnerability-wcnsswlanwrite-cve-2016-5342"}],"PublishedDate":"2016-08-30T13:59:02.567-04:00","LastModifiedDate":"2016-11-28T15:24:38.123-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-5342","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2010-3853","Nvd":{"Summary":"pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"MLIST","Link":"http://lists.vmware.com/pipermail/security-announce/2011/000126.html"},{"Source":"CONFIRM","Link":"http://pam.cvs.sourceforge.net/viewvc/pam/Linux-PAM/modules/pam_namespace/pam_namespace.c?view=log#rev1.13"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:220"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2010-0819.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2010-0891.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/516909/100/0/threaded"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0004.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0606"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=643043"}],"PublishedDate":"2011-01-24T13:00:02.173-05:00","LastModifiedDate":"2012-07-23T23:22:39.037-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-3853","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-0008","Nvd":{"Summary":"A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command. NOTE: this vulnerability exists because of a CVE-2009-0034 regression.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0195"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0199"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=668843"},{"Source":"XF","Link":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64965"}],"PublishedDate":"2011-01-20T14:00:07.443-05:00","LastModifiedDate":"2017-08-16T21:33:22.603-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-0008","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2011-1154","Nvd":{"Summary":"The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-20","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/16"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/17"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/18"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/19"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/22"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/24"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/25"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/26"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/27"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/28"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/29"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/30"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/31"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/32"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/33"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/11"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/08/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/2"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/11/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/11/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/14/26"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/23/11"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:065"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0407.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0791"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0872"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0961"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=680796"}],"PublishedDate":"2011-03-30T18:55:02.36-04:00","LastModifiedDate":"2011-04-20T22:33:30-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1154","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2013-1775","Nvd":{"Summary":"sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1353.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1701.html"},{"Source":"CONFIRM","Link":"http://support.apple.com/kb/HT5880"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2642"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/02/27/22"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/58203"},{"Source":"SLACKWARE","Link":"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.517440"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/ddf399e3e306"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/sudo/alerts/epoch_ticket.html"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1754-1"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"}],"PublishedDate":"2013-03-05T16:38:56.293-05:00","LastModifiedDate":"2016-11-28T14:08:53.117-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-1775","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2014-0196","Nvd":{"Summary":"The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://bugzilla.novell.com/show_bug.cgi?id=875690"},{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-0771.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html"},{"Source":"MISC","Link":"http://pastebin.com/raw.php?i=yTSFUBgZ"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-0512.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59218"},{"Source":"CONFIRM","Link":"http://source.android.com/security/bulletin/2016-07-01.html"},{"Source":"CONFIRM","Link":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2926"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2928"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/33516"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/05/05/6"},{"Source":"OSVDB","Link":"http://www.osvdb.org/106646"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2196-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2197-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2198-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2199-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2200-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2201-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2202-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2203-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2204-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1094232"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00"}],"PublishedDate":"2014-05-07T06:55:04.337-04:00","LastModifiedDate":"2017-01-06T21:59:19.047-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-0196","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-1419","Nvd":{"Summary":"Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60319"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2984"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2297-1"},{"Source":"CONFIRM","Link":"https://bugs.launchpad.net/ubuntu/%2Bsource/acpi-support/%2Bbug/1340812"}],"PublishedDate":"2014-07-24T10:55:06.817-04:00","LastModifiedDate":"2017-01-06T21:59:36.827-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-1419","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"acpi-support-base","Version":"0.137-5+deb6u2","Release":"","NewVersion":"0.140-5+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2014-4699","Nvd":{"Summary":"The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-0924.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3047.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3048.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2014/07/05/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2014/07/08/16"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2014/07/08/5"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2972"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/34134"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/07/04/4"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2266-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2267-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2268-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2269-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2270-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2271-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2272-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2273-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2274-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1115927"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97"}],"PublishedDate":"2014-07-09T07:07:03.477-04:00","LastModifiedDate":"2014-08-01T01:10:33.077-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4699","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4943","Nvd":{"Summary":"The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-0924.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3047.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3048.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2014/07/17/1"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1025.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59790"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2992"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/36267"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030610"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/94665"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1119458"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf"}],"PublishedDate":"2014-07-19T15:55:08.23-04:00","LastModifiedDate":"2017-01-06T22:00:24.71-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4943","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-8370","Nvd":{"Summary":"Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an \"Off-by-two\" or \"Out of bounds overwrite\" memory error.","Score":6.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173703.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174049.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-2623.html"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2015/Dec/69"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3421"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/12/15/6"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/537115/100/0/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/79358"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1034422"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2836-1"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201512-03"}],"PublishedDate":"2015-12-16T16:59:04.063-05:00","LastModifiedDate":"2016-12-07T13:27:11.13-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-8370","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:grub2:1.98"]},{"CveDetail":{"CveID":"CVE-2011-3205","Nvd":{"Summary":"Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response. NOTE: This issue exists because of a CVE-2005-0094 regression.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/08/29/2"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/08/30/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/08/30/8"},{"Source":"SECTRACK","Link":"http://securitytracker.com/id?1025981"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2011/dsa-2304"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:150"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-1293.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/49356"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2011_3.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patch"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=734583"}],"PublishedDate":"2011-09-06T11:55:08.383-04:00","LastModifiedDate":"2016-11-28T14:07:37.333-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-3205","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2013-4237","Nvd":{"Summary":"sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/08/12/8"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/61729"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1991-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=995839"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=14699"},{"Source":"CONFIRM","Link":"https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=91ce40854d0b7f865cf5024ef95a8026b76096f3"}],"PublishedDate":"2013-10-09T18:55:02.65-04:00","LastModifiedDate":"2017-06-30T21:29:04.153-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4237","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2014-0475","Nvd":{"Summary":"Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-22","References":[{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2976"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/07/10/7"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/07/14/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68505"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030569"},{"Source":"REDHAT","Link":"https://rhn.redhat.com/errata/RHSA-2014-1110.html"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201602-02"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=17137"}],"PublishedDate":"2014-07-29T10:55:05.077-04:00","LastModifiedDate":"2016-11-28T14:10:39.97-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-0475","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2014-3686","Nvd":{"Summary":"wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://advisories.mageia.org/MGASA-2014-0429.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1956.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2014-1/"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3052"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:120"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/09/28"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70396"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2383-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1151259"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2014-10-15T20:55:05.577-04:00","LastModifiedDate":"2016-07-26T21:59:08.633-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3686","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2014-6270","Nvd":{"Summary":"Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/542"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/550"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/69686"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2921-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/95873"},{"Source":"CONFIRM","Link":"https://bugzilla.novell.com/show_bug.cgi?id=895773"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1139967"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2014-09-12T10:55:07.907-04:00","LastModifiedDate":"2016-12-02T22:01:33.37-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-6270","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2014-8104","Nvd":{"Summary":"OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"SINGLE_INSTANCE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://advisories.mageia.org/MGASA-2014-0512.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3084"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:139"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2430-1"},{"Source":"CONFIRM","Link":"https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b"}],"PublishedDate":"2014-12-03T13:59:00.063-05:00","LastModifiedDate":"2016-08-29T14:46:41.917-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8104","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openvpn:openvpn:2.1.3"]},{"CveDetail":{"CveID":"CVE-2015-1791","Nvd":{"Summary":"Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"NETBSD","Link":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1115.html"},{"Source":"CISCO","Link":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl"},{"Source":"CONFIRM","Link":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3287"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/75161"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032479"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2639-1"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa98"},{"Source":"CONFIRM","Link":"https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122"},{"Source":"CONFIRM","Link":"https://openssl.org/news/secadv/20150611.txt"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201506-02"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"},{"Source":"CONFIRM","Link":"https://www.openssl.org/news/secadv_20150611.txt"}],"PublishedDate":"2015-06-12T15:59:04.397-04:00","LastModifiedDate":"2017-08-08T21:29:02.5-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1791","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveDetail":{"CveID":"CVE-2015-7547","Nvd":{"Summary":"Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing \"dual A/AAAA DNS queries\" and the libnss_dns.so.2 NSS module.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=145596041017029\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=145672440608228\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=145690841819314\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=145857691004892\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=146161017210491\u0026w=2"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2016-0175.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2016-0176.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2016-0225.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2016-0277.html"},{"Source":"CONFIRM","Link":"http://support.citrix.com/article/CTX206991"},{"Source":"UBUNTU","Link":"http://ubuntu.com/usn/usn-2900-1"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3480"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3481"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow"},{"Source":"CONFIRM","Link":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/83265"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035020"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2016-0002.html"},{"Source":"CONFIRM","Link":"https://access.redhat.com/articles/2161461"},{"Source":"CONFIRM","Link":"https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/"},{"Source":"CONFIRM","Link":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa114"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1293532"},{"Source":"MISC","Link":"https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"Source":"MISC","Link":"https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01"},{"Source":"CONFIRM","Link":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10150"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201602-02"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=18665"},{"Source":"MLIST","Link":"https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html"},{"Source":"CONFIRM","Link":"https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html"},{"Source":"CONFIRM","Link":"https://support.lenovo.com/us/en/product_security/len_5450"},{"Source":"EXPLOIT-DB","Link":"https://www.exploit-db.com/exploits/39454/"},{"Source":"CERT-VN","Link":"https://www.kb.cert.org/vuls/id/457759"}],"PublishedDate":"2016-02-18T16:59:00.12-05:00","LastModifiedDate":"2017-02-16T21:59:04.67-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-7547","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2016-4051","Nvd":{"Summary":"Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3625"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/9"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/86788"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035646"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_5.txt"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2995-1"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1138"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1139"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1140"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-04-25T10:59:02.267-04:00","LastModifiedDate":"2016-11-29T22:06:02.183-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4051","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-4052","Nvd":{"Summary":"Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3625"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/9"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/86788"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035647"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2995-1"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1138"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1139"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1140"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-04-25T10:59:03.313-04:00","LastModifiedDate":"2016-11-29T22:06:03.293-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4052","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-4054","Nvd":{"Summary":"Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.","Score":6.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3625"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/9"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/86788"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035647"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2995-1"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1138"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1139"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1140"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-04-25T10:59:05.487-04:00","LastModifiedDate":"2016-11-29T22:06:05.293-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4054","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2014-0106","Nvd":{"Summary":"Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable.","Score":6.6,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"SINGLE_INSTANCE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-20","References":[{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-0266.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/03/06/2"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/65997"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/sudo/alerts/env_add.html"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2146-1"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"}],"PublishedDate":"2014-03-11T15:37:03.24-04:00","LastModifiedDate":"2016-11-28T14:10:25.42-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-0106","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2014-4653","Nvd":{"Summary":"sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.","Score":6.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fd9f26e4eca5d08a27d12c0933fceef76ed9663d"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1083.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60545"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68164"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113409"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/fd9f26e4eca5d08a27d12c0933fceef76ed9663d"}],"PublishedDate":"2014-07-03T00:22:15.747-04:00","LastModifiedDate":"2017-01-06T22:00:22.35-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4653","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-2338","Nvd":{"Summary":"IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.","Score":6.4,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-287","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2903"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/66815"},{"Source":"CONFIRM","Link":"http://www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-%28cve-2014-2338%29.html"}],"PublishedDate":"2014-04-16T14:37:14.24-04:00","LastModifiedDate":"2016-11-28T14:10:59.523-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-2338","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2014-7141","Nvd":{"Summary":"The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.","Score":6.4,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-19","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/539"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/612"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/626"},{"Source":"UBUNTU","Link":"http://ubuntu.com/usn/usn-2422-1"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/69688"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2014_4.txt"},{"Source":"CONFIRM","Link":"https://bugzilla.novell.com/show_bug.cgi?id=891268"}],"PublishedDate":"2014-11-26T10:59:03.557-05:00","LastModifiedDate":"2016-11-28T14:12:54.17-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7141","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2014-7142","Nvd":{"Summary":"The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.","Score":6.4,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/539"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/613"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/626"},{"Source":"UBUNTU","Link":"http://ubuntu.com/usn/usn-2422-1"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70022"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2014_4.txt"},{"Source":"CONFIRM","Link":"https://bugzilla.novell.com/show_bug.cgi?id=891268"}],"PublishedDate":"2014-11-26T10:59:04.95-05:00","LastModifiedDate":"2016-11-28T14:12:55.373-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7142","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2014-7284","Nvd":{"Summary":"The net_get_random_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values.","Score":6.4,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-200","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d4405226d27b3a215e4d03cfa51f536244e5de7"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.5"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/01/19"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1148788"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/3d4405226d27b3a215e4d03cfa51f536244e5de7"},{"Source":"MISC","Link":"https://web.archive.org/web/20141002163852/http://secondlookforensics.com/ngro-linux-kernel-bug/"}],"PublishedDate":"2014-10-13T06:55:08.263-04:00","LastModifiedDate":"2014-10-15T15:20:48.587-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7284","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-3294","Nvd":{"Summary":"The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.","Score":6.4,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-19","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00013.html"},{"Source":"MLIST","Link":"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009382.html"},{"Source":"MLIST","Link":"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009387.html"},{"Source":"CONFIRM","Link":"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=ad4a8ff7d9097008d7623df8543df435bfddeac8"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3251"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/535354/100/1100/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/74452"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032195"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2593-1"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201512-01"}],"PublishedDate":"2015-05-08T10:59:05.527-04:00","LastModifiedDate":"2017-01-02T22:00:00.897-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-3294","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"dnsmasq","Version":"2.55-2+deb6u1","Release":"","NewVersion":"2.62-3+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"dnsmasq-base","Version":"2.55-2+deb6u1","Release":"","NewVersion":"2.62-3+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-1095","Nvd":{"Summary":"locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.","Score":6.2,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://bugs.gentoo.org/show_bug.cgi?id=330923"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/08/21"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/08/22"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/08/8"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"Source":"SECTRACK","Link":"http://securitytracker.com/id?1025286"},{"Source":"CONFIRM","Link":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904"},{"Source":"CONFIRM","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=11904"},{"Source":"CONFIRM","Link":"http://sourceware.org/git/?p=glibc.git;a=patch;h=026373745eab50a683536d950cb7e17dc98c4259"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0412.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0413.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0863"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=625893"}],"PublishedDate":"2011-04-09T22:55:01.54-04:00","LastModifiedDate":"2012-01-26T22:58:39.25-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1095","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2014-4014","Nvd":{"Summary":"The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.","Score":6.2,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=23adbe12ef7d3d4195e80800ab36b37bee28cd03"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59220"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/33824"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/10/4"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/67988"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030394"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1107966"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2016-12-01.html"}],"PublishedDate":"2014-06-23T07:21:17.793-04:00","LastModifiedDate":"2017-01-19T21:59:02.683-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4014","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-5045","Nvd":{"Summary":"The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.","Score":6.2,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-59","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=295dc39d941dc2ae53d5c170365af4c9d5c16212"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60353"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/07/24/2"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68862"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1122472"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212"}],"PublishedDate":"2014-08-01T07:13:09.46-04:00","LastModifiedDate":"2017-01-06T22:00:25.273-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-5045","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8884","Nvd":{"Summary":"Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.","Score":6.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f2e323ec96077642d397bb1c355def536d489d16"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0290.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0782.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3093"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/14/7"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1164266"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/f2e323ec96077642d397bb1c355def536d489d16"}],"PublishedDate":"2014-11-29T20:59:06.557-05:00","LastModifiedDate":"2015-04-13T21:59:56.617-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8884","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-5207","Nvd":{"Summary":"fs/namespace.c in the Linux kernel through 3.16.1 does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges, interfere with backups and auditing on systems that had atime enabled, or cause a denial of service (excessive filesystem updating) on systems that had atime disabled via a \"mount -o remount\" command within a user namespace.","Score":6,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"SINGLE_INSTANCE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"COMPLETE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9566d6742852c527bf5af38af5cbb878dad75705"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2014/q3/352"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/34923"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/08/13/4"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/69216"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2317-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2318-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/95266"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1129662"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/9566d6742852c527bf5af38af5cbb878dad75705"}],"PublishedDate":"2014-08-18T07:15:27.153-04:00","LastModifiedDate":"2017-01-06T22:00:27.087-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-5207","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2012-6085","Nvd":{"Summary":"The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.","Score":5.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=f0b33b6fb8e0586e9584a7a409dcc31263776a67"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095513.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095516.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1459.html"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:001"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/01/01/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/57102"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1682-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/80990"},{"Source":"CONFIRM","Link":"https://bugs.g10code.com/gnupg/issue1455"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=891142"}],"PublishedDate":"2013-01-23T20:55:03.74-05:00","LastModifiedDate":"2014-01-03T23:43:15.353-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-6085","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveDetail":{"CveID":"CVE-2013-4351","Nvd":{"Summary":"GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.","Score":5.8,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-310","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1459.html"},{"Source":"CONFIRM","Link":"http://thread.gmane.org/gmane.comp.encryption.gpg.devel/17712/focus=18138"},{"Source":"UBUNTU","Link":"http://ubuntu.com/usn/usn-1987-1"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2773"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2774"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/09/13/4"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1010137"}],"PublishedDate":"2013-10-09T20:55:15.023-04:00","LastModifiedDate":"2014-01-03T23:48:39.533-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4351","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveDetail":{"CveID":"CVE-2015-1863","Nvd":{"Summary":"Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.","Score":5.8,"AccessVector":"ADJACENT_NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1090.html"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2015/Apr/82"},{"Source":"MISC","Link":"http://security.alibaba.com/blog/blog.htm?spm=0.0.0.0.p1ECc3\u0026id=19"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3233"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/535353/100/0/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/74296"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032192"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2577-1"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-04-28T10:59:01.293-04:00","LastModifiedDate":"2017-01-02T21:59:51.787-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1863","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2014-5077","Nvd":{"Summary":"The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.","Score":5.4,"AccessVector":"NETWORK","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1be9a950c646c9092fb3618197f7b6bfb50e82aa"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1083.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1668.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1763.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60430"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60545"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/07/26/1"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68881"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030681"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2358-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2359-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/95134"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1122982"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa"}],"PublishedDate":"2014-08-01T07:13:09.507-04:00","LastModifiedDate":"2017-01-06T22:00:25.647-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-5077","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2011-1071","Nvd":{"Summary":"The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a \"stack extension attack,\" a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.","Score":5.1,"AccessVector":"NETWORK","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://bugs.debian.org/615120"},{"Source":"CONFIRM","Link":"http://code.google.com/p/chromium/issues/detail?id=48733"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/02/26/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/02/28/11"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/02/28/15"},{"Source":"MISC","Link":"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2011/Feb/635"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2011/Feb/644"},{"Source":"SREASON","Link":"http://securityreason.com/securityalert/8175"},{"Source":"SECTRACK","Link":"http://securitytracker.com/id?1025290"},{"Source":"CONFIRM","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=11883"},{"Source":"CONFIRM","Link":"http://sourceware.org/git/?p=glibc.git;a=commit;h=f15ce4d8dc139523fe0c273580b604b2453acba6"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0412.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0413.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/46563"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0863"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=681054"}],"PublishedDate":"2011-04-08T11:17:27.65-04:00","LastModifiedDate":"2012-01-26T00:00:00-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1071","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2012-4424","Nvd":{"Summary":"Stack-based buffer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string that triggers a malloc failure and use of the alloca function.","Score":5.1,"AccessVector":"NETWORK","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=14547"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2012/09/13/16"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1991-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=858238"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"}],"PublishedDate":"2013-10-09T18:55:02.587-04:00","LastModifiedDate":"2017-06-30T21:29:02.797-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-4424","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2013-4788","Nvd":{"Summary":"The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.","Score":5.1,"AccessVector":"NETWORK","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"MISC","Link":"http://hmarco.org/bugs/CVE-2013-4788.html"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2015/Sep/23"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/07/15/9"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/61183"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"}],"PublishedDate":"2013-10-04T13:55:09.96-04:00","LastModifiedDate":"2017-06-30T21:29:04.733-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4788","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2010-2951","Nvd":{"Summary":"dns_internal.cc in Squid 3.1.6, when IPv6 DNS resolution is not enabled, accesses an invalid socket during an IPv4 TCP DNS query, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors that trigger an IPv4 DNS response with the TC bit set.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072"},{"Source":"CONFIRM","Link":"http://bugs.gentoo.org/show_bug.cgi?id=334263"},{"Source":"CONFIRM","Link":"http://bugs.squid-cache.org/show_bug.cgi?id=3009"},{"Source":"CONFIRM","Link":"http://bugs.squid-cache.org/show_bug.cgi?id=3021"},{"Source":"MLIST","Link":"http://marc.info/?l=squid-users\u0026m=128263555724981\u0026w=2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/08/24/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/08/24/7"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/08/25/2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/08/25/6"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=626927"}],"PublishedDate":"2010-10-12T17:00:01.71-04:00","LastModifiedDate":"2010-10-13T00:00:00-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-2951","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2010-3072","Nvd":{"Summary":"The string-comparison functions in String.cci in Squid 3.x before 3.1.8 and 3.2.x before 3.2.0.2 allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047787.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047820.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2010/dsa-2111"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/05/2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/07/7"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/42982"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2010_3.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9189.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10090.patch"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2010/2433"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=630444"}],"PublishedDate":"2010-09-20T17:00:02.597-04:00","LastModifiedDate":"2011-01-14T01:46:32.37-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-3072","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2010-4051","Nvd":{"Summary":"The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a \"RE_DUP_MAX overflow.\"","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"MISC","Link":"http://cxib.net/stuff/proftpd.gnu.c"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2011/Jan/78"},{"Source":"SREASONRES","Link":"http://securityreason.com/achievement_securityalert/93"},{"Source":"SREASON","Link":"http://securityreason.com/securityalert/8003"},{"Source":"SECTRACK","Link":"http://securitytracker.com/id?1024832"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/15935"},{"Source":"CERT-VN","Link":"http://www.kb.cert.org/vuls/id/912279"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/515589/100/0/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/45233"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=645859"}],"PublishedDate":"2011-01-13T14:00:02.9-05:00","LastModifiedDate":"2011-02-02T01:59:06.22-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-4051","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2010-4052","Nvd":{"Summary":"Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"MISC","Link":"http://cxib.net/stuff/proftpd.gnu.c"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2011/Jan/78"},{"Source":"SREASONRES","Link":"http://securityreason.com/achievement_securityalert/93"},{"Source":"SREASON","Link":"http://securityreason.com/securityalert/8003"},{"Source":"SECTRACK","Link":"http://securitytracker.com/id?1024832"},{"Source":"EXPLOIT-DB","Link":"http://www.exploit-db.com/exploits/15935"},{"Source":"CERT-VN","Link":"http://www.kb.cert.org/vuls/id/912279"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/515589/100/0/threaded"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/45233"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=645859"}],"PublishedDate":"2011-01-13T14:00:02.963-05:00","LastModifiedDate":"2011-07-19T00:00:00-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-4052","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2011-1659","Nvd":{"Summary":"Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-189","References":[{"Source":"MISC","Link":"http://code.google.com/p/chromium/issues/detail?id=48733"},{"Source":"MISC","Link":"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"},{"Source":"CONFIRM","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=12583"},{"Source":"CONFIRM","Link":"http://sourceware.org/git/?p=glibc.git;a=commit;h=8126d90480fa3e0c5c5cd0d02cb1c93174b45485"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id?1025450"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=681054"},{"Source":"XF","Link":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66819"}],"PublishedDate":"2011-04-08T11:17:28.54-04:00","LastModifiedDate":"2017-08-16T21:34:17.98-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1659","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2011-2483","Nvd":{"Summary":"crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-310","References":[{"Source":"MISC","Link":"http://freshmeat.net/projects/crypt_blowfish"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html"},{"Source":"CONFIRM","Link":"http://php.net/security/crypt_blowfish"},{"Source":"CONFIRM","Link":"http://support.apple.com/kb/HT5130"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2011/dsa-2340"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2012/dsa-2399"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:165"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:180"},{"Source":"CONFIRM","Link":"http://www.openwall.com/crypt/"},{"Source":"CONFIRM","Link":"http://www.php.net/archive/2011.php#id2011-08-18-1"},{"Source":"CONFIRM","Link":"http://www.php.net/ChangeLog-5.php#5.3.7"},{"Source":"CONFIRM","Link":"http://www.postgresql.org/docs/8.4/static/release-8-4-9.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-1377.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-1378.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-1423.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/49241"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1229-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/69319"}],"PublishedDate":"2011-08-25T10:22:44.913-04:00","LastModifiedDate":"2016-12-07T22:02:06.59-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-2483","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"whois","Version":"5.0.10","Release":"","NewVersion":"5.1.1~deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-4096","Nvd":{"Summary":"The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"MISC","Link":"http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:193"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2011/10/31/5"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2011/11/01/3"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-1791.html"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id?1026265"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html"}],"PublishedDate":"2011-11-17T14:55:01.453-05:00","LastModifiedDate":"2016-11-28T14:07:41.977-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-4096","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2013-0189","Nvd":{"Summary":"cachemgr.cgi in Squid 3.1.x and 3.2.x, possibly 3.1.22, 3.2.4, and other versions, allows remote attackers to cause a denial of service (resource consumption) via a crafted request. NOTE: this issue is due to an incorrect fix for CVE-2012-5643, possibly involving an incorrect order of arguments or incorrect comparison.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://bazaar.launchpad.net/~squid/squid/3.2/revision/11743"},{"Source":"CONFIRM","Link":"http://bazaar.launchpad.net/~squid/squid/3.2/revision/11744"},{"Source":"MLIST","Link":"http://lists.fedoraproject.org/pipermail/scm-commits/2013-January/934637.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2631"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:129"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/57646"},{"Source":"MISC","Link":"http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2012_1.patch"},{"Source":"MISC","Link":"http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2012_1.patch"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1713-1"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=887962#c9"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=895972"},{"Source":"CONFIRM","Link":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0029"}],"PublishedDate":"2013-02-08T15:55:01.377-05:00","LastModifiedDate":"2016-11-28T14:08:38.503-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-0189","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2013-1914","Nvd":{"Summary":"Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"Source":"CONFIRM","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330"},{"Source":"CONFIRM","Link":"http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1cef1b19089528db11f221e938f60b9b048945d7"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/04/03/2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/04/03/8"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/04/05/1"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/58839"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1991-1"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"Source":"MISC","Link":"https://bugzilla.novell.com/show_bug.cgi?id=813121"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=947882"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"}],"PublishedDate":"2013-04-29T18:55:01.057-04:00","LastModifiedDate":"2017-06-30T21:29:04.03-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-1914","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2013-4402","Nvd":{"Summary":"The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725433"},{"Source":"MLIST","Link":"http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000333.html"},{"Source":"MLIST","Link":"http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000334.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-10/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-10/msg00025.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1459.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2773"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2774"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1987-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1015685"}],"PublishedDate":"2013-10-28T18:55:03.913-04:00","LastModifiedDate":"2014-01-03T23:48:47.377-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4402","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveDetail":{"CveID":"CVE-2013-4458","Nvd":{"Summary":"Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=16072"},{"Source":"MLIST","Link":"https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html"}],"PublishedDate":"2013-12-12T13:55:10.883-05:00","LastModifiedDate":"2017-06-30T21:29:04.67-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4458","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2013-6075","Nvd":{"Summary":"The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an \"insufficient length check\" during identity comparison.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"MISC","Link":"http://download.strongswan.org/security/CVE-2013-6075/strongswan-4.3.3-5.1.0_id_dn_match.patch"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2012/dsa-2789"},{"Source":"CONFIRM","Link":"http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html"}],"PublishedDate":"2013-11-02T14:55:03.283-04:00","LastModifiedDate":"2013-11-21T13:41:18.297-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-6075","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2014-0128","Nvd":{"Summary":"Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-04/msg00030.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/66112"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2014_1.txt"}],"PublishedDate":"2014-04-14T11:09:05.71-04:00","LastModifiedDate":"2016-11-28T14:10:27.53-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-0128","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2014-2284","Nvd":{"Summary":"The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"MLIST","Link":"http://comments.gmane.org/gmane.comp.security.oss.general/12284"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-0321.html"},{"Source":"MLIST","Link":"http://sourceforge.net/p/net-snmp/code/ci/a1fd64716f6794c55c34d77e618210238a73bfa1/"},{"Source":"GENTOO","Link":"http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2166-1"}],"PublishedDate":"2014-03-24T12:43:02.177-04:00","LastModifiedDate":"2014-09-13T01:25:27.697-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-2284","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:net-snmp:net-snmp:5.7.2"]},{"CveDetail":{"CveID":"CVE-2014-3609","Nvd":{"Summary":"HttpHdrRange.cc in Squid 3.x before 3.3.12 and 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via a request with crafted \"Range headers with unidentifiable byte-range values.\"","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-09/msg00029.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1147.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/61320"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/61412"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3014"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3139"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/69453"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2014_2.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9201.patch"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2327-1"}],"PublishedDate":"2014-09-11T14:55:05.15-04:00","LastModifiedDate":"2017-01-06T22:00:06.787-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3609","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2014-3688","Nvd":{"Summary":"The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=26b87c7881006311828bb0ab271a551a62dcceb4"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722450701342\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=142722544401658\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0115.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/13/8"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1155745"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/26b87c7881006311828bb0ab271a551a62dcceb4"}],"PublishedDate":"2014-11-29T20:59:02.307-05:00","LastModifiedDate":"2016-08-22T22:08:12.633-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3688","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4608","Nvd":{"Summary":"** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says \"the Linux kernel is *not* affected; media hype.\"","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"MISC","Link":"http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"},{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=206a81c18401c0cde6e579164f752c4b147324ce"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0062.html"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MISC","Link":"http://www.oberhumer.com/opensource/lzo/"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/21"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68214"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2416-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2419-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2420-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2421-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113899"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/206a81c18401c0cde6e579164f752c4b147324ce"},{"Source":"MISC","Link":"https://www.securitymouse.com/lms-2014-06-16-2"}],"PublishedDate":"2014-07-03T00:22:15.31-04:00","LastModifiedDate":"2015-06-03T22:00:29.473-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4608","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4611","Nvd":{"Summary":"Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"MISC","Link":"http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"},{"Source":"MISC","Link":"http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html"},{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=206204a1162b995e2185275167b22468c00d6b36"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html"},{"Source":"MISC","Link":"http://twitter.com/djrbliss/statuses/484931749013495809"},{"Source":"MISC","Link":"http://twitter.com/djrbliss/statuses/485042901399789568"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/24"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030491"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1112436"},{"Source":"CONFIRM","Link":"https://code.google.com/p/lz4/issues/detail?id=52"},{"Source":"CONFIRM","Link":"https://code.google.com/p/lz4/source/detail?r=118"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36"},{"Source":"MISC","Link":"https://www.securitymouse.com/lms-2014-06-16-5"},{"Source":"MISC","Link":"https://www.securitymouse.com/lms-2014-06-16-6"}],"PublishedDate":"2014-07-03T00:22:15.623-04:00","LastModifiedDate":"2014-09-28T01:26:11.447-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4611","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4617","Nvd":{"Summary":"The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342"},{"Source":"CONFIRM","Link":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a"},{"Source":"MLIST","Link":"http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html"},{"Source":"MLIST","Link":"http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59351"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2968"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html"}],"PublishedDate":"2014-06-25T07:19:22.637-04:00","LastModifiedDate":"2017-01-06T22:00:21.943-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4617","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveDetail":{"CveID":"CVE-2014-4667","Nvd":{"Summary":"The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d3217b15a19a4779c39b212358a5c71d725822ee"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3068.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3069.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59790"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60596"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2992"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/27/11"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68224"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113967"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/d3217b15a19a4779c39b212358a5c71d725822ee"}],"PublishedDate":"2014-07-03T00:22:16.06-04:00","LastModifiedDate":"2017-01-06T22:00:22.787-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4667","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-6040","Nvd":{"Summary":"GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of \"0xffff\" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2015-0016.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62100"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62146"},{"Source":"UBUNTU","Link":"http://ubuntu.com/usn/usn-2432-1"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3142"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/08/29/3"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/09/02/1"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/69472"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201602-02"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=17325"},{"Source":"CONFIRM","Link":"https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=41488498b6"}],"PublishedDate":"2014-12-05T11:59:09.91-05:00","LastModifiedDate":"2017-01-02T21:59:06.61-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-6040","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2014-7841","Nvd":{"Summary":"The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e40607cbe270a9e8360907cb1e62ddf0736e4864"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2015-3004.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2015-3005.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0087.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0102.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0284.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0285.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0695.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62597"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62735"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3093"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/13/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71081"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1163087"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/e40607cbe270a9e8360907cb1e62ddf0736e4864"},{"Source":"CONFIRM","Link":"https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16016.html"}],"PublishedDate":"2014-11-29T20:59:03.493-05:00","LastModifiedDate":"2017-01-02T21:59:12.877-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7841","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8160","Nvd":{"Summary":"net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-254","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=db29a9508a9246e77087c5531e45b2c88ec6988b"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0284.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0290.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0674.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3170"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:057"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/14/3"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/72061"},{"Source":"MLIST","Link":"http://www.spinics.net/lists/netfilter-devel/msg33430.html"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1182059"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b"}],"PublishedDate":"2015-03-02T06:59:02.66-05:00","LastModifiedDate":"2017-01-02T21:59:18.877-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8160","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9112","Nvd":{"Summary":"Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2014/Nov/74"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62145"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3111"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/23/2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/25/2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/26/20"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71248"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2456-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/98918"},{"Source":"MISC","Link":"https://savannah.gnu.org/bugs/?43709"}],"PublishedDate":"2014-12-02T11:59:05.76-05:00","LastModifiedDate":"2017-01-02T21:59:22.58-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9112","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"cpio","Version":"2.11-4+deb6u2","Release":"","NewVersion":"2.11+dfsg-0.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2014-9221","Nvd":{"Summary":"strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-19","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/62083"},{"Source":"CONFIRM","Link":"http://strongswan.org/blog/2015/01/05/strongswan-5.2.2-released.html"},{"Source":"CONFIRM","Link":"http://strongswan.org/blog/2015/01/05/strongswan-denial-of-service-vulnerability-%28cve-2014-9221%29.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3118"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71894"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2450-1"}],"PublishedDate":"2015-01-07T14:59:01.137-05:00","LastModifiedDate":"2017-01-02T21:59:23.003-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9221","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2015-1790","Nvd":{"Summary":"The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"NETBSD","Link":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1115.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1197.html"},{"Source":"CISCO","Link":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3287"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/75157"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032564"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2639-1"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa98"},{"Source":"CONFIRM","Link":"https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122"},{"Source":"CONFIRM","Link":"https://openssl.org/news/secadv/20150611.txt"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201506-02"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"},{"Source":"CONFIRM","Link":"https://www.openssl.org/news/secadv_20150611.txt"}],"PublishedDate":"2015-06-12T15:59:03.413-04:00","LastModifiedDate":"2017-08-08T21:29:02.407-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1790","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveDetail":{"CveID":"CVE-2015-1792","Nvd":{"Summary":"The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"NETBSD","Link":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1115.html"},{"Source":"CISCO","Link":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3287"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/75154"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032564"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2639-1"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa98"},{"Source":"CONFIRM","Link":"https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122"},{"Source":"CONFIRM","Link":"https://openssl.org/news/secadv/20150611.txt"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201506-02"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"},{"Source":"CONFIRM","Link":"https://www.openssl.org/news/secadv_20150611.txt"}],"PublishedDate":"2015-06-12T15:59:05.273-04:00","LastModifiedDate":"2017-08-08T21:29:02.593-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1792","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveDetail":{"CveID":"CVE-2015-4143","Nvd":{"Summary":"The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/09/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/31/6"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-06-15T11:59:07.913-04:00","LastModifiedDate":"2016-07-29T10:16:39.097-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4143","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2015-4144","Nvd":{"Summary":"The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/09/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/31/6"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-06-15T11:59:08.79-04:00","LastModifiedDate":"2016-07-29T11:38:43.883-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4144","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2015-4145","Nvd":{"Summary":"The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/09/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/31/6"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-06-15T11:59:09.727-04:00","LastModifiedDate":"2016-07-29T11:42:41.117-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4145","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2015-4146","Nvd":{"Summary":"The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-4/0005-EAP-pwd-peer-Fix-asymmetric-fragmentation-behavior.patch"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/09/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/31/6"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-06-15T11:59:10.617-04:00","LastModifiedDate":"2016-07-29T11:43:24.007-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4146","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2015-8023","Nvd":{"Summary":"The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00139.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3398"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/84947"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2811-1"},{"Source":"CONFIRM","Link":"https://www.strongswan.org/blog/2015/11/16/strongswan-vulnerability-%28cve-2015-8023%29.html"}],"PublishedDate":"2015-11-18T11:59:07.587-05:00","LastModifiedDate":"2016-12-07T13:25:57.667-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-8023","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2016-2569","Nvd":{"Summary":"Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/02/26/2"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035101"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_2.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v4/changesets/squid-4-14552.patch"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-02-27T00:59:03.843-05:00","LastModifiedDate":"2016-12-02T22:25:41.703-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2569","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-2570","Nvd":{"Summary":"The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/02/26/2"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035101"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_2.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13993.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v4/changesets/squid-4-14549.patch"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-02-27T00:59:04.797-05:00","LastModifiedDate":"2016-12-02T22:25:42.827-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2570","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-2571","Nvd":{"Summary":"http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3522"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/02/26/2"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035101"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_2.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2921-1"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-02-27T00:59:05.797-05:00","LastModifiedDate":"2016-12-02T22:25:43.813-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2571","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-3948","Nvd":{"Summary":"Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035458"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_4.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14016.patch"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-04-07T14:59:01.607-04:00","LastModifiedDate":"2016-11-28T15:14:20.087-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-3948","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-4476","Nvd":{"Summary":"hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \\n and \\r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/05/03/12"}],"PublishedDate":"2016-05-09T06:59:41.813-04:00","LastModifiedDate":"2016-05-10T11:20:22.01-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4476","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1"]},{"CveDetail":{"CveID":"CVE-2016-4555","Nvd":{"Summary":"client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://bugs.squid-cache.org/show_bug.cgi?id=4455"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3625"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/05/06/3"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/05/06/5"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035770"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_9.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2995-1"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1139"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1140"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-05-10T15:59:02.323-04:00","LastModifiedDate":"2016-11-29T22:07:00.083-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4555","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-4556","Nvd":{"Summary":"Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3625"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/05/06/3"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/05/06/5"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035770"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_9.txt"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2995-1"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1138"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1139"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1140"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-05-10T15:59:03.387-04:00","LastModifiedDate":"2016-11-29T22:07:01.273-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4556","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2016-6321","Nvd":{"Summary":"Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.","Score":5,"AccessVector":"NETWORK","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-22","References":[{"Source":"CONFIRM","Link":"http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d"},{"Source":"MLIST","Link":"http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html"},{"Source":"MISC","Link":"http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2016/Oct/102"},{"Source":"FULLDISC","Link":"http://seclists.org/fulldisclosure/2016/Oct/96"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3702"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/93937"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-3132-1"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201611-19"},{"Source":"MISC","Link":"https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt"}],"PublishedDate":"2016-12-09T17:59:00.17-05:00","LastModifiedDate":"2017-06-30T21:30:00.843-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-6321","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:tar:1.23"]},{"CveDetail":{"CveID":"CVE-2010-5321","Nvd":{"Summary":"Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/02/08/4"},{"Source":"MISC","Link":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827340"},{"Source":"MISC","Link":"https://bugzilla.kernel.org/show_bug.cgi?id=120571"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=620629"}],"PublishedDate":"2017-04-24T02:59:00.21-04:00","LastModifiedDate":"2017-05-04T14:37:50.247-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-5321","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2013-2944","Nvd":{"Summary":"strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.","Score":4.9,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"SINGLE_INSTANCE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-287","References":[{"Source":"MISC","Link":"http://download.strongswan.org/patches/10_openssl_ecdsa_signature_patch/strongswan-4.3.5-5.0.3_openssl_ecdsa_signature.patch"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-05/msg00014.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00121.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2665"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/59580"},{"Source":"CONFIRM","Link":"http://www.strongswan.org/blog/2013/04/30/strongswan-5.0.4-released-%28cve-2013-2944%29.html"}],"PublishedDate":"2013-05-02T10:55:05.43-04:00","LastModifiedDate":"2013-12-05T00:26:44.157-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-2944","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2014-1738","Nvd":{"Summary":"The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2145e15e0557a01b9195d1c7199a1b92cb9be81f"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-0771.html"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3043.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2926"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2928"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/05/09/2"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/67302"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030474"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1094299"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f"}],"PublishedDate":"2014-05-11T17:55:05.873-04:00","LastModifiedDate":"2017-01-06T21:59:43.72-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-1738","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3122","Nvd":{"Summary":"The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=57e68e9cd65b4b8eb4045a1e0d0746458502554c"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-2926"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.3"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/05/01/7"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/67162"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1093076"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/57e68e9cd65b4b8eb4045a1e0d0746458502554c"}],"PublishedDate":"2014-05-11T17:55:06.06-04:00","LastModifiedDate":"2014-07-17T01:06:44.197-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3122","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3144","Nvd":{"Summary":"The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05ab8f2647e4221cbdb3856dd7d32bd5407316b3"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3052.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59311"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60613"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/05/09/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/67309"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3"}],"PublishedDate":"2014-05-11T17:55:06.123-04:00","LastModifiedDate":"2017-01-06T21:59:53.677-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3144","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3145","Nvd":{"Summary":"The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=05ab8f2647e4221cbdb3856dd7d32bd5407316b3"},{"Source":"CONFIRM","Link":"http://linux.oracle.com/errata/ELSA-2014-3052.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59311"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60613"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/05/09/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/67321"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1038201"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2017-04-01"}],"PublishedDate":"2014-05-11T17:55:06.187-04:00","LastModifiedDate":"2017-07-10T21:33:21.157-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3145","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3610","Nvd":{"Summary":"The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=854e8bb1aa06c578c2c9145fa6bfe3680ef63b23"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0869.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/24/9"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70742"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2394-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2491-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1144883"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/854e8bb1aa06c578c2c9145fa6bfe3680ef63b23"}],"PublishedDate":"2014-11-10T06:55:06.33-05:00","LastModifiedDate":"2017-01-02T21:59:05.407-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3610","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3611","Nvd":{"Summary":"Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2febc839133280d5a5e8e1179c94ea674489dae2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0126.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0284.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0869.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/24/9"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2394-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2491-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1144878"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/2febc839133280d5a5e8e1179c94ea674489dae2"}],"PublishedDate":"2014-11-10T06:55:06.393-05:00","LastModifiedDate":"2017-01-02T21:59:05.53-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3611","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3690","Nvd":{"Summary":"arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d974baa398f34393db76be45f7d4d04fbdbb4a0a"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0290.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0782.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.2"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/21/4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/29/7"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70691"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2419-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2420-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2421-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1153322"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/d974baa398f34393db76be45f7d4d04fbdbb4a0a"}],"PublishedDate":"2014-11-10T06:55:07.783-05:00","LastModifiedDate":"2015-06-03T22:00:27.88-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3690","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4654","Nvd":{"Summary":"The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=82262a46627bebb0febcc26664746c25cef08563"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1083.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60545"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68162"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113445"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563"}],"PublishedDate":"2014-07-03T00:22:15.793-04:00","LastModifiedDate":"2017-01-06T22:00:22.46-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4654","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4655","Nvd":{"Summary":"The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=82262a46627bebb0febcc26664746c25cef08563"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1083.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60545"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68162"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1036763"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113445"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/82262a46627bebb0febcc26664746c25cef08563"}],"PublishedDate":"2014-07-03T00:22:15.937-04:00","LastModifiedDate":"2017-08-12T21:29:03.863-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4655","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4656","Nvd":{"Summary":"Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=883a1d49f0d77d30012f114b2e19fc141beb3e8e"},{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ac902c112d90a89e59916f751c2745f4dbdbb4bd"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1083.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0087.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60545"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/6"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1038201"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113470"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/ac902c112d90a89e59916f751c2745f4dbdbb4bd"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2017-04-01"}],"PublishedDate":"2014-07-03T00:22:15.997-04:00","LastModifiedDate":"2017-07-10T21:33:21.283-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4656","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7283","Nvd":{"Summary":"The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c88547a8119e3b581318ab65e9b72f27f23e641d"},{"Source":"MLIST","Link":"http://marc.info/?l=linux-xfs\u0026m=139590613002926\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1943.html"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/01/29"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70261"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1148777"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/c88547a8119e3b581318ab65e9b72f27f23e641d"}],"PublishedDate":"2014-10-13T06:55:08.013-04:00","LastModifiedDate":"2014-12-10T10:26:55.343-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7283","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7825","Nvd":{"Summary":"kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism via a crafted application.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=086ba77a6db00ed858ff07451bedee197df868c9"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1943.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0290.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/06/11"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70972"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/98557"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1161565"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/086ba77a6db00ed858ff07451bedee197df868c9"}],"PublishedDate":"2014-11-10T06:55:08.127-05:00","LastModifiedDate":"2017-01-06T22:00:30.867-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7825","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7842","Nvd":{"Summary":"Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2b9e6c1a35afcc0973acb72e591c714e78885ff"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2016-0855.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/13/7"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71078"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1163762"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/a2b9e6c1a35afcc0973acb72e591c714e78885ff"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.4"}],"PublishedDate":"2014-11-29T20:59:04.587-05:00","LastModifiedDate":"2017-01-02T21:59:12.987-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7842","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7970","Nvd":{"Summary":"The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/08/21"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70319"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030991"},{"Source":"MLIST","Link":"http://www.spinics.net/lists/linux-fsdevel/msg79153.html"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2419-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2420-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/96921"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1151095"},{"Source":"CONFIRM","Link":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0826019e529f21c84687521d03f60cd241ca7d"}],"PublishedDate":"2014-10-13T06:55:08.497-04:00","LastModifiedDate":"2016-06-16T09:34:53.79-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7970","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7975","Nvd":{"Summary":"The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5"},{"Source":"MLIST","Link":"http://thread.gmane.org/gmane.linux.kernel.stable/109312"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/08/22"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70314"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1031180"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2415-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2416-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2419-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2420-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2421-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/96994"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1151108"}],"PublishedDate":"2014-10-13T06:55:09.263-04:00","LastModifiedDate":"2017-01-06T22:00:31.977-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7975","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8086","Nvd":{"Summary":"Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0290.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0694.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/09/25"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70376"},{"Source":"MLIST","Link":"http://www.spinics.net/lists/linux-ext4/msg45683.html"},{"Source":"MLIST","Link":"http://www.spinics.net/lists/linux-ext4/msg45685.html"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/96922"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1151353"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/8/545"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/9/129"}],"PublishedDate":"2014-10-13T06:55:09.59-04:00","LastModifiedDate":"2016-12-07T22:06:14.25-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8086","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8559","Nvd":{"Summary":"The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-399","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1976.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1978.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3170"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/30/7"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70854"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1034051"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2492-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2493-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1159313"},{"Source":"CONFIRM","Link":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=946e51f2bf37f1656916eb75bd0742ba33983c28"},{"Source":"CONFIRM","Link":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca5358ef75fc69fee5322a38a340f5739d997c10"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/25/171"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/25/179"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/25/180"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/26/101"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/26/116"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/26/128"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/26/129"}],"PublishedDate":"2014-11-10T06:55:09.813-05:00","LastModifiedDate":"2017-01-02T21:59:20.207-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8559","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9090","Nvd":{"Summary":"The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.","Score":4.9,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-17","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6f442be2fb22be02cafa606f1769fa1e6f894441"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3093"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/26/5"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441"}],"PublishedDate":"2014-11-29T20:59:08.46-05:00","LastModifiedDate":"2015-06-03T22:01:09.847-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9090","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2010-3430","Nvd":{"Summary":"The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=843807a3a90f52e7538be756616510730a24739a"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/9"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/10/03/1"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/10/25/2"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/21/11"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/24/2"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=641361"}],"PublishedDate":"2011-01-24T13:00:01.907-05:00","LastModifiedDate":"2012-07-23T23:21:43.927-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-3430","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2010-3435","Nvd":{"Summary":"The (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) before 1.1.2 use root privileges during read access to files and directories that belong to arbitrary user accounts, which might allow local users to obtain sensitive information by leveraging this filesystem activity, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=06f882f30092a39a1db867c9744b2ca8d60e4ad6"},{"Source":"MLIST","Link":"http://lists.vmware.com/pipermail/security-announce/2011/000126.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/10/25/2"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:220"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/24/2"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2010-0819.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2010-0891.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/516909/100/0/threaded"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0004.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0606"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=641335"}],"PublishedDate":"2011-01-24T13:00:02.033-05:00","LastModifiedDate":"2012-07-23T23:21:44.8-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-3435","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2014-4171","Nvd":{"Summary":"mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"MLIST","Link":"http://marc.info/?l=linux-mm-commits\u0026m=140303745420549\u0026w=2"},{"Source":"CONFIRM","Link":"http://ozlabs.org/~akpm/mmots/broken-out/shmem-fix-faulting-into-a-hole-while-its-punched.patch"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1318.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0102.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/18/11"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68157"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030450"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1111180"}],"PublishedDate":"2014-06-23T07:21:20.403-04:00","LastModifiedDate":"2017-01-06T22:00:11.973-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4171","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4508","Nvd":{"Summary":"arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-189","References":[{"Source":"MLIST","Link":"http://article.gmane.org/gmane.linux.kernel/1726110"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2014/06/20/1"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/20/10"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68126"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61"}],"PublishedDate":"2014-06-23T07:21:20.687-04:00","LastModifiedDate":"2017-01-06T22:00:21.74-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4508","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-4652","Nvd":{"Summary":"Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"COMPLETE","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=07f4d9d74a04aa7c72c5dae0ef97565f28f17b92"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1083.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1272.html"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/60545"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/26/6"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/94412"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1113406"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/07f4d9d74a04aa7c72c5dae0ef97565f28f17b92"}],"PublishedDate":"2014-07-03T00:22:15.687-04:00","LastModifiedDate":"2017-01-06T22:00:22.227-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4652","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-0239","Nvd":{"Summary":"The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3747379accba8e95d70cec0eae0582c8c182050"},{"Source":"MLIST","Link":"http://permalink.gmane.org/gmane.linux.kernel.commits.head/502245"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1272.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3170"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/27/6"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/72842"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1186448"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/f3747379accba8e95d70cec0eae0582c8c182050"}],"PublishedDate":"2015-03-02T06:59:04.693-05:00","LastModifiedDate":"2016-12-23T21:59:04.663-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-0239","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-8551","Nvd":{"Summary":"The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"","Score":4.7,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"COMPLETE","Cpes":[],"CweID":"","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/79546"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1034480"},{"Source":"CONFIRM","Link":"http://xenbits.xen.org/xsa/advisory-157.html"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201604-03"}],"PublishedDate":"2016-04-13T11:59:05.257-04:00","LastModifiedDate":"2017-06-30T21:29:26.357-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-8551","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2011-3148","Nvd":{"Summary":"Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=caf5e7f61c8d9288daa49b4f61962e6b1239121d"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1237-1"},{"Source":"CONFIRM","Link":"https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874469"}],"PublishedDate":"2012-07-22T13:55:01.057-04:00","LastModifiedDate":"2014-03-05T23:31:35.943-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-3148","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-4099","Nvd":{"Summary":"The capsh program in libcap before 2.22 does not change the current working directory when the --chroot option is specified, which allows local users to bypass the chroot restrictions via unspecified vectors.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2011-1694.html"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=722694"},{"Source":"CONFIRM","Link":"https://sites.google.com/site/fullycapable/release-notes-for-libcap/releasenotesfor222"}],"PublishedDate":"2014-02-07T19:55:05.863-05:00","LastModifiedDate":"2014-02-10T10:09:31.333-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-4099","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:libcap:libcap:2.19"]},{"CveDetail":{"CveID":"CVE-2011-4578","Nvd":{"Summary":"event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:138"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2011/12/06/3"},{"Source":"CONFIRM","Link":"https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=760984"}],"PublishedDate":"2012-08-29T18:55:01.237-04:00","LastModifiedDate":"2013-04-04T23:06:21.327-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-4578","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:tedfelix:acpid2:2.0.7"]},{"CveDetail":{"CveID":"CVE-2012-0064","Nvd":{"Summary":"xkeyboard-config before 2.5 in X.Org before 7.6 enables certain XKB debugging functions by default, which allows physically proximate attackers to bypass an X screen lock via keyboard combinations that break the input grab.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://gu1.aeroxteam.fr/2012/01/19/bypass-screensaver-locker-program-xorg-111-and-up/"},{"Source":"MLIST","Link":"http://lists.x.org/archives/xorg-announce/2012-January/001797.html"},{"Source":"MLIST","Link":"http://lists.x.org/archives/xorg-devel/2012-January/028691.html"},{"Source":"SECTRACK","Link":"http://securitytracker.com/id?1026549"},{"Source":"MISC","Link":"http://who-t.blogspot.com/2012/01/xkb-breaking-grabs-cve-2012-0064.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2012/01/19/6"},{"Source":"CONFIRM","Link":"http://www.x.org/wiki/Development/Security/"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=783039"}],"PublishedDate":"2014-02-10T18:55:04.777-05:00","LastModifiedDate":"2014-02-11T14:56:51.093-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-0064","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"xkb-data","Version":"1.8-2","Release":"","NewVersion":"2.5.1-3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2014-4157","Nvd":{"Summary":"arch/mips/include/asm/thread_info.h in the Linux kernel before 3.14.8 on the MIPS platform does not configure _TIF_SECCOMP checks on the fast system-call path, which allows local users to bypass intended PR_SET_SECCOMP restrictions by executing a crafted application without invoking a trace or audit subsystem.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=137f7df8cead00688524c82360930845396b8a21"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2014/06/16/1"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/17/17"},{"Source":"CONFIRM","Link":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751417"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/137f7df8cead00688524c82360930845396b8a21"}],"PublishedDate":"2014-06-23T07:21:19.217-04:00","LastModifiedDate":"2014-06-25T14:10:21.323-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4157","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-7826","Nvd":{"Summary":"kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=086ba77a6db00ed858ff07451bedee197df868c9"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-1943.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0290.html"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/06/11"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70971"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/98556"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1161565"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/086ba77a6db00ed858ff07451bedee197df868c9"}],"PublishedDate":"2014-11-10T06:55:08.173-05:00","LastModifiedDate":"2017-01-06T22:00:30.977-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-7826","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8369","Nvd":{"Summary":"The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges. NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3d32e4dbe71374a6780eaf51d719d76f9a9bf22f"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0674.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3093"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/24/7"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70747"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70749"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1156518"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/3d32e4dbe71374a6780eaf51d719d76f9a9bf22f"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2014/10/24/460"}],"PublishedDate":"2014-11-10T06:55:08.737-05:00","LastModifiedDate":"2015-06-03T22:01:02.237-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8369","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8989","Nvd":{"Summary":"The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a \"negative groups\" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html"},{"Source":"CONFIRM","Link":"http://thread.gmane.org/gmane.linux.man/7385/"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/11/20/4"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71154"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"}],"PublishedDate":"2014-11-29T20:59:07.57-05:00","LastModifiedDate":"2017-01-02T21:59:22.313-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8989","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-5706","Nvd":{"Summary":"Use-after-free vulnerability in the path_openat function in fs/namei.c in the Linux kernel 3.x and 4.x before 4.0.4 allows local users to cause a denial of service or possibly have unspecified other impact via O_TMPFILE filesystem operations that leverage a duplicate cleanup operation.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f15133df088ecadd141ea1907f2c96df67c729f0"},{"Source":"MISC","Link":"http://twitter.com/grsecurity/statuses/597127122910490624"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3329"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/08/01/5"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/76142"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2680-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2681-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1250047"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/f15133df088ecadd141ea1907f2c96df67c729f0"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2017-01-01.html"}],"PublishedDate":"2015-08-31T06:59:16.08-04:00","LastModifiedDate":"2017-01-06T22:00:33.32-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-5706","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-5707","Nvd":{"Summary":"Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-189","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81"},{"Source":"CONFIRM","Link":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3329"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/08/01/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/76145"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2733-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2734-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2737-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2738-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2750-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2759-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2760-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1250030"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2017-07-01"}],"PublishedDate":"2015-10-19T06:59:05.037-04:00","LastModifiedDate":"2017-07-12T21:29:00.45-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-5707","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2854","Nvd":{"Summary":"The aufs module for the Linux kernel 3.x and 4.x does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/02/24/9"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/96838"},{"Source":"MLIST","Link":"https://sourceforge.net/p/aufs/mailman/message/34864744/"}],"PublishedDate":"2016-05-02T06:59:34.533-04:00","LastModifiedDate":"2017-03-14T21:59:00.493-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2854","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-5870","Nvd":{"Summary":"The msm_ipc_router_close function in net/ipc_router/ipc_router_socket.c in the ipc_router component for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact by triggering failure of an accept system call for an AF_MSM_IPC socket.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-476","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/97414"},{"Source":"CONFIRM","Link":"https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=71fe5361cbef34e2d606b79e8936a910a3e95566"},{"Source":"CONFIRM","Link":"https://www.codeaurora.org/null-pointer-dereference-when-processing-accept-system-call-user-process-afmsmipc-sockets-cve-2016"}],"PublishedDate":"2017-04-04T14:59:00.203-04:00","LastModifiedDate":"2017-04-11T15:01:05.53-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-5870","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-7079","Nvd":{"Summary":"The graphic acceleration functions in VMware Tools 9.x and 10.x before 10.0.9 on OS X allow local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2016-7080.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-476","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/92938"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1036804"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2016-0014.html"}],"PublishedDate":"2016-12-29T04:59:00.273-05:00","LastModifiedDate":"2017-07-29T21:29:18.193-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-7079","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:vmware:tools:9.4.0"]},{"CveDetail":{"CveID":"CVE-2016-7080","Nvd":{"Summary":"The graphic acceleration functions in VMware Tools 9.x and 10.x before 10.0.9 on OS X allow local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2016-7079.","Score":4.6,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-476","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/92938"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1036804"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2016-0014.html"}],"PublishedDate":"2016-12-29T04:59:00.307-05:00","LastModifiedDate":"2017-07-29T21:29:18.257-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-7080","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:vmware:tools:9.4.0"]},{"CveDetail":{"CveID":"CVE-2011-0010","Nvd":{"Summary":"check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/01/11/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/01/12/1"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/01/12/3"},{"Source":"SLACKWARE","Link":"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593654"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0599.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/45774"},{"Source":"MISC","Link":"http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/fe8a94f96542"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/sudo/alerts/runas_group_pw.html"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1046-1"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0089"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0182"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0195"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0199"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0212"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0362"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=668879"},{"Source":"XF","Link":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64636"}],"PublishedDate":"2011-01-18T13:03:08.267-05:00","LastModifiedDate":"2017-08-16T21:33:22.68-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-0010","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2011-2777","Nvd":{"Summary":"samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and earlier uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a DBUS_SESSION_BUS_ADDRESS environment variable containing commands.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821"}],"PublishedDate":"2012-08-29T18:55:01.16-04:00","LastModifiedDate":"2012-12-20T00:00:00-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-2777","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:tedfelix:acpid2:2.0.7"]},{"CveDetail":{"CveID":"CVE-2013-1776","Nvd":{"Summary":"sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1353.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2642"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/02/27/31"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/58207"},{"Source":"SLACKWARE","Link":"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.517440"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/632f8e028191"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/6b22be4d09f0"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/sudo/alerts/tty_tickets.html"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/82453"},{"Source":"MISC","Link":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=916365"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"}],"PublishedDate":"2013-04-08T13:55:01.1-04:00","LastModifiedDate":"2016-09-08T21:59:26.01-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-1776","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2013-2776","Nvd":{"Summary":"sudo 1.3.5 through 1.7.10p5 and 1.8.0 through 1.8.6p6, when running on systems without /proc or the sysctl function with the tty_tickets option enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1353.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1701.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2642"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/02/27/31"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/58207"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/62741"},{"Source":"SLACKWARE","Link":"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.517440"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/049a12a5cc14"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/sudo/alerts/tty_tickets.html"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/82453"},{"Source":"MISC","Link":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=916365"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"}],"PublishedDate":"2013-04-08T13:55:01.127-04:00","LastModifiedDate":"2016-11-28T14:09:13.467-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-2776","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2013-2777","Nvd":{"Summary":"sudo before 1.7.10p5 and 1.8.x before 1.8.6p6, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to a session without a controlling terminal device and connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1701.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2642"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/02/27/31"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/58207"},{"Source":"SLACKWARE","Link":"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.517440"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/repos/sudo/rev/bfa23f089bba"},{"Source":"CONFIRM","Link":"http://www.sudo.ws/sudo/alerts/tty_tickets.html"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/82453"},{"Source":"MISC","Link":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=916365"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"}],"PublishedDate":"2013-04-08T13:55:01.153-04:00","LastModifiedDate":"2016-03-30T17:54:18.57-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-2777","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:todd_miller:sudo:1.7.4p4"]},{"CveDetail":{"CveID":"CVE-2015-7312","Nvd":{"Summary":"Multiple race conditions in the Advanced Union Filesystem (aufs) aufs3-mmap.patch and aufs4-mmap.patch patches for the Linux kernel 3.x and 4.x allow local users to cause a denial of service (use-after-free and BUG) or possibly gain privileges via a (1) madvise or (2) msync system call, related to mm/madvise.c and mm/msync.c.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-362","References":[{"Source":"MLIST","Link":"http://sourceforge.net/p/aufs/mailman/message/34449209/"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/09/22/10"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2777-1"}],"PublishedDate":"2015-11-16T06:59:09.527-05:00","LastModifiedDate":"2016-12-07T13:23:53.477-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-7312","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-2853","Nvd":{"Summary":"The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.","Score":4.4,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-284","References":[{"Source":"MISC","Link":"http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/02/24/9"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/96839"},{"Source":"MLIST","Link":"https://sourceforge.net/p/aufs/mailman/message/34864744/"}],"PublishedDate":"2016-05-02T06:59:33.16-04:00","LastModifiedDate":"2017-03-14T21:59:00.383-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2853","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2013-4332","Nvd":{"Summary":"Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-189","References":[{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1411.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2013/09/12/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/62324"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1991-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4332"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=15855"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=15856"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=15857"}],"PublishedDate":"2013-10-09T18:55:02.667-04:00","LastModifiedDate":"2017-06-30T21:29:04.28-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4332","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2015-1788","Nvd":{"Summary":"The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery"},{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"NETBSD","Link":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"},{"Source":"CISCO","Link":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl"},{"Source":"CONFIRM","Link":"http://www-304.ibm.com/support/docview.wss?uid=swg21960041"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3287"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/75158"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032564"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2639-1"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa98"},{"Source":"CONFIRM","Link":"https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122"},{"Source":"CONFIRM","Link":"https://openssl.org/news/secadv/20150611.txt"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201506-02"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"},{"Source":"CONFIRM","Link":"https://www.openssl.org/news/secadv_20150611.txt"}],"PublishedDate":"2015-06-12T15:59:01.6-04:00","LastModifiedDate":"2017-08-08T21:29:02.203-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1788","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveDetail":{"CveID":"CVE-2015-1789","Nvd":{"Summary":"The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"NETBSD","Link":"http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10733"},{"Source":"APPLE","Link":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143654156615516\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=143880121627664\u0026w=2"},{"Source":"HP","Link":"http://marc.info/?l=bugtraq\u0026m=144050155601375\u0026w=2"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1115.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1197.html"},{"Source":"CISCO","Link":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3287"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/75156"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032564"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2639-1"},{"Source":"CONFIRM","Link":"https://bto.bluecoat.com/security-advisory/sa98"},{"Source":"CONFIRM","Link":"https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351"},{"Source":"CONFIRM","Link":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965"},{"Source":"CONFIRM","Link":"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10122"},{"Source":"CONFIRM","Link":"https://openssl.org/news/secadv/20150611.txt"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201506-02"},{"Source":"CONFIRM","Link":"https://support.apple.com/kb/HT205031"},{"Source":"CONFIRM","Link":"https://www.openssl.org/news/secadv_20150611.txt"}],"PublishedDate":"2015-06-12T15:59:02.507-04:00","LastModifiedDate":"2017-08-08T21:29:02.31-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1789","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:openssl:openssl:0.9.8zf"]},{"CveDetail":{"CveID":"CVE-2015-3310","Nvd":{"Summary":"Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://advisories.mageia.org/MGASA-2015-0173.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00147.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3228"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:222"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/74163"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2595-1"},{"Source":"CONFIRM","Link":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201701-50"}],"PublishedDate":"2015-04-24T10:59:11.86-04:00","LastModifiedDate":"2017-06-30T21:29:16.187-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-3310","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"ppp","Version":"2.4.5-4+deb6u1","Release":"","NewVersion":"2.4.5-5.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2015-4141","Nvd":{"Summary":"The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/09/4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/31/6"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-06-15T11:59:05.367-04:00","LastModifiedDate":"2016-08-16T16:35:46.643-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4141","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2015-4142","Nvd":{"Summary":"Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172608.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172655.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1090.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1439.html"},{"Source":"CONFIRM","Link":"http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/09/5"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/31/6"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032625"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201606-17"}],"PublishedDate":"2015-06-15T11:59:06.85-04:00","LastModifiedDate":"2016-12-07T13:11:53.073-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4142","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:w1.fi:hostapd:1.1","cpe:/a:w1.fi:wpa_supplicant:1.1"]},{"CveDetail":{"CveID":"CVE-2016-2037","Nvd":{"Summary":"The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3483"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/01/19/4"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/01/22/4"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/82293"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035067"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2906-1"}],"PublishedDate":"2016-02-22T10:59:00.127-05:00","LastModifiedDate":"2016-12-05T22:07:59.807-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-2037","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"cpio","Version":"2.11-4+deb6u2","Release":"","NewVersion":"2.11+dfsg-0.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2016-4053","Nvd":{"Summary":"Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.","Score":4.3,"AccessVector":"NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-119","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2016/dsa-3625"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2016/04/20/9"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/86788"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/91787"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1035647"},{"Source":"CONFIRM","Link":"http://www.squid-cache.org/Advisories/SQUID-2016_6.txt"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2995-1"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1138"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1139"},{"Source":"REDHAT","Link":"https://access.redhat.com/errata/RHSA-2016:1140"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201607-01"}],"PublishedDate":"2016-04-25T10:59:04.533-04:00","LastModifiedDate":"2016-11-29T22:06:04.293-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-4053","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:squid-cache:squid:3.1.6"]},{"CveDetail":{"CveID":"CVE-2011-1658","Nvd":{"Summary":"ld.so in the GNU C Library (aka glibc or libc6) 2.13 and earlier expands the $ORIGIN dynamic string token when RPATH is composed entirely of this token, which might allow local users to gain privileges by creating a hard link in an arbitrary directory to a (1) setuid or (2) setgid program with this RPATH value, and then executing the program with a crafted value for the LD_PRELOAD environment variable, a different vulnerability than CVE-2010-3847 and CVE-2011-0536. NOTE: it is not expected that any standard operating-system distribution would ship an applicable setuid or setgid program.","Score":3.7,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=12393"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=667974"},{"Source":"XF","Link":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66820"}],"PublishedDate":"2011-04-08T11:17:28.493-04:00","LastModifiedDate":"2017-08-16T21:34:17.9-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1658","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2010-3316","Nvd":{"Summary":"The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.","Score":3.3,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=06f882f30092a39a1db867c9744b2ca8d60e4ad6"},{"Source":"MLIST","Link":"http://lists.vmware.com/pipermail/security-announce/2011/000126.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/08/16/2"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/10/25/2"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:220"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/24/2"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2010-0819.html"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2010-0891.html"},{"Source":"BUGTRAQ","Link":"http://www.securityfocus.com/archive/1/archive/1/516909/100/0/threaded"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2011-0004.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0606"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=637898"},{"Source":"MISC","Link":"https://sourceforge.net/tracker/?func=detail\u0026aid=3028213\u0026group_id=6663\u0026atid=106663"}],"PublishedDate":"2011-01-24T13:00:01.847-05:00","LastModifiedDate":"2012-07-23T23:21:28.287-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-3316","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-1089","Nvd":{"Summary":"The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.","Score":3.3,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-16","References":[{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"Source":"MISC","Link":"http://sourceware.org/bugzilla/show_bug.cgi?id=12625"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-1526.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/46740"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=688980"}],"PublishedDate":"2011-04-09T22:55:01.367-04:00","LastModifiedDate":"2016-12-07T13:15:43.747-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1089","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2012-1820","Nvd":{"Summary":"The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message.","Score":2.9,"AccessVector":"ADJACENT_NETWORK","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"","References":[{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2012-1259.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2012/dsa-2497"},{"Source":"CERT-VN","Link":"http://www.kb.cert.org/vuls/id/962587"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/53775"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1605-1"}],"PublishedDate":"2012-06-13T11:55:01.057-04:00","LastModifiedDate":"2013-03-01T23:40:49.207-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2012-1820","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:quagga:quagga:0.99.20.1"]},{"CveDetail":{"CveID":"CVE-2013-2207","Nvd":{"Summary":"pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.","Score":2.6,"AccessVector":"LOCAL","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2985-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2985-2"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=976408"},{"Source":"GENTOO","Link":"https://security.gentoo.org/glsa/201503-04"},{"Source":"CONFIRM","Link":"https://sourceware.org/bugzilla/show_bug.cgi?id=15755"},{"Source":"MLIST","Link":"https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html"}],"PublishedDate":"2013-10-09T18:55:02.633-04:00","LastModifiedDate":"2017-06-30T21:29:04.093-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-2207","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnu:glibc:2.11.3"]},{"CveDetail":{"CveID":"CVE-2015-4171","Nvd":{"Summary":"strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.","Score":2.6,"AccessVector":"NETWORK","AccessComplexity":"HIGH","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-200","References":[{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3282"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/29/6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/05/29/7"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/06/08/4"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/74933"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1032514"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2628-1"},{"Source":"CONFIRM","Link":"https://play.google.com/store/apps/details?id=org.strongswan.android"},{"Source":"CONFIRM","Link":"https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-%2528cve-2015-4171%2529.html"}],"PublishedDate":"2015-06-10T14:59:09.097-04:00","LastModifiedDate":"2016-11-28T14:27:35.23-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-4171","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:strongswan:strongswan:4.5.2"]},{"CveDetail":{"CveID":"CVE-2014-4027","Nvd":{"Summary":"The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.","Score":2.3,"AccessVector":"ADJACENT_NETWORK","AccessComplexity":"MEDIUM","Authentication":"SINGLE_INSTANCE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"MLIST","Link":"http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59134"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/11/1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2334-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2335-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1108744"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc"},{"Source":"CONFIRM","Link":"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html"}],"PublishedDate":"2014-06-23T07:21:18.7-04:00","LastModifiedDate":"2017-01-06T22:00:07.723-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-4027","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2011-3149","Nvd":{"Summary":"The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-119","References":[{"Source":"CONFIRM","Link":"http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=109823cb621c900c07c4b6cdc99070d354d19444"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1237-1"},{"Source":"CONFIRM","Link":"https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565"}],"PublishedDate":"2012-07-22T13:55:01.103-04:00","LastModifiedDate":"2014-03-05T23:31:36.02-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-3149","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2013-4576","Nvd":{"Summary":"GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-255","References":[{"Source":"MLIST","Link":"http://lists.gnupg.org/pipermail/gnupg-devel/2013-December/028102.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2014-0016.html"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2013/q4/520"},{"Source":"MLIST","Link":"http://seclists.org/oss-sec/2013/q4/523"},{"Source":"MISC","Link":"http://www.cs.tau.ac.il/~tromer/acoustic/"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2821"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/64424"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1029513"},{"Source":"MISC","Link":"http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2059-1"},{"Source":"XF","Link":"http://xforce.iss.net/xforce/xfdb/89846"}],"PublishedDate":"2013-12-20T16:55:06.93-05:00","LastModifiedDate":"2014-01-23T23:35:45.603-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4576","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveDetail":{"CveID":"CVE-2013-7421","Nvd":{"Summary":"The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5d26a105b5a73e5635eae0629b42fa0a90e07b7b"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3170"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:057"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/24/4"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/72322"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2543-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2544-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2545-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2546-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1185469"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/5d26a105b5a73e5635eae0629b42fa0a90e07b7b"},{"Source":"MLIST","Link":"https://lkml.org/lkml/2013/3/4/70"},{"Source":"MISC","Link":"https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu"}],"PublishedDate":"2015-03-02T06:59:00.053-05:00","LastModifiedDate":"2016-10-14T21:59:23.153-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-7421","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-0206","Nvd":{"Summary":"Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=edfbbf388f293d70bf4b7c0bc38774d05e6f711a"},{"Source":"SECUNIA","Link":"http://secunia.com/advisories/59278"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68176"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1030479"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1038201"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1094602"},{"Source":"CONFIRM","Link":"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edfbbf388f29"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/edfbbf388f293d70bf4b7c0bc38774d05e6f711a"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2017-04-01"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.46"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.24"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.10"},{"Source":"CONFIRM","Link":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.3"}],"PublishedDate":"2014-06-25T07:19:21.387-04:00","LastModifiedDate":"2017-07-10T21:33:20.83-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-0206","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3646","Nvd":{"Summary":"arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a642fc305053cc1c6e47e4f4df327895747ab485"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0126.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-0284.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/24/9"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2394-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1144825"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/a642fc305053cc1c6e47e4f4df327895747ab485"}],"PublishedDate":"2014-11-10T06:55:06.487-05:00","LastModifiedDate":"2015-03-25T21:59:40.113-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3646","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-3647","Nvd":{"Summary":"arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=234f3ce485d54017f15cf5e0699cff4100121601"},{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d1442d85cc30ea75f7d399474ca738e0bc96f715"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2014/dsa-3060"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/10/24/9"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/70748"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2394-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2417-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2418-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1144897"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/234f3ce485d54017f15cf5e0699cff4100121601"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/d1442d85cc30ea75f7d399474ca738e0bc96f715"}],"PublishedDate":"2014-11-10T06:55:06.533-05:00","LastModifiedDate":"2016-10-14T21:59:48.203-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-3647","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8133","Nvd":{"Summary":"arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=41bdc78544b8a93a9c6814b8bbbfef966272abbe"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1272.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3128"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/12/15/6"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71684"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2490-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2491-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2492-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2493-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1172797"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/41bdc78544b8a93a9c6814b8bbbfef966272abbe"}],"PublishedDate":"2014-12-17T06:59:00.07-05:00","LastModifiedDate":"2016-12-23T21:59:03.227-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8133","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-8134","Nvd":{"Summary":"The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"CONFIRM","Link":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-8134.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2016-0855.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71650"},{"Source":"MLIST","Link":"http://www.spinics.net/lists/kvm/msg111458.html"},{"Source":"CONFIRM","Link":"https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400314"},{"Source":"CONFIRM","Link":"https://bugzilla.novell.com/show_bug.cgi?id=909078"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1172765"}],"PublishedDate":"2014-12-12T13:59:03.317-05:00","LastModifiedDate":"2017-01-02T21:59:18.44-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-8134","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9584","Nvd":{"Summary":"The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-20","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4e2024624e678f0ebb916e6192bd23c1f9fdf696"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3128"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/09/4"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71883"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2511-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2512-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1180119"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/4e2024624e678f0ebb916e6192bd23c1f9fdf696"}],"PublishedDate":"2015-01-09T16:59:01.533-05:00","LastModifiedDate":"2017-01-02T21:59:25.157-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9584","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9585","Nvd":{"Summary":"The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MISC","Link":"http://git.kernel.org/?p=linux/kernel/git/luto/linux.git;a=commit;h=bc3b94c31d65e761ddfe150d02932c65971b74e2"},{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/tip/tip.git;a=commit;h=fbe1bf140671619508dfa575d74a185ae53c5dbb"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148480.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1778.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2015-1787.html"},{"Source":"MISC","Link":"http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3170"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/12/09/10"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/09/8"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/71990"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2515-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2516-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2517-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2518-1"}],"PublishedDate":"2015-01-09T16:59:02.72-05:00","LastModifiedDate":"2017-01-02T21:59:25.393-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9585","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2014-9644","Nvd":{"Summary":"The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-2013-7421.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"PARTIAL","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-264","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4943ba16bbc2db05115707b3ff7b4874e9e3c560"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2015/dsa-3170"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:057"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:058"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/24/4"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/72320"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2513-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2514-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2543-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2544-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2545-1"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-2546-1"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1190546"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/4943ba16bbc2db05115707b3ff7b4874e9e3c560"},{"Source":"MISC","Link":"https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu"}],"PublishedDate":"2015-03-02T06:59:03.66-05:00","LastModifiedDate":"2016-10-14T22:00:23.82-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-9644","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-1350","Nvd":{"Summary":"The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-264","References":[{"Source":"MLIST","Link":"http://marc.info/?l=linux-kernel\u0026m=142153722930533\u0026w=2"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2015/01/24/5"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/76075"},{"Source":"MISC","Link":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1185139"}],"PublishedDate":"2016-05-02T06:59:07.857-04:00","LastModifiedDate":"2017-02-01T21:59:00.337-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-1350","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2015-2877","Nvd":{"Summary":"** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states \"Basically if you care about this attack vector, disable deduplication.\" Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-200","References":[{"Source":"MISC","Link":"http://www.antoniobarresi.com/files/cain_advisory.txt"},{"Source":"CERT-VN","Link":"http://www.kb.cert.org/vuls/id/935424"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/76256"},{"Source":"MISC","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1252096"},{"Source":"MISC","Link":"https://www.kb.cert.org/vuls/id/BGAR-A2CNKG"},{"Source":"MISC","Link":"https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH"},{"Source":"MISC","Link":"https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf"}],"PublishedDate":"2017-03-03T06:59:00.147-05:00","LastModifiedDate":"2017-03-16T11:19:38.293-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2015-2877","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]},{"CveDetail":{"CveID":"CVE-2016-5328","Nvd":{"Summary":"VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.","Score":2.1,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-200","References":[{"Source":"BID","Link":"http://www.securityfocus.com/bid/93886"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1037102"},{"Source":"CONFIRM","Link":"http://www.vmware.com/security/advisories/VMSA-2016-0017.html"}],"PublishedDate":"2016-12-29T04:59:00.18-05:00","LastModifiedDate":"2017-07-28T21:34:09.35-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2016-5328","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:vmware:tools:9.4.0"]},{"CveDetail":{"CveID":"CVE-2010-3431","Nvd":{"Summary":"The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.","Score":1.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"","References":[{"Source":"CONFIRM","Link":"http://git.altlinux.org/people/ldv/packages/?p=pam.git;a=commit;h=843807a3a90f52e7538be756616510730a24739a"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/21/9"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/10"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/09/27/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/10/03/1"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2010/10/25/2"},{"Source":"GENTOO","Link":"http://security.gentoo.org/glsa/glsa-201206-31.xml"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/21/11"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2010/09/24/2"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=641361"}],"PublishedDate":"2011-01-24T13:00:01.97-05:00","LastModifiedDate":"2012-07-23T23:21:44.097-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2010-3431","Confidence":{"Score":50,"DetectionMethod":"ChangelogLenientMatch"},"Packages":[{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-1098","Nvd":{"Summary":"Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.","Score":1.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-362","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/16"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/17"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/18"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/19"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/22"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/24"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/25"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/26"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/27"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/28"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/29"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/30"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/31"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/32"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/33"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/11"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/08/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/2"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/11/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/11/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/14/26"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/23/11"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:065"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0407.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0791"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0872"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0961"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=680798"}],"PublishedDate":"2011-03-30T18:55:02.253-04:00","LastModifiedDate":"2011-04-20T22:33:25-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1098","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2011-1155","Nvd":{"Summary":"The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \\n (newline) or (2) \\ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.","Score":1.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"NONE","IntegrityImpact":"NONE","AvailabilityImpact":"PARTIAL","Cpes":[],"CweID":"CWE-399","References":[{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057845.html"},{"Source":"FEDORA","Link":"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056992.html"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/16"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/17"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/18"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/19"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/22"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/24"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/25"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/26"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/27"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/28"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/29"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/30"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/31"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/32"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/04/33"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/05/8"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/4"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/06/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/11"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/07/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/08/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/2"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/6"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/10/7"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/11/3"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/11/5"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/14/26"},{"Source":"MLIST","Link":"http://openwall.com/lists/oss-security/2011/03/23/11"},{"Source":"MANDRIVA","Link":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:065"},{"Source":"REDHAT","Link":"http://www.redhat.com/support/errata/RHSA-2011-0407.html"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0791"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0872"},{"Source":"VUPEN","Link":"http://www.vupen.com/english/advisories/2011/0961"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=680797"}],"PublishedDate":"2011-03-30T18:55:02.44-04:00","LastModifiedDate":"2011-04-20T22:33:30.187-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2011-1155","Confidence":{"Score":95,"DetectionMethod":"ChangelogExactMatch"},"Packages":[{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"DistroAdvisories":[],"CpeNames":[]},{"CveDetail":{"CveID":"CVE-2013-4242","Nvd":{"Summary":"GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.","Score":1.9,"AccessVector":"LOCAL","AccessComplexity":"MEDIUM","Authentication":"NONE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-200","References":[{"Source":"MISC","Link":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880"},{"Source":"MISC","Link":"http://eprint.iacr.org/2013/448"},{"Source":"CONFIRM","Link":"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"},{"Source":"MLIST","Link":"http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-updates/2013-08/msg00003.html"},{"Source":"REDHAT","Link":"http://rhn.redhat.com/errata/RHSA-2013-1457.html"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2730"},{"Source":"DEBIAN","Link":"http://www.debian.org/security/2013/dsa-2731"},{"Source":"CERT-VN","Link":"http://www.kb.cert.org/vuls/id/976534"},{"Source":"CONFIRM","Link":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/61464"},{"Source":"UBUNTU","Link":"http://www.ubuntu.com/usn/USN-1923-1"}],"PublishedDate":"2013-08-19T19:55:09.01-04:00","LastModifiedDate":"2016-12-07T22:03:31.117-05:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2013-4242","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/a:gnupg:gnupg:1.4.10"]},{"CveDetail":{"CveID":"CVE-2014-1739","Nvd":{"Summary":"The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.","Score":1.7,"AccessVector":"LOCAL","AccessComplexity":"LOW","Authentication":"SINGLE_INSTANCE","ConfidentialityImpact":"PARTIAL","IntegrityImpact":"NONE","AvailabilityImpact":"NONE","Cpes":[],"CweID":"CWE-200","References":[{"Source":"CONFIRM","Link":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e6a623460e5fc960ac3ee9f946d3106233fd28d8"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html"},{"Source":"SUSE","Link":"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html"},{"Source":"MISC","Link":"http://speirofr.appspot.com/cve-2014-1739-kernel-infoleak-vulnerability-in-media_enum_entities.html"},{"Source":"CONFIRM","Link":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.6"},{"Source":"MLIST","Link":"http://www.openwall.com/lists/oss-security/2014/06/15/1"},{"Source":"BID","Link":"http://www.securityfocus.com/bid/68048"},{"Source":"SECTRACK","Link":"http://www.securitytracker.com/id/1038201"},{"Source":"CONFIRM","Link":"https://bugzilla.redhat.com/show_bug.cgi?id=1109774"},{"Source":"CONFIRM","Link":"https://github.com/torvalds/linux/commit/e6a623460e5fc960ac3ee9f946d3106233fd28d8"},{"Source":"CONFIRM","Link":"https://source.android.com/security/bulletin/2017-04-01"}],"PublishedDate":"2014-06-23T07:21:17.73-04:00","LastModifiedDate":"2017-07-10T21:33:20.94-04:00"},"Jvn":{"Title":"","Summary":"","JvnLink":"","JvnID":"","Score":0,"Severity":"","Vector":"","References":[],"Cpes":[],"PublishedDate":"0001-01-01T00:00:00Z","LastModifiedDate":"0001-01-01T00:00:00Z"}},"CveID":"CVE-2014-1739","Confidence":{"Score":100,"DetectionMethod":"CpeNameMatch"},"Packages":[],"DistroAdvisories":[],"CpeNames":["cpe:/o:linux:linux_kernel:3.13.11"]}],"UnknownCves":[],"IgnoredCves":[],"Packages":[{"Name":"acpi-support-base","Version":"0.137-5+deb6u2","Release":"","NewVersion":"0.140-5+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of acpi-support-base\nacpi-support (0.140-5+deb7u3) wheezy-security; urgency=high\n\n * SECURITY UPDATE: unquoted variables that are computed from user processes\n - quote variables in policy-funcs, power-funcs, screenblank,\n rotatescreen.sh, lid.sh\n - CVE-2014-0484\n * Make sure display is locked before suspending by not putting the screen\n savers/lockers into background, except xtrlock which blocks.\n (Closes: #593303, #700696)\n\n -- Michael Meskes \[email protected]\u003e Sat, 30 Aug 2014 01:54:21 +0200\n\nacpi-support (0.140-5+deb7u2) wheezy-security; urgency=high\n\n * Only check for gnome-settings- insted of gnome-settings-daemon because\n /proc/\u003cpid\u003e/stat only lists the first 15 characters\n\n -- Michael Meskes \[email protected]\u003e Sat, 09 Aug 2014 11:17:03 +0200\n\nacpi-support (0.140-5+deb7u1) wheezy-security; urgency=high\n\n * SECURITY UPDATE: root escalation via race in policy-funcs\n - lib/policy-funcs: use the X console user instead of the one from an\n arbitrary kded4 process.\n - power.sh: also source /usr/share/acpi-support/power-funcs.\n - CVE-2014-1419\n\n -- Michael Meskes \[email protected]\u003e Fri, 18 Jul 2014 12:21:39 +0200\n\nacpi-support (0.140-5) unstable; urgency=low\n\n * Rewrote getXuser in power-funcs to only use ck-list-sessions if installed,\n if not fallback to using pinky instead. This enables us to downgrade\n consolekit to a recommendation instead of a dependency. (Closes: #665987)\n * Unset IFS after using it to make other commands use standard setting again.\n (Closes: #680409)\n\n -- Michael Meskes \[email protected]\u003e Thu, 05 Jul 2012 11:03:20 +0200\n\nacpi-support (0.140-4) unstable; urgency=low\n\n * Remove examples that are variants of files still in use.\n * Simplified new sleep and hibernate script.\n * Simplifying some patches as suggested by Cristian Ionescu-Idbohrn\n \[email protected]\u003e.\n * Applied patch to simplify power-funcs.\n Thanks to Cristian Ionescu-Idbohrn \[email protected]\u003e\n * Simplified and robustified state-funcs.\n Thanks to Cristian Ionescu-Idbohrn \[email protected]\u003e\n * Remove dependency of `acpi-support-base` on `kbd | console-utilities` and\n move the dependency on `consolekit` from `acpi-support` to\n `acpi-support-base` since `getXuser()` and `getXconsole()`, using\n `ck-list-sessions` instead of `fgconsole` since 0.140-1, are in\n `power-funcs` which is in `acpi-support-base`.\n Thanks to Paul Menzel \[email protected]\u003e (Closes: #678241)\n\n -- Michael Meskes \[email protected]\u003e Thu, 21 Jun 2012 13:58:02 +0200\n\nacpi-support (0.140-3) unstable; urgency=low\n\n * Remove hibernatebtn.sh from package. It's no longer needed.\n (Closes: #667514)\n * Also remove the other files deprecated in 0.140-2.\n\n -- Michael Meskes \[email protected]\u003e Thu, 05 Apr 2012 11:41:25 +0200\n\nacpi-support (0.140-2) unstable; urgency=low\n\n * Replaced sleep.sh, hibernate.sh, sleepbtn.sh, hibernatebtn.sh with newly\n written scripts that handle both events to reduce code redundancy.\n (Closes: #664702)\n * Added generic key press event for suspend keys. (Closes: #664703)\n\n -- Michael Meskes \[email protected]\u003e Fri, 30 Mar 2012 14:56:50 +0200\n\nacpi-support (0.140-1) unstable; urgency=low\n\n * Imported new Upstream version 0.140\n * Upstream switched to consolekit to find the current X user, so we do the\n same.\n * Fixed typo in default file. (Closes: #662730)\n\n -- Michael Meskes \[email protected]\u003e Tue, 06 Mar 2012 17:44:59 +0100\n\nacpi-support (0.138-14) unstable; urgency=low\n\n * Re-wrote rules file to not throw an error on binary only builds.\n\n -- Michael Meskes \[email protected]\u003e Sun, 04 Mar 2012 15:10:27 +0100\n\nacpi-support (0.138-13) unstable; urgency=low\n\n * Make xrandr output device configurable. (Closes: #657673)\n * Make sure xscreensaver gets called even is user is in a screen session.\n (Closes: #658232)\n * Bumped Standards-Version to 3.9.3, no changes needed.\n * Added event file for WLAN on some Thinkpads. (Closes: #656703)\n * Made ASUS backlit key brightness up/down buttons work.\n\n -- Michael Meskes \[email protected]\u003e Sun, 04 Mar 2012 12:29:24 +0100\n\nacpi-support (0.138-12) unstable; urgency=low\n\n * Check for gnome-settings-daemon instead of gnome-session because the former\n is really needed for power management.\n * Fixed typo that made the script not find KDE4 anymore. (Closes: #655938)\n * Made screen disabling optional for systems without an active user.\n (Closes: #653205)\n * Moved to debhelper 7 and simplified rules file.\n * Do not print an error message if acpid couldn't be restarted because it\n wasn't running. (Closes: #656473)\n\n -- Michael Meskes \[email protected]\u003e Fri, 20 Jan 2012 12:37:29 +0100\n\nacpi-support (0.138-11) unstable; urgency=low\n\n * Check for power management in gnome3.\n Thanks to Matthijs Kooijman \[email protected]\u003e (Closes: #655394)\n * Simplified lid.sh a little bit more. \n\n -- Michael Meskes \[email protected]\u003e Thu, 12 Jan 2012 09:52:19 +0100\n\nacpi-support (0.138-10) unstable; urgency=low\n\n * Made init script use on_ac_power. (Closes: #631629)\n * Fixed typos and language errors in README.Debian.\n Thanks to Wookey \[email protected]\u003e (Closes: #648422)\n * Made screenblank script use $XUSER that is set instead of the unset $user.\n At the same time added xlock and xtrlock as possible lock managers.\n Thanks to Santiago Garcia Mantinan \[email protected]\u003e\n (Closes: #605276, #649562)\n * Also added gnome-screensaver as valid screensaver option.\n * Rolled more logic into /usr/share/acpi-support/screenblank instead of\n duplicating it in /etc/acpi/sleep.sh and /etc/acpi/screenblank.sh.\n * Rewrote and simplified lid.sh.\n * Made power-funcs also use on_ac_power again, removing the very old patch\n that removed it. As we use on_ac_power elsewhere this should be fine here\n as well.\n * Add support for \"status\" action to the init scripts.\n Thanks to Peter Eisentraut \[email protected]\u003e (Closes: #651864)\n * Allow SPIC and SNC events on Sony laptops. (LP: #240915, #295809)\n * Added patch to fix rotation issues. (LP: #217182)\n * Added build-arch and build-indep targets to rules file.\n * Bumped Standards-Version to 3.9.2, no changes needed.\n\n -- Michael Meskes \[email protected]\u003e Tue, 13 Dec 2011 14:54:40 +0100\n\nacpi-support (0.138-9) unstable; urgency=low\n\n * Do not unload uinput module on acpi-fakekey stop. It might be used\n elsewhere. (Closes: #619316)\n\n -- Michael Meskes \[email protected]\u003e Wed, 23 Mar 2011 20:15:14 +0100\n\nacpi-support (0.138-8) unstable; urgency=low\n\n * Create fifo under /var/run instead of using shared memory as filesystem.\n (Closes: #616023)\n * The kernel might give a tty number despite running on a serial line. Make\n sure the scripts can cope with this. (Closes: #612849)\n * Removed old workaround needed when acpi-fakekey became its own package\n because squeeze was released with acpi-fakekey package. (Closes: #613901)\n\n -- Michael Meskes \[email protected]\u003e Fri, 11 Mar 2011 11:29:28 +0100\n\nacpi-support (0.138-7) unstable; urgency=low\n\n * Use /dev/uinput instead of the no longer existing /dev/input/uinput.\n (Closes: #612628) - thanks to Sven Joachim \[email protected]\u003e\n * Use a smaller canon (no forks) to edit /tmp/.X11-unix/* (Closes:\n #609276) - thanks to Cristian Ionescu-Idbohrn \u003ccristian.ionescu-\n [email protected]\u003e\n * Added a small explanation why some packages are recommended.\n (Closes: #611699)\n\n -- Michael Meskes \[email protected]\u003e Thu, 10 Feb 2011 12:03:35 +0100\n\nacpi-support (0.138-6) unstable; urgency=low\n\n * Further improvements on power-funcs (Closes: #607981) - thanks to\n Cristian Ionescu-Idbohrn \[email protected]\u003e\n * Cleaned up asus-touchpad.sh and improved error handling (Closes:\n #607624) - thanks to Cristian Ionescu-Idbohrn \u003ccristian.ionescu-\n [email protected]\u003e\n * Optimize asus-wireless.sh to consume a few cpu cycles less. (Closes:\n #607976) - thanks to Cristian Ionescu-Idbohrn \u003ccristian.ionescu-\n [email protected]\u003e\n * Replaced cat with builtin read (Closes: #608040) - thanks to\n Cristian Ionescu-Idbohrn \[email protected]\u003e\n * Cleaned up and re-diffed patches.\n * Quote name of scripts executed from init script to cope with blanks.\n (Closes: #608117)\n\n -- Michael Meskes \[email protected]\u003e Fri, 07 Jan 2011 15:44:35 +0100\n\nacpi-support (0.138-5) unstable; urgency=low\n\n * Test availability of state-funcs before using it. (Closes: #607435)\n * Also fix CheckPolicy usage in example.\n * Fixed power.sh to not run a subshell for a simple test. (Closes:\n #607061)\n * Joined screenblank patches into one and simplified it some. (Closes:\n #607096)\n * Make state-funcs more efficient and support iw alongside iwconfig.\n (Closes: #607111) - thanks to Cristian Ionescu-Idbohrn\n \[email protected]\u003e\n * Make device-funcs work without forking. (Closes: #607128) - thanks\n to Cristian Ionescu-Idbohrn \[email protected]\u003e\n * As per recommendation on debian-devel acpi-support-base now depends\n on kbd instead of console-tools.\n\n -- Michael Meskes \[email protected]\u003e Sun, 19 Dec 2010 14:27:15 +0100\n\nacpi-support (0.138-4) unstable; urgency=low\n\n * Active console may also be 'serial'. (Closes: #606214)\n\n -- Michael Meskes \[email protected]\u003e Sat, 11 Dec 2010 14:46:55 +0100\n\nacpi-support (0.138-3) unstable; urgency=low\n\n * Fixed another breakage due to the power-funcs error checking.\n (Closes: #605219)\n\n -- Michael Meskes \[email protected]\u003e Thu, 02 Dec 2010 08:42:47 +0100\n\nacpi-support (0.138-2) unstable; urgency=low\n\n * Made power-funs patch work correctly if X is not running on the\n active console. (Closes: #605219)\n\n -- Michael Meskes \[email protected]\u003e Sun, 28 Nov 2010 14:07:20 +0100\n\nacpi-support (0.138-1) unstable; urgency=low\n\n * New Upstream version 0.138, we keep the files upstream deleted because we\n are still on an older kernel.\n * Added patch to optimize policy functions. (Closes: #603864) - thanks\n to Cristian Ionescu-Idbohrn \[email protected]\u003e\n * Make power-funcs work correctly with latest X and gdm3. (Closes:\n #591813, #603796) - thanks to Luca Niccoli \[email protected]\u003e\n * Robustify power-funcs and log errors where possible. (Closes:\n #604251) - thanks to Cristian Ionescu-Idbohrn \u003ccristian.ionescu-\n [email protected]\u003e\n\n -- Michael Meskes \[email protected]\u003e Fri, 26 Nov 2010 16:45:44 +0100\n\nacpi-support (0.137-7) unstable; urgency=low\n\n * Adjusted remaining scripts to new CheckPolicy function. (Closes:\n #603738)\n\n -- Michael Meskes \[email protected]\u003e Wed, 17 Nov 2010 09:47:42 +0100\n\nacpi-support (0.137-6) unstable; urgency=low\n\n * Re-diffed patches to remove fuzz. (Closes: #593518)\n * Update key-constants from 2.6.32 kernel in squeeze. (Closes:\n #603471)\n * Optimized CheckPolicy to save resources. (Closes: #593975)\n\n -- Michael Meskes \[email protected]\u003e Mon, 15 Nov 2010 14:22:40 +0100\n\nacpi-support (0.137-5) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"acpid","Version":"1:2.0.7-1squeeze4","Release":"","NewVersion":"1:2.0.16-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"adduser","Version":"3.112+nmu2","Release":"","NewVersion":"3.113+nmu3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of adduser\nadduser (3.113+nmu3) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix translated manpages. Closes: #670579\n * Restore Portuguese manpages translations from 3.112+nmu2.\n * New Danish manpages translation (Joe Hansen). Closes: #672576\n\n -- David Prévot \[email protected]\u003e Tue, 15 May 2012 16:46:45 -0400\n\nadduser (3.113+nmu2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Support multi-arch: (closes: #672886)\n - Mark adduser as foreign.\n\n -- Bastian Blank \[email protected]\u003e Mon, 14 May 2012 13:47:27 +0000\n\nadduser (3.113+nmu1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Re-add missing translations in po/ and doc/po4a/po\n Closes: #651114, #645951\n * Manpages translations:\n - Spanish. Closes: #636240\n * Fix pending l10n issues. Debconf translations:\n - Serbian (Zlatan Todoric). Closes: #634980\n - Serbian Latin (Zlatan Todoric). Closes: #634982\n\n -- Christian Perrier \[email protected]\u003e Sat, 21 Jan 2012 09:00:03 +0100\n\nadduser (3.113) unstable; urgency=low\n\n * Warning to STDERR (closes: #561864)\n * Use unlink on symlinks (closes: #609156)\n * Keep test from complaining (closes: #613009)\n * Use db_settitle instead of db_title (closes: #560313)\n * Add newline to deluser output (closes: #592629)\n * Don't go wrong if user or group is 0, although, please, stop that\n (closes: #617480)\n * Add afs to EXCLUDE_FSTYPES by default (closes: #630340)\n\n -- Stephen Gran \[email protected]\u003e Mon, 13 Jun 2011 08:15:58 +0100\n\nadduser (3.112+nmu2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"apt","Version":"0.8.10.3+squeeze7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"apt-transport-https","Version":"0.8.10.3+squeeze7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"apt-utils","Version":"0.8.10.3+squeeze7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"aptitude","Version":"0.6.3-3.2+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"at","Version":"3.1.12-1+squeeze1","Release":"","NewVersion":"3.1.13-2+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of at\nat (3.1.13-2+deb7u1) wheezy; urgency=medium\n\n * at: Only retain variables whose name consists of alphanumerics and\n underscores. This prevents jobs from failing in case bash exports\n functions to the environment with the changes from DSA-3035.\n\n -- Ansgar Burchardt \[email protected]\u003e Tue, 30 Sep 2014 20:58:23 +0200\n\nat (3.1.13-2) unstable; urgency=low\n\n * Use debhelper compat level 9 (to enable hardening by default).\n * debian/rules: Also enable pie and bindnow hardening features.\n * Use XZ compression for binary packages.\n * Mark binary package as Multi-Arch: foreign. (Closes: #676782)\n\n -- Ansgar Burchardt \[email protected]\u003e Sat, 09 Jun 2012 13:32:34 +0200\n\nat (3.1.13-1) unstable; urgency=low\n\n * New upstream release:\n + Remove useless chdir(). (Closes: #587121)\n + Create hardlink as priviledged user. (Closes: #597130)\n + Add support for -r option required by POSIX. (Closes: #616697)\n + Don't abort when job is removed just before we run it. (Closes: #309014)\n + Do not strip binaries on install. (Closes: #436485)\n * Recommend default-mta instead of exim4. (Closes: #542872)\n * debian/control: Add dependency on ${misc:Depends}. (Closes: #586260)\n * debian/control: Remove DM-Upload-Allowed.\n * Update my email address.\n * debian/source/format: Use source format 1.0.\n * debian/copyright: Refer to specific versions of the GPL.\n * Add debian/watch with a comment that Debian is upstream.\n * debian/postinst: use \"set -e\" instead of \"#!/bin/sh -e\".\n * debian/rules: Add build-arch, build-indep targets.\n * Bump Standards-Version to 3.9.2.\n\n -- Ansgar Burchardt \[email protected]\u003e Sat, 25 Jun 2011 15:05:40 +0200\n\nat (3.1.12-1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"atmel-firmware","Version":"1.3-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"base-files","Version":"6.0squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"base-passwd","Version":"3.5.22","Release":"","NewVersion":"3.5.26","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of base-passwd\nbase-passwd (3.5.26) unstable; urgency=low\n\n * Build-depend on dpkg (\u003e= 1.16.4) | sgml-base (\u003c\u003c 1.26+nmu2) to ensure\n that #675613 does not cause incorrect generation of documentation\n (closes: #678570).\n\n -- Colin Watson \[email protected]\u003e Sat, 23 Jun 2012 09:35:04 +0100\n\nbase-passwd (3.5.25) unstable; urgency=low\n\n * users-and-groups: Document historical meaning of sys user/group (thanks\n to Mantas M. for the tip).\n * Use dpkg-buildflags to enable hardening options (based on a patch from\n Moritz Muehlenhoff; closes: #655501).\n * Update users-and-groups documentation of the sudo group to describe\n current behaviour and mention pkexec (thanks, Luca Capello; closes:\n #650553).\n\n -- Colin Watson \[email protected]\u003e Fri, 22 Jun 2012 11:40:25 +0100\n\nbase-passwd (3.5.24) unstable; urgency=low\n\n * Mark base-passwd Multi-Arch: foreign.\n\n -- Colin Watson \[email protected]\u003e Sat, 26 Nov 2011 13:13:39 +0000\n\nbase-passwd (3.5.23) unstable; urgency=low\n\n * Convert to source format 3.0 (native).\n * Update to current DEP-5 copyright proposal (thanks, Kyle Nitzsche; part\n of LP #610108).\n * Remove unused Lintian overrides.\n * Add translations of update-passwd(8):\n - Spanish (thanks, Omar Campagne; closes: #604455).\n - Japanese (thanks, KURASAWA Nozomu; closes: #614377).\n - German (thanks, Helge Kreutzmann; closes: #625898).\n * Allocate gid 64040-64044 (grsec-tpe, grsec-sock-all, grsec-sock-clt,\n grsec-sock-srv, grsec-proc) for linux-grsec-base, by request of\n Yves-Alexis Perez.\n * Update Vcs-Bzr field for Alioth changes.\n * Allow cross-building (thanks, Peter Pearse and Wookey; closes: #631954).\n * Add build-arch and build-indep targets.\n * Fix typo in description of -v in update-passwd(8), and unfuzzy\n translations (thanks, Helge Kreutzmann; closes: #625900).\n\n -- Colin Watson \[email protected]\u003e Sat, 16 Jul 2011 12:52:47 +0100\n\nbase-passwd (3.5.22) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"bash","Version":"4.1-3+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"bash-completion","Version":"1:1.2-3","Release":"","NewVersion":"1:2.0-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of bash-completion\nbash-completion (1:2.0-1) unstable; urgency=low\n\n [ David Paleino ]\n * New upstream version\n - Recognise symlinks to directories as directories (Closes: #666055)\n - sudo -e should list filenames instead of commands (Closes: #446355)\n - ri completion: defines function outside _* namespace (Closes: #669178)\n - overrides lyx's bash-completion (Closes: #662203)\n - complete 'apt-get changelog' (Closes: #659395)\n - sudo su {user} -c \"sss failing because of quotation (LP: #783136)\n - scp and rsync error on local path completion (LP: #772571)\n * Standards-Version bump to 3.9.3, no changes needed\n * Updated debian/copyright\n * Added Pre-Depends on dpkg because of dpkg-maintscript-helper\n\n [ Jonathan Nieder ]\n * Replace /etc/bash_completion symlink with a shim script (Closes: #669180)\n * Remove no longer needed symlink-issue patch\n * Remove /etc/bash_completion symlink to make room for shim script\n on upgrade from versions 1:1.99-2 and 1:1.99-3.\n\n -- David Paleino \[email protected]\u003e Sun, 17 Jun 2012 21:08:02 +0200\n\nbash-completion (1:1.99-3) unstable; urgency=low\n\n * Fixed issue when loading completions from the /etc/bash_completion\n symlink.\n\n -- David Paleino \[email protected]\u003e Wed, 11 Jan 2012 14:41:37 +0100\n\nbash-completion (1:1.99-2) unstable; urgency=low\n\n * Make /etc/bash_completion a symlink to the new location, waiting\n for bash to update its scripts (Closes: #648319)\n * Dropped debian/NEWS\n * Drop references to old triggers-mechanism (Closes: #655286)\n\n -- David Paleino \[email protected]\u003e Tue, 10 Jan 2012 07:26:30 +0100\n\nbash-completion (1:1.99-1) unstable; urgency=low\n\n * Uploading to unstable\n * New upstream pre-2.x snapshot\n - correctly list purgeable packages for dpkg --listfiles and dpkg\n --purge (Closes: #647684)\n - fix bash_completion paths in README (Closes: #647941)\n - _known_hosts_real: Handle more than two hostnames per known hosts\n line (Closes: #647352)\n - _known_hosts_real: Support \u003e 1 files per *KnownHostsFile line\n (Closes: #650514)\n\n -- David Paleino \[email protected]\u003e Sun, 08 Jan 2012 00:29:16 +0100\n\nbash-completion (1:1.90-1) experimental; urgency=low\n\n * bash-completion 2 preview: dynamic loading of completions\n - optionally fallback to generic file completion if _filedir\n returns nothing (Closes: #619014, LP: #533985)\n - various fixes (Closes: #622383)\n - apt: add 'download' to subcommands (Closes: #625234, LP: #720541)\n - aptitude: add 'versions' command (Closes: #604393)\n - dpkg-query: use the 'dpkg' completion (Closes: #642526)\n - lintian: remove --unpack-level (Closes: #623680)\n - rrdtool: complete filenames after commands (Closes: #577933)\n - provide profile.d hook for per user disabling of bash_completion\n (Closes: #593835)\n - mutt: support tildes when recursively sourcing muttrc files\n (Closes: #615134)\n - tar: improve tar *[cr]*f completions (Closes: #618734)\n * More checks in update-bash-completion: avoid unnecessary\n sourcing of completion if symlink already exists\n * Add message for users before they report a bug (debian/bug-presubj),\n I'm kind of fed-up with bugs caused by acroread.sh :/\n * Removed patches merged upstream\n * Drop trigger-based completion loading\n * Standards-Version bump to 3.9.2, no changes needed\n\n -- David Paleino \[email protected]\u003e Thu, 03 Nov 2011 13:03:51 +0100\n\nbash-completion (1:1.3-3) experimental; urgency=low\n\n * Include install-completions from upstream\n * Use new mechanism to symlink completions (Closes: #623880)\n\n -- David Paleino \[email protected]\u003e Mon, 25 Apr 2011 14:38:24 +0200\n\nbash-completion (1:1.3-2) experimental; urgency=low\n\n * Change completion directory layout (00-change_completions_layout.patch)\n * Use autoreconf in debian/rules\n * Implement dpkg triggers and update-bash-completion script, and monthly\n cronjob to clean up unused completions.\n * Remove old UCF-related postinst tasks\n * Remove old conffiles, using dpkg-maintscript-helper\n * Added debian/NEWS, to explain the changes with this revision\n * Use Breaks+Replaces xen-tools, because of conflicting files\n * Added debian/README.Debian with instructions on the new layout,\n and how to enable completions\n\n -- David Paleino \[email protected]\u003e Tue, 12 Apr 2011 12:15:12 +0200\n\nbash-completion (1:1.3-1) unstable; urgency=low\n\n * New upstream release\n - Fixed \"service\" completion, thanks to John Hedges (Closes: #586210)\n - Fixed typo in openssl completion (Closes: #609552)\n - Added ip completion (Closes: #600617)\n - Added _tilde(), fix ~username completion (Closes: #587095)\n - Add *.webm to mplayer file completions (Closes: #588079).\n * debian/watch: fix to handle .tar.bz2 files\n * Bump Standards-Version to 3.9.1, no changes needed\n * Install upstream CHANGES file\n * Update copyright years in debian/copyright\n * debian/rules: reflect new source layout\n\n -- David Paleino \[email protected]\u003e Sun, 06 Feb 2011 22:00:58 +0100\n\nbash-completion (1:1.2-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"bcrelay","Version":"1.3.4-3","Release":"","NewVersion":"1.3.4-5.2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of bcrelay\npptpd (1.3.4-5.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Handle ENOBUFS gracefully.\n Closes: #692129: pptpd: PPTP Connections Drop\n * Programming error, reference to a stack variable used out of scope in\n arguments to execvp call.\n Closes: #693136: pptpd: Binary trash when launching ppp\n\n -- Maximiliano Curia \[email protected]\u003e Wed, 28 Nov 2012 16:21:01 +0100\n\npptpd (1.3.4-5.1) unstable; urgency=low\n\n * Non-maintainer upload\n * Remove debian/conffiles, avoids debsum mismatches regarding conffiles\n (Closes: #689779)\n\n -- Reinhard Tartler \[email protected]\u003e Sun, 28 Oct 2012 17:19:04 +0100\n\npptpd (1.3.4-5) unstable; urgency=medium\n\n Urgency medium because 1.3.4-4 broke connections for some settings.\n * Fix bug introduced by last change adding the remotenumber parameter\n to pppd. Thanks to Michael Poetters for the patch!\n Closes: #625459: pppctrl fixup\n Closes: #622258: pptpd: Impossible to establish connection\n\n -- Rene Mayrhofer \[email protected]\u003e Sat, 07 May 2011 22:39:57 +0200\n\npptpd (1.3.4-4) unstable; urgency=low\n\n * Apply patch provided by Sergey Naumov to fix a segmentation fault\n when invalid IP ranges are specified in the config file (upper \u003c\n lower)\n * Apply patch provided by Igor A Tarasov to pass the remotenumber\n command line option to pppd, which is then used for th radius\n plugin.\n Closes: #610375: remotenumber support\n * Report that the init script also supports a \"status\" option.\n Closes: #536424: init.d script error message does not mention \n \"status\" action\n\n -- Rene Mayrhofer \[email protected]\u003e Tue, 29 Mar 2011 11:03:36 +0200\n\npptpd (1.3.4-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"bind9-host","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"bmon","Version":"2.0.1-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"bridge-utils","Version":"1.4-5","Release":"","NewVersion":"1.5-6","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of bridge-utils\nbridge-utils (1.5-6) unstable; urgency=low\n\n * Will rewrite post wheezy, changing to suggests. Closes: #693095.\n * Applied patch to fix man typo. Closes: #683710.\n\n -- Santiago Garcia Mantinan \[email protected]\u003e Wed, 14 Nov 2012 10:39:43 +0100\n\nbridge-utils (1.5-5) unstable; urgency=low\n\n * Set Multi-Arch: foreign. Closes: #689144.\n * Add a depends on net-tools. Closes: #688677.\n\n -- Santiago Garcia Mantinan \[email protected]\u003e Thu, 08 Nov 2012 19:56:15 +0100\n\nbridge-utils (1.5-4) unstable; urgency=low\n\n * Remove mkdir and exit if /run/network doesn't exist. Thanks\n to Andrew Shadura. Closes: #676183.\n * Allow hotplug of ports to be user configurable and default\n to disable. Closes: #673490.\n\n -- Santiago Garcia Mantinan \[email protected]\u003e Fri, 29 Jun 2012 10:56:51 +0200\n\nbridge-utils (1.5-3) unstable; urgency=low\n\n * First version targetting Wheezy.\n * Lintian cleans including complying with hardening, ...\n * Enable ipv6 on ports when taking bridge interface down. Thanks to\n David Fries for the bug and patch. Closes: #651652.\n * Now that #568479 is gone we can hopefully sync with Ubuntu:\n Include the new Steve's udev rule to allow attaching hotplug devices.\n Extend the definition of 'bridge_ports all' to support biosdevname.\n Thanks to Steve Langasek for his help. Closes: #626152.\n\n -- Santiago Garcia Mantinan \[email protected]\u003e Mon, 09 May 2011 19:02:48 +0200\n\nbridge-utils (1.5-2) unstable; urgency=low\n\n * Include Ubuntu's patch to factor out parsing of bridge_ports into\n a reusable shell library.\n\n -- Santiago Garcia Mantinan \[email protected]\u003e Tue, 03 May 2011 19:35:38 +0200\n\nbridge-utils (1.5-1) unstable; urgency=low\n\n * New upstream version. Closes: #611761.\n * Relocate ifupdown.sh to /lib/bridge-utils and brctl to /sbin.\n Closes: #569350.\n * Removed SMPNOTES, upstream updated FIREWALL. Closes: #518649.\n * Removed the 30 seconds wait. Closes: #549696.\n * Only suggest ifupdown. Closes: #595115.\n * Remove the versioning from the description. Closes: #595116.\n * Disable ipv6 on the interfaces of the bridge. Closes: #607741.\n * On newer kernels we wait only till we forward. Closes: #549696.\n * Use sleep 0.1 (0.01 was too much), thanks Mikhail. Closes: #572835.\n * Set ret to -1 on errno to avoid returning 0. Closes: #574363.\n * Fix manpage setageing explanation. Closes: #523141.\n * Make it lintian clean again.\n\n -- Santiago Garcia Mantinan \[email protected]\u003e Tue, 19 Apr 2011 19:45:51 +0200\n\nbridge-utils (1.4-5) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"bsdmainutils","Version":"8.0.13","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"bsdutils","Version":"1:2.17.2-9","Release":"","NewVersion":"1:2.20.1-5.3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of bsdutils\nutil-linux (2.20.1-5.3) unstable; urgency=low\n\n * Non-maintainer upload.\n * Ship the /var/lib/libuuid/ directory in the package instead of creating it\n in postinst. Closes: #694898\n\n -- David Prévot \[email protected]\u003e Sun, 09 Dec 2012 12:46:41 -0400\n\nutil-linux (2.20.1-5.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Drop the /etc/default/rcS update from postinst. (Closes: #676454)\n\n [ Translation update ]\n * French, David Prévot. Closes: #684225, #270584\n * Vietnamese, Trần Ngọc Quân.\n * Dutch, Benno Schulenberg.\n * Polish, Michał Kułach. Closes: #685785\n\n -- David Prévot \[email protected]\u003e Sun, 09 Sep 2012 15:52:17 -0400\n\nutil-linux (2.20.1-5.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * agetty: don't use log_err() for non-fatal errors\n * agetty: Eliminate another log_err() call. Closes: #675569\n * Fix watch file\n\n -- Hilko Bengen \[email protected]\u003e Fri, 22 Jun 2012 00:00:36 +0200\n\nutil-linux (2.20.1-5) unstable; urgency=low\n\n [Petr Uzel]\n\n * sfdisk: fix calculation due to type mismatch (ix86) Closes: #670127\n\n [Eduard Bloch]\n\n * Make sure we have non-null mount options. Closes: #632118\n\n [Francesco Del Degan]\n\n * tries to umount /proc when told to umount /some/dir/proc without an\n /etc/mtab entry. Closes: #634107\n\n [Pino Toscano]\n\n * Deliver {c,}fdisk-udeb on hurd. Closes: #672551\n\n [Roger Leigh]\n\n * Improve handling of the hardware clock\n - Remove redundant hwclockfirst.sh and hwclock.sh. The reason for\n this redundant script existing (/etc/localtime not being present\n until after /usr was mounted AFAICT) no longer exists. The\n hwclock script has been adjusted to run before checkroot.\n Closes: #660365\n - Migrate existing\n UTC= setting in /etc/default/rcS to UTC/LOCAL in /etc/adjtime.\n This removes needless duplication of the setting, and prevents the\n behaviour of hwclock being overridden, and its configuration\n overwritten every shutdown. Closes: #554345\n - The hwclock init scripts now use /etc/adjtime instead of the\n --utc and --localtime options (based on the UTC setting).\n - Add /etc/default/hwclock and hwclock(5) which permit\n configuration without editing the initscript, and also document\n all the undocumented variables used by the scripts.\n Closes: #481357, #659654\n - The udev hwclock-set script runs hwclock --tzset unconditionally\n in all cases (it's a no-op for UTC).\n - The user running \"hwclock --systohc (--utc|--localtime)\" is now\n handled correctly. The clock state is recorded in /etc/adjtime\n and correctly handled on system restart. This means the UTC\n setting in /etc/default/rcS doesn't create problems by requiring\n two separate changes (changing the UTC setting and running\n hwclock) to do the same thing.\n - Comment out the now-obsolete UTC= setting in /etc/default/rcS,\n with a reference to /etc/adjtime and hwclock(8).\n - systemd uses /etc/adjtime as for hwclock to store the hardware\n clock UTC/LOCAL configuration. This change means there's a\n single place to store the hardware clock configuration for all\n init systems.\n\n -- LaMont Jones \[email protected]\u003e Thu, 17 May 2012 12:11:44 -0600\n\nutil-linux (2.20.1-4) unstable; urgency=low\n\n [Michał Kułach]\n\n * Polish Debconf Translation. Closes: #658507\n\n [LaMont Jones]\n\n * fix lintian error\n * Drop broken Pre-Depends: multiarch-support on udeb. Closes: #661562\n\n [Roger Leigh]\n\n * Support /etc/default/hwclock. Closes: #659654\n\n -- LaMont Jones \[email protected]\u003e Mon, 27 Feb 2012 20:53:43 -0700\n\nutil-linux (2.20.1-3) unstable; urgency=low\n\n * fix lintian error\n\n -- LaMont Jones \[email protected]\u003e Fri, 24 Feb 2012 05:34:39 -0700\n\nutil-linux (2.20.1-2) unstable; urgency=low\n\n [Reuben Thomas]\n\n * Better english in mount.8. Closes: #603096\n\n [Steve Langasek]\n\n * Multiarch support in util-linux build. Closes: #631175\n\n [LaMont Jones]\n\n * Drop ancient and technically incorrect workaround for hwclock ordering in\n postinst. Closes: #195720\n * Re-enable ddate, disabled by default upstream in 2.20. Closes: #650321\n * Ack 2.20.1-1.2\n * Re-enable ddate. Closes: #650321\n * reenable line. Closes: #653414\n * Deliver the correct upstream changelog. Closes: #656228\n\n [Christoph Biedl]\n\n * Fix typo in misc-utils/blkid.c. Closes: #655127\n\n [Samuel Thibault]\n\n * fix FTBFS on !linux-any. Closes: #650185\n\n [Andrew Pollock]\n\n * Preserve the ACPI wakeup time when updating the hardware clock.\n Closes: #505138\n\n [Jakub Wilk]\n\n * Fix typo in unshare manpage. Closes: #619666\n\n [Moritz Muehlenhoff]\n\n * Enable hardened build flags. Closes: #653856\n\n -- LaMont Jones \[email protected]\u003e Thu, 09 Feb 2012 10:06:42 -0700\n\nutil-linux (2.20.1-1.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fixing FTBFS on !linux (Closes: #650185)\n * Only enable partx where it is supported\n * Handle vc flags missing on FreeBSD\n * Fix tty creation on kFreeBSD taking patch from 2.19\n\n -- Christoph Egger \[email protected]\u003e Mon, 16 Jan 2012 22:30:04 +0100\n\nutil-linux (2.20.1-1.1) unstable; urgency=high\n\n * Non-maintainer upload.\n * Fix FTBFS by running autoreconf -vfi before calling ./configure, which\n looks better than patching Makefile.in's manually. Thanks to Thorsten\n Glaser for reporting, and to Simon Ruderich for suggesting a patch\n (Closes: #650534).\n * Add autoconf, automake, autopoint, and libtool to Build-Depends\n accordingly.\n * Set severity to “high” for the RC bug fix.\n\n -- Cyril Brulebois \[email protected]\u003e Thu, 05 Jan 2012 18:24:37 +0100\n\nutil-linux (2.20.1-1) unstable; urgency=low\n\n * New upstream\n\n [Roger Leigh]\n\n * Various merge fixes [with edits - lamont]\n - drop old unused patches\n - cleanup debian/rules\n - updated symbols files for lib{blkid,mount,uuid}1\n\n [LaMont Jones]\n\n * merge in 2.19.1-{3..5}\n * deliver /etc/fstab.d\n\n [김종규]\n\n * add korean debconf pofile. Closes: #632421, #632425\n\n [Niels Thykier]\n\n * Add build-arch and build-indep targets. Closes: #648467\n\n -- LaMont Jones \[email protected]\u003e Thu, 03 Nov 2011 15:38:23 -0600\n\nutil-linux (2.19.1-5) unstable; urgency=low\n\n * Conflict/Replace fstrim to provide smooth upgrades (closes: #627579)\n * Don't run hwclock-set when running under systemd (closes: #629811)\n * Switch to using linux-any in place of lists (closes: #635530, #634722)\n\n -- Adam Conrad \[email protected]\u003e Wed, 03 Aug 2011 13:43:21 +0000\n\nutil-linux (2.19.1-4) unstable; urgency=low\n\n * Add missing patch from #631468 to fix agetty linkage on k*bsd\n\n -- Adam Conrad \[email protected]\u003e Sun, 17 Jul 2011 03:55:11 -0600\n\nutil-linux (2.19.1-3) unstable; urgency=low\n\n * Apply two patches from Michael Biebl \[email protected]\u003e:\n - disable libmount on !linux, fixing kfreebsd FTBFS (closes: #631468)\n - remove empty /usr/share/locale/ from util-linux (closes: #633412)\n * Apply patch from Roger Leigh \[email protected]\u003e to make hwclock.sh\n correctly support /run/udev in addition to /dev/.udev (closes: #629274)\n * Build with arch:all to resurrect util-linux-locales (closes: #630859)\n * Add myself to Uploaders, following a short conversation with LaMont.\n\n -- Adam Conrad \[email protected]\u003e Sun, 17 Jul 2011 06:41:42 +0000\n\nutil-linux (2.19.1-2) unstable; urgency=low\n\n [LaMont Jones]\n\n * deliver findmnt in mount, rather than util-linux\n\n [Jeroen Schot]\n\n * Dutch transations. Closes: #624858\n\n [Hideki Yamane]\n\n * Japanese translation. Closes: #626383\n\n [Esko Arajärvi]\n\n * Finnish debconf templates. Closes: #615472\n\n [Roger Leigh]\n\n * Update with current translations\n * Enable libmount; new packages libmount1, libmount-udeb and libmount-dev\n added; bump standards-version\n\n [Arief S Fitrianto]\n\n * update Indonesian translations. Closes: #611319\n\n [Innocent De Marchi]\n\n * debconf po file for Catalan. Closes: #628367\n\n [Paul Menzel]\n\n * Add Homepage: to control. Closes: #590708\n\n -- LaMont Jones \[email protected]\u003e Tue, 31 May 2011 14:12:57 -0600\n\nutil-linux (2.19.1-1) experimental; urgency=low\n\n * New upstream\n\n -- LaMont Jones \[email protected]\u003e Wed, 11 May 2011 08:38:31 -0600\n\nutil-linux (2.17.2-9.1) unstable; urgency=low\n\n * NMU\n * Bump to Standards-Version 3.9.1.\n * Drop XS- prefixes on Vcs-Git and Vcs-Browser fields.\n * Patch from Konstantinos Margaritis to add preliminary armhf\n support. closes: #596948.\n * Add watch file. closes: #543721.\n\n -- Clint Adams \[email protected]\u003e Sun, 13 Feb 2011 10:38:14 -0500\n\nutil-linux (2.17.2-9) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"ca-certificates","Version":"20090814+nmu3squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"cluster-agents","Version":"1:1.0.3-3.1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"cluster-glue","Version":"1.0.6-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"conntrack","Version":"1:1.0.1-3+vyos1+helium4","Release":"","NewVersion":"1:1.2.1-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"conntrack-helpers","Version":"1:1.0.1-3+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"conntrackd","Version":"1:1.0.1-3+vyos1+helium4","Release":"","NewVersion":"1:1.2.1-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"console-common","Version":"0.7.85","Release":"","NewVersion":"0.7.87","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of console-common\nconsole-common (0.7.87) unstable; urgency=low\n\n * Drop dependency on $remote_fs that accidentally leaked in 0.7.86\n init script. Closes: #650995\n\n -- Christian Perrier \[email protected]\u003e Mon, 05 Dec 2011 21:08:35 +0100\n\nconsole-common (0.7.86) unstable; urgency=low\n\n * Drop splashy-related code in /etc/init.d/keymap.sh\n This will also allow /run transition\n Closes: #633048\n * Debconf translations:\n - Danish (Joe Hansen). Closes: #599849\n * Add init.d status support. Thanks to Peter Eisentraut\n for the patch. Closes: #642054\n * Add build-arch and build-indep targets in debian/rules\n * Bump Standards to 3.9.2 (checked)\n * Bump debhelper compatibility level to 8\n\n -- Christian Perrier \[email protected]\u003e Sun, 04 Dec 2011 18:04:57 +0100\n\nconsole-common (0.7.85) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"console-data","Version":"2:1.10-9","Release":"","NewVersion":"2:1.12-2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of console-data\nconsole-data (2:1.12-2) unstable; urgency=low\n\n * Icelandic debconf translation updated\n * Vietnamese debconf translation updated\n\n -- Christian Perrier \[email protected]\u003e Tue, 08 May 2012 10:23:22 +0200\n\nconsole-data (2:1.12-1) unstable; urgency=low\n\n * New upstream release. Fix Icelandic keymap.\n Thanks to Bjarni Ingi Gislason for the patch\n Closes: #650591\n * No longer mention Agafari console fonts in debian/copyright.\n The font is not included in upstream source.\n Closes: #632235\n * Use \"sr\" for Serbian instead of \"sr-cy\". Even for Serbian (Latin)\n Do my best to avoid fuzzying translations (it's easy to drop the\n 'cyrillic' part in PO files)\n Closes: #636812\n * Rename console-data.copyright to copyright\n * Bump debhelper compatibility to 8\n * Bump standards to 3.9.2\n * Debconf translations:\n - Sinhala; (Danishka Navin). Closes: #640756, #640762\n\n -- Christian Perrier \[email protected]\u003e Sun, 04 Dec 2011 15:38:14 +0100\n\nconsole-data (2:1.11-1) unstable; urgency=low\n\n * New upstream release. Add Kazakh keymap\n Closes: #609233\n * Fix debconf translation encoding for Hebrew\n * Debconf translation updates:\n - Serbian (Latin). Closes: #600122\n - Nepali (Mahesh Subedi). Closes: #614690\n\n -- Christian Perrier \[email protected]\u003e Wed, 23 Feb 2011 20:08:11 +0100\n\nconsole-data (2:1.10-9) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"console-setup","Version":"1.68+squeeze2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"console-terminus","Version":"4.30-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"coreutils","Version":"8.5-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"cpio","Version":"2.11-4+deb6u2","Release":"","NewVersion":"2.11+dfsg-0.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of cpio\ncpio (2.11+dfsg-0.1+deb7u2) wheezy-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * CVE-2016-2037: 1-byte out-of-bounds write (Closes: #812401)\n\n -- Salvatore Bonaccorso \[email protected]\u003e Sun, 14 Feb 2016 13:51:33 +0100\n\ncpio (2.11+dfsg-0.1+deb7u1) stable-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * Fix CVE-2014-9112: out of bounds write, insufficient range checking, and\n null pointer dereference issues (closes: #772793).\n\n -- Michael Gilbert \[email protected]\u003e Mon, 22 Dec 2014 22:13:01 +0000\n\ncpio (2.11+dfsg-0.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Remove non DFSG-compliant doc/cpio.info and doc/cpio.texi from source.\n Closes: #695717\n * Do not build nor ship cpio.info because of the above.\n\n -- David Prévot \[email protected]\u003e Sat, 29 Dec 2012 22:02:30 -0400\n\ncpio (2.11-8) unstable; urgency=low\n\n * Enable hardened build flags\n Patch by Moritz Muehlenhoff\n Closes: #654522\n * Cross-building issues \n - Fix invalid redefinition of stat() during cross-building cpio\n Patch by Steve McIntyre\n Add 627444-invalid-redefinition-of-stat.patch\n - Use the strip that's provided by the cross-binutils\n Patch by Steve Langasek\n Closes: #627444\n * Standards version is 3.9.3\n * Fix debian-rules-missing-recommended-target\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Tue, 12 Jun 2012 20:55:53 +1000\n\ncpio (2.11-7) unstable; urgency=low\n\n * New mantainer. Closes: #609990.\n * Add a 'Reporting Bugs' section to manpages. Closes: #218086.\n * Add a 'See Also' section to manpages mentioning cpio(5), and\n Add a 'Suggests: libarchive1' for cpio(5). Closes: #588020.\n\n -- Ruben Molina \[email protected]\u003e Thu, 10 Feb 2011 23:16:52 -0500\n\ncpio (2.11-6) unstable; urgency=low\n\n * New mantainer: adopt the package.\n closes: 604790\n * debian/copyright: change link to GPL3 file\n * debian/control: add homepage field\n * Fix manpages section\n * Minor changes in postinst and prerm scripts\n\n -- Monica Ramirez Arceda \[email protected]\u003e Thu, 02 Dec 2010 07:43:11 +0100\n\ncpio (2.11-5) unstable; urgency=low\n\n * Bump to Standards-Version 3.9.1.\n * Orphan the package.\n\n -- Clint Adams \[email protected]\u003e Sun, 14 Nov 2010 00:50:05 -0500\n\ncpio (2.11-4) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"cpufrequtils","Version":"007-1+squeeze1","Release":"","NewVersion":"008-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of cpufrequtils\ncpufrequtils (008-1) unstable; urgency=low\n\n * Package the last available upstream vesion of cpufrequtils. Anything\n after this should really be cpupowerutils (closes: 639454).\n * Include all the work also pending the in the git repository as patches\n on top of version 008.\n * Upstream fixed po.DE (closes: #633307).\n * Enable static library building as upstream disabled it.\n * Load powernow-k8 for AMD Bulldozer (21) and Llano (18) (closes: #654957).\n * Do not update po files upon building (closes: #651415).\n\n -- Mattia Dongili \[email protected]\u003e Sun, 06 May 2012 08:23:44 +0900\n\ncpufrequtils (007-2) unstable; urgency=low\n\n * Bulk load only helper modules. Linux 3.0 shuffled cpufreq modules\n locations a bit and now cpu drivers and helpers are in the same directory\n (closes: #636141).\n * Use modprobe -b in loadcpufreq to honour blacklisted modules\n (closes: #592488).\n * Load powernow-k8 for AMD family 20 (i.e. AMD E-350 cpus)\n (closes: #627811).\n * Stop changing printk levels when loading cpufreq modules (closes: #624575\n and closes: #596235).\n\n -- Mattia Dongili \[email protected]\u003e Wed, 03 Aug 2011 18:13:41 +0900\n\ncpufrequtils (007-1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"crda","Version":"1.1.2-1~bpo60+1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"cron","Version":"3.0pl1-116","Release":"","NewVersion":"3.0pl1-124","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of cron\ncron (3.0pl1-124) unstable; urgency=medium\n\n [ Release targeted to Wheezy including fixes for critical/important bugs ]\n * debian/{preinst,postinst,postrm}: remove obsolete /etc/cron.daily/standard\n on upgrade. (Closes: #679062)\n * debian/cron.init: Have the init.d file remove cron's pidfile if it \n exists after killing the process. The pidfile should be removed\n by cron itself (but it isn't) through its SIGhandler as done in later\n versions in cron (4.1 and cronie). This fix is, however, simpler and less\n intrusive. (Closes: 679106, 615855)\n * debian/control: \n - Reword last paragraph since cron does not provide any standard tasks\n anymore. (Closes: 674192)\n - Update to Standards-Version: 3.9.3 - which BTW includes an indication\n on which are the valid cron filenames.\n - Depend on debhelper \u003e= 9 (lintian warning)\n\n -- Javier Fernández-Sanguino Peña \[email protected]\u003e Thu, 28 Jun 2012 12:08:09 +0200\n\ncron (3.0pl1-123) unstable; urgency=low\n\n * debian/standard.daily: Apply patch from Steve Allison to prevent checking\n two times the same filesystem. This prevents bogus warnings about missing\n lost+found in schroot bind mounts (Closes: #660879)\n * debian/rules: Apply patch from Steve Langasek to add cross compiler\n support to cron (Closes: #666892)\n * debian/cron.default, debian/standard.daily, debian/rules: Remove\n the lost+found check as this is no longer required and causes\n issues with some filesystems (e.g. bind mounts, locally mounted USB\n drives). Additionally, in some filesystems the directory\n will be generated when required. (Closes: #620164, #658743, #662605,\n #660879, #579640, #473711)\n\n -- Javier Fernández-Sanguino Peña \[email protected]\u003e Sat, 23 Jun 2012 08:28:27 +0200\n\ncron (3.0pl1-121) unstable; urgency=low\n\n * debian/control:\n - Put the maintainer address in UTF-8 encoding\n * debian/postinst:\n - Only go ahead when configuring the package (Closes: #653304, #657073)\n * debian/source/lintian-overrides:\n - Removed, no longer required\n * crontab.5:\n - Escape the '%' in the examples so that they can work when copied over to\n crontab (Closes: #642309)\n - Remove tabs from manpage since they are not formatted properly in the\n nonfill area\n * cron.8, crontab.1, crontab.5:\n - Fix formatting errors in manual pages with patch provided by David\n Prévot (Closes: #643603)\n * debian/cron.default:\n - Fix typo (Closes: #643897)\n * debian/compat:\n - Set to compatibility version 9 to enable hardened build flags \n (Closes: #653720)\n\n -- Javier Fernández-Sanguino Peña \[email protected]\u003e Mon, 19 Sep 2011 00:20:17 +0200\n\ncron (3.0pl1-120) unstable; urgency=low\n\n * do_command.c, cron.h, cron.8: \n - Change the behaviour when logging the information of the child processes.\n A new loglevel (8) is introduced and documented in cron.8. The previous\n log format is kept unless the sysadmin choses to select this new option.\n (Closes: #637295) \n * debian/examples/cron-stats.pl:\n - Adjust the script with the changes introduced in the logging behaviour.\n * cron.8: Fix minor formatting errors\n * debian/cron.bug-script:\n - Report properly on the EDITOR variable. Thanks to Jan Braun for the\n report.\n - Also report the contents of /etc/cron.* dirs. This is helpful when\n debugging syntax/mode/naming errors. Users that do not want to share this\n information should edit/delete before reporting bugs.\n * debian/changelog: Typo fixes and missing information\n * debian/control:\n - Update package description, removing the \"backup of key system files\" as\n a feature. The last of these responsibilities were transffered in -117.\n * crontab.5: \n - Document limitations of the periods that can be defined in crontab syntax\n and provide workarounds (Closes: #640086)\n - Document limitation of the use of @reboot due to the definition of the\n boot sequence as suggested by Regid Ichira.\n * debian/source/lintian-overrides:\n - Add overrides file for lintian required because the maintainer name in\n debian/changelog and in debian/control do not match due to encoding.\n [ Christian Kastner ]\n * debian/control:\n - Fix broken Vcs-* URLs\n * debian/NEWS: \n - Remove spurious NEWS entry (the entry for -110 was duplicated at the\n bottom)\n\n -- Javier Fernández-Sanguino Peña \[email protected]\u003e Fri, 09 Sep 2011 23:25:35 +0200\n\ncron (3.0pl1-119) unstable; urgency=low\n\n * The development team has migrated from Subversion to git, with the latter\n becoming authoritative immediately. A log of the migration process can be\n found in debian/svn-git-migration.txt.\n\n [ Javier Fernandez-Sanguino ]\n * debian/NEWS:\n - Remove the entry introduced in the previous version until an agreement is\n reached on the desired behaviour (Reopens: #608774)\n * debian/standard.daily: \n - Work properly if mount points have a space (Closes: #633972)\n - Sanity check mount point value before generating an error\n * Add one new example script:\n - cron-tasks-review.sh: Reviews the files that exist in /etc/cron.d\n and in /etc/cron.{hourly,daily,weekly,monthly} to find those that\n will not be run by cron due to some error.\n * debian/copyright:\n - Adjust debian/copyright to acknowledge the (c) and license of the new\n example script.\n * debian/control:\n - Remove Steve from the Uploaders field, no longer needed there\n * cron.8: \n - Document the Debian specific changes in a separate section, describing\n how /etc/cron.{hourly,daily,weekly,monthly} and /etc/cron.d behave\n and should be used.\n\n [ Christian Kastner ]\n * debian/control:\n - Updated Vcs-* URLs to point to the new git repository\n * debian/cron.c, database.c:\n - Interpret the \"-L\" option of the daemon as a bitmask, and add initial\n support for three selectors: start, stop, end\n * database.c, cron.c, cron.h, debian/copyright:\n - Check orphaned crontabs for adoption. Fix taken from Fedora cronie.\n Closes: #634926\n * do_command.c:\n - When logging a job run, prefix the command text with the PID of the\n process. Closes: #609780\n * debian/NEWS:\n - Added entry documenting the change of the \"-L\" option as well as the\n dropping of LSBNAMES in -117.\n\n -- Javier Fernandez-Sanguino Pen~a \[email protected]\u003e Wed, 08 Jun 2011 20:44:49 +0200\n\ncron (3.0pl1-118) unstable; urgency=low\n\n * debian/control\n - Limited Build-Depends for libaudit-dev to linux-any. I erroneously\n assumed it applied to other OSes as well.\n * debian/rules\n - DEB_BUILD_OPTIONS for audit support is limited to Linux platforms\n\n [ Javier Fernandez-Sanguino]\n * debian/NEWS\n - Document the new behaviour of cron regarding logging of non-zero\n exit status cronjobs (Closes: #608874)\n\n -- Christian Kastner \[email protected]\u003e Tue, 31 May 2011 14:50:34 +0200\n\ncron (3.0pl1-117) unstable; urgency=low\n\n * Makefile:\n - Fixed integration of cron-internal debug code into the package building\n process. Instead of having to modify debian/rules, this can now driven by\n DEB_BUILD_OPTIONS=debug\n - Removed hard-coded compiler flags, honoring those provided by\n dpkg-buildflags instead\n * do_command.c:\n - When logging the end of cron jobs, log the PID of the actually exec'ed\n user command, not the PID of the parent. Closes: #609780\n * database.c:\n - Split crontab security checks (type, owner, mode, links) into separate\n tests with individual error messages instead of the cryptic message\n \"WRONG INODE INFO\". Closes: #625493\n - Extended the ability to recover from broken symlinks (added in -110) to\n also recover from failed security checks above. Fixes to these were not\n being detected as cron only looks at mtime. Closes: #625495\n - Also recover from syntax errors. Fixes to these did change mtime, but\n were ignored as cron permanently removes broken crontabs from its\n database of files to check. Closes: #627859\n * cron.8:\n - Documented the fact that /etc/crontab and files in /etc/cron.d must not\n be group- or other-writable. Closes: #625491, LP: #741979\n * crontab.5:\n - Specify parse order of crontabs (thanks, Jonathan Amery). Closes: #622645\n * debian/control:\n - Bumped Standards-Version to 3.9.2 (no changes needed)\n - Added missing Build-Depends on libaudit-dev\n - Removed Conflicts for nonexistent package suidmanager\n - Removed Conflicts for lockfile-progs (which should have been a Breaks\n anyway) as we no longer rely on it, we use flock from util-linux instead\n - Changed architecture-specific Build-Depends on libselinux1-dev to\n linux-any instead of negating all other OSes\n * debian/cron.default:\n - Merged the LSBNAMES option with EXTRA_OPTS. Both where used to pass\n options to the daemon, making one of them redundant\n - Added the ability to disable the daily lost+found check by setting the\n new variable CHECK_LOSTFOUND to \"no\". Closes: #579640\n * debian/cron.init:\n - Don't call start-stop-daemon directly, use LSB init functions instead.\n Among other things, this works around the cron daemon not deleting its\n pidfile from /var/run/. Closes: #615855, 622348\n - Added $network to Should-Start\n * debian/rules:\n - Converted to dh syntax. This included replacing some manually executed\n steps with debhelper file-automated ones (eg: cron.man, cron.examples)\n to lessen clutter\n - Completely rewrote the PAM/SELinux/audit integration parts. PAM support\n was being skipped on kfreebsd and hurd, and audit support was completely\n broken. From now on:\n + PAM is enabled by default on all platforms\n + SELinux is enabled by default on linux-any\n + audit is disabled by default on all platforms\n All of these can be driven by DEB_BUILD_OPTIONS (see debian/rules)\n - Do not compress example perl scripts\n * debian/{prerm,postrm,postinst}:\n - Let dh_installinit manage stopping/(re)starting of jobs instead of\n calling invoke-rc.d ourselves\n * debian/standard.daily:\n - Backup of /etc/{passd,group} is no longer performed by cron; the task\n was handed over to src:shadow (see #554170). In Squeeze, this task will\n be performed redundantly by both packages (as discussed on\n debian-release) (Closes: 333837)\n - Rewrite locking and lost+found-checking code, based on a submission to\n the BTS by Justin B. Rye. Closes: #478967, #537073, LP: #257367\n - Parse /etc/mtab instead of /proc/mounts; the former makes handling bind\n mounts easier. Closes: #578856\n - Pull in /etc/cron/default for CHECK_LOSTFOUND (see above)\n * debian/copyright:\n - Convert to DEP5 format (r173)\n * debian/watch:\n - Added watch file to silence a lintian warning, even though the last\n upstream release was in 2004\n * Packaging (general): removed a lot of cruft which seems to have accumulated\n over time. This included all the cron-se stuff, which appears to have been\n a remnant from the SELinux integration process, and was either not being\n used anymore or completely broken. Also, the patches/ directory was\n removed, as that location has a specific meaning and the patches in there\n were no longer relevant.\n\n -- Christian Kastner \[email protected]\u003e Sun, 08 May 2011 01:21:15 +0200\n\ncron (3.0pl1-116) unstable; urgency=high","Method":"ChangelogExactMatch"}},{"Name":"curl","Version":"7.21.0-2.1+squeeze12","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"dash","Version":"0.5.5.1-7.4","Release":"","NewVersion":"0.5.7-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of dash\ndash (0.5.7-3) unstable; urgency=low\n\n [ Christian Perrier ]\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n * French (Julien Patriarca). Closes: #638821\n * Indonesian (Mahyuddin Susanto). Closes: #657111\n * Polish (Michał Kułach). Closes: #658180\n * Romanian (Andrei POPESCU). Closes: #660615\n * Turkish (Mert Dirik). Closes: #661513\n\n [ Gerrit Pape ]\n * debian/control: Standards-Version: 3.9.3.0.\n\n -- Gerrit Pape \[email protected]\u003e Thu, 01 Mar 2012 00:09:45 +0000\n\ndash (0.5.7-2) unstable; urgency=high\n\n * debian/diff/:\n - 0004-BUILTIN-Fix-test-x-as-root...diff: new; teach \"test -x\"\n as root not to return true for nonexecutable files on\n platforms where faccessat() does return true in this case,\n such as glibc-bsd in squeeze (thx Christoph Egger, closes:\n #640334).\n - 0005-SHELL-Disable-sh-c-...diff: back out the optimization\n that makes dash -c \"script\" avoid a fork(). It caused\n several packages to fail to build from source (thx Stéphane\n Glondu, closes: #642922).\n\n -- Jonathan Nieder \[email protected]\u003e Mon, 26 Sep 2011 16:39:38 -0500\n\ndash (0.5.7-1) unstable; urgency=low\n\n * new upstream release.\n * optimize dash -c \"script\" to notice the last command and\n exec it without forking (thx Jilles Tjoelker; closes:\n #436466). This change is inspired by a similar trick in\n ksh, bash, and zsh and can be useful in commands passed to\n system(), popen(), and Makefiles, where \"exec\" is usually\n not explicitly used.\n * remove spurious space in descriptions of PS1, PS2, PS4 (thx\n Kalle Olavi Niemitalo; closes: #624715).\n * test builtin: use faccessat if available (closes: #539909,\n #556521) so ACLs and other corner cases can be handled\n correctly.\n * debian/diff/:\n - remove patches applied upstream (i.e. all except 0045, 0046).\n - 0045-SHELL-print-n-upon-EOF-...diff: rename to 0001-*.\n - 0046-PARSER-Remove-backslash-...diff: rename to 0002-*.\n - 0003-VAR-Disable-LINENO-support.diff: new; remove LINENO\n support (closes: #582952, reopens: #540685).\n * debian/po/sk.po: [INTL:sk] Slovak debconf templates (thx\n Slavko; closes: #611556).\n * debian/po/nl.po: [INTL:nl] Dutch debconf templates (thx\n Jeroen Schot; closes: #624172).\n\n -- Jonathan Nieder \[email protected]\u003e Wed, 17 Aug 2011 00:30:30 -0500\n\ndash (0.5.6.1-1~exp2) experimental; urgency=low\n\n * debian/diff/:\n - 0036-BUILTIN-Fix-corruption-of-reads...diff: remove; fixed\n upstream.\n - 0037-EVAL-Make-.-dev-null-return-.diff: remove; applied\n upstream.\n - 0034-SHELL-print-n-upon...diff: rename to 0045-*.\n - 0035-PARSER-Remove-backslash...diff: rename to 0046-*.\n - 0034...0044: new from the upstream \"master\" branch.\n - 0042-EXPAND-Free-IFS-state...diff: new from upstream:\n do not let parameter expansion in here documents corrupt word\n splitting state (thx Aurelien Jarno; closes: #618023).\n\n -- Jonathan Nieder \[email protected]\u003e Thu, 24 Mar 2011 17:24:05 -0500\n\ndash (0.5.6.1-1~exp1) experimental; urgency=low\n\n * new upstream release.\n * add preliminary LINENO support (closes: #540685, reopens:\n #582952).\n * fix corruption of redirections with byte 0x81 (closes:\n #532302).\n * honor tab as IFS whitespace in read (closes: #429251,\n #607174).\n * debian/diff/:\n - remove patches applied upstream (0001-0016, 0020).\n - 0021--INPUT-exit-127...diff: remove; patch is faulty\n (reopens: #548687).\n - 0022--EVAL-with-set-e-exit: remove; fixed upstream.\n - 0019--SHELL-print-n-upon...diff: rename to 0034-*.\n - 0001...0033: new from the upstream \"master\" branch.\n - 0035-PARSER-Remove-backslash-before...diff: new from the\n mailing list: remove backslashes used to escape closing\n braces in ${...} expressions (thx Jilles Tjoelker).\n - 0036-BUILTIN-Fix-corruption-of-reads...diff: new from the\n mailing list: do not corrupt input by removing CTLESC bytes\n ('\\x81') in readcmd (thx Alexey Gladkov).\n - 0037-EVAL-Make-.-dev-null-return-0.diff: new from the\n mailing list: dotcmd should yield status 0 when no command\n is executed (thx Tim Allen, closes: #615922).\n * debian/watch: document upstream source location.\n\n -- Jonathan Nieder \[email protected]\u003e Sun, 06 Mar 2011 21:11:25 -0600\n\ndash (0.5.5.1-7.4) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"ddclient","Version":"3.8.0-11.3","Release":"","NewVersion":"3.8.0-11.5","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of ddclient\nddclient (3.8.0-11.5) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Dutch; (Jeroen Schot). Closes: #650640\n - Bokmål, (Bjørn Steensrud). Closes: #653585\n - Polish (Michał Kułach). Closes: #661475\n\n -- Christian Perrier \[email protected]\u003e Tue, 06 Mar 2012 22:00:48 +0100\n\nddclient (3.8.0-11.4) UNRELEASED; urgency=low\n\n * Non-maintainer upload.\n * Prevent hang if IP address check blocks. Closes: #600054\n\n -- Stefano Rivera \[email protected]\u003e Wed, 04 Jan 2012 17:33:35 +0200\n\nddclient (3.8.0-11.3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"debconf","Version":"1.5.36.1","Release":"","NewVersion":"1.5.49","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"debconf-i18n","Version":"1.5.36.1","Release":"","NewVersion":"1.5.49","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"debian-archive-keyring","Version":"2014.3~deb7u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"debian-keyring","Version":"2013.04.21","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"debianutils","Version":"3.4","Release":"","NewVersion":"4.3.2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of debianutils\ndebianutils (4.3.2) unstable; urgency=low\n\n * Fix list of utilities in long description. closes: #666077.\n * run-parts(8): clarify that run-parts execution order is not\n locale-dependent. closes: #654340.\n * tempfile(1): note that tempfile cannot create directories.\n closes: #457974.\n\n -- Clint Adams \[email protected]\u003e Wed, 27 Jun 2012 21:44:53 -0400\n\ndebianutils (4.3.1) unstable; urgency=low\n\n * Updated Spanish man page translation from Omar Campagne. closes: #673631.\n\n -- Clint Adams \[email protected]\u003e Thu, 31 May 2012 20:56:30 -0400\n\ndebianutils (4.3) unstable; urgency=low\n\n * Patch from Wookey to set Multi-Arch: foreign. closes: #665964.\n * Patch from Wookey to fix stripping on cross-builds. closes: #665988.\n\n -- Clint Adams \[email protected]\u003e Tue, 27 Mar 2012 15:29:33 -0400\n\ndebianutils (4.2.2) unstable; urgency=low\n\n [ Michal Čihař ]\n * Properly handle situation inside vserver. closes: #665352.\n\n [ Clint Adams ]\n * Bump to Standards-Version 3.9.3.\n\n -- Clint Adams \[email protected]\u003e Sat, 24 Mar 2012 10:51:35 -0400\n\ndebianutils (4.2.1) unstable; urgency=low\n\n * Patch from Daniel Richman to unblock SIGCHLD before spawning.\n closes: #657947.\n\n -- Clint Adams \[email protected]\u003e Mon, 30 Jan 2012 23:29:02 -0500\n\ndebianutils (4.2) unstable; urgency=low\n\n * run-parts.c: Apply patch from Daniel Richman to better handle\n dead child processes. closes: #379645.\n\n -- Clint Adams \[email protected]\u003e Sat, 28 Jan 2012 15:47:18 -0500\n\ndebianutils (4.1) unstable; urgency=low\n\n [ Clint Adams ]\n * Add build-arch and build-indep targets.\n * Use dpkg-buildflags.\n\n [ Daniel Kahn Gillmor ]\n * ischroot now \"detects\" a chroot under fakechroot (Closes: #650141)\n\n -- Clint Adams \[email protected]\u003e Thu, 01 Dec 2011 20:52:56 -0500\n\ndebianutils (4.0.4) unstable; urgency=low\n\n * Remove csh from shells list. closes: #644778.\n * Remove ksh from shells list. closes: #644779.\n\n -- Clint Adams \[email protected]\u003e Sat, 08 Oct 2011 20:50:31 -0400\n\ndebianutils (4.0.3) unstable; urgency=low\n\n * Remove /usr/bin/esh from shells list (see #328802).\n * Remove /usr/bin/es from shells list (see #503547).\n * Remove /usr/bin/rc from shells list; handled by rc postinst/postrm.\n * Remove /bin/tcsh and /usr/bin/tcsh from shells list; handled by tcsh\n postinst/postrm.\n * German man page translation update from Helge Kreutzmann. closes: #628660.\n\n -- Clint Adams \[email protected]\u003e Sun, 02 Oct 2011 18:14:14 -0400\n\ndebianutils (4.0.2) unstable; urgency=low\n\n * French man page translation update from Christian Perrier.\n closes: #630170.\n\n -- Clint Adams \[email protected]\u003e Sun, 12 Jun 2011 11:44:19 -0400\n\ndebianutils (4.0.1) unstable; urgency=low\n\n * tempfile.1: state in the man page that tempfile is\n deprecated. closes: #627564.\n * ischroot.1: correct root/non-root logic claims.\n closes: #628465.\n\n -- Clint Adams \[email protected]\u003e Mon, 30 May 2011 10:54:03 -0400\n\ndebianutils (4) unstable; urgency=low\n\n * ischroot utility by Aurelien Jarno to detect chrootedness.\n closes: #627205.\n\n -- Clint Adams \[email protected]\u003e Wed, 18 May 2011 15:04:15 -0400\n\ndebianutils (3.4.6) unstable; urgency=low\n\n * Add Spanish man page translations from Omar\n Campagne. closes: #619016.\n * Updated German man page translations from Helge\n Kreutzmann. closes: #626891.\n\n -- Clint Adams \[email protected]\u003e Tue, 17 May 2011 23:29:42 -0400\n\ndebianutils (3.4.5) unstable; urgency=low\n\n * Vcs-Git update.\n * add-shell(8): grammar fix from Helge Kreutzmann. closes: #626409.\n * German man page translations from Helge Kreutzmann. closes: #626397.\n * Bump to Standards-Version 3.9.2.\n\n -- Clint Adams \[email protected]\u003e Thu, 12 May 2011 22:45:15 -0400\n\ndebianutils (3.4.4) unstable; urgency=low\n\n * French man page translation update from David Prévot.\n closes: #603908.\n * Patch from Jari Aalto to reorder tempfile options alphabetically.\n closes: #600542.\n\n -- Clint Adams \[email protected]\u003e Thu, 10 Feb 2011 17:24:34 -0500\n\ndebianutils (3.4.3) unstable; urgency=low\n\n * Patch from Ben Hutchings to have installkernel run hook scripts.\n closes: #607411.\n\n -- Clint Adams \[email protected]\u003e Tue, 18 Jan 2011 15:29:35 -0500\n\ndebianutils (3.4.2) unstable; urgency=low\n\n * Add Slovene man page translations from Peter Kragelj. closes:\n #598531.\n * French man page translation update from Christian Perrier. closes:\n #597486.\n * run-parts.8: be more precise about ASCII requirement in naming.\n closes: #542029.\n\n -- Clint Adams \[email protected]\u003e Sun, 14 Nov 2010 10:47:12 -0500\n\ndebianutils (3.4.1) unstable; urgency=low\n\n * po4a/po/fr.po: French man page translation update from\n Christian Perrier. closes: #597430.\n * Bump to Standards-Version 3.9.1.\n\n -- Clint Adams \[email protected]\u003e Sun, 19 Sep 2010 12:58:38 -0400\n\ndebianutils (3.4) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"dialog","Version":"1.1-20100428-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"diffutils","Version":"1:3.0-1","Release":"","NewVersion":"1:3.2-6","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of diffutils\ndiffutils (1:3.2-6) unstable; urgency=low\n\n * Forgot to update configure script after modifying m4/float_h.m4.\n\n -- Santiago Vila \[email protected]\u003e Sun, 29 Apr 2012 21:30:06 +0200\n\ndiffutils (1:3.2-5) unstable; urgency=low\n\n * The previous change didn't work. Fix it the right way: Applied patch\n by Bruno Haible (taken from gnulib) fixing powerpc float issues.\n\n -- Santiago Vila \[email protected]\u003e Sun, 29 Apr 2012 17:06:46 +0200\n\ndiffutils (1:3.2-4) unstable; urgency=medium\n\n * Modified gnulib-tests/Makefile.in to disable test-float,\n as it fails on powerpc.\n\n -- Santiago Vila \[email protected]\u003e Sun, 29 Apr 2012 14:53:14 +0200\n\ndiffutils (1:3.2-3) unstable; urgency=low\n\n * Switch to dh. Should hopefully cross-build from source now.\n Closes: #664270.\n\n -- Santiago Vila \[email protected]\u003e Thu, 12 Apr 2012 20:20:46 +0200\n\ndiffutils (1:3.2-2) unstable; urgency=low\n\n * Dropped dummy \"diff\" binary package.\n * Build with hardened flags. Closes: #653853.\n\n -- Santiago Vila \[email protected]\u003e Sat, 03 Mar 2012 13:31:40 +0100\n\ndiffutils (1:3.2-1) unstable; urgency=low\n\n * New upstream release.\n * Manual license is now GFDL without cover or back texts, which means\n we can generate diffutils-doc from this source package again.\n * Moved info manual to diffutils. Now diffutils-doc has only HTML.\n * However, no need to add Replaces: diffutils-doc (\u003c= 2.8.1-14)\n to diffutils, as old diff.info is now diffutils.info.\n * Info manual now clearly states that regular expressions are\n to be considered `grep'-style. Closes: #287682.\n * Fixed cmp manpage where it wrongly suggested \"info diff\" instead\n of \"info cmp\". Closes: #434214.\n * Manpage has improved a bit about format options. Closes: #547691.\n * Recursive diff now avoids printing excess slashes in concatenated\n file names. Closes: #586301.\n * Behaviour of --ignore-all-space has been clarified about what\n is to be considered \"white space\". Closes: #613319.\n * Fixed reporting of spurious differences. Closes: #633978.\n\n -- Santiago Vila \[email protected]\u003e Sun, 16 Oct 2011 16:47:44 +0200\n\ndiffutils (1:3.0-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"dmidecode","Version":"2.9-1.2","Release":"","NewVersion":"2.11-9","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of dmidecode\ndmidecode (2.11-9) unstable; urgency=low\n\n * Adding debug package.\n\n -- Daniel Baumann \[email protected]\u003e Fri, 18 May 2012 13:29:25 +0200\n\ndmidecode (2.11-8) unstable; urgency=low\n\n * Using package type instead of custom field for udeb package.\n * Adding patch to escape hypens in manpage.\n * Also passing cppflags to make (Closes: #655891).\n\n -- Daniel Baumann \[email protected]\u003e Fri, 18 May 2012 12:36:27 +0200\n\ndmidecode (2.11-7) unstable; urgency=low\n\n * Updating compression handling for udeb with newer debhelper.\n\n -- Daniel Baumann \[email protected]\u003e Fri, 18 May 2012 08:00:01 +0200\n\ndmidecode (2.11-6) unstable; urgency=low\n\n * Also passing ldflags to configure to enable all hardening build\n flags (Closes: #655891).\n * Updating to standards version 3.9.3.\n * Updating copyright file machine-readable format version 1.0.\n\n -- Daniel Baumann \[email protected]\u003e Mon, 16 Apr 2012 09:23:37 +0000\n\ndmidecode (2.11-5) unstable; urgency=low\n\n * Updating year in copyright file.\n * Updating to debhelper version 9.\n * Adding patch to avoid overwriting build environment rather than to\n just extend it.\n * Simplifying CFLAGS handing in rules.\n * Enabling hardening build options (Closes: #655891).\n\n -- Daniel Baumann \[email protected]\u003e Sat, 21 Jan 2012 11:16:31 +0100\n\ndmidecode (2.11-4) unstable; urgency=low\n\n * Using compression level 9 also for binary packages.\n * Adding patch from Jean Delvare \[email protected]\u003e to fix boundary\n checks of memory array location codes (DMI type 16).\n * Adding patch from Jean Delvare \[email protected]\u003e to update to\n support SMBIOS specification version 2.7.1.\n * Sorting overrides in rules alphabetically.\n\n -- Daniel Baumann \[email protected]\u003e Fri, 28 Oct 2011 21:54:37 +0200\n\ndmidecode (2.11-3) unstable; urgency=low\n\n * Adding patch from Svante Signell \[email protected]\u003e to\n enable build of all targets on GNU/Hurd (Closes: #643649).\n\n -- Daniel Baumann \[email protected]\u003e Wed, 28 Sep 2011 13:03:50 +0200\n\ndmidecode (2.11-2) unstable; urgency=low\n\n * Adding patch from Stefan Tauner \[email protected]\u003e\n to correctly decode the chassis-type (Closes: #637028).\n\n -- Daniel Baumann \[email protected]\u003e Wed, 28 Sep 2011 06:42:29 +0200\n\ndmidecode (2.11-1) unstable; urgency=low\n\n * Taking over package from Petter with thanks for his past work on the\n package.\n * Merging upstream version 2.11 (Closes: #531843, #639169).\n * Removing useless whitespaces at EOL and EOF.\n * Updating to debhelper version 8.\n * Updating to standards version 3.9.2.\n * Adding homepage field.\n * Switching to source format 3.0 (quilt).\n * Removing pre-squeeze conflict against lm-sensors.\n * Using architecture patterns (Closes: #480571).\n * Sorting depends.\n * Adding misc-depends to udeb.\n * Removing watch file.\n * Rewriting package descriptions.\n * Rewriting copyright file in machine-interpretable format.\n * Prefixing debhelper files with package name.\n * Adding authors file to docs.\n * Minimizing rules file.\n * Sorting fields in control.\n * Removing unused debhelper dirs files.\n * Adding debhelper install files.\n * Avoid installing readme file, no additional useful content.\n\n -- Daniel Baumann \[email protected]\u003e Tue, 27 Sep 2011 21:23:46 +0200\n\ndmidecode (2.9-1.2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"dmsetup","Version":"2:1.02.48-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"dnsmasq","Version":"2.55-2+deb6u1","Release":"","NewVersion":"2.62-3+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of dnsmasq\ndnsmasq (2.62-3+deb7u3) wheezy-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * Handle case where SO_REUSEPORT may be defined but not supported by\n the running kernel.\n The update for CVE-2015-3294 caused a regression for the armel and armhf\n builds due to a newer linux-libc-dev package installed in the wheezy\n chroots used for the build. The libc headers defined SO_REUSEPORT,\n whereas the kernel in wheezy does not support it uncovering this\n problem. (Closes: #784571)\n * Set SO_REUSEADDR as well as SO_REUSEPORT on DHCP sockets when\n both are available\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 06 May 2015 21:37:29 +0200\n\ndnsmasq (2.62-3+deb7u2) wheezy-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * CVE-2015-3294: denial of service and memory disclosure via malformed\n DNS requests (Closes: #783459)\n\n -- Salvatore Bonaccorso \[email protected]\u003e Tue, 05 May 2015 12:50:41 +0200\n\ndnsmasq (2.62-3+deb7u1) testing-proposed-updates; urgency=low\n\n * Non-maintainer upload.\n * Backport fix for symlink attacks from 2.63-4\n (Closes: #686484)\n\n -- Jonathan Wiltshire \[email protected]\u003e Sun, 10 Feb 2013 21:07:17 +0000\n\ndnsmasq (2.62-3) unstable; urgency=low\n\n * Do resolvconf and /etc/default startup logic when\n starting with systemd. (closes: #675854)\n\n -- Simon Kelley \[email protected]\u003e Mon, 11 Jun 2012 21:50:11 +0000\n\ndnsmasq (2.62-2) unstable; urgency=low\n\n * Pass LDFLAGS to make to get hardening in linker.\n\n -- Simon Kelley \[email protected]\u003e Thu, 7 June 2012 09:53:43 +0000\n\ndnsmasq (2.62-1) unstable; urgency=low\n\n * New upstream.\n * Use dpkg-buildflags. (Enables hardening).\n\n -- Simon Kelley \[email protected]\u003e Sat, 12 May 2012 15:25:23 +0000\n\ndnsmasq (2.61-1) unstable; urgency=low\n\n * New upstream.\n * Provide \"dump-stats\" initscript method. (closes: #654656)\n * Add (empty) build-indep and build-arch rules targets.\n * Bump standards-version to 3.9.3\n * Add port option to example dnsmasq.conf (closes: #668386)\n\n -- Simon Kelley \[email protected]\u003e Tue, 6 Mar 2012 19:45:43 +0000\n\ndnsmasq (2.60-2) unstable; urgency=high\n\n * Fix DHCPv4 segfault. (closes: #665008)\n\n -- Simon Kelley \[email protected]\u003e Fri, 23 Mar 2012 09:37:23 +0000\n\ndnsmasq (2.60-1) unstable; urgency=low\n\n * New upstream.\n * Bump standards-version to 3.9.2\n * Fix typo in example config file. (closes: #654897)\n\n -- Simon Kelley \[email protected]\u003e Thu, 1 Dec 2011 15:49:33 +0000\n\ndnsmasq (2.59-4) unstable; urgency=low\n\n * Supply /etc/insserv.conf.d/dnsmasq (closes: #650540)\n\n -- Simon Kelley \[email protected]\u003e Thu, 1 Dec 2011 11:35:13 +0000\n\ndnsmasq (2.59-3) unstable; urgency=low\n\n * Stop daemon at runlevels 0, 1 and 6. (closes: #647726)\n\n -- Simon Kelley \[email protected]\u003e Sat, 26 Nov 2011 15:28:33 +0000\n\ndnsmasq (2.59-2) unstable; urgency=low\n\n * Fix reported version number.\n\n -- Simon Kelley \[email protected]\u003e Wed, 19 Oct 2011 09:25:53 +0000\n\ndnsmasq (2.59-1) unstable; urgency=low\n\n * New upstream.\n * Fix IPv6 bind problem (closes: #644345)\n\n -- Simon Kelley \[email protected]\u003e Sat, 8 Oct 2011 16:34:13 +0000\n\ndnsmasq (2.58-3) unstable; urgency=low\n\n * Fix resolvconf script location. (closes: #641717)\n * Update systemd service file. (closes: #640095)\n\n -- Simon Kelley \[email protected]\u003e Thu, 15 Sep 2011 16:33:23 +0000\n\ndnsmasq (2.58-2) unstable; urgency=low\n\n * Fix resolvconf script. (closes: #639963)\n\n -- Simon Kelley \[email protected]\u003e Thu, 1 Sep 2011 10:05:23 +0000\n\ndnsmasq (2.58-1) unstable; urgency=low\n\n * New upstream.\n * Add noconntrack DEB_BUILD_OPTIONS flag.\n * Improve error message when tag:xxx appears\n in --dhcp-host (closes: #627986)\n * Add /usr/lib/resolvconf/packaging-event.d/dnsmasq (closes: #628003)\n * Update resolvconf hook script to sleep only\n when necessary. (closes: #627789)\n * Tweak behaviour of --domain-needed to avoid problems with recursive\n nameservers _downstream_ of dnsmasq. (closes: #630637)\n * Allow processes running as uid dnsmasq to send messages on the DBus,\n so that dnsmasq can return errors. (closes: #635017)\n * Add /lib/systemd/system/dnsmasq.service (closes: #635753)\n * New binary package, dnsmasq-utils, containing dhcp_release and\n dhcp_lease_time from contrib/wrt. Note that these are Linux-specific\n so this package is Architecture: linux-any (closes: #638136)\n\n -- Simon Kelley \[email protected]\u003e Mon, 22 Aug 2011 14:57:03 +0000\n\ndnsmasq (2.57-1) unstable; urgency=low\n\n * New upstream.\n * Fix typos in example config file. (closes: #606615)\n * Bump standards-version to 3.9.1\n * Add noidn DEB_BUILD_OPTIONS flag.\n * Don't complain about extra command line arguments if\n they are empty, as this breaks libvirt. (closes: #613915)\n\n -- Simon Kelley \[email protected]\u003e Fri, 18 Feb 2011 09:54:13 +0000\n\ndnsmasq (2.56-1) unstable; urgency=low\n\n * New upstream.\n * Die if non-option args present on the command-line. (closes: #589885)\n * Tighten up use of IGNORE_RESOLVCONF in initscript. (closes: #575345)\n * Update URL of ISC's explanation of dhcp-authoritative in the example\n configuration file. (closes: #604870)\n * Cosmetic changes to dnsmasq.conf.example. (closes: #598790)\n * More dnsmasq.conf.example fixes. (closes: #606615)\n * Add other resolv.conf locations to FILES section of the manual\n page. (closes: #603505)\n * Clarify configuration for static IP addresses in the absence of\n resolvconf in the Debian readme file. (closes: #604035)\n * Fix handling of obsolete DNSMASQ_INTERFACE and DNSMASQ_EXCEPT\n variables in /etc/default/dnsmasq. (LP: #691329)\n * Provide debian/source/format.\n\n -- Simon Kelley \[email protected]\u003e Fri, 17 Dec 2010 13:17:33 +0000\n\ndnsmasq (2.55-2) unstable; urgency=high","Method":"ChangelogLenientMatch"}},{"Name":"dnsmasq-base","Version":"2.55-2+deb6u1","Release":"","NewVersion":"2.62-3+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of dnsmasq-base\ndnsmasq (2.62-3+deb7u3) wheezy-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * Handle case where SO_REUSEPORT may be defined but not supported by\n the running kernel.\n The update for CVE-2015-3294 caused a regression for the armel and armhf\n builds due to a newer linux-libc-dev package installed in the wheezy\n chroots used for the build. The libc headers defined SO_REUSEPORT,\n whereas the kernel in wheezy does not support it uncovering this\n problem. (Closes: #784571)\n * Set SO_REUSEADDR as well as SO_REUSEPORT on DHCP sockets when\n both are available\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 06 May 2015 21:37:29 +0200\n\ndnsmasq (2.62-3+deb7u2) wheezy-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * CVE-2015-3294: denial of service and memory disclosure via malformed\n DNS requests (Closes: #783459)\n\n -- Salvatore Bonaccorso \[email protected]\u003e Tue, 05 May 2015 12:50:41 +0200\n\ndnsmasq (2.62-3+deb7u1) testing-proposed-updates; urgency=low\n\n * Non-maintainer upload.\n * Backport fix for symlink attacks from 2.63-4\n (Closes: #686484)\n\n -- Jonathan Wiltshire \[email protected]\u003e Sun, 10 Feb 2013 21:07:17 +0000\n\ndnsmasq (2.62-3) unstable; urgency=low\n\n * Do resolvconf and /etc/default startup logic when\n starting with systemd. (closes: #675854)\n\n -- Simon Kelley \[email protected]\u003e Mon, 11 Jun 2012 21:50:11 +0000\n\ndnsmasq (2.62-2) unstable; urgency=low\n\n * Pass LDFLAGS to make to get hardening in linker.\n\n -- Simon Kelley \[email protected]\u003e Thu, 7 June 2012 09:53:43 +0000\n\ndnsmasq (2.62-1) unstable; urgency=low\n\n * New upstream.\n * Use dpkg-buildflags. (Enables hardening).\n\n -- Simon Kelley \[email protected]\u003e Sat, 12 May 2012 15:25:23 +0000\n\ndnsmasq (2.61-1) unstable; urgency=low\n\n * New upstream.\n * Provide \"dump-stats\" initscript method. (closes: #654656)\n * Add (empty) build-indep and build-arch rules targets.\n * Bump standards-version to 3.9.3\n * Add port option to example dnsmasq.conf (closes: #668386)\n\n -- Simon Kelley \[email protected]\u003e Tue, 6 Mar 2012 19:45:43 +0000\n\ndnsmasq (2.60-2) unstable; urgency=high\n\n * Fix DHCPv4 segfault. (closes: #665008)\n\n -- Simon Kelley \[email protected]\u003e Fri, 23 Mar 2012 09:37:23 +0000\n\ndnsmasq (2.60-1) unstable; urgency=low\n\n * New upstream.\n * Bump standards-version to 3.9.2\n * Fix typo in example config file. (closes: #654897)\n\n -- Simon Kelley \[email protected]\u003e Thu, 1 Dec 2011 15:49:33 +0000\n\ndnsmasq (2.59-4) unstable; urgency=low\n\n * Supply /etc/insserv.conf.d/dnsmasq (closes: #650540)\n\n -- Simon Kelley \[email protected]\u003e Thu, 1 Dec 2011 11:35:13 +0000\n\ndnsmasq (2.59-3) unstable; urgency=low\n\n * Stop daemon at runlevels 0, 1 and 6. (closes: #647726)\n\n -- Simon Kelley \[email protected]\u003e Sat, 26 Nov 2011 15:28:33 +0000\n\ndnsmasq (2.59-2) unstable; urgency=low\n\n * Fix reported version number.\n\n -- Simon Kelley \[email protected]\u003e Wed, 19 Oct 2011 09:25:53 +0000\n\ndnsmasq (2.59-1) unstable; urgency=low\n\n * New upstream.\n * Fix IPv6 bind problem (closes: #644345)\n\n -- Simon Kelley \[email protected]\u003e Sat, 8 Oct 2011 16:34:13 +0000\n\ndnsmasq (2.58-3) unstable; urgency=low\n\n * Fix resolvconf script location. (closes: #641717)\n * Update systemd service file. (closes: #640095)\n\n -- Simon Kelley \[email protected]\u003e Thu, 15 Sep 2011 16:33:23 +0000\n\ndnsmasq (2.58-2) unstable; urgency=low\n\n * Fix resolvconf script. (closes: #639963)\n\n -- Simon Kelley \[email protected]\u003e Thu, 1 Sep 2011 10:05:23 +0000\n\ndnsmasq (2.58-1) unstable; urgency=low\n\n * New upstream.\n * Add noconntrack DEB_BUILD_OPTIONS flag.\n * Improve error message when tag:xxx appears\n in --dhcp-host (closes: #627986)\n * Add /usr/lib/resolvconf/packaging-event.d/dnsmasq (closes: #628003)\n * Update resolvconf hook script to sleep only\n when necessary. (closes: #627789)\n * Tweak behaviour of --domain-needed to avoid problems with recursive\n nameservers _downstream_ of dnsmasq. (closes: #630637)\n * Allow processes running as uid dnsmasq to send messages on the DBus,\n so that dnsmasq can return errors. (closes: #635017)\n * Add /lib/systemd/system/dnsmasq.service (closes: #635753)\n * New binary package, dnsmasq-utils, containing dhcp_release and\n dhcp_lease_time from contrib/wrt. Note that these are Linux-specific\n so this package is Architecture: linux-any (closes: #638136)\n\n -- Simon Kelley \[email protected]\u003e Mon, 22 Aug 2011 14:57:03 +0000\n\ndnsmasq (2.57-1) unstable; urgency=low\n\n * New upstream.\n * Fix typos in example config file. (closes: #606615)\n * Bump standards-version to 3.9.1\n * Add noidn DEB_BUILD_OPTIONS flag.\n * Don't complain about extra command line arguments if\n they are empty, as this breaks libvirt. (closes: #613915)\n\n -- Simon Kelley \[email protected]\u003e Fri, 18 Feb 2011 09:54:13 +0000\n\ndnsmasq (2.56-1) unstable; urgency=low\n\n * New upstream.\n * Die if non-option args present on the command-line. (closes: #589885)\n * Tighten up use of IGNORE_RESOLVCONF in initscript. (closes: #575345)\n * Update URL of ISC's explanation of dhcp-authoritative in the example\n configuration file. (closes: #604870)\n * Cosmetic changes to dnsmasq.conf.example. (closes: #598790)\n * More dnsmasq.conf.example fixes. (closes: #606615)\n * Add other resolv.conf locations to FILES section of the manual\n page. (closes: #603505)\n * Clarify configuration for static IP addresses in the absence of\n resolvconf in the Debian readme file. (closes: #604035)\n * Fix handling of obsolete DNSMASQ_INTERFACE and DNSMASQ_EXCEPT\n variables in /etc/default/dnsmasq. (LP: #691329)\n * Provide debian/source/format.\n\n -- Simon Kelley \[email protected]\u003e Fri, 17 Dec 2010 13:17:33 +0000\n\ndnsmasq (2.55-2) unstable; urgency=high","Method":"ChangelogLenientMatch"}},{"Name":"dpkg","Version":"1.15.12","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"e2fslibs","Version":"1.41.12-4+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"e2fsprogs","Version":"1.41.12-4+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ed","Version":"1.4-3","Release":"","NewVersion":"1.6-2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of ed\ned (1.6-2) unstable; urgency=low\n\n * Enable hardening build flags. \n * Bump Standards-Version, no changes needed.\n * Add lintian overwrite for build-depends-on-obsolete-package.\n\n -- Martin Zobel-Helas \[email protected]\u003e Tue, 29 May 2012 15:32:44 +0200\n\ned (1.6-1) unstable; urgency=low\n\n * Imported Upstream version 1.6\n\n -- Martin Zobel-Helas \[email protected]\u003e Mon, 02 Jan 2012 16:56:21 +0100\n\ned (1.5-3) unstable; urgency=low\n\n * uuuups, that should not have gone to unstanle\n removed ed Provides: editor\n\n -- Martin Zobel-Helas \[email protected]\u003e Sun, 04 Sep 2011 13:53:47 +0200\n\ned (1.5-2) unstable; urgency=low\n\n * ed Provides: editor\n * fix lintian warning description-synopsis-starts-with-article\n * bump Standards-Version, no changes needed.\n\n -- Martin Zobel-Helas \[email protected]\u003e Sun, 04 Sep 2011 13:01:49 +0200\n\ned (1.5-1) experimental; urgency=low\n\n * Imported Upstream version 1.5\n * updated Makefile.in patch\n * Bump Standards-Version, no changes needed.\n * add debian/source/format\n * add debian/watch\n * update to newer debhelper (Closes: #577122)\n * add README.source and fix patches/ to please lintian\n\n -- Martin Zobel-Helas \[email protected]\u003e Tue, 14 Sep 2010 23:49:59 +0200\n\ned (1.4-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"eject","Version":"2.1.5+deb1+cvs20081104-7.1","Release":"","NewVersion":"2.1.5+deb1+cvs20081104-13+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"ethtool","Version":"1:2.6.34-3","Release":"","NewVersion":"1:3.4.2-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of ethtool\nethtool (1:3.4.2-1) unstable; urgency=low\n\n * New upstream release:\n - Fix regression in RX NFC rule insertion for drivers that do not\n select rule locations (-N/-U option)\n - Remove bogus error message when changing offload settings on\n Linux \u003c 2.6.39 (-K option)\n - Use alternate method to check for VLAN tag offload on Linux \u003c 2.6.37\n (-k option)\n\n -- Ben Hutchings \[email protected]\u003e Thu, 19 Jul 2012 03:28:01 +0100\n\nethtool (1:3.4.1-1) unstable; urgency=low\n\n * New upstream release\n\n -- Ben Hutchings \[email protected]\u003e Wed, 13 Jun 2012 03:42:08 +0100\n\nethtool (1:3.2-1) unstable; urgency=low\n\n * New upstream release\n\n -- Ben Hutchings \[email protected]\u003e Sat, 28 Apr 2012 16:11:43 +0100\n\nethtool (1:3.1-1) unstable; urgency=low\n\n * New upstream release\n\n -- Ben Hutchings \[email protected]\u003e Sun, 11 Dec 2011 22:29:38 +0000\n\nethtool (1:3.0-1) unstable; urgency=low\n\n * New upstream release\n\n -- Ben Hutchings \[email protected]\u003e Sun, 21 Aug 2011 00:21:09 +0100\n\nethtool (1:2.6.39-1) unstable; urgency=low\n\n * New upstream release\n - Add support for e1000 M88 PHY registers (-d option) (Closes: #574574)\n * Note that additional protocol offloads may be controlled through\n /etc/network/interfaces\n * Update policy version to 3.9.2; no changes required\n\n -- Ben Hutchings \[email protected]\u003e Sat, 04 Jun 2011 21:55:17 +0100\n\nethtool (1:2.6.38-1) unstable; urgency=low\n\n * New upstream release\n - Don't silently ignore speed/duplex when autoneg is on (Closes: #457971)\n * Update upstream homepage and download URLs\n * Convert copyright information to DEP5 format\n * Add some missing copyright information\n\n -- Ben Hutchings \[email protected]\u003e Sat, 02 Apr 2011 17:13:01 +0100\n\nethtool (1:2.6.37-1) unstable; urgency=low\n\n * New upstream release\n - Includes our patch 01-fix-man-rx-hash-opts.patch\n * Remove conflict with ancient sparc-utils\n * Don't install the upstream changelog file; changes are now recorded\n in git history and the NEWS file instead\n\n -- Ben Hutchings \[email protected]\u003e Sat, 19 Feb 2011 03:07:34 +0000\n\nethtool (1:2.6.34-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"eventwatchd","Version":"0.2+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"file","Version":"5.04-5+squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"findutils","Version":"4.4.2-1+b1","Release":"","NewVersion":"4.4.2-4","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of findutils\nfindutils (4.4.2-4) unstable; urgency=low\n\n * Use 3.0 (quilt) format.\n * 10_Fix29828-testsuite-FreeBSD.patch, pulled from 4.5 series. Fix testsuite\n deadlock on FreeBSD.\n\n -- Andreas Metzler \[email protected]\u003e Fri, 06 Jan 2012 10:40:28 +0100\n\nfindutils (4.4.2-3) unstable; urgency=low\n\n * Drop all dpatch related stuff.\n\n -- Andreas Metzler \[email protected]\u003e Sat, 31 Dec 2011 17:19:39 +0100\n\nfindutils (4.4.2-2) unstable; urgency=low\n\n * Use dh_installcron to install locate's cron script.\n * Stop suggesting slocate, it has been removed from the archive.\n Closes: #565653\n * Enable hardened build flags through dpkg-buildflags. (Thank's, Moritz\n Muehlenhoff). Closes: #653849\n * Drop dpatch build-dependency.\n\n -- Andreas Metzler \[email protected]\u003e Sat, 31 Dec 2011 16:21:15 +0100\n\nfindutils (4.4.2-1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"fuse-utils","Version":"2.8.4-1.1+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"gawk","Version":"1:3.1.7.dfsg-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"gcc-4.4-base","Version":"4.4.5-8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"gettext-base","Version":"0.18.1.1-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"gnupg","Version":"1.4.10-4+squeeze7","Release":"","NewVersion":"1.4.12-7+deb7u8","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"gpgv","Version":"1.4.10-4+squeeze7","Release":"","NewVersion":"1.4.12-7+deb7u8","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"grep","Version":"2.6.3-3+squeeze1","Release":"","NewVersion":"2.12-2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of grep\ngrep (2.12-2) unstable; urgency=low\n\n * Updated debian/watch to match .tar.xz files \n * Added 90-672240-exclude.patch so that --exclude excludes again \n (Closes: #672240)\n\n -- Santiago Ruano Rincón \[email protected]\u003e Sun, 13 May 2012 14:08:01 +0200\n\ngrep (2.12-1) unstable; urgency=low\n\n * New upstream version 2.12\n Merged upstream:\n 82-669084-stdin-exemption.patch\n 81-668585-excluded_file_name.patch\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Tue, 08 May 2012 11:41:50 +1000\n\ngrep (2.11-3) unstable; urgency=low\n\n * --devices=ACTION (-D) no longer affects stdin \n Add 82-669084-stdin-exemption.patch\n Closes: #669084\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Tue, 17 Apr 2012 22:49:08 +1000\n\ngrep (2.11-2) unstable; urgency=low\n\n * Don't segfault with -r --exclude-dir and no file operand\n Add 81-668585-excluded_file_name.patch\n Patch by Allan McRae\n Closes: #668585\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Fri, 13 Apr 2012 18:29:01 +1000\n\ngrep (2.11-1) unstable; urgency=low\n\n * New upstream version 2.11\n Closes: #668534\n Fix \"input file == output file detection and -q\"\n Closes: #651617\n * Enable hardened build flags\n Patch by Moritz Muehlenhoff\n Closes: #655502\n * Drop 55-185208-bigfile.patch as it doesn't work\n * Standards Version is 3.9.3\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Fri, 13 Apr 2012 09:20:46 +1000\n\ngrep (2.10-1) unstable; urgency=low\n\n * New upstream version 2.10\n * Fix unneeded-build-dep-on-quilt\n * Fix debian-rules-missing-recommended-target\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Sun, 04 Dec 2011 21:17:33 +1100\n\ngrep (2.9-2) unstable; urgency=low\n\n * Removed 60-76011-main.c.patch introduced in the last revision. It\n introduces a bug and needs further discusion. See:\n https://savannah.gnu.org/patch/?7577\n\n -- Santiago Ruano Rincón \[email protected]\u003e Thu, 18 Aug 2011 00:31:57 +0200\n\ngrep (2.9-1) unstable; urgency=low\n\n * 60-76011-main.c.patch: `grep -lc' does not show files with no occurrences. \n Thanks to Peter Samuelson. (Closes: #76011)\n * New upstream release.\n - Fixes locales and brackets-related bug (Closes: #624387)\n * Updating 80-587930-man-ere-reference.patch to add changes in info page\n\n -- Santiago Ruano Rincón \[email protected]\u003e Wed, 13 Jul 2011 20:02:15 -0400\n\ngrep (2.8-2) unstable; urgency=low\n\n * Applying patch to improve reference acronyms in man page. Thanks to \n Chris Butler. (Closes: #587930)\n * Bump Standars-Version to 3.9.2. No changes needed\n\n -- Santiago Ruano Rincón \[email protected]\u003e Tue, 31 May 2011 19:05:48 +0200\n\ngrep (2.8-1) experimental; urgency=low\n\n * New upstream version: 2.8\n * Removing, since not longer needed:\n - 80-495993-catalan_translation.patch\n - 90-dfasearch-hurd.patch\n * Really applying 55-185208-bigfile.patch\n\n -- Santiago Ruano Rincón \[email protected]\u003e Sun, 29 May 2011 11:04:28 +0200\n\ngrep (2.7-2) experimental; urgency=low\n\n * Adding 90-dfasearch-hurd.patch to avoid error \n when compiling on hurd.\n\n -- Santiago Ruano Rincón \[email protected]\u003e Tue, 19 Apr 2011 21:17:27 +0200\n\ngrep (2.7-1) experimental; urgency=low\n\n * New upstream version, 2.7\n - Updated patches: \n 03-397262-dlopen-pcre.patch\n 55-185208-bigfile.patch\n 80-495993-catalan_translation.patch\n - Not longer needed, now included in upstream: \n 05-kwset.c.patch\n 06-578709-ignore-MMAP_OPTION.patch\n * Merging with Ubuntu:\n - Don't pass -ldl in CFLAGS, but in LIBS instead. (Closes: #596266)\n - Verbose build by default.\n * Bump Standars-Version to 3.9.1, no changes needed\n * Vcs-Git and Vcs-Browser fileds included again\n\n -- Santiago Ruano Rincón \[email protected]\u003e Mon, 18 Apr 2011 18:23:03 +0200\n\ngrep (2.6.3-3) unstable; urgency=high","Method":"ChangelogLenientMatch"}},{"Name":"groff-base","Version":"1.20.1-10","Release":"","NewVersion":"1.21-9","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of groff-base\ngroff (1.21-9) unstable; urgency=low\n\n * Pass build flags in a few more places (based on a patch from Simon\n Ruderich; closes: #653852).\n\n -- Colin Watson \[email protected]\u003e Mon, 25 Jun 2012 01:32:46 +0100\n\ngroff (1.21-8) unstable; urgency=low\n\n * Use dpkg-buildflags to enable hardening options (based on a patch from\n Moritz Muehlenhoff; closes: #653852).\n * Adjust paths in groff_mom(7) (closes: #611904).\n\n -- Colin Watson \[email protected]\u003e Fri, 22 Jun 2012 13:11:24 +0100\n\ngroff (1.21-7) unstable; urgency=low\n\n * Make groff-base and groff Multi-Arch: foreign.\n * Support cross-building.\n\n -- Colin Watson \[email protected]\u003e Sun, 01 Apr 2012 02:00:26 +0100\n\ngroff (1.21-6) unstable; urgency=low\n\n * Add mdoc support for various BSD versions (thanks, Guillem Jover;\n closes: #629159).\n\n -- Colin Watson \[email protected]\u003e Mon, 06 Jun 2011 12:09:05 +0100\n\ngroff (1.21-5) unstable; urgency=low\n\n * Fix -mm .RD macro to use .if rather than .ie (thanks, James Avera;\n LP: #738169).\n\n -- Colin Watson \[email protected]\u003e Sat, 19 Mar 2011 22:48:00 +0000\n\ngroff (1.21-4) unstable; urgency=low\n\n * Upload to unstable.\n\n -- Colin Watson \[email protected]\u003e Tue, 08 Feb 2011 10:29:38 +0000\n\ngroff (1.21-3) experimental; urgency=low\n\n * Go back to installing groff.info from the source directory, not the\n build directory; timestamps are such that make won't rebuild it (closes:\n #609459).\n\n -- Colin Watson \[email protected]\u003e Tue, 11 Jan 2011 03:37:52 +0000\n\ngroff (1.21-2) experimental; urgency=low\n\n * Build-depend on texinfo (closes: #609459).\n * Only emit a single backspace for bold/underline in no-SGR mode.\n\n -- Colin Watson \[email protected]\u003e Mon, 10 Jan 2011 19:48:58 +0000\n\ngroff (1.21-1) experimental; urgency=low\n\n * New upstream release:\n - New warning category 'file'. (man-db uses this as part of\n automatically enabling language-specific hyphenation rules, which\n should now work.)\n - CJK line-breaking and hyphenation support (closes: #552201).\n - Fix typo in groff_man(7) (closes: #369254).\n - Fix typo in \"Character Translations\" info node (closes: #450434).\n - Fix white heart and diamond Unicode values in groff_char(7) (closes:\n #540477).\n - Point to troff(1) for -w and -W in groff(1) (closes: #545807).\n * Document reasons for groff's Recommends in its package description\n (closes: #599648).\n * Switch build-dependency from byacc to bison, as that's what was used to\n generate the parsers in the 1.21 release.\n * Force YACC='bison -y' when configuring, to avoid problems if byacc is\n also installed.\n * Use a separate build directory, eliminating the requirement to preserve\n some files by hand.\n * Policy version 3.9.1:\n - Rename debian/README.build to debian/README.source.\n - Add a Homepage field.\n - Refer to /usr/share/common-licenses/GFDL-1.3 in debian/copyright\n rather than quoting it (although the GPL v3 governs this package, as\n explained in detail in debian/copyright).\n - Use Breaks rather than Conflicts.\n\n -- Colin Watson \[email protected]\u003e Sun, 09 Jan 2011 13:15:30 +0000\n\ngroff (1.20.1-10) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"grub-common","Version":"1.98+20100804-14+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"grub-pc","Version":"1.98+20100804-14+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"gzip","Version":"1.3.12-9+squeeze1","Release":"","NewVersion":"1.5-1.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of gzip\ngzip (1.5-1.1) unstable; urgency=low\n\n * Non-maintainer upload with permission of maintainer.\n * Clean up the debian/rules file to fix FTBFS caused by\n inclusion of build-indep on binary-arch target.\n\n -- Thorsten Glaser \[email protected]\u003e Wed, 20 Jun 2012 16:10:12 +0200\n\ngzip (1.5-1) unstable; urgency=low\n\n * new upstream version, with updated gnulib that closes: #669434\n * patch to restore zgrep -h from Pär-Ola Nilsson, closes: #658734\n * patch to fix pack reference in gzip man page from Stéphane Aulery,\n closes: #308522\n * patch to add --rsyncable doc to info page from Jörgen Grahn,\n closes: #637626\n * patch to improve zdiff doc from Stéphane Aulery, closes: #269612\n * patches to fix RFC URLs from Stéphane Aulery, closes: #636182\n\n -- Bdale Garbee \[email protected]\u003e Tue, 19 Jun 2012 14:04:08 -0600\n\ngzip (1.4-5) unstable; urgency=low\n\n * patch from upstream to address determinism issue, closes: #647522\n\n -- Bdale Garbee \[email protected]\u003e Mon, 19 Mar 2012 11:07:22 +0100\n\ngzip (1.4-4) unstable; urgency=low\n\n * enable hardening build flags, closes: #664499\n\n -- Bdale Garbee \[email protected]\u003e Sun, 18 Mar 2012 20:16:45 +0100\n\ngzip (1.4-3) unstable; urgency=low\n\n * patch from upstream for sys_stat.in.h to fix mingw32 builds, \n closes: #653960\n\n -- Bdale Garbee \[email protected]\u003e Mon, 05 Mar 2012 22:13:33 -0700\n\ngzip (1.4-2) unstable; urgency=low\n\n * patch to use DEB_HOST_ARCH in rules, closes: #644785\n * fix missing stamp creating in rules file causing extra build cycle,\n closes: #648555\n\n -- Bdale Garbee \[email protected]\u003e Sat, 12 Nov 2011 17:24:17 -0700\n\ngzip (1.4-1) unstable; urgency=low\n\n * new upstream version, closes: #627121, #633927\n * add Vcs entries to control file\n * patch zless LESSOPEN definition to allow handling of gunzip data on STDIN,\n closes: #248302\n * Build using mingw-w64 instead of mingw32, closes: #623428\n * update to current policy, source package formats, etc\n\n -- Bdale Garbee \[email protected]\u003e Wed, 20 Apr 2011 01:48:46 -0600\n\ngzip (1.3.12-9) unstable; urgency=high","Method":"ChangelogLenientMatch"}},{"Name":"heartbeat","Version":"1:3.0.3-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"host","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"1:9.8.4.dfsg.P1-6+nmu2+deb7u18","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"hostapd","Version":"1:1.1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"hostname","Version":"3.04","Release":"","NewVersion":"3.11","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of hostname\nhostname (3.11) unstable; urgency=low\n\n * Fixed typo in manpage.\n Thanks to Regid Ichira \[email protected]\u003e (Closes: #659836)\n * Order options alphabetically in program.\n Thanks to Jari Aalto \[email protected]\u003e (Closes: #660106)\n * Combine options in manpage.\n * Do not install hostname.1.fr anymore because it is outdated.\n\n -- Michael Meskes \[email protected]\u003e Thu, 16 Feb 2012 16:02:01 +0100\n\nhostname (3.10) unstable; urgency=low\n\n * Enabled hardened build flag.\n Thanks to Moritz Muehlenhoff \[email protected]\u003e (Closes: #655874)\n\n -- Michael Meskes \[email protected]\u003e Sun, 15 Jan 2012 13:52:38 +0100\n\nhostname (3.09) unstable; urgency=low\n\n * Order items alphabetically in manpage.\n Thanks to Jari Aalto \[email protected]\u003e (Closes: #653269)\n\n -- Michael Meskes \[email protected]\u003e Wed, 28 Dec 2011 15:14:48 +0100\n\nhostname (3.08) unstable; urgency=low\n\n * Prevent a potential buffer underrun.\n * Clarified FQDN message in man page. (Closes: #626292)\n * Use Breaks instead of Conflicts.\n\n -- Michael Meskes \[email protected]\u003e Fri, 23 Dec 2011 11:07:34 +0100\n\nhostname (3.07) unstable; urgency=low\n\n * Strip leading and trailing whitespaces from hostname. (Closes: #650822)\n * Bumped Standards-Version to 3.9.2, no changes needed.\n * Added build-arch and build-indep targets to rules file.\n\n -- Michael Meskes \[email protected]\u003e Thu, 22 Dec 2011 16:31:05 +0100\n\nhostname (3.06) unstable; urgency=low\n\n * Relax version comparison to make binnmus possible. (Closes: #616683)\n\n -- Michael Meskes \[email protected]\u003e Mon, 07 Mar 2011 12:31:08 +0100\n\nhostname (3.05) unstable; urgency=low\n\n * Updated hostname.c to carry correct version number. (Closes:\n #602987)\n * Bumped Standards-Version to 3.9.1, no changes needed.\n * Added source/format file.\n\n -- Michael Meskes \[email protected]\u003e Tue, 16 Nov 2010 14:31:07 +0100\n\nhostname (3.04) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"iftop","Version":"0.17-16","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ifupdown","Version":"0.6.10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"igmpproxy","Version":"1:0.1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"initramfs-tools","Version":"0.99.0+vyos2+lithium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"initscripts","Version":"2.88dsf-13.1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"insserv","Version":"1.14.0-2","Release":"","NewVersion":"1.14.0-5","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of insserv\ninsserv (1.14.0-5) unstable; urgency=low\n\n * Add +mountall-bootclean to $local_fs virtual facility definition in\n insserv.conf. (Closes: #693371)\n * Add test_bootmisc_order test to suite to verify the mountall-bootclean\n dependency works as expected.\n\n -- Kel Modderman \[email protected]\u003e Sun, 18 Nov 2012 11:55:44 +1000\n\ninsserv (1.14.0-4) unstable; urgency=low\n\n * Provide machine parseable output which may be used by file-rc to calculate\n dynamic sequence number for each script. (Closes: #573004)\n * Use \"overrides\" instead of \"overwrites\" and define defaults as \"LSB\n defaults\" when emitting warnings. (Closes: #668559)\n * Remove upstart jobs created by test_insserv_upstart at end of test.\n * Remove config snippets made by test_local_virtual at end of test.\n\n -- Kel Modderman \[email protected]\u003e Thu, 05 Jul 2012 21:13:26 +1000\n\ninsserv (1.14.0-3) unstable; urgency=low\n\n * Acknowledge NMUs, thanks Christian \u0026 Luk.\n * Use source format 3.0 (quilt), drop build dependency on quilt.\n Remove debian/README.source.\n * Use dh at compat level 8, significantly reduce debian/rules and\n build depend on debhelper \u003e= 8.\n * Use dh_bash-completion dh sequence utility to install completion\n snippet, rename snippet to debian/insserv.bash-completion and build\n depend on bash-completion.\n * Use dpkg-buildflags to set default CFLAGS \u0026 LDFLAGS and get noopt\n handling for free. 130_crossbuild_fixes.patch allows upstream\n Makefile defaults for COPTS, LDFLAGS \u0026 CC to be overridden by the\n environment variables exported by debian/rules. Also decouple `make\n check' from `make install' to ease cross building. Set \u0026 export CC\n environment variable in debian/rules to (hopefully) allow cross\n building. (Closes: #629540, #629539, #666212)\n * Patch upstream Makefile to execute Debian testsuite instead of\n common suite.\n * Update to Standards-Version 3.9.3, no changes in policy warranted\n changes in packaging.\n * Refresh patch series.\n * Suggest the actively maintained bootchart2 instead of the doormant\n bootchart package. (Closes: #599012)\n * Update insserv package description. (Closes: #549327)\n * Undocument the CONCURRENCY feature and add a reference to a modern\n discussion about the status of init systems in Debian. (Closes: #605368)\n * Add test_invalid_core_string to test conditions described in\n #611292.\n * Correctly quote here statements in test_undetected_loop with non-\n interpolating quotation marks. Make test unconditionally fatal now\n that test is not incorrectly interpolating $local_fs in script headers.\n * Add 150_core_string_test.patch from Ben Harris \[email protected]\u003e to\n fix inconsistent filtering of core dumps. (Closes: #611292)\n * Fix manual page reference to init(8). (Closes: #634150)\n * Purge update-rc.d-insserv \u0026 update-bootsystem-insserv as per\n Petter's advice in changelog entry for version 1.12.0-11. sysv-rc \u003e\u003e\n 2.87dsf-2 takes care of all that stuff now.\n * No longer provide LSB dependency overrides for obsolete (etch or\n before) packages such as hotplug, modutils, initrd-tools and devfsd.\n (Closes: #545164, #545165, #545166, #545169)\n * Mention when insserv should (not) be used and how update-rc.d is\n almost always the interface you want to use. (Closes: #566352)\n * Use the package short summary in the manual page too, it mentions\n the keyword \"dependency\". (Closes: #609655)\n * Update debian/watch file for savannah.gnu.org sysvinit project site.\n\n -- Kel Modderman \[email protected]\u003e Mon, 09 Apr 2012 23:08:25 +1000\n\ninsserv (1.14.0-2.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Danish (Joe Hansen). Closes: #619657\n - Slovak (Slavko). Closes: #641960\n - Bokmål, (Bjørn Steensrud). Closes: #654871\n\n -- Christian Perrier \[email protected]\u003e Sun, 15 Jan 2012 08:11:26 +0100\n\ninsserv (1.14.0-2.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Drop definition of $portmap (Closes: #564501).\n * Add unbound to definition of $named (Closes: #602901).\n\n -- Luk Claes \[email protected]\u003e Sat, 19 Mar 2011 12:48:34 +0100\n\ninsserv (1.14.0-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"installation-report","Version":"2.44","Release":"","NewVersion":"2.49","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of installation-report\ninstallation-report (2.49) unstable; urgency=low\n\n [ Updated translations ]\n * Catalan (ca.po) by Jordi Mallach\n\n -- Christian Perrier \[email protected]\u003e Mon, 10 Dec 2012 22:19:16 +0100\n\ninstallation-report (2.48) unstable; urgency=low\n\n [ Updated translations ]\n * Galician (gl.po) by Jorge Barreiro\n\n -- Christian Perrier \[email protected]\u003e Sun, 14 Oct 2012 22:37:05 +0200\n\ninstallation-report (2.47) unstable; urgency=low\n\n * Team upload\n * Replace XC-Package-Type by package-Type\n\n [ Joey Hess ]\n * Reorder steps in template to match current installer order.\n\n [ Updated translations ]\n * Tibetan (bo.po) by Tennom\n * Welsh (cy.po) by Dafydd Tomos\n * Galician (gl.po) by Jorge Barreiro\n * Lithuanian (lt.po) by Rimas Kudelis\n * Latvian (lv.po) by Rūdolfs Mazurs\n * Macedonian (mk.po) by Arangel Angov\n * Panjabi (pa.po) by A S Alam\n * Portuguese (Brazil) (pt_BR.po) by Felipe Augusto van de Wiel (faw)\n * Traditional Chinese (zh_TW.po) by Yao Wei (魏銘廷)\n\n -- Christian Perrier \[email protected]\u003e Fri, 15 Jun 2012 19:17:08 +0200\n\ninstallation-report (2.46) unstable; urgency=low\n\n [ Updated translations ]\n * Asturian (ast.po) by Mikel González\n * Bulgarian (bg.po) by Damyan Ivanov\n * German (de.po) by Holger Wansing\n * Estonian (et.po) by Mattias Põldaru\n * Basque (eu.po)\n * Hebrew (he.po) by Lior Kaplan\n * Hindi (hi.po) by Kumar Appaiah\n * Indonesian (id.po) by Mahyuddin Susanto\n * Icelandic (is.po) by Sveinn í Felli\n * Italian (it.po) by Milo Casagrande\n * Japanese (ja.po) by Kenshi Muto\n * Kannada (kn.po) by Prabodh C P\n * Macedonian (mk.po) by Arangel Angov\n * Dutch (nl.po) by Jeroen Schot\n * Polish (pl.po) by Marcin Owsiany\n * Romanian (ro.po) by Ioan Eugen Stan\n * Sinhala (si.po)\n * Ukrainian (uk.po) by Borys Yanovych\n * Simplified Chinese (zh_CN.po) by YunQiang Su\n\n -- Otavio Salvador \[email protected]\u003e Thu, 15 Mar 2012 14:45:46 -0300\n\ninstallation-report (2.45) unstable; urgency=low\n\n * Add myself to Uploaders\n * Add ${misc:Depends} to Depends\n * Bump Standards to 3.9.2\n \n [ Updated translations ]\n * Bulgarian (bg.po) by Damyan Ivanov\n * Czech (cs.po) by Miroslav Kure\n * Esperanto (eo.po) by Felipe Castro\n * Spanish (es.po) by Javier Fernández-Sanguino\n * Korean (ko.po) by Changwoo Ryu\n * Romanian (ro.po) by Eddy Petrișor\n * Russian (ru.po) by Yuri Kozlov\n * Northern Sami (se.po) by Børre Gaup\n * Slovak (sk.po) by Ivan Masár\n * Swedish (sv.po) by Daniel Nylander\n * Telugu (te.po) by Arjuna Rao Chavala\n * Thai (th.po) by Theppitak Karoonboonyanan\n * Uyghur (ug.po) by Sahran\n\n -- Christian Perrier \[email protected]\u003e Sun, 24 Apr 2011 09:37:34 +0200\n\ninstallation-report (2.44) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"iperf","Version":"2.0.4-5","Release":"","NewVersion":"2.0.5-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of iperf\niperf (2.0.5-3) unstable; urgency=low\n\n * ACK NMU.\n * Fix improper check for IPv6 family when sending multicast\n (Closes: #674288).\n * Updated standards.\n\n -- Roberto Lumbreras \[email protected]\u003e Thu, 24 May 2012 19:00:01 +0200\n\niperf (2.0.5-2.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix FTBFS -Werror=format-security (Closes: #643408) \n\n -- Simon Paillard \[email protected]\u003e Tue, 15 Nov 2011 19:42:14 +0100\n\niperf (2.0.5-2) unstable; urgency=low\n\n * Fix server mode exiting after TCP bidirectional test.\n\n -- Roberto Lumbreras \[email protected]\u003e Sat, 08 Jan 2011 21:24:28 +0100\n\niperf (2.0.5-1) unstable; urgency=low\n\n * New upstream version.\n * Updated standards.\n * Deleted patches merged by upstream:\n 000-Iperf_Fix-CPU-Usage.diff\n 004-svn-r43-ro.patch\n 006-iperf-die-on-connect-fail.patch\n * Dropped probably unnecesary patches:\n 008-numofreport.patch\n 009-delayloop.patch\n * Fix 'recieve' spelling-error-in-binary (lintian).\n\n -- Roberto Lumbreras \[email protected]\u003e Sun, 26 Dec 2010 16:29:07 +0100\n\niperf (2.0.4-5) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"iproute","Version":"20120801+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ipsec-tools","Version":"1:0.7.3-12+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ipset","Version":"6.9-1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"iptables","Version":"1.4.10+vyos1+helium1","Release":"","NewVersion":"1.4.20+vyos1+helium4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"iptraf","Version":"3.0.0-7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"iputils-arping","Version":"3:20100418-3","Release":"","NewVersion":"3:20101006-1+b1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of iputils-arping\niputils (3:20101006-1) unstable; urgency=low\n\n * New upstream release.\n * Remove patches that are now applied upstream.\n * Update Vcs-* fields in debian/control to point to git repos.\n * Update debian/copyright to include the BSD license text.\n * Override lintian's possible-gpl-code-linked-with-openssl error on\n iputils-ping. ping6 links against libcrypto and is BSD licensed.\n\n -- Noah Meyerhans \[email protected]\u003e Sun, 20 Feb 2011 21:28:54 -0800\n\niputils (3:20100418-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"iputils-ping","Version":"3:20100418-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ipvsadm","Version":"1:1.25.clean-1","Release":"","NewVersion":"1:1.26-1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"iw","Version":"0.9.19-1","Release":"","NewVersion":"3.4-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of iw\niw (3.4-1) unstable; urgency=low\n\n [ Stefan Lippers-Hollmann ]\n * New upstream release:\n - iw: add HT options for ibss\n * bump standards version to 3.9.3, no changes necessary.\n * update dep-5 version to final 1.0, no changes necessary.\n * update copyright information.\n * convert packaging to Multi-Arch, bump compat level to 9 and adapt debhelper\n build-dependency accordingly; all binaries are Multi-Arch=foreign.\n * Remove Faidon Liambotis \[email protected]\u003e from Uploaders as per\n his request, many thanks for all past efforts Faidon.\n\n [ Kel Modderman ]\n * Add support for cross-building by setting CC to something\n appropriate.\n * Add append-cppflags.patch to modify upstream Makefile in order to append\n CPPFLAGS to CFLAGS if set in build environment.\n\n -- Kel Modderman \[email protected]\u003e Tue, 15 May 2012 22:17:42 +1000\n\niw (3.2-1) unstable; urgency=low\n\n [ Stefan Lippers-Hollmann ]\n * New upstream release:\n - support libnl3\n * restrict debian/watch to ignore new iw-latest link.\n * use Format instead of Format-Specification in debian/copyright, thanks to\n Michael Biebl for noticing; fix Format URL.\n * restrict architecture to linux-any, it depends on the linux specific\n nl80211 kernel interface.\n * add fix for the newly introduced tx power validation regression from\n upstream, thanks to Felix Fietkau \[email protected]\u003e.\n * fix linking against different libnl3.x versions, taken from upstream git:\n - fix compilation against libnl-3.x\n - always use libnl 3.2 as 3.2, not 3.0\n * switch build dependency from libnl3-dev to libnl-3-dev \u0026\u0026 libnl-genl-3-dev\n in order to cope with libnl3 3.2.\n * raise versioned build-dependency to (\u003e= 3.2.3-2~), to be able to expect it\n in /lib/.\n * move iw to /sbin/, as it is needed during early boot by udev rules to set\n regdom settings non-interactively (Closes: #622247).\n * recommend crda, which is needed to execute regulatory domain changes\n (Closes: #653703).\n\n [ Jonathan Nieder ]\n * change Priority to optional from extra (Closes: #591102).\n\n -- Stefan Lippers-Hollmann \[email protected]\u003e Fri, 30 Dec 2011 15:24:09 +0100\n\niw (3.1-1) unstable; urgency=low\n\n * New upstream release.\n - support wake on wlan commands.\n * add myself to uploaders.\n * bump standards version to 3.9.2:\n - use Breaks/ Replaces in favour of Conflicts with previous aircrack\n versions, policy 7.4.\n * update copyright years, clarify copyright status for nl80211.h.\n * don't use git on the buildd (Closes: #557167).\n * update debian/copyright to DEP-5, r174.\n * use new anonscm URIs for alioth.\n * backport libnl-3.0 support from upstream and switch to it.\n\n -- Stefan Lippers-Hollmann \[email protected]\u003e Sat, 10 Sep 2011 00:50:29 +0200\n\niw (0.9.19-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"jnettop","Version":"0.12.0-4","Release":"","NewVersion":"0.13.0-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of jnettop\njnettop (0.13.0-1) unstable; urgency=low\n\n * New upstream release\n * Update debian/watch file\n * Switch to source format 3.0 (quilt) and try to split out patches\n\n -- Ari Pollak \[email protected]\u003e Mon, 04 Oct 2010 21:02:59 -0400\n\njnettop (0.12.0-4) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"kbd","Version":"1.15.2-2","Release":"","NewVersion":"1.15.3-9","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of kbd\nkbd (1.15.3-9) unstable; urgency=low\n\n * Revert the build-dependency change towards gettext:any and let the buildds\n do their work again, closes: #670778.\n\n -- Michael Schutte \[email protected]\u003e Sun, 29 Apr 2012 09:43:38 +0200\n\nkbd (1.15.3-8) unstable; urgency=low\n\n * Set debian/compat to 9 and build-depend on debhelper \u003e= 9.\n * Support cross-building, closes: #670653. Thanks to Colin Watson\n \[email protected]\u003e for the patch.\n - Allow the gettext build-dep to be satisfied by a package of any\n architecture.\n - Use dh_auto_configure.\n - Explicitly set the host CC to cross-build the contrib binaries.\n * Trigger font setup when any of CONSOLE_FONT, CONSOLE_MAP, or FONT_MAP are\n present in /etc/kbd/config, closes: #647153.\n * Point Format: in debian/copyright to the 1.0 version of the\n machine-readable copyright spec.\n * Update manpages.diff: Minor fixes to the setleds(1) manual page, closes:\n #663252. Thanks to Bjarni Ingi Gislason \[email protected]\u003e for the\n patch.\n * Provide a no-op “status” option for /etc/init.d/kbd.\n * Bump Standards-Version: to 3.9.3, no changes necessary.\n\n -- Michael Schutte \[email protected]\u003e Sat, 28 Apr 2012 11:47:07 +0200\n\nkbd (1.15.3-7) unstable; urgency=low\n\n * Use dpkg-buildflags to pass build options on to the configure\n script; build-depend on dpkg-dev \u003e= 1.16.1 accordingly.\n * Set debian/compat to 8 and build-depend on debhelper \u003e= 8.\n * Don’t depend on console-setup | console-common to break up a\n dependency loop. The default configuration does not require any\n files from console-data (which is pulled in through console-common)\n or console-setup, so this should be a safe change. Both packages\n are still alternatives in Recommends:.\n * Package relationship cleanup:\n - Drop minimum version from the console-data recommendation (the\n mentioned revision is from 2001).\n - Don’t Breaks:/Replaces: util-linux (relevant revisions before\n early 2001).\n - Don’t conflict with kbd-data, which hasn’t been around since\n Slink.\n - Get rid of all mentions of “open” (from the Slink era too). This\n name is only provided by console-tools and kbd these days, which\n already conflict via console-utilities. There also aren’t any\n dependencies on it in the archive.\n * Fix some deviations from DEP 5 in debian/copyright.\n * Rename patch openvt_error_handling to openvt and update it to not\n exit with a zero status code if there was an invocation error,\n closes: #642324.\n\n -- Michael Schutte \[email protected]\u003e Fri, 23 Sep 2011 22:54:08 +0200\n\nkbd (1.15.3-6) unstable; urgency=low\n\n * Experimentally drop reset_vga_palette from /etc/init.d/kbd, closes:\n #637277.\n * Build for Architecture: linux-any to help clean up Not-For-Us.\n\n -- Michael Schutte \[email protected]\u003e Mon, 22 Aug 2011 20:57:00 +0200\n\nkbd (1.15.3-5) unstable; urgency=low\n\n * Move away from topgit: Export the patches to debian/patches/ one\n last time and maintain them with quilt in the future.\n * Use the occasion to make the patch headers more DEP-3-y.\n * Add a manual page for setvtrgb(1) introduced in 1.15.3.\n * debian/copyright: List copyright holders for setvtrgb.c and set\n Format: to the frozen DEP URL.\n\n -- Michael Schutte \[email protected]\u003e Sat, 23 Jul 2011 11:50:09 +0200\n\nkbd (1.15.3-4) unstable; urgency=low\n\n * Remove a superfluous call to wait() in openvt.c to propagate the\n exit code of the child process of “openvt -w”, closes: #630108.\n * Write and ship a manual page for the kbdinfo(1) utility introduced with\n 1.15.3.\n\n -- Michael Schutte \[email protected]\u003e Sun, 12 Jun 2011 12:49:42 +0200\n\nkbd (1.15.3-3) unstable; urgency=low\n\n * debian/rules clean: Force regeneration of loadkeys.c and\n loadkeys.analyze.c, closes: #629180, #629191.\n * Manually clean some .gmo files in po/.\n\n -- Michael Schutte \[email protected]\u003e Sat, 04 Jun 2011 15:28:44 +0200\n\nkbd (1.15.3-2) unstable; urgency=low\n\n * New patch loadkeys_stdin, taken from upstream Git: A regression in\n the loadkeys program caused it to read no files at all, rather than\n stdin, when called without arguments. This broke, for instance, the\n /etc/init.d/kbd script.\n * Point debian/copyright to the frozen revision of DEP 5, which is the\n one now shipped in debian-policy.\n\n -- Michael Schutte \[email protected]\u003e Fri, 03 Jun 2011 12:40:56 +0200\n\nkbd (1.15.3-1) unstable; urgency=low\n\n * New upstream release.\n - Drop the compose_as_usual patch (merged upstream).\n - Includes Dustin Kirkland’s setvtrgb utility, closes: #617416; and\n kbdinfo, vaguely based on Julien Cristau’s VT mode query code,\n closes: #618573.\n - Reflect changes to the build system in debian/rules.\n - Spanish translations had to be dropped due to problems with the\n es.po file.\n * Upgrade Standards-Version to 3.9.2, no changes needed.\n * Point Vcs-* to anonscm.debian.org.\n\n -- Michael Schutte \[email protected]\u003e Wed, 25 May 2011 21:48:07 +0200\n\nkbd (1.15.2-3) unstable; urgency=low\n\n * Bump Priority: to optional (while downgrading console-tools to extra),\n closes: #591146.\n * Change my e-mail address in Uploaders:, debian/copyright and patches.\n * Update debian/copyright format to the current revision of DEP-5.\n * Patch manpages:\n - Document that the -e switch requires openvt to be a session leader,\n closes: #610373.\n - Give in to lintian concerning the *superflous typo in mk_modmap(8).\n * Breaks: util-linux (\u003c\u003c 2.11) instead of conflicting with it, as per Policy\n 7.6.1: This was because of kbdrate moving packages.\n\n -- Michael Schutte \[email protected]\u003e Sat, 19 Feb 2011 11:38:00 +0100\n\nkbd (1.15.2-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"keyboard-configuration","Version":"1.68+squeeze2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"klibc-utils","Version":"1.5.20-1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"laptop-detect","Version":"0.13.7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"less","Version":"436-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libacl1","Version":"2.2.49-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libattr1","Version":"1:2.4.44-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libbind9-60","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libblkid1","Version":"2.17.2-9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libboost-filesystem1.42.0","Version":"1.42.0-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libboost-iostreams1.42.0","Version":"1.42.0-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libboost-system1.42.0","Version":"1.42.0-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libbsd0","Version":"0.2.0-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libbz2-1.0","Version":"1.0.5-6+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libc-ares2","Version":"1.7.3-1squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libc-bin","Version":"2.11.3-4+deb6u11","Release":"","NewVersion":"2.13-38+deb7u12","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"libc6","Version":"2.11.3-4+deb6u11","Release":"","NewVersion":"2.13-38+deb7u12","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"libcap2","Version":"1:2.19-3+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libcap2-bin","Version":"1:2.19-3+vyos1+helium2","Release":"","NewVersion":"1:2.22-1.2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libcap2-bin\nlibcap2 (1:2.22-1.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Add preinst script for libcap2-bin to properly remove PAM module\n on upgrade from libcap2-bin \u003c= 1:2.22-1. (Closes: #673770)\n\n -- Tobias Hansen \[email protected]\u003e Fri, 06 Jul 2012 20:02:14 +0200\n\nlibcap2 (1:2.22-1.1) unstable; urgency=low\n\n * Non-maintainer upload with permission from Torsten Werner.\n * Apply Multiarch patch from Kees Cook. Closes: #653186.\n * debian/{control,rules,compat}: Build for Multi-arch.\n * debian/{control,libpam-cap.*}: Split PAM module into separate binary\n package so it can be built for Multi-arch separate from the -bins pkg.\n\n -- Mark Hymers \[email protected]\u003e Sun, 13 May 2012 10:28:44 +0100\n\nlibcap2 (1:2.22-1) unstable; urgency=low\n\n * New upstream released\n\n -- Zhi Li \[email protected]\u003e Thu, 28 Jul 2011 12:50:30 +0800\n\nlibcap2 (1:2.21-3) unstable; urgency=low\n\n * Non-maintainer upload.\n * 0003-refine-setcap-error-message.patch:refine setcap output on errors\n (Closes: #633075)\n\n -- Zhi Li \[email protected]\u003e Wed, 20 Jul 2011 09:35:48 +0800\n\nlibcap2 (1:2.21-2) unstable; urgency=low\n\n [ Serge Hallyn ]\n * 0002-support-getting-setting-capabilities-on-large-files.patch: patch from\n upstream to enable setting capabilities on large files.\n (Closes: #631134)\n\n [ Torsten Werner ]\n * Move package to alioth's collab-maint project.\n * Use git instead of svn.\n * Update Vcs-* headers in debian/control.\n\n [ Zhi Li ]\n * Modify long description in libcap2-bin/debian/control, remove those files that were not generated.\n (Closes: #620345)\n\n -- Torsten Werner \[email protected]\u003e Mon, 11 Jul 2011 22:11:41 +0200\n\nlibcap2 (1:2.21-1) unstable; urgency=low\n\n * New upstream release.\n * debian/patches/0001-fix-Makefiles.patch: link pam_cap against -lpam.\n (Closes: #591410) (LP: #582769)\n\n -- Serge Hallyn \[email protected]\u003e Fri, 20 May 2011 08:28:55 -0500\n\nlibcap2 (1:2.20-1) unstable; urgency=low\n\n * New upstream release.\n * Remove all patches because they have been included upstream.\n\n -- Torsten Werner \[email protected]\u003e Fri, 11 Feb 2011 20:31:45 +0100\n\nlibcap2 (1:2.19-3) unstable; urgency=high","Method":"ChangelogLenientMatch"}},{"Name":"libcluster-glue","Version":"1.0.6-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libcomerr2","Version":"1.41.12-4+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libcorosync4","Version":"1.2.1-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libcpufreq0","Version":"007-1+squeeze1","Release":"","NewVersion":"008-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libcpufreq0\ncpufrequtils (008-1) unstable; urgency=low\n\n * Package the last available upstream vesion of cpufrequtils. Anything\n after this should really be cpupowerutils (closes: 639454).\n * Include all the work also pending the in the git repository as patches\n on top of version 008.\n * Upstream fixed po.DE (closes: #633307).\n * Enable static library building as upstream disabled it.\n * Load powernow-k8 for AMD Bulldozer (21) and Llano (18) (closes: #654957).\n * Do not update po files upon building (closes: #651415).\n\n -- Mattia Dongili \[email protected]\u003e Sun, 06 May 2012 08:23:44 +0900\n\ncpufrequtils (007-2) unstable; urgency=low\n\n * Bulk load only helper modules. Linux 3.0 shuffled cpufreq modules\n locations a bit and now cpu drivers and helpers are in the same directory\n (closes: #636141).\n * Use modprobe -b in loadcpufreq to honour blacklisted modules\n (closes: #592488).\n * Load powernow-k8 for AMD family 20 (i.e. AMD E-350 cpus)\n (closes: #627811).\n * Stop changing printk levels when loading cpufreq modules (closes: #624575\n and closes: #596235).\n\n -- Mattia Dongili \[email protected]\u003e Wed, 03 Aug 2011 18:13:41 +0900\n\ncpufrequtils (007-1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"libcurl3","Version":"7.21.0-2.1+squeeze12","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libcurl3-gnutls","Version":"7.21.0-2.1+squeeze12","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libcwidget3","Version":"0.5.16-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdaemon0","Version":"0.14-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdb4.7","Version":"4.7.25-9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdb4.8","Version":"4.8.30-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdbus-1-3","Version":"1.2.24-4+squeeze3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdevmapper1.02.1","Version":"2:1.02.48-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdns69","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libdumbnet1","Version":"1.12-3+b1","Release":"","NewVersion":"1.12-3.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libdumbnet1\nlibdumbnet (1.12-3.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Don't ship .la files.\n\n -- Luk Claes \[email protected]\u003e Fri, 01 Jul 2011 19:43:39 +0200\n\nlibdumbnet (1.12-3) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"libedit2","Version":"2.11-20080614-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libept1","Version":"1.0.4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libexpat1","Version":"2.0.1-7+squeeze2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libfam0","Version":"2.7.0-17","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libfile-slurp-perl","Version":"9999.13-1","Release":"","NewVersion":"9999.19-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libfile-slurp-perl\nlibfile-slurp-perl (9999.19-1) unstable; urgency=low\n\n * New upstream release, \n new watchfile as the upstream changed again (closes: #639815)\n\n -- Alexander Zangerl \[email protected]\u003e Wed, 31 Aug 2011 10:09:27 +1000\n\nlibfile-slurp-perl (9999.16-1) unstable; urgency=low\n\n * New upstream release (more robust wrt. utf-8)\n * removed some local patches, updated watch file\n\n -- Alexander Zangerl \[email protected]\u003e Wed, 11 May 2011 19:06:20 +1000\n\nlibfile-slurp-perl (9999.13-3) unstable; urgency=low\n\n * incorporated new utf8 tests (closes: #600870)\n * cleaned some lintian warnings\n * lifted standards version\n\n -- Alexander Zangerl \[email protected]\u003e Sun, 13 Mar 2011 00:57:54 +1000\n\nlibfile-slurp-perl (9999.13-2) unstable; urgency=low\n\n * updated watch file (upstream changed)\n\n -- Alexander Zangerl \[email protected]\u003e Sun, 25 Apr 2010 14:15:25 +1000\n\nlibfile-slurp-perl (9999.13-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libfile-sync-perl","Version":"0.09-4+b1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libfreetype6","Version":"2.4.2-2.1+squeeze6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libfuse2","Version":"2.8.4-1.1+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgcc1","Version":"1:4.4.5-8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgcrypt11","Version":"1.4.5-2+squeeze3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgdbm3","Version":"1.8.3-9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgeoip1","Version":"1.4.7~beta6+dfsg-1","Release":"","NewVersion":"1.4.8+dfsg-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libgeoip1\ngeoip (1.4.8+dfsg-3) unstable; urgency=low\n\n * Sync 1.4.8+dfsg-2~bpo60+1 changelog.\n * Bump Standards-Version to 3.9.3 (no changed needed).\n\n -- Patrick Matthäi \[email protected]\u003e Sat, 25 Feb 2012 22:01:26 +0100\n\ngeoip (1.4.8+dfsg-2~bpo60+1) squeeze-backports; urgency=low\n\n * Rebuild for squeeze-backports.\n\n -- Patrick Matthäi \[email protected]\u003e Thu, 16 Feb 2012 11:30:48 +0100\n\ngeoip (1.4.8+dfsg-2) unstable; urgency=low\n\n * Apply patch from Sebastian Carneiro, to fix the broken libtool.\n Closes: #638395\n\n -- Patrick Matthäi \[email protected]\u003e Fri, 26 Aug 2011 21:09:59 +0200\n\ngeoip (1.4.8+dfsg-1) unstable; urgency=low\n\n * New upstream release.\n * Overwrite no-symbols-control-file lintian warnings.\n\n -- Patrick Matthäi \[email protected]\u003e Sat, 25 Jun 2011 14:00:58 +0200\n\ngeoip (1.4.7+dfsg-2) unstable; urgency=low\n\n * Build with hardening-wrapper.\n\n -- Patrick Matthäi \[email protected]\u003e Sat, 30 Apr 2011 16:12:59 +0200\n\ngeoip (1.4.7+dfsg-1) unstable; urgency=low\n\n * New upstream release.\n * Wrap build dependencies.\n\n -- Patrick Matthäi \[email protected]\u003e Sat, 16 Apr 2011 12:58:12 +0200\n\ngeoip (1.4.7~beta14+dfsg-1) unstable; urgency=low\n\n * New upstream beta release.\n * Bump Standards-Version to 3.9.2 (no changes needed).\n * Convert the deprecated AN country code to CW in the geoip-generator. This\n fixes a FTBFS at the geoip-database package.\n * Fix lintian warning description-synopsis-starts-with-article.\n\n -- Patrick Matthäi \[email protected]\u003e Tue, 12 Apr 2011 20:29:20 +0200\n\ngeoip (1.4.7~beta13+dfsg-1) unstable; urgency=low\n\n * New upstream beta release.\n\n -- Patrick Matthäi \[email protected]\u003e Fri, 01 Apr 2011 20:35:40 +0200\n\ngeoip (1.4.7~beta12+dfsg-1) unstable; urgency=low\n\n * New upstream beta release.\n\n -- Patrick Matthäi \[email protected]\u003e Tue, 15 Mar 2011 19:55:07 +0100\n\ngeoip (1.4.7~beta11+dfsg-1) unstable; urgency=low\n\n * New upstream beta release.\n\n -- Patrick Matthäi \[email protected]\u003e Thu, 10 Mar 2011 20:26:15 +0100\n\ngeoip (1.4.7~beta10+dfsg-4) unstable; urgency=low\n\n * Uploading to unstable.\n\n -- Patrick Matthäi \[email protected]\u003e Sun, 06 Feb 2011 16:30:26 +0100\n\ngeoip (1.4.7~beta10+dfsg-3) experimental; urgency=low\n\n * Drop geoip-database package, it will be split to an extra source package.\n Closes: #610161\n\n -- Patrick Matthäi \[email protected]\u003e Tue, 18 Jan 2011 21:38:37 +0100\n\ngeoip (1.4.7~beta10+dfsg-2) experimental; urgency=low\n\n * Install our database generator scripts to /usr/lib/geoip/ with the\n geoip-bin package and set geoip-bin as a dependency for libgeoip-dev.\n This change prepares the split of the library and database package.\n * Remove database update script examples. They are superseded by the\n geoip-database-contrib package.\n\n -- Patrick Matthäi \[email protected]\u003e Sat, 15 Jan 2011 19:21:55 +0100\n\ngeoip (1.4.7~beta10+dfsg-1) experimental; urgency=low\n\n * New upstream beta release.\n * Update both databases to the 4.1.2011 version.\n\n -- Patrick Matthäi \[email protected]\u003e Wed, 12 Jan 2011 21:07:24 +0100\n\ngeoip (1.4.7~beta9+dfsg-1) experimental; urgency=low\n\n * New upstream beta release.\n * Merge 1.4.7~beta6+dfsg-1~bpo50+1 changelog.\n * Remove temporary directory at the end of the database update scripts.\n Closes: #601965\n * Bump Standards-Version to 3.9.1 (no changes needed).\n * Update both databases to the 2.11.2010 version.\n * Bump debhelper to version 7.\n * Some little format fixes in debian/README.Debian-source.\n * Update my copyright.\n\n -- Patrick Matthäi \[email protected]\u003e Mon, 08 Nov 2010 19:56:14 +0100\n\ngeoip (1.4.7~beta6+dfsg-1~bpo50+1) lenny-backports; urgency=low\n\n * Rebuild for lenny-backports.\n - Revert the 3.0 (quilt) format.\n\n -- Patrick Matthäi \[email protected]\u003e Fri, 16 Jul 2010 20:40:41 +0200\n\ngeoip (1.4.7~beta6+dfsg-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libglib2.0-0","Version":"2.24.2-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgmp3c2","Version":"2:4.3.2+dfsg-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgnutls26","Version":"2.8.6-1+squeeze6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgpg-error0","Version":"1.6-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libgssapi-krb5-2","Version":"1.8.3+dfsg-4squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libheartbeat2","Version":"1:3.0.3-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libhtml-parser-perl","Version":"3.66-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libhtml-tagset-perl","Version":"3.20-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libhtml-tree-perl","Version":"3.23-2","Release":"","NewVersion":"5.02-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libhtml-tree-perl\nlibhtml-tree-perl (5.02-1) unstable; urgency=low\n\n * New upstream release.\n * Drop spelling.patch, lintian has become more liberal.\n\n -- gregor herrmann \[email protected]\u003e Sat, 30 Jun 2012 17:34:51 +0200\n\nlibhtml-tree-perl (5.01-1) unstable; urgency=low\n\n * New upstream release\n * debian/control:\n - Add myself to list of Uploaders\n - Bump debhelper Build-Depends to \u003e= 9\n * debian/copyright: Add myself to debian/* copyright\n * debian/compat: Bump to 9\n\n -- Nathan Handler \[email protected]\u003e Sat, 23 Jun 2012 18:12:23 -0500\n\nlibhtml-tree-perl (5.00-1) unstable; urgency=low\n\n [ Ansgar Burchardt ]\n * debian/control: Convert Vcs-* fields to Git.\n\n [ gregor herrmann ]\n * New upstream release.\n * Update debian/libhtml-tree-perl.examples to new file locations.\n * debian/copyright: update to Copyright-Format 1.0.\n * debian/copyright: new upstream maintainer / copyright holder.\n * Bump Standards-Version to 3.9.3 (no changes).\n * Update Build-Depends-Indep (new test modules needed), add Recommends.\n * Add debian/NEWS with some potentially incompatible changes.\n\n -- gregor herrmann \[email protected]\u003e Fri, 15 Jun 2012 14:53:03 +0200\n\nlibhtml-tree-perl (4.2-1) unstable; urgency=low\n\n * New upstream release.\n * debian/copyright: add additional copyright holder.\n * Add /me to Uploaders.\n * Set Standards-Version to 3.9.2 (no changes).\n * debian/control: remove now unused build dependency.\n * Add a patch to fix a small spelling mistake.\n\n -- gregor herrmann \[email protected]\u003e Sat, 23 Apr 2011 19:43:30 +0200\n\nlibhtml-tree-perl (4.1-1) unstable; urgency=low\n\n * New upstream release.\n * Use debhelper compat level 8.\n * debian/rules: Remove /usr/bin from the package (htmltree is shipped as\n an example); we no longer need to fix the interpreter in htmltree.\n * debian/copyright: Refer to /usr/share/common-licenses/GPL-1; refer to\n \"Debian systems\" instead of \"Debian GNU/Linux systems\".\n * Update my email address.\n\n -- Ansgar Burchardt \[email protected]\u003e Thu, 28 Oct 2010 15:55:38 +0200\n\nlibhtml-tree-perl (4.0-1) unstable; urgency=low\n\n * New upstream release, (closes: #374605)\n * Update Standards-Version to 3.9.1 (no changes)\n * Removed debian/patches/missing_close_tag.patch and \n debian/patches/spelling.patch (fixed by upstream)\n\n -- Krzysztof Krzyżaniak (eloy) \[email protected]\u003e Fri, 24 Sep 2010 17:15:47 +0200\n\nlibhtml-tree-perl (3.23-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libicu44","Version":"4.4.1-8+squeeze5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libidn11","Version":"1.15-2+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libio-prompt-perl","Version":"0.997001-1","Release":"","NewVersion":"0.997001-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libio-prompt-perl\nlibio-prompt-perl (0.997001-1+deb7u1) testing-proposed-updates; urgency=low\n\n * Add 694537-use-Scalar-Util-openhandle.patch patch.\n IO::Prompt doesn't work on perl (\u003e= 5.14) if prompt() is called in\n non-\"main\" package with 'Can't call method \"opened\" without a package\n or object reference at /usr/share/perl5/IO/Prompt.pm line 188.'.\n Thanks to Michael Howe \[email protected]\u003e (Closes: #694537)\n * Email change: Salvatore Bonaccorso -\u003e [email protected]\n\n -- Salvatore Bonaccorso \[email protected]\u003e Tue, 27 Nov 2012 14:54:29 +0100\n\nlibio-prompt-perl (0.997001-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libio-socket-ssl-perl","Version":"1.33-1+squeeze1","Release":"","NewVersion":"1.76-2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libio-socket-ssl-perl\nlibio-socket-ssl-perl (1.76-2) unstable; urgency=low\n\n * Add 0001-Fix-update_peer-subroutine-to-work-with-IPv6.patch patch.\n Fix _update_peer subroutine to work with IPv6.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Fri, 05 Oct 2012 17:41:19 +0200\n\nlibio-socket-ssl-perl (1.76-1) unstable; urgency=low\n\n * Imported Upstream version 1.75 and 1.76\n * Update dependencies for IPv6 support\n + Update Build-Depends-Indep for IPv6 support to an alternative dependency\n on libsocket6-perl | perl (\u003e= 5.15.6) | libsocket-perl (\u003e= 1.95) and\n libio-socket-inet6-perl | libio-socket-ip-perl (\u003e= 0.11).\n + Update Recommends field to libio-socket-ip-perl (\u003e= 0.11) |\n libio-socket-inet6-perl and perl (\u003e= 5.15.6) | libsocket-perl (\u003e= 1.95)\n | libsocket6-perl\n * Update long description regarding IPv6 support.\n Add additional information that IO::Socket::SSL uses IPv6 if\n libio-socket-inet6-perl or libio-socket-ip-perl (\u003e= 0.11) is installed.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Thu, 21 Jun 2012 20:40:20 +0200\n\nlibio-socket-ssl-perl (1.74-1) unstable; urgency=low\n\n * Imported Upstream version 1.74\n\n -- Salvatore Bonaccorso \[email protected]\u003e Sun, 13 May 2012 22:20:36 +0200\n\nlibio-socket-ssl-perl (1.73-1) unstable; urgency=low\n\n * Imported Upstream version 1.73\n\n -- Salvatore Bonaccorso \[email protected]\u003e Fri, 11 May 2012 23:39:42 +0200\n\nlibio-socket-ssl-perl (1.72-1) unstable; urgency=low\n\n * Imported Upstream version 1.72\n\n -- Salvatore Bonaccorso \[email protected]\u003e Thu, 10 May 2012 20:13:55 +0200\n\nlibio-socket-ssl-perl (1.71-1) unstable; urgency=low\n\n * Imported Upstream version 1.71\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 09 May 2012 16:20:20 +0200\n\nlibio-socket-ssl-perl (1.70-1) unstable; urgency=low\n\n * Imported Upstream version 1.70\n\n -- Salvatore Bonaccorso \[email protected]\u003e Tue, 08 May 2012 16:54:14 +0200\n\nlibio-socket-ssl-perl (1.67-1) unstable; urgency=low\n\n * Imported Upstream version 1.67\n\n -- Salvatore Bonaccorso \[email protected]\u003e Mon, 07 May 2012 14:02:04 +0200\n\nlibio-socket-ssl-perl (1.66-1) unstable; urgency=low\n\n [ Alessandro Ghedini ]\n * Email change: Alessandro Ghedini -\u003e [email protected]\n\n [ gregor herrmann ]\n * New upstream release (1.64).\n\n [ Salvatore Bonaccorso ]\n * Drop remove-ssleay-version-test.patch patch\n * Imported Upstream version 1.66\n\n -- Salvatore Bonaccorso \[email protected]\u003e Tue, 17 Apr 2012 17:11:26 +0200\n\nlibio-socket-ssl-perl (1.62-1) unstable; urgency=low\n\n * Imported Upstream version 1.62\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 28 Mar 2012 23:14:36 +0200\n\nlibio-socket-ssl-perl (1.61-1) unstable; urgency=low\n\n [ Alessandro Ghedini ]\n * Add remove-ssleay-version-test.patch (Closes: #664900)\n\n [ Salvatore Bonaccorso ]\n * Imported Upstream version 1.60 and 1.61\n\n -- Salvatore Bonaccorso \[email protected]\u003e Tue, 27 Mar 2012 19:28:26 +0200\n\nlibio-socket-ssl-perl (1.59-1) unstable; urgency=low\n\n * Imported Upstream version 1.59\n\n -- Salvatore Bonaccorso \[email protected]\u003e Thu, 08 Mar 2012 15:36:05 +0100\n\nlibio-socket-ssl-perl (1.58-1) unstable; urgency=low\n\n * Imported Upstream version 1.58\n * Update format to copyright-format 1.0\n * Bump Standards-Version to 3.9.3\n\n -- Salvatore Bonaccorso \[email protected]\u003e Mon, 27 Feb 2012 07:55:30 +0100\n\nlibio-socket-ssl-perl (1.56-1) unstable; urgency=low\n\n * Imported Upstream version 1.56\n\n -- Angel Abad \[email protected]\u003e Wed, 22 Feb 2012 21:27:54 +0100\n\nlibio-socket-ssl-perl (1.55-1) unstable; urgency=low\n\n * Imported Upstream version 1.55\n * Bump Debhelper compat level to 9.\n Adjust versioned Build-Depends on debhelper to (\u003e= 9).\n\n -- Salvatore Bonaccorso \[email protected]\u003e Mon, 20 Feb 2012 16:43:09 +0100\n\nlibio-socket-ssl-perl (1.54-1) unstable; urgency=low\n\n [ Angel Abad ]\n * Email change: Angel Abad -\u003e [email protected]\n\n [ Salvatore Bonaccorso ]\n * Imported Upstream version 1.54\n * Update copyright years for debian/* packaging\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 11 Jan 2012 13:00:54 +0100\n\nlibio-socket-ssl-perl (1.53-1) unstable; urgency=low\n\n [ Salvatore Bonaccorso ]\n * Imported Upstream version 1.52\n\n [ Angel Abad ]\n * Imported Upstream version 1.53\n * Bump debhelper compatibility level to 8\n\n -- Angel Abad \[email protected]\u003e Mon, 12 Dec 2011 12:53:01 +0100\n\nlibio-socket-ssl-perl (1.49-1) unstable; urgency=low\n\n * Imported Upstream version 1.49\n\n -- Salvatore Bonaccorso \[email protected]\u003e Fri, 28 Oct 2011 14:41:19 +0200\n\nlibio-socket-ssl-perl (1.48-1) unstable; urgency=low\n\n [ Salvatore Bonaccorso ]\n * Imported Upstream version 1.46 and 1.48\n\n [ gregor herrmann ]\n * New upstream release 1.47.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 26 Oct 2011 21:04:47 +0200\n\nlibio-socket-ssl-perl (1.45-1) unstable; urgency=low\n\n * Imported Upstream version 1.45\n\n -- Salvatore Bonaccorso \[email protected]\u003e Thu, 13 Oct 2011 19:23:22 +0200\n\nlibio-socket-ssl-perl (1.44-1) unstable; urgency=low\n\n [ Alessandro Ghedini ]\n * New upstream release\n * Add myself to Uploaders\n\n [ Ansgar Burchardt ]\n * debian/control: Convert Vcs-* fields to Git.\n\n [ Salvatore Bonaccorso ]\n * debian/copyright: Replace DEP5 Format-Specification URL from\n svn.debian.org to anonscm.debian.org URL.\n * debian/control: libio-socket-inet6-perl from Suggests to Recommends\n (Closes: #627159)\n\n -- Salvatore Bonaccorso \[email protected]\u003e Sat, 27 Aug 2011 13:05:24 +0200\n\nlibio-socket-ssl-perl (1.43-1) unstable; urgency=low\n\n * New upstream release\n\n -- Salvatore Bonaccorso \[email protected]\u003e Thu, 12 May 2011 23:45:18 +0200\n\nlibio-socket-ssl-perl (1.40-1) unstable; urgency=low\n\n * New upstream release\n * debian/control: Add liburi-perl (\u003e= 1.50) as an alternative\n Recommends.\n * Bump Standards-Version to 3.9.2.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Fri, 06 May 2011 12:21:22 +0200\n\nlibio-socket-ssl-perl (1.39-1) unstable; urgency=low\n\n [ Angel Abad ]\n * New upstream release\n\n [ gregor herrmann ]\n * Remove version from libnet-ssleay-perl (build) dependency, already\n satisfied in lenny.\n\n -- Angel Abad \[email protected]\u003e Thu, 03 Mar 2011 17:57:38 +0100\n\nlibio-socket-ssl-perl (1.38-1) unstable; urgency=low\n\n * New upstream release\n * debian/copyright: Refresh copyright years for debian/* packaging.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Wed, 19 Jan 2011 13:23:10 +0100\n\nlibio-socket-ssl-perl (1.37-1) unstable; urgency=low\n\n * New upstream release (Closes: #606243, #606248, #606249).\n\n -- Salvatore Bonaccorso \[email protected]\u003e Thu, 09 Dec 2010 16:20:10 +0100\n\nlibio-socket-ssl-perl (1.35-1) unstable; urgency=low\n\n * New upstream release (Closes: #606058).\n * Refresh debian/copyright: Update copyright information for debian/*\n packaging stanza.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Mon, 06 Dec 2010 10:48:05 +0100\n\nlibio-socket-ssl-perl (1.34-1) unstable; urgency=low\n\n [ Salvatore Bonaccorso ]\n * Update my email address.\n\n [ Ansgar Burchardt ]\n * Update my email address.\n * Use source format 3.0 (quilt).\n * Bump Standards-Version to 3.9.1.\n\n [ Angel Abad ]\n * New upstream release\n * debian/copyirght: Update license information\n\n -- Angel Abad \[email protected]\u003e Tue, 02 Nov 2010 15:20:49 +0100\n\nlibio-socket-ssl-perl (1.33-1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"libisc62","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libisccc60","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libisccfg62","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libk5crypto3","Version":"1.8.3+dfsg-4squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libkeyutils1","Version":"1.4-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libklibc","Version":"1.5.20-1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libkrb5-3","Version":"1.8.3+dfsg-4squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libkrb5support0","Version":"1.8.3+dfsg-4squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libldap-2.4-2","Version":"2.4.23-7.3+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"liblocale-gettext-perl","Version":"1.05-6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libltdl7","Version":"2.2.6b-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"liblua5.1-0","Version":"5.1.4-5+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"liblwres60","Version":"1:9.7.3.dfsg-1~squeeze19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"liblzma2","Version":"5.0.0-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"liblzo2-2","Version":"2.03-2+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libmagic1","Version":"5.04-5+squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libmnl0","Version":"1.0.3-5+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libncurses5","Version":"5.7+20100313-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libncursesw5","Version":"5.7+20100313-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnet-ssleay-perl","Version":"1.36-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnet1","Version":"1.1.4-2","Release":"","NewVersion":"1.1.4-2.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libnet1\nlibnet (1.1.4-2.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix \"FTBFS: libnet_init.c:88:17: error: format not a string literal\n and no format arguments [-Werror=format-security]\": add patch from Bart\n Martens as Werror_format-security.patch.\n Closes: #643431\n\n -- gregor herrmann \[email protected]\u003e Sat, 15 Oct 2011 16:30:40 +0200\n\nlibnet (1.1.4-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libnetaddr-ip-perl","Version":"4.028+dfsg-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnetfilter-conntrack3","Version":"1.0.0-1+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnetfilter-cthelper","Version":"1.0.1-4+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnetfilter-cttimeout","Version":"1.0.0-3+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnetfilter-queue1","Version":"0.0.17-6+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnfnetlink0","Version":"1.0.0-1","Release":"","NewVersion":"1.0.0-1.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libnfnetlink0\nlibnfnetlink (1.0.0-1.1) unstable; urgency=low\n\n [ David Prevot ]\n * Non-maintainer upload.\n * iftable: fix incomplete list of interfaces via nlif_query. RTM_GETLINK\n with NLM_F_DUMP returns a multi-part netlink message. The existing code\n only handled the first message of it, thus, ignoring the remaining\n interfaces. This causes a bug in conntrackd. Report 8b15e48 from upstream.\n (Closes: #684863).\n\n -- Christian Perrier \[email protected]\u003e Tue, 01 Jan 2013 19:19:15 +0100\n\nlibnfnetlink (1.0.0-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libnl-3-200","Version":"3.2.25+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnl-genl-3-200","Version":"3.2.25+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnl1","Version":"1.1-6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnl2","Version":"1.99+git20091216-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnspr4-0d","Version":"4.8.6-1+squeeze2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libnss3-1d","Version":"3.12.8-1+squeeze10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libopenhpi2","Version":"2.14.1-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libopenipmi0","Version":"2.0.16-1.2","Release":"","NewVersion":"2.0.16-1.3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libopenipmi0\nopenipmi (2.0.16-1.3) unstable; urgency=low\n\n * Non-maintainer upload.\n * Don't ship .la files.\n\n -- Luk Claes \[email protected]\u003e Sun, 03 Jul 2011 09:48:16 +0200\n\nopenipmi (2.0.16-1.2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libopts25","Version":"1:5.10-1.1","Release":"","NewVersion":"1:5.12-0.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libopts25\nautogen (1:5.12-0.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * New upstream release\n - Don't set rpath for default search paths. (Closes: #630176)\n - Fixes build issue on Hurd.\n - Drop patch 02_home.diff, applied upstream\n * Don't run the build target twice. Patch from Matthias Klose\n \[email protected]\u003e (Closes: #629690)\n\n -- Kurt Roeckx \[email protected]\u003e Sun, 10 Jul 2011 15:05:23 +0200\n\nautogen (1:5.11.9-0.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Apply patch from Bruce Korb \[email protected]\u003e to deal with non-existing\n $HOME (Closes: #629142)\n\n -- Kurt Roeckx \[email protected]\u003e Sat, 04 Jun 2011 15:17:34 +0000\n\nautogen (1:5.11.9-0.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * New upstream release (Closes: #624755, #619791)\n - Removed 02_fix_bashisms_in_tests.diff, fixed upstream\n - autoopts.pc moved to /usr/share/pkgconfig\n - liboptschk.m4 moved to /usr/share/autogen\n - install autoopts.m4 in /usr/share/aclocal\n - libguileopts is removed from the library\n * Remove *.la files (Closes: #621207)\n\n -- Kurt Roeckx \[email protected]\u003e Fri, 03 Jun 2011 16:19:19 +0000\n\nautogen (1:5.10-1.1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libpam-modules","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpam-radius-auth","Version":"1.3.16-4.4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpam-runtime","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"1.1.3-7.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libpam-runtime\npam (1.1.3-7.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix cve-2011-4708: user-configurable .pam_environment allows\n administrator-level changes without root access (closes: #611136).\n\n -- Michael Gilbert \[email protected]\u003e Sun, 29 Apr 2012 02:23:26 -0400\n\npam (1.1.3-7) unstable; urgency=low\n\n * Updated debconf translations:\n - Danish, thanks to Joe Dalton \[email protected]\u003e (closes: #648382)\n - French, thanks to Jean-Baka Domelevo Entfellner \[email protected]\u003e\n (closes: #649850)\n - Dutch, thanks to Jeroen Schot \[email protected]\u003e\n (closes: #650755)\n - Russian, thanks to Yuri Kozlov \[email protected]\u003e (closes: #650867)\n - Portuguese, thanks to Pedro Ribeiro \[email protected]\u003e\n (closes: #652493)\n - German, thanks to Sven Joachim \[email protected]\u003e (closes: #653407)\n - Spanish, thanks to Javier Fernandez-Sanguino Peña \[email protected]\u003e\n (closes: #654043)\n - Bulgarian, thanks to Damyan Ivanov \[email protected]\u003e (closes: #656518)\n - Slovak, thanks to Ivan Masár \[email protected]\u003e (closes: #656521)\n - Japanese, thanks to Kenshi Muto \[email protected]\u003e (closes: #656834)\n - Polish, thanks to Michał Kułach \[email protected]\u003e\n (closes: #657476)\n - Catalan, thanks to Innocent De Marchi \[email protected]\u003e\n (closes: #657489)\n - Czech, thanks to Miroslav Kure \[email protected]\u003e\n (closes: #657578)\n - Swedish, thanks to Martin Bagge \[email protected]\u003e (closes: #651349)\n\n -- Steve Langasek \[email protected]\u003e Sat, 28 Jan 2012 10:57:49 -0800\n\npam (1.1.3-6) unstable; urgency=low\n\n * debian/patches-applied/hurd_no_setfsuid: we don't want to check all\n setre*id() calls; we know that there are situations where some of these\n may fail but we don't care. As long as the last setre*id() call in each\n set succeeds, that's the state we mean to be in.\n * debian/libpam0g.postinst: according to Kubuntu developers, kdm no longer\n keeps libpam loaded persistently at runtime, so it's not necessary to\n force a kdm restart on ABI bump. Which is good, since restarting kdm\n now seems to also log users out of running sessions, which we rather\n want to avoid. Closes: #632673, LP: #744944.\n * debian/patches-applied/update-motd: set a sane umask before calling\n run-parts, and restore the old mask afterwards, so /run/motd gets\n consistent permissions. LP: #871943.\n * debian/patches-applied/update-motd: new module option for pam_motd,\n 'noupdate', which suppresses the call to run-parts /etc/update-motd.d.\n LP: #805423.\n * debian/libpam0g.templates, debian/libpam0g.postinst: add a new question,\n libraries/restart-without-asking, that allows admins to accept the\n service restarts once for all so that they don't have to repeatedly\n say \"ok\". LP: #745004.\n * debian/libpam-runtime.templates, debian/local/pam-auth-update: add a\n new 'title' template, so pam-auth-update doesn't give a blank title\n when called outside of a maintainer script. LP: #882794.\n\n -- Steve Langasek \[email protected]\u003e Sun, 06 Nov 2011 19:43:14 -0800\n\npam (1.1.3-5) unstable; urgency=low\n\n [ Kees Cook ]\n * debian/patches-applied/pam_unix_dont_trust_chkpwd_caller.patch: use\n setresgid() to wipe out saved-gid just in case.\n * debian/patches-applied/008_modules_pam_limits_chroot:\n - fix off-by-one when parsing configuration file.\n - when using chroot, chdir() to root to lose links to old tree.\n * debian/patches-applied/022_pam_unix_group_time_miscfixes,\n debian/patches-applied/026_pam_unix_passwd_unknown_user,\n debian/patches-applied/054_pam_security_abstract_securetty_handling:\n improve descriptions.\n * debian/patches-applied/{007_modules_pam_unix,055_pam_unix_nullok_secure}:\n drop unneeded no-op change to reduce delta from upstream.\n * debian/patches-applied/hurd_no_setfsuid: check all set*id() calls.\n * debian/patches-applied/update-motd: correctly clear environment when\n building motd.\n * debian/patches-applied/pam_env-fix-overflow.patch: fix stack overflow\n in environment file parsing (CVE-2011-3148).\n * debian/patches-applied/pam_env-fix-dos.patch: fix DoS in environment\n file parsing (CVE-2011-3149).\n\n -- Steve Langasek \[email protected]\u003e Thu, 27 Oct 2011 21:33:57 -0700\n\npam (1.1.3-4) unstable; urgency=low\n\n * Make sure shared library links are also installed to the multiarch\n directory, not just the .a files; otherwise the static libs get found\n first by the linker. Thanks to Russ Allbery for catching this.\n Closes: #642952.\n\n -- Steve Langasek \[email protected]\u003e Sun, 25 Sep 2011 22:33:55 +0000\n\npam (1.1.3-3) unstable; urgency=low\n\n * Look for /etc/init.d/postgresql, not /etc/init.d/postgresql-8.{2,3},\n for service restarts; the latter are obsolete since squeeze.\n Closes: #631511.\n * Move debian/libpam0g-dev.install to debian/libpam0g-dev.install.in\n and substitute the multiarch path at build time, so our .a files go to\n the multiarch dir instead of to /usr/lib. Thanks to Riku Voipio for\n pointing out the bug.\n * debian/control: adjust the package descriptions, as the current ones\n use some awkward language that's gone unnoticed for a long time. Thanks\n to Martin Eberhard Schauer \[email protected]\u003e for pointing this\n out. Closes: #633863.\n * Build-depend on debhelper 8.9.4 and bump debian/compat to 9 for\n dpkg-buildflags integration, and drop manual setting of -g -O options in\n CFLAGS now that we can let dh do it for us\n * Don't set --sbindir when calling configure; upstream takes care of this\n for us\n\n -- Steve Langasek \[email protected]\u003e Sat, 24 Sep 2011 20:08:56 +0000\n\npam (1.1.3-2) unstable; urgency=low\n\n [ Kees Cook ]\n * debian/patches-applied/027_pam_limits_better_init_allow_explicit_root:\n - only report about unknown kernel rlimits when \"debug\" is set\n (Closes: 625226, LP: #794531).\n\n [ Steve Langasek ]\n * Build for multiarch. Closes: #463420.\n * debian/patches-applied/027_pam_limits_better_init_allow_explicit_root:\n don't reset the process niceness for root; since it's root, they can\n still renice to a lower nice level if they need to and changing the\n nice level by default is unexpected behavior. Closes: #594377.\n\n -- Steve Langasek \[email protected]\u003e Tue, 21 Jun 2011 11:41:12 -0700\n\npam (1.1.3-1) unstable; urgency=low\n\n * New upstream release.\n - Fixes CVE-2010-3853, executing namespace.init with an insecure\n environment set by the caller. Closes: #608273.\n - Fixes CVE-2010-3316 CVE-2010-3430 CVE-2010-3431 CVE-2010-3435.\n Closes: #599832.\n * Port hurd_no_setfsuid patch to new pam_modutil_{drop,restore}_priv\n interface; now possibly upstreamable\n * debian/patches-applied/027_pam_limits_better_init_allow_explicit_root:\n set a better default RLIMIT_MEMLOCK value for BSD kernels. Thanks to\n Petr Salinger for the fix. Closes: #602902.\n * bump the minimum version check in maintainer scripts for the restart\n handling.\n\n -- Steve Langasek \[email protected]\u003e Sat, 04 Jun 2011 03:10:50 -0700\n\npam (1.1.2-3) unstable; urgency=low\n\n [ Kees Cook ]\n * 027_pam_limits_better_init_allow_explicit_root: load rlimit defaults\n from the kernel (via /proc/1/limits), instead of continuing to hardcode\n the settings internally. Fall back to internal defaults when the kernel\n rlimits are not found. Closes: #620302. (LP: #746655, #391761)\n\n * Updated debconf translations:\n - Vietnamese, thanks to Clytie Siddall \[email protected]\u003e\n (closes: #601197)\n - Dutch, thanks to Eric Spreen \[email protected]\u003e (closes: #605592)\n - Danish, thanks to Joe Dalton \[email protected]\u003e (closes: #606739)\n - Catalan, thanks to Innocent De Marchi \[email protected]\u003e\n (closes: #622786)\n\n -- Steve Langasek \[email protected]\u003e Sun, 01 May 2011 01:49:11 -0700\n\npam (1.1.2-2) unstable; urgency=low\n\n * debian/patches-applied/hurd_no_setfsuid: handle some new calls to\n setfsuid in pam_xauth that I overlooked, so that the build works again\n on non-Linux. Closes: #613630.\n\n -- Steve Langasek \[email protected]\u003e Wed, 16 Feb 2011 09:27:11 -0800\n\npam (1.1.2-1) unstable; urgency=low\n\n * New upstream release.\n - Add support for NSS groups to pam_group. Closes: #589019,\n LP: #297408.\n - Support cross-building the package. Thanks to Neil Williams\n \[email protected]\u003e for the patch. Closes: #284854. \n * debian/rules: pass getconf LFS_CFLAGS so that we get a 64-bit rlimit\n interface. Closes: #579402.\n * Drop patches conditional_module,_conditional_man and\n mkhomedir_linking.patch, which are included upstream.\n * debian/patches/hurd_no_setfsuid: pam_env and pam_mail now also use\n setfsuid, so patch them to be likewise Hurd-safe.\n * Update debian/source.lintian-overrides to clean up some spurious\n warnings.\n * debian/libpam-modules.postinst: if any 'min=n' options are found in\n /etc/pam.d/common-password, convert them on upgrade to 'minlen=n' for\n compatibility with upstream.\n * debian/NEWS: document the disappearance of 'min=n', in case users have\n encoded this option elsewhere outside of /etc/pam.d/common-password.\n * debian/patches/007_modules_pam_unix: drop compatibility handling of\n 'max=' no-op; use of this option will now log an error, as warned three\n years ago.\n * Bump Standards-Version to 3.9.1.\n * Add lintian overrides for a few more spurious warnings.\n * debian/patches-applied/no_PATH_MAX_on_hurd: define PATH_MAX for\n compatibility when it's not already set. Closes: #552043.\n * debian/local/pam-auth-update: Don't try to pass embedded newlines to\n debconf; backslash-escape them instead and use CAPB escape.\n * debian/local/pam-auth-update: sort additional module options before\n writing them out, so that we don't wind up with a different config file\n on every invocation. Thanks to Jim Paris \[email protected]\u003e for the patch.\n Closes: #594123.\n * debian/libpam-runtime.{postinst,templates}: since 1.1.2-1 is targeted\n for post-squeeze, we don't need to support upgrades from 1.0.1-6 to\n 1.0.1-10 anymore. Drop the debconf error note about having configured\n your system with a lack of authentication, so that translators don't\n spend any more time on it.\n * Updated debconf translations:\n - Swedish, thanks to Martin Bagge \[email protected]\u003e (closes: #575875)\n\n -- Steve Langasek \[email protected]\u003e Tue, 15 Feb 2011 23:21:41 -0800\n\npam (1.1.1-7) UNRELEASED; urgency=low\n\n * Updated debconf translations:\n - Italian, thanks to Nicole B. \[email protected]\u003e (closes: #602112)\n\n -- Steve Langasek \[email protected]\u003e Wed, 17 Nov 2010 16:53:46 -0800\n\npam (1.1.1-6.1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"libpam0g","Version":"1.1.1-6.1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libparted0debian1","Version":"2.3-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpcap0.8","Version":"1.1.1-2+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpci3","Version":"1:3.1.7-6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpcre3","Version":"8.02-1.1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpcsclite1","Version":"1.5.5-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libperl5.10","Version":"5.10.1-17squeeze6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpkcs11-helper1","Version":"1.07-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libpopt0","Version":"1.16-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libradiusclient-ng2","Version":"0.5.6-1.1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libreadline6","Version":"6.1-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsasl2-2","Version":"2.1.23.dfsg1-7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libselinux1","Version":"2.0.96-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsensors4","Version":"1:3.1.2-6+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsepol1","Version":"2.0.41-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsigc++-2.0-0c2a","Version":"2.2.4.2-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libslang2","Version":"2.2.2-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsmi2ldbl","Version":"0.4.8+dfsg2-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsnmp-base","Version":"5.7.2+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsnmp-perl","Version":"5.7.2+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsnmp15","Version":"5.7.2+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsocket6-perl","Version":"0.23-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsort-versions-perl","Version":"1.5-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsqlite3-0","Version":"3.7.3-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libss2","Version":"1.41.12-4+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libssh2-1","Version":"1.2.6-1+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libssl0.9.8","Version":"0.9.8zf+vyos1+helium8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libstdc++6","Version":"4.4.5-8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libstrongswan","Version":"4.5.2-1.1-bpo60+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libsysfs2","Version":"2.1.0+repack-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libtasn1-3","Version":"2.7-1+squeeze+3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libterm-readkey-perl","Version":"2.30-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libterm-readline-perl-perl","Version":"1.0303-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libtext-charwidth-perl","Version":"0.04-6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libtext-iconv-perl","Version":"1.7-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libtext-wrapi18n-perl","Version":"0.06-7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libtimedate-perl","Version":"1.2000-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libtree-simple-perl","Version":"1.18-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libudev0","Version":"164-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"liburi-perl","Version":"1.54-2","Release":"","NewVersion":"1.60-1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"libusb-0.1-4","Version":"2:0.1.12-16","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libuuid1","Version":"2.17.2-9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libvyatta-cfg1","Version":"0.102.0+vyos1+helium13","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libvyatta-util1","Version":"0.13+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libwant-perl","Version":"0.18-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libwrap0","Version":"7.6.q-19","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libwww-perl","Version":"5.836-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libxapian22","Version":"1.2.3-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libxml-libxml-perl","Version":"1.70.ds-1+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libxml-namespacesupport-perl","Version":"1.09-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libxml-sax-perl","Version":"0.96+dfsg-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libxml-simple-perl","Version":"2.18-3","Release":"","NewVersion":"2.20-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of libxml-simple-perl\nlibxml-simple-perl (2.20-1) unstable; urgency=low\n\n [ Ansgar Burchardt ]\n * Update my email address.\n * debian/control: Convert Vcs-* fields to Git.\n\n [ Nathan Handler ]\n * New upstream release\n * debian/control:\n - Add myself to list of Uploaders\n - Bump Standards-Version to 3.9.3\n - Bump debhelper Build-Depends to \u003e= 9\n - Wrap lines to \u003c 80 characters\n * debian/compat: Bump to 9\n * debian/copyright:\n - Add myself to debian/* copyright\n - Use copyright-format 1.0\n - Replace | with 'or' for License fields\n - GPL-1 is now in common-licenses, so reference that file\n\n -- Nathan Handler \[email protected]\u003e Sat, 23 Jun 2012 13:10:27 -0500\n\nlibxml-simple-perl (2.18-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"libxml2","Version":"2.7.8.dfsg-2+squeeze16","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"libxml2-utils","Version":"2.7.8.dfsg-2+squeeze16","Release":"","NewVersion":"2.8.0+dfsg1-7+wheezy9","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"libxslt1.1","Version":"1.1.26-6+squeeze3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"lighttpd","Version":"1.4.28-2+squeeze1.7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"linux-firmware","Version":"1.29+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"linux-image-3.13.11-1-amd64-vyos","Version":"3.13.11-1+vyos1+helium11","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"live-initramfs","Version":"1.157.1-1+vyos1+helium3","Release":"","NewVersion":"1.157.1-1+vyos1+helium4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"lldpd","Version":"0.6.0+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"locales","Version":"2.11.3-4+deb6u11","Release":"","NewVersion":"2.13-38+deb7u12","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"login","Version":"1:4.1.4.2+svn3283-2+squeeze1","Release":"","NewVersion":"1:4.1.5.1-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"logrotate","Version":"3.7.8-6","Release":"","NewVersion":"3.8.1-4","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of logrotate\nlogrotate (3.8.1-4) unstable; urgency=low\n\n * Switch to dh type debian/rules.\n * Patch:\n + test-cleanup.patch: Clean up after regression tests.\n\n -- Paul Martin \[email protected]\u003e Thu, 17 May 2012 13:58:57 +0100\n\nlogrotate (3.8.1-3) unstable; urgency=low\n\n * Enabled hardened build flags.\n * Patch:\n + asprintf-fixes.patch: Fix asprintf() warnings and allow build with\n hardened build flags.\n * Update standards version to 3.9.3.\n\n -- Paul Martin \[email protected]\u003e Thu, 17 May 2012 00:36:48 +0100\n\nlogrotate (3.8.1-2) unstable; urgency=low\n\n * Removed dependancy on fcron as it is no longer in the repository.\n\n -- Paul Martin \[email protected]\u003e Wed, 21 Dec 2011 11:02:53 +0000\n\nlogrotate (3.8.1-1) unstable; urgency=low\n\n * New upstream release\n + Changes in 3.8.0 fix build problems on non-POSIX architectures \n (Closes: #632501)\n + New config options: dateyesterday, maxsize, su. (See manpage.)\n (maxsize Closes: #635184)\n * New patch:\n + man-compressext-576362.patch. Correct manpage about compressext,\n compressoptions behaviour. (Closes: #576362)\n * debian/logrotate.README.Debian: update now that rsyslog is default\n for new installs. (Closes: #649598)\n * Incidentally, rsyslog is now default syslog, and that doesn't use \n savelog but makes use of logrotate. (Closes: #379843)\n * Install logrotate.conf.5 (a redirect to logrotate.8) (Closes: #182261)\n * debian/control: depend on cron-daemon as an alternative to cron.\n (Closes: #334137)\n * lintian warning fix: move debian/logrotate.copyright to debian/copyright\n * debian/control: add Breaks: postgresql-common (\u003c= 126) as its config \n file requires an \"su\". Postgres maintainer is aware and awaits this\n upload.\n * Upload to unstable. (Closes: #648025)\n\n -- Paul Martin \[email protected]\u003e Mon, 05 Dec 2011 17:58:16 +0000\n\nlogrotate (3.8.0-1) experimental; urgency=low\n\n * New upstream release (Closes: #633529)\n + Fixes for CVE-2011-1098, CVE-2011-1154, and CVE-2011-1155\n (Closes: #639302)\n + dateformat sorting noted in manpage (Closes: #580054)\n * Changed debian/control to use [linux-any] in Build-Depends.\n (Closes: #634704)\n * Removed patches:\n + create-388608.patch: Upstream has fixed this.\n + nofollow.patch: Upstream has fixed this.\n + security-388608.patch: Upstream has fixed this.\n + FTBFS-hurd-613342.patch: Adopted upstream. (Closes: #613342)\n\n -- Paul Martin \[email protected]\u003e Sun, 28 Aug 2011 19:11:09 +0100\n\nlogrotate (3.7.9-1) experimental; urgency=low\n\n * New upstream release\n * New patch:\n + FTBFS-hurd-613342.patch. Half of a fix to #613342. Unfortunately\n the rest of the supplied patch leaks memory badly.\n * Removed patches:\n - deb-taboos.patch (applied upstream)\n - ucf-taboos.patch (applied upstream)\n - compressutime.patch (applied upstream)\n - rh-toolarge.patch (upstream does things a different way)\n - rh-curdir2.patch (applied upstream) \n - parser571033.patch (applied upstream) \n * Added build-arch/build-indep targets to debian/rules.\n * Update standards version to 3.9.2 (no changes).\n -- Paul Martin \[email protected]\u003e Wed, 22 Jun 2011 15:51:46 +0100\n\nlogrotate (3.7.8-6) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"lsb-base","Version":"3.2-23.2squeeze1","Release":"","NewVersion":"4.1+Debian8+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"lsb-release","Version":"3.2-23.2squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"lsof","Version":"4.81.dfsg.1-1","Release":"","NewVersion":"4.86+dfsg-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of lsof\nlsof (4.86+dfsg-1) unstable; urgency=low\n\n [ Nicholas Bamber ]\n * Imported into git.debian.org and documented procedures in README.source\n\n [ Raoul Gunnar Borenius ]\n * New upstream release (Closes: #596393) and (Closes: #520587)\n * packaging is now done with plain debhelper.\n * updated debian/control (added Uploaders:, include\n upstream homepage, bumped standards version, etc.)\n * changed debian/copyright to latest format\n * added debian/patches/examples to correct path to perl interpreter \n * added debian/patches/manpage to add missing escape signs in\n manpage \n * added watch file and uscan helper files (repack.stub, repack.local)\n in preparation for downloading and dfsg-repackaging of the newest source. \n\n [ Nicholas Bamber ]\n * New upstream release (4.86) and refreshed manpage patch\n * Added additional mirrors to watch file\n * Marked examples patch as not requiring forwarding\n * Removed obsolete debian/control clauses\n * Enabled all tests apart from the NFS based test\n * Passed '-n freebsd' to ./Configure on freebsd builds (cf. #589103)\n * Added main comment to debian/copyright explaining modifications\n to upstream tarball and added missing copyright stanzas\n\n -- Nicholas Bamber \[email protected]\u003e Wed, 25 Apr 2012 07:11:12 +0100\n\nlsof (4.81.dfsg.1-1.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * changed path to perl interpreter in examples (Closes: #544533) \n\n -- Raoul Gunnar Borenius \[email protected]\u003e Sun, 26 Feb 2012 00:20:17 +0100\n\nlsof (4.81.dfsg.1-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"lsscsi","Version":"0.21-2","Release":"","NewVersion":"0.26-2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of lsscsi\nlsscsi (0.26-2) unstable; urgency=low\n\n * Enable hardened build flags\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Thu, 14 Jun 2012 11:27:31 +1000\n\nlsscsi (0.26-1) unstable; urgency=low\n\n [ Guillaume Delacour \[email protected]\u003e ]\n * New upstream release (Closes: #608223), repackage tgz without debian subdir\n * Bump to Standards-Version 3.9.3\n + Add Homepage field in debian/control\n * debian/control: Depends on ${misc:Depends}\n * debian/control: Build-Depends on debhelper 9 and autotools-dev\n * debian/compat: Use version 9\n * debian/rules: Use default debhelper template\n * debian/docs: Remove doc/lsscsi.html, no more provided upstream\n * Switch to dpkg-source 3.0 (quilt) format\n * debian/watch: Create it to track new versions\n * debian/patches/FTBFS_kfreebsd.diff: Don't include obsolete linux/major.h\n * debian/copyright: Use DEP5 format\n\n [ Anibal Monsalve Salazar ]\n * Add myself as co-maintainer.\n\n -- Guillaume Delacour \[email protected]\u003e Sat, 21 Apr 2012 12:56:37 +0200\n\nlsscsi (0.21-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"man-db","Version":"2.5.7-8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"mawk","Version":"1.3.3-15","Release":"","NewVersion":"1.3.3-17","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of mawk\nmawk (1.3.3-17) unstable; urgency=low\n\n * debian/patches/cross-compile: fix the wrong invocation of AC_CHECK_PROG()\n that breaks cross-compiler detection.\n * debian/patches/21_memcpy-to-memmove: use memmove instead of memcpy in\n FINgets. Closes: #665383, LP: #955791.\n * mark mawk Multi-Arch: foreign, to satisfy cross-build-dependencies.\n * debian/patches/20_overlong-regexps: Do not crash if regexp is too\n long for our buffer. Thanks to Ian Jackson \[email protected]\u003e,\n Jonathan Nieder \[email protected]\u003e. Closes: #391051, LP: #23494.\n * add autopkgtest/autodebtest support to run upstream tests.\n\n -- Steve Langasek \[email protected]\u003e Fri, 23 Mar 2012 13:15:00 -0700\n\nmawk (1.3.3-16) unstable; urgency=low\n\n * Swap out dpatch in favor of quilt.\n * Replace debian/patches/08_fix-for-gcc3.3 with debian/patches/autoreconf,\n which gets us modern autoconf support.\n * Migrate to dh(1). This gets us md5sums for the package (Closes: #507315)\n and support for DEB_BUILD_OPTIONS=nostrip (Closes: #437557).\n * Only run the mawk_test and fpe_test targets from override_dh_auto_test,\n so that DEB_BUILD_OPTIONS=nocheck does the right thing. This should\n be sufficient to support cross-building, provided nocheck is passed in\n the cross-build environment (as it should be). Closes: #285418.\n * Put mawk in Section: interpreters, along with the other awken.\n Closes: #442071.\n * debian/mawk.postinst: drop obsolete upgrade handling of long-gone broken\n symlinks.\n * Update to standards-version 3.9.2.\n * Add Vcs-Bzr/Vcs-Browser fields.\n\n -- Steve Langasek \[email protected]\u003e Tue, 25 Oct 2011 00:47:34 +0000\n\nmawk (1.3.3-15) unstable; urgency=high","Method":"ChangelogExactMatch"}},{"Name":"mdadm","Version":"3.1.4-1+8efb9d1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"mgetty","Version":"1.1.36-1.6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"mime-support","Version":"3.48-1+deb6u1","Release":"","NewVersion":"3.52-1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of mime-support\nmime-support (3.52-1+deb7u1) wheezy-security; urgency=high\n\n * Non-maintainer upload by the Security Team.\n * CVE-2014-7209: run-mailcap shell command injection.\n Thanks to Timothy D. Morgan for the report.\n\n -- Salvatore Bonaccorso \[email protected]\u003e Sun, 21 Dec 2014 07:51:04 +0100\n\nmime-support (3.52-1) unstable; urgency=low\n\n * removed application/x-httpd-* types (closes: 589384)\n * added numerous new mime.types (closes: 652560, 624697, 627997, 619475, 639822)\n * fixed some bad mime.types (closes: 605250, 620372, 613810)\n * added dpkg trigger support (closes: 594915)\n * obsolete bugs (closes: 560118, 605254, 639580, 646462, 658073)\n\n -- Brian White \[email protected]\u003e Sun, 12 Feb 2012 21:06:40 +0100\n\n\nmime-support (3.51-1) unstable; urgency=medium\n\n * added numerous new mime.types (closes: 585040, 563067, 578392, 599216)\n * can generate local user .mailcap file (closes: 569738, 445267)\n * pass --debug to sub-instances (closes: 533721)\n * a little more documentation (closes: 402778)\n\n -- Brian White \[email protected]\u003e Fri, 12 Nov 2010 20:52:43 +0100\n\n\nmime-support (3.49-1) unstable; urgency=medium\n\n * added numerous new mime.types (closes: 585040, 563067, 578392)\n * can generate local user .mailcap file (closes: 569738, 445267)\n * pass --debug to sub-instances (closes: 533721)\n * a little more documentation (closes: 402778)\n\n -- Brian White \[email protected]\u003e (not uploaded due to key issues)\n\n\nmime-support (3.48-1) unstable; urgency=medium","Method":"ChangelogLenientMatch"}},{"Name":"module-init-tools","Version":"3.12-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"mount","Version":"2.17.2-9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"mtr-tiny","Version":"0.75-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"nano","Version":"2.2.4-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ncurses-base","Version":"5.7+20100313-5","Release":"","NewVersion":"5.9-10","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of ncurses-base\nncurses (5.9-10) unstable; urgency=low\n\n * Drop the dependency of the biarch packages on libtinfo5\n (Closes: #678440).\n - Convert /usr/share/doc/lib{32,64}tinfo5 back to directories.\n\n -- Sven Joachim \[email protected]\u003e Wed, 27 Jun 2012 17:20:15 +0200\n\nncurses (5.9-9) unstable; urgency=low\n\n * New patch 05-fix-poll-test.diff adapted from the 20120608 upstream\n patchlevel, correcting the CF_FUNC_POLL test which inadvertently\n failed if standard input was redirected, as is the case on the Debian\n buildds (Closes: #676461).\n * Assume working poll() for the biarch packages where we cannot run the\n configure check.\n\n -- Sven Joachim \[email protected]\u003e Thu, 14 Jun 2012 17:02:56 +0200\n\nncurses (5.9-8) unstable; urgency=low\n\n * Update terminfo descriptions to the 20120602 upstream patchlevel.\n - Correct 'op' for bterm (Closes: #671227).\n * Change section of ncurses-{base,term} to misc (see #671616).\n * Move the Breaks against old binutils-gold versions to libtinfo-dev.\n * Conflict with libc6-i386 (\u003c= 2.9-18) in lib32tinfo{5,-dev}.\n\n -- Sven Joachim \[email protected]\u003e Sun, 03 Jun 2012 10:17:35 +0200\n\nncurses (5.9-7) unstable; urgency=low\n\n * Take over bterm terminfo entry from bogl-bterm in ncurses-term\n (Closes: #562134).\n * Make libtinfo5 rather than libncurses5 the main package where the\n Debian FAQ and TODO files are installed.\n * Let all library, -dev and -dbg packages directly depend on libtinfo5\n and replace their /usr/share/doc directories with symlinks to save\n some space.\n * Mark ncurses-base and ncurses-term as Multi-Arch: foreign.\n * Explicitly blacklist fbterm and stterm terminfo entries to prevent\n accidents like #665877.\n\n -- Sven Joachim \[email protected]\u003e Tue, 01 May 2012 10:07:23 +0200\n\nncurses (5.9-6) unstable; urgency=low\n\n [ Craig Small ]\n * Permit DMs to upload\n\n [ Sven Joachim ]\n * Blacklist st and st-256color terminfo entries until suckless-tools\n stops shipping them (Closes: #665877).\n * Update terminfo descriptions to the 20120407 upstream patchlevel.\n - Revert to linux2.2 rather than linux3.0 as the base for the linux\n terminfo entry, since the latter breaks display of line drawing\n characters in non-UTF-8 locales (closes: #665959).\n\n -- Sven Joachim \[email protected]\u003e Mon, 09 Apr 2012 10:35:00 +0200\n\nncurses (5.9-5) unstable; urgency=low\n\n * Configure with /etc/terminfo as default terminfo dir\n (Closes: #653435, #654672).\n - New patch 04-fix-tabset-directory.diff to prevent incorrect tabset\n directory in compiled terminfo descriptions (see #509919).\n * Mention in debian/README.source that a non-standard autoconf version is\n required to regenerate 'configure' (Closes: #580190).\n * New patch 00-terminfo-update.diff, updating terminfo descriptions to\n the 20120211 upstream patchlevel.\n - Includes entries for gnu-mach and gnu-mach-color, installed into\n the ncurses-base package (Closes: #614316).\n * Update xterm.ti from xterm 276. All xterm-* terminfo entries should\n have kbs=\\177 now. Update patch 02-debian-backspace.diff accordingly.\n * Drop patch 05-emdebian-wchar.diff, no longer needed.\n * Protect shell loops in debian/rules with \"set -e\" to ensure that\n any errors in them are caught (see Policy §4.6).\n * Upgrade Standards-Version to 3.9.3, no changes needed.\n\n -- Sven Joachim \[email protected]\u003e Tue, 28 Feb 2012 20:36:51 +0100\n\nncurses (5.9-4) unstable; urgency=low\n\n * Create debian/libtermcap.so at build time rather than trying to ship\n it, since dpkg-source does not like to do the latter (Closes: #647253).\n\n -- Sven Joachim \[email protected]\u003e Tue, 01 Nov 2011 20:27:49 +0100\n\nncurses (5.9-3) unstable; urgency=low\n\n * Move the libtermcap symlinks to lib{32,}tinfo-dev (Closes: #644426).\n - Symlink libtinfo.a to libtermcap.a.\n - Use a linker script for libtermcap.so to work around ldconfig\n bug #249122.\n * Move the libtic libraries from lib*ncurses5 to lib*tinfo5\n (Closes: #644933) and their development files from lib*ncurses5-dev\n to lib*tinfo-dev.\n * Drop libticw from libncursesw5 and configure with \"--with-ticlib=tic\"\n to share the same tic library between libncurses5 and libncursesw5.\n * Don't mark libncurses5-dev and libncursesw5-dev as \"Multi-Arch: same\"\n for now (Closes: #646761).\n * Link the example programs against ncursesw rather than ncurses.\n * Add Breaks against binutils-gold (\u003c\u003c 2.21.53.20110910) to\n libncurses5-dev and libncursesw5-dev (see #644708).\n * Mention in /etc/terminfo/README that ${HOME}/.terminfo is the first \n directory where ncurses looks for terminfo files (LP: #384285).\n * Obtain CPPFLAGS from dpkg-buildflags.\n * Drop the lintian overrides introduced in 5.9-2.\n\n -- Sven Joachim \[email protected]\u003e Mon, 31 Oct 2011 17:18:46 +0100\n\nncurses (5.9-2) unstable; urgency=low\n\n * Build libncurses and libncursesw with \"--with-termlib\" and split out\n libtinfo* packages to allow building a libreadline that does not link\n against libncurses. Thanks to Matthias Klose for the initial patch.\n (Closes: #631592)\n - Add Pre-dependency on libtinfo5 to libncurses5 to prevent possible\n symbol lookup errors if libncurses5 is unpacked before libtinfo5.\n - Replace the libncurses{w,}.so symlinks with linker scripts. Since\n lintian does not like those in multiarch paths, temporarily add\n overrides (see #639735).\n - Remove spurious leftover libncurses5.so.5 symlinks (Closes: #224450,\n LP: #836246).\n * Ship the ncurses.supp file in libtinfo-dev (Closes: #627474).\n * Configure all library builds except libncurses5 with \"--without-progs\"\n to reduce build time a bit.\n * Add build-arch and build-indep targets to debian/rules.\n * Use dh_install's \"--fail-missing\" option.\n * Build for multiarch (Closes: #638281).\n - Mark libncurses5, libncursesw5, libtinfo5 and their -dev counterparts\n as Multi-Arch: same.\n - Mark ncurses-bin as Multi-Arch: foreign.\n * New patch 03-debian-ncursesconfig-omit-L.diff to omit the \"-L\" part\n from \"ncurses5-config --libs\" (see #638281).\n * Add rxvt-256color and rxvt-88color entries to debian/rxvt.ti\n (Closes: #638189).\n * Bump debhelper compatibility level to 8.\n * Upgrade Standards-Version to 3.9.2, no changes needed.\n\n -- Sven Joachim \[email protected]\u003e Tue, 13 Sep 2011 20:01:05 +0200\n\nncurses (5.9-1) unstable; urgency=low\n\n * New upstream release.\n * Correct dh_strip usage in debian/rules (Closes: #619939).\n\n -- Sven Joachim \[email protected]\u003e Tue, 05 Apr 2011 20:37:53 +0200\n\nncurses (5.8+20110307-1) unstable; urgency=low\n\n * New upstream patchlevel.\n - Fixes bad bound checks in newwin() (Closes: #616711, #617210).\n * Update years in debian/copyright.\n * Add a debian/watch.patchlevel file for checking/downloading weekly\n snapshots with uscan.\n\n -- Sven Joachim \[email protected]\u003e Tue, 08 Mar 2011 20:32:23 +0100\n\nncurses (5.8-1) unstable; urgency=low\n\n * New upstream release.\n * Drop patch 01-debian-kfreebsd-terminfo.patch, applied upstream.\n * Ship .pc files for pkg-config in libncurses5-dev and libncursesw5-dev,\n adding a build-dependency on pkg-config (Closes: #609614).\n * Update rxvt-unicode terminfo description from upstream CVS Rev 1.29.\n - Introduce an rxvt-unicode-256color terminfo entry in ncurses-term\n (Closes: #613171).\n - Fix typo in kIC terminfo capability (Closes: #446444).\n * Adjust the Replaces/Breaks combination on mlterm-common, now that\n mlterm 3.0.2-1 has dropped the mlterm terminfo entry.\n * Fix the libncursesw5-dbg preinst which had been removing the wrong\n symlink since it was introduced.\n * Drop the other preinst scripts, they were only necessary for upgrades\n from pre-Lenny versions.\n * Use linux-any wildcard for libgpm-dev Build-Depends and\n libgpm2 Recommends instead of using a list of negated architectures.\n * Do not run uupdate from debian/watch.\n\n -- Sven Joachim \[email protected]\u003e Mon, 28 Feb 2011 19:05:25 +0100\n\nncurses (5.7+20101128-1) experimental; urgency=low\n\n [ Sven Joachim ]\n * New upstream patchlevel.\n - Clarify that infotocap, captoinfo and tic read text files and do\n not work with compiled terminfo files (Closes: #593920).\n * Remove dangling /usr/share/terminfo/k/kon2 symlink (Closes: #522435).\n * Add an ncurses-examples package containing the compiled test programs\n (Closes: #34182). Stop shipping the sources in libncurses5-dev.\n * Move documentation and section 3 manpages to a new ncurses-doc package\n (Closes: #233400). Suggest ncurses-doc in all -dev packages.\n * Register the documentation in doc-base (Closes: #451667).\n * Remove the rather useless README.Debian (Closes: #606034).\n * Move libtic libraries to /usr.\n * Tighten the dependencies of the lib{32,64}ncurses*-dev packages to their\n regular counterparts.\n * Provide symbols files in all library packages.\n - Use them to compute the dependencies of the other packages instead of\n messing around with local shlibs files.\n * Ship mlterm terminfo in ncurses-term (see #485448).\n * Ship curses and termcap symlinks in lib{32,64}ncurses5-dev (LP: #485118).\n * Add lintian override for the empty /usr/share/terminfo directory that\n was introduced in 5.7+20100313-2.\n * Stop building the test programs in every library build.\n * Fix non-idempotency of the install (and thus the binary) target in\n debian/rules introduced in 5.7+20100313-1.\n * Do not unnecessarily add /lib32 and /usr/lib32 to dh_shlibdeps' search\n path when calculating the dependencies of the 32-bit libraries.\n * Do not allow dh_shlibdeps to fail for the 64-bit libraries.\n * Drop most patches as obsolete or unused:\n - 09-fix-delscreen-segfault.diff, applied upstream.\n - 06-kfreebsd.diff, apparently no longer needed.\n - 03-linux-use-fsuid.diff, patched code that is not compiled if ncurses\n is configured with \"--disable-termcap\", as we do.\n - 01-use-d-reentrant.diff, no longer needed since all architectures moved\n away from LinuxThreads and Policy 3.9.1 has explicitly removed the need\n to #define _REENTRANT.\n * Refresh all remaining Debian patches and add DEP-3 headers to them.\n * Remove the fix for bug #127622 from 02-debian-backspace.diff,\n no longer needed.\n * Update patch 02-debian-backspace.diff to get kbs=\\177 in all screen-*\n terminfo entries (Closes: #602300).\n * Drop the rather outdated screen terminfo from the debian directory and use\n the one provided by upstream's terminfo.src instead.\n * Get CFLAGS, CXXFLAGS and LDFLAGS from dpkg-buildflags, adding a build\n dependency on dpkg-dev (\u003e= 1.15.7).\n * Switch to format 3.0 (quilt).\n - Remove quilt build dependency and patch/unpatch logic from debian/rules.\n - Drop debian/README.source.\n * Add a debian/watch file.\n * Extend the package descriptions.\n * Remove duplicate \"Priority:\" fields from debian/control.\n * Update debian/copyright:\n - Update FSF Copyright years.\n - Mention other copyright holders and licenses.\n - Give a pointer to the current location of the ncurses sources.\n - Stop mentioning Debian changes.\n * Upgrade Standards-Version to 3.9.1, no changes needed.\n\n [ Loïc Minier ]\n * Update patch 05-emdebian-wchar to apply cleanly.\n * Drop 08-pkg-config-libdir patch as dpkg \u003e= 1.15.6 don't set\n PKG_CONFIG_LIBDIR anymore.\n\n [ Steve Langasek ]\n * Export LDFLAGS in debian/rules (Closes: #586144).\n\n -- Sven Joachim \[email protected]\u003e Mon, 29 Nov 2010 16:41:55 +0100\n\nncurses (5.7+20100313-5) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"ncurses-bin","Version":"5.7+20100313-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"net-tools","Version":"1.60-23","Release":"","NewVersion":"1.60-24.2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of net-tools\nnet-tools (1.60-24.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Parse Linux version correctly (Closes: #680204).\n * Build with hardening flags (Closes: #656130):\n - Fix improper format function usage: use fputs instead of fprintf or pass\n \"%s\" format string where necessary (-Werror=format-security treats those\n as errors).\n\n -- Andrew O. Shadura \[email protected]\u003e Tue, 04 Sep 2012 10:51:20 +0200\n\nnet-tools (1.60-24.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Add cross-build support, based on patch from Neil Williams. Closes: #451281\n * debian/control: Add Homepage. Closes: #530712.\n\n -- Steve McIntyre \[email protected]\u003e Fri, 15 Jul 2011 14:58:52 +0100\n\nnet-tools (1.60-24) unstable; urgency=low\n\n * debian/patches/Add_missing_headers.patch: Fix FTBFS (Closes: #625157).\n * debian/patches/Bug#569509-iface_overflow.patch: Fix crash \n (Closes: #569509).\n\n -- Luk Claes \[email protected]\u003e Sun, 22 May 2011 09:17:57 +0200\n\nnet-tools (1.60-23) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"netbase","Version":"4.45","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"netcat-traditional","Version":"1.10-38","Release":"","NewVersion":"1.10-40","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of netcat-traditional\nnetcat (1.10-40) unstable; urgency=low\n\n * Standards version is 3.9.3\n * DH compatibility level is 9\n * Enable hardened build flags\n Patches by Moritz Muehlenhoff\n Add 655881-Makefile-LDFLAGS.patch\n Add 655881-netcat.c.format.patch\n Closes: #655881\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Tue, 12 Jun 2012 22:53:29 +1000\n\nnetcat (1.10-39) unstable; urgency=low\n\n [ Ruben Molina ]\n * New Maintainer, New Uploaders (RFA on debian-devel).\n * Bump Standards-Version: 3.9.1 (Adding Homepage field)\n * Raise dh compat to \u003e= 8.0.0\n * Adding ${misc:Depends}\n * Now using dh_prep instead of dh_clean -k.\n * Move nc.1 to debian/man and clean patches that used to change it. \n * Now using 3.0 (quilt) format.\n\n [ Anibal Monsalve Salazar ]\n * Fix maintainer-script-without-set-e\n\n -- Ruben Molina \[email protected]\u003e Fri, 11 Feb 2011 03:26:13 -0500\n\nnetcat (1.10-38) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"netplug","Version":"1.2.9.1-2+vyos1+helium1","Release":"","NewVersion":"1.2.9.2-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of netplug\nnetplug (1.2.9.2-1) unstable; urgency=low\n\n * New upstream version:\n - Fixes FTBFS caused by -Werror and ignored return value (Closes: #559924)\n * debian/init.d:\n - Drop \"set -e\" and add --oknodo to fix restart (Closes: #589617)\n - Use LSB log_* functions.\n - Drop /usr/local and /usr from PATH.\n * debian/control:\n - Switch to 3.0 quilt format.\n - Update to Standards-Version: 3.9.1: no changes.\n - Add misc:Depends\n * debian/rules: Fix quoting of $$.\n * main.c: Fix log spamming (Closes: #569226)\n\n -- Philipp Matthias Hahn \[email protected]\u003e Sat, 07 Aug 2010 13:58:21 +0200\n\nnetplug (1.2.9.1-2) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"nfct","Version":"1:1.0.1-3+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ntp","Version":"1:4.2.6.p2+dfsg-1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ntpdate","Version":"1:4.2.6.p2+dfsg-1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"open-vm-tools","Version":"2:9.4.0-1280544-8+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"openssh-blacklist","Version":"0.4.1","Release":"","NewVersion":"0.4.1+nmu1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of openssh-blacklist\nopenssh-blacklist (0.4.1+nmu1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Compress all binaries with xz (Closes: #687267).\n\n -- Cyril Brulebois \[email protected]\u003e Sat, 22 Sep 2012 02:35:19 +0200\n\nopenssh-blacklist (0.4.1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"openssh-client","Version":"1:5.5p1-6+squeeze8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"openssh-server","Version":"1:5.5p1-6+squeeze8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"openssl","Version":"0.9.8zf+vyos1+helium8","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"openssl-blacklist","Version":"0.5-2","Release":"","NewVersion":"0.5-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of openssl-blacklist\nopenssl-blacklist (0.5-3) unstable; urgency=low\n\n * openssl-vulnkey: adjust for new openssl 1.0.0 output (Closes: #628332)\n * fix test suite when run as root. Patch from Moritz Muehlenhoff.\n (Closes: #612461)\n * convert to dh_python2. Patch from Colin Watson (Closes: #616927)\n * make lintian -Ivi clean\n - debian/control: update Standards-Version to 3.9.2\n - debian/control: add ${misc:Depends} to binaries\n - debian/control: make Description more verbose\n - debian/copyright: convert to DEP-5\n - openssl-vulnkey.1: fix some hyphens as minuses\n - add debian/source/format\n - add comments only debian/watch file\n\n -- Jamie Strandboge \[email protected]\u003e Wed, 22 Jun 2011 11:14:53 -0500\n\nopenssl-blacklist (0.5-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"openvpn","Version":"2.1.3+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"openvpn-blacklist","Version":"0.4","Release":"","NewVersion":"0.5","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of openvpn-blacklist\nopenvpn-blacklist (0.5) unstable; urgency=low\n\n * convert to dh_python2. Patch from Colin Watson (Closes: #616929)\n * add debian/source/format\n * debian/control: update Standards-Version to 3.9.2\n * debian/control: add ${misc:Depends}\n\n -- Jamie Strandboge \[email protected]\u003e Thu, 23 Jun 2011 08:39:56 -0500\n\nopenvpn-blacklist (0.4) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"parted","Version":"2.3-5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"passwd","Version":"1:4.1.4.2+svn3283-2+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"patch","Version":"2.6-2","Release":"","NewVersion":"2.6.1-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of patch\npatch (2.6.1-3) unstable; urgency=low\n\n * 3.0 (quilt).\n * Fix Suggests broken in the last upload.\n\n -- Christoph Berg \[email protected]\u003e Wed, 25 Jan 2012 15:00:41 +0100\n\npatch (2.6.1-2.1) unstable; urgency=low\n\n * NMU with maintainer approval\n * Set patch as Multi-Arch: foreign to allow use when cross-compiling\n\n -- Riku Voipio \[email protected]\u003e Mon, 16 Jan 2012 14:13:59 +0200\n\npatch (2.6.1-2) unstable; urgency=low\n\n * Use dh_auto_test. Closes: #627196\n\n -- Christoph Berg \[email protected]\u003e Fri, 20 May 2011 23:45:48 +0200\n\npatch (2.6.1-1) unstable; urgency=low\n\n * New upstream version.\n + Improved CR stripping heuristics. Closes: #484539\n + Fixes: creates files and directories instead of asking for the file\n location. Closes: #568248\n * Remove lenny compatibility options -U --unified-reject-files and\n --global-reject-file.\n * Null update-version.sh file so it doesn't interfere with the git\n repository the package is hosted in.\n\n -- Christoph Berg \[email protected]\u003e Sun, 06 Feb 2011 20:19:30 +0100\n\npatch (2.6-3) unstable; urgency=low\n\n * Enable -m short option for --merge as documented in help and manpage.\n Closes: #597305.\n\n -- Christoph Berg \[email protected]\u003e Wed, 22 Sep 2010 21:41:30 +0200\n\npatch (2.6-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"pciutils","Version":"1:3.1.7-6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"perl","Version":"5.10.1-17squeeze6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"perl-base","Version":"5.10.1-17squeeze6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"perl-modules","Version":"5.10.1-17squeeze6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"pmacct","Version":"0.14.0+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ppp","Version":"2.4.5-4+deb6u1","Release":"","NewVersion":"2.4.5-5.1+deb7u2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of ppp\nppp (2.4.5-5.1+deb7u2) wheezy-security; urgency=medium\n\n * Non-maintainer upload by the Security Team (thanks to Emanuele Rocca\n for the patch).\n * Fix CVE-2015-3310: buffer overflow which may lead to DoS (Closes:\n #782450).\n\n -- Sebastien Delafond \[email protected]\u003e Thu, 16 Apr 2015 09:37:44 +0200\n\nppp (2.4.5-5.1+deb7u1) wheezy-security; urgency=medium\n\n * Non-maintainer upload by the Security Team (thanks to Pierre\n Schweitzer \[email protected]\u003e for preparing the update).\n * Fix CVE-2014-3158: integer overflow which may allow overwrite\n security-relevant variables (Closes: #762789).\n\n -- Sebastien Delafond \[email protected]\u003e Fri, 28 Nov 2014 09:49:28 +0100\n\nppp (2.4.5-5.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Set Architecture to linux-any. (Closes: #648345)\n\n -- Robert Millan \[email protected]\u003e Sun, 22 Apr 2012 16:25:45 +0200\n\nppp (2.4.5-5) unstable; urgency=medium\n\n * Updated debconf translation: da. (Closes: #601791)\n\n -- Marco d'Itri \[email protected]\u003e Wed, 19 Jan 2011 23:24:16 +0100\n\nppp (2.4.5-4) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"pppoe","Version":"3.8-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"pptpd","Version":"1.3.4-3","Release":"","NewVersion":"1.3.4-5.2","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of pptpd\npptpd (1.3.4-5.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Handle ENOBUFS gracefully.\n Closes: #692129: pptpd: PPTP Connections Drop\n * Programming error, reference to a stack variable used out of scope in\n arguments to execvp call.\n Closes: #693136: pptpd: Binary trash when launching ppp\n\n -- Maximiliano Curia \[email protected]\u003e Wed, 28 Nov 2012 16:21:01 +0100\n\npptpd (1.3.4-5.1) unstable; urgency=low\n\n * Non-maintainer upload\n * Remove debian/conffiles, avoids debsum mismatches regarding conffiles\n (Closes: #689779)\n\n -- Reinhard Tartler \[email protected]\u003e Sun, 28 Oct 2012 17:19:04 +0100\n\npptpd (1.3.4-5) unstable; urgency=medium\n\n Urgency medium because 1.3.4-4 broke connections for some settings.\n * Fix bug introduced by last change adding the remotenumber parameter\n to pppd. Thanks to Michael Poetters for the patch!\n Closes: #625459: pppctrl fixup\n Closes: #622258: pptpd: Impossible to establish connection\n\n -- Rene Mayrhofer \[email protected]\u003e Sat, 07 May 2011 22:39:57 +0200\n\npptpd (1.3.4-4) unstable; urgency=low\n\n * Apply patch provided by Sergey Naumov to fix a segmentation fault\n when invalid IP ranges are specified in the config file (upper \u003c\n lower)\n * Apply patch provided by Igor A Tarasov to pass the remotenumber\n command line option to pppd, which is then used for th radius\n plugin.\n Closes: #610375: remotenumber support\n * Report that the init script also supports a \"status\" option.\n Closes: #536424: init.d script error message does not mention \n \"status\" action\n\n -- Rene Mayrhofer \[email protected]\u003e Tue, 29 Mar 2011 11:03:36 +0200\n\npptpd (1.3.4-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"procps","Version":"1:3.2.8-9squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"psmisc","Version":"22.11-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"python","Version":"2.6.6-3+squeeze7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"python-central","Version":"0.6.16+nmu1","Release":"","NewVersion":"0.6.17","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of python-central\npython-central (0.6.17) unstable; urgency=medium\n\n * The use of python-central / dh_pycentral is depreated. Please use\n dh_python2 instead.\n\n * Add 2.7 as known python version.\n * Fix up for multiarch dpkg: /var/lib/dpkg/info/$pkg.list is now no longer\n guaranteed to exist, it may be /var/lib/dpkg/info/$arch/$pkg.list\n (Steve Langasek).\n\n -- Matthias Klose \[email protected]\u003e Thu, 14 Apr 2011 16:34:05 +0200\n\npython-central (0.6.16+nmu1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"python-minimal","Version":"2.6.6-3+squeeze7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"python-support","Version":"1.0.10","Release":"","NewVersion":"1.0.15","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of python-support\npython-support (1.0.15) unstable; urgency=low\n\n [ Jakub Wilk ]\n * parseversions:\n + Make comparison of field names case-insensitive.\n + Recognize X-Python-Version.\n\n [ Piotr Ożarowski ]\n * update-python-modules manpage: fix --install option's description\n (closes: #671942)\n * movemodules:\n - doesn't raise string exceptions anymore (closes: #585332)\n * Standards version is 3.9.3, no changes required\n\n -- Piotr Ożarowski \[email protected]\u003e Sat, 30 Jun 2012 19:20:00 +0200\n\npython-support (1.0.14) unstable; urgency=low\n\n * update-python-modules: remove directory if it's replaced with a file\n (often happens with .egg-info file/dirs)\n * Add deprecation warning: dh_python2 (from python package) should be used\n instead. Migration guide is available on wiki page:\n http://wiki.debian.org/Python/PythonSupportToDHPython2\n * Vcs-* fields now point to anonscm.debian.org\n * Standards version is 3.9.2, no changes required.\n\n -- Piotr Ożarowski \[email protected]\u003e Mon, 27 Jun 2011 20:22:56 +0200\n\npython-support (1.0.13) unstable; urgency=low\n\n [ Loïc Minier ]\n * tests/testparseversions.py: don't hardcode expected versions; instead,\n compare with pyversions' output.\n * pysupport.py: don't hardcode supported and old versions; instead, parse\n debian_defaults; NB: this removes some very old python versions from the\n list (2.1 and 2.2), but these weren't ever support and aren't supported in\n the previous stable release anyway. Depend on python-minimal as\n debian_defaults is accessed directly.\n\n [ Piotr Ożarowski ]\n * Upload to unstable (closes: #622906)\n * Add lintian override for depends-on-python-minimal\n\n -- Piotr Ożarowski \[email protected]\u003e Fri, 15 Apr 2011 21:14:04 +0200\n\npython-support (1.0.12) experimental; urgency=low\n\n * Add support for python2.7.\n * Move python2.4 to old versions.\n\n -- Piotr Ożarowski \[email protected]\u003e Mon, 18 Oct 2010 19:51:21 +0200\n\npython-support (1.0.11) unstable; urgency=low\n\n * Move python2.4 to old versions.\n\n -- Piotr Ożarowski \[email protected]\u003e Tue, 19 Oct 2010 17:20:22 +0200\n\npython-support (1.0.10) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"python2.6","Version":"2.6.6-8+deb6u3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"python2.6-minimal","Version":"2.6.6-8+deb6u3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"radvd","Version":"1:1.15+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"readline-common","Version":"6.1-3","Release":"","NewVersion":"6.2+dfsg-0.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of readline-common\nreadline6 (6.2+dfsg-0.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Remove non DFSG-compliant files from source:\n doc/{history,rlman,rluserman,readline}.{dvi,html,info,pdf,ps,texi}.\n rluserman thus removed from /usr/share/info/ in readline-common and\n history and readline also removed from /usr/share/info/ in\n libreadline6-dev. Closes: #695784.\n\n -- David Prévot \[email protected]\u003e Sun, 30 Dec 2012 17:20:39 -0400\n\nreadline6 (6.2-9) unstable; urgency=low\n\n * Apply upstream patches 002 - 004. Fixes:\n - The readline shared library helper script needs to be updated for\n Mac OS X 10.7 (Lion, darwin11).\n - A change between readline-6.1 and readline-6.2 to prevent the readline\n input hook from being called too frequently had the side effect of\n causing delays when reading pasted input on systems such as Mac OS X.\n This patch fixes those delays while retaining the readline-6.2 behavior.\n Closes: #687100.\n - Attempting to redo (using `.') the vi editing mode `cc', `dd', or `yy'\n commands leads to an infinite loop.\n * Make examples Makefile Multi-Arch installable (Shawn Landden).\n Closes: #670030.\n * Fix building with -Wformat-security, and pass CPPFLAGS (Simon Ruderich).\n Closes: #687717.\n\n -- Matthias Klose \[email protected]\u003e Mon, 17 Sep 2012 14:10:00 +0200\n\nreadline6 (6.2-8) unstable; urgency=low\n\n * Mark readline-common Multi-Arch: foreign. Closes: #648098.\n\n -- Matthias Klose \[email protected]\u003e Mon, 21 Nov 2011 23:21:05 +0100\n\nreadline6 (6.2-7) unstable; urgency=low\n\n * Fix build failure on hurd-i386 (Samuel Thibault). Closes: #644777.\n * Use dpkg-buildflags to set CFLAGS and LDFLAGS.\n\n -- Matthias Klose \[email protected]\u003e Sun, 09 Oct 2011 11:23:45 +0200\n\nreadline6 (6.2-6) unstable; urgency=low\n\n * lib{,32}readline6-dev: Depend on lib{,32}tinfo-dev instead of\n lib{,32}ncurses5-dev.\n * Don't link rlfe against any libncurses* library.\n\n -- Matthias Klose \[email protected]\u003e Tue, 04 Oct 2011 16:33:44 +0200\n\nreadline6 (6.2-5) unstable; urgency=low\n\n * Do not link against any libncurses* library, just against libtinfo.\n * Fix corrupt display for history search in vi-mode, 256-color prompt\n (Micah Cowan). Closes: #614718, LP: #721982.\n * Remove unused build-dep on lsb-release. Closes: #642383.\n\n -- Matthias Klose \[email protected]\u003e Sat, 01 Oct 2011 11:56:50 +0200\n\nreadline6 (6.2-4) unstable; urgency=low\n\n * Fix broken .so symlinks.\n\n -- Matthias Klose \[email protected]\u003e Wed, 24 Aug 2011 10:08:49 +0200\n\nreadline6 (6.2-3) unstable; urgency=low\n\n * Add multi-arch support (Riku Voipio). Closes: #638850.\n\n -- Matthias Klose \[email protected]\u003e Tue, 23 Aug 2011 00:25:58 +0200\n\nreadline6 (6.2-2) unstable; urgency=low\n\n * Re-apply patch from 6.1-3, fixing kfreebsd build failure. Closes: #626704.\n\n -- Matthias Klose \[email protected]\u003e Wed, 18 May 2011 12:04:44 +0200\n\nreadline6 (6.2-1) unstable; urgency=low\n\n * New upstream version.\n\n -- Matthias Klose \[email protected]\u003e Sat, 23 Apr 2011 14:37:46 +0200\n\nreadline6 (6.2~alpha1-1) experimental; urgency=low\n\n * New upstream version, first alpha release.\n\n -- Matthias Klose \[email protected]\u003e Mon, 22 Nov 2010 10:30:08 +0100\n\nreadline6 (6.1-3) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"rsync","Version":"3.0.7-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"rsyslog","Version":"4.6.4-2+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"screen","Version":"4.0.3-14+deb6u1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"sed","Version":"4.2.1-7","Release":"","NewVersion":"4.2.1-10","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of sed\nsed (4.2.1-10) unstable; urgency=low\n\n * Bump to Standards-Version 3.9.2.\n * Use dpkg-buildflags. closes: #653718.\n * Add build-arch and build-indep targets.\n * Change selinux build-dependency to [linux-any].\n\n -- Clint Adams \[email protected]\u003e Fri, 30 Dec 2011 12:21:54 -0500\n\nsed (4.2.1-9) unstable; urgency=low\n\n * doc/sed-in.texi: Fix double negation in comment, escape\n file names.\n * doc/sed.x: Order commands alphabetically.\n\n -- Clint Adams \[email protected]\u003e Fri, 11 Feb 2011 16:55:05 -0500\n\nsed (4.2.1-8) unstable; urgency=low\n\n * Bump to Standards-Version 3.9.1.\n\n -- Clint Adams \[email protected]\u003e Mon, 15 Nov 2010 21:05:27 -0500\n\nsed (4.2.1-7) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"sensible-utils","Version":"0.0.4","Release":"","NewVersion":"0.0.7","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of sensible-utils\nsensible-utils (0.0.7) unstable; urgency=low\n\n [ David Prévot \[email protected]\u003e ]\n * set Multi-Arch: foreign. Closes: #666102\n * French, by David Prévot. Closes: #603883\n * German, by Helge Kreutzmann. Closes: #625897\n * Spanish, by Omar Campagne. Closes: #636239\n * Japanese, by KURASAWA Nozomu. Closes: #650641\n * Italian, by Beatrice Torracca. Closes: #672650\n\n [ Anibal Monsalve Salazar ]\n * Fix out-of-date-standards-version\n * Fix debian-rules-missing-recommended-target\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Mon, 14 May 2012 17:23:27 +1000\n\nsensible-utils (0.0.6) unstable; urgency=low\n\n * New maintainer \n * French man page update from David Prévot\n Closes: 603883\n * Fix copyright-refers-to-symlink-license\n * Fix maintainer-script-without-set-e\n\n -- Anibal Monsalve Salazar \[email protected]\u003e Fri, 26 Nov 2010 00:18:17 +1100\n\nsensible-utils (0.0.5) unstable; urgency=low\n\n * sensible-editor.1: Add reference to VISUAL environment variable.\n closes: #603244.\n * Add Spanish man page from Omar Campagne. closes: #602283.\n * Bump to Standards-Version 3.9.1.\n * Orphan the package.\n\n -- Clint Adams \[email protected]\u003e Sun, 14 Nov 2010 01:24:38 -0500\n\nsensible-utils (0.0.4) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"sipcalc","Version":"1.1.4-2","Release":"","NewVersion":"1.1.5-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of sipcalc\nsipcalc (1.1.5-1) unstable; urgency=low\n\n * new upstream version\n * Imported Upstream version 1.1.5\n * new maintainer\n * move to collab-maint, put URLs into debian/control\n * debhelper 9\n * new version in changelog\n * Standards-Version: 3.9.3 (no changes needed)\n\n -- Marc Haber \[email protected]\u003e Mon, 18 Jun 2012 08:54:33 +0200\n\nsipcalc (1.1.4-2.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix FTBFS with flag -Werror=format-security. (Closes: #646502)\n\n -- Ana Beatriz Guerrero Lopez \[email protected]\u003e Sat, 03 Dec 2011 23:32:54 +0100\n\nsipcalc (1.1.4-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"snmp","Version":"5.7.2+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"snmpd","Version":"5.7.2+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"squid-langpack","Version":"20100628-1","Release":"","NewVersion":"20120616-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of squid-langpack\nsquid-langpack (20120616-1) unstable; urgency=low\n\n * New upstream release\n\n * debian/control: Bumped to Standard Version 3.9.2 (no change needed)\n\n -- Luigi Gangitano \[email protected]\u003e Mon, 18 Jun 2012 15:04:16 +0200\n\nsquid-langpack (20111114-1) unstable; urgency=low\n\n * New upstream release\n\n * debian/rules\n - Added missing targets, to make lintian happy\n\n -- Luigi Gangitano \[email protected]\u003e Mon, 26 Dec 2011 22:01:25 +0100\n\nsquid-langpack (20110902-1) unstable; urgency=low\n\n * New upstream release\n\n -- Luigi Gangitano \[email protected]\u003e Sun, 04 Sep 2011 11:15:05 +0200\n\nsquid-langpack (20110707-1) unstable; urgency=low\n\n * New upstream release\n\n * debian/control: Bumped to Standard Version 3.9.2 (no change needed)\n\n -- Luigi Gangitano \[email protected]\u003e Sat, 09 Jul 2011 18:22:57 +0200\n\nsquid-langpack (20110317-1) unstable; urgency=low\n\n * New upstream release\n\n -- Luigi Gangitano \[email protected]\u003e Mon, 11 Apr 2011 19:03:33 +0200\n\nsquid-langpack (20110214-1) unstable; urgency=low\n\n * New upstream release\n\n * debian/control: Bumped to Standard Version 3.9.1 (no change needed)\n\n -- Luigi Gangitano \[email protected]\u003e Tue, 15 Feb 2011 00:43:14 +0100\n\nsquid-langpack (20100628-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"squid3","Version":"3.1.6-1.2+squeeze5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"squid3-common","Version":"3.1.6-1.2+squeeze5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"squidclient","Version":"3.1.6-1.2+squeeze5","Release":"","NewVersion":"3.1.20-2.2+deb7u7","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"squidguard","Version":"1.4.0+vyos1+helium3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ssh","Version":"1:5.5p1-6+squeeze8","Release":"","NewVersion":"1:6.0p1-4+deb7u6","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"ssmtp","Version":"2.64-4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"strongswan","Version":"4.5.2-1.1-bpo60+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"strongswan-ikev1","Version":"4.5.2-1.1-bpo60+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"strongswan-ikev2","Version":"4.5.2-1.1-bpo60+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"strongswan-starter","Version":"4.5.2-1.1-bpo60+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"sudo","Version":"1.7.4p4-2.squeeze.6","Release":"","NewVersion":"1.8.5p2-1+nmu3+deb7u4","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"sysv-rc","Version":"2.88dsf-13.1+squeeze1","Release":"","NewVersion":"2.88dsf-41+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of sysv-rc\nsysvinit (2.88dsf-41+deb7u1) stable-proposed-updates; urgency=low\n\n [ Roger Leigh ]\n * Correct the Breaks on bootchart to ensure that all broken\n versions are removed on upgrade (Closes: #694252). Break\n bootchart \u003c\u003c 0.10~svn407-4 to ensure that 0.10~svn407-3.3\n and earlier are removed.\n\n -- Roger Leigh \[email protected]\u003e Sun, 14 Jul 2013 18:21:07 +0100\n\nsysvinit (2.88dsf-41) unstable; urgency=low\n\n [ Roger Leigh ]:\n * sysvinit postinst always creates /etc/inittab if absent during\n configuration (Closes: #700051).\n\n -- Roger Leigh \[email protected]\u003e Thu, 07 Feb 2013 23:32:12 +0000\n\nsysvinit (2.88dsf-40) unstable; urgency=low\n\n [ Roger Leigh ]:\n * Don't restart init on GNU/Hurd (Closes: #663009).\n * Handle PID detection more robustly, to work better with containers\n (Closes: #699523). Always use PID1, which avoids the need for\n fragile pidof usage.\n * Handle ischroot more gracefully on failure (Closes: #699566).\n\n -- Roger Leigh \[email protected]\u003e Sun, 03 Feb 2013 14:52:05 +0000\n\nsysvinit (2.88dsf-39) unstable; urgency=low\n\n [ Roger Leigh ]:\n * initscripts postinst calls urandom, not urandom.sh (Closes: #698966).\n * sysvinit postinst unconditionally creates a compatibility initctl\n link to ensure the migration to /run won't fail (Closes: #663009).\n\n -- Roger Leigh \[email protected]\u003e Sat, 26 Jan 2013 12:09:29 +0000\n\nsysvinit (2.88dsf-38) unstable; urgency=low\n\n [ Roger Leigh ]:\n * If pidof fails in the sysvinit postinst or initscripts, default\n to PID 1 (for /sbin/init) (Closes: #663009).\n * Make fstab globbing in initscripts completely robust.\n\n -- Roger Leigh \[email protected]\u003e Wed, 23 Jan 2013 22:43:55 +0000\n\nsysvinit (2.88dsf-37) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts: Remove all use of shell heredocs in shell libraries;\n these require a writable /tmp which will not be guaranteed to be\n present in early boot (Closes: #697994).\n\n -- Roger Leigh \[email protected]\u003e Mon, 14 Jan 2013 21:53:59 +0000\n\nsysvinit (2.88dsf-36) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Handle globbing of /etc/fstab.d/* safely.\n - Correct erroneous error that an entry for /dev/shm existed in\n /etc/fstab when no entry was present (Closes: #697537).\n\n -- Roger Leigh \[email protected]\u003e Fri, 11 Jan 2013 23:36:28 +0000\n\nsysvinit (2.88dsf-35) unstable; urgency=low\n\n [ David Prévot ]\n * Fix German translation charset.\n\n [ Roger Leigh ]\n * initscripts:\n - To permit enabling of dependency-based boot, add Breaks on older\n versions of bootchart. Thanks to Andreas Beckmann.\n Closes: #694252.\n - To work around a bug in the Oracle database, which has a faulty\n check for /dev/shm, continue to mount a tmpfs on /dev/shm rather\n than /run/shm if one is defined in /etc/fstab. Closes: #694379.\n * sysvinit-utils:\n - Add Breaks: upstart (\u003c\u003c 1.5-1) to avoid breaking the boot with\n older versions of upstart. Closes: #694961.\n\n -- Roger Leigh \[email protected]\u003e Mon, 17 Dec 2012 22:50:49 +0000\n\nsysvinit (2.88dsf-34) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts: Don't run mountall until checkroot-bootclean is finished.\n\n [ Steve Langasek ]\n * initscripts.postinst: hide from lintian the fact that we're removing\n /dev/shm, since otherwise a buggy lintian check prevents us from\n uploading legitimate code to the archive.\n\n -- Steve Langasek \[email protected]\u003e Fri, 16 Nov 2012 14:51:06 -0600\n\nsysvinit (2.88dsf-33) unstable; urgency=low\n\n [ David Prévot ]\n * Updated debconf translations:\n - es. Thanks to Javier Fernández-Sanguino. Closes: #686774, #682560.\n - pt_BR. Thanks to Adriano Rafael Gomes. Closes: #686906.\n\n [ Roger Leigh ]\n * All bootclean scripts run before bootmisc. Closes: #677097.\n\n [ Steve Langasek ]\n * when running under upstart, emit an 'unmounted-remote-filesystems' event\n when we're done unmounting in umountnfs.sh so that upstart can finish\n shutting down.\n * make the startpar bridge track stopped jobs, not just started ones;\n required for us to have a smooth event-based shutdown with upstart.\n\n -- Steve Langasek \[email protected]\u003e Fri, 16 Nov 2012 04:30:29 -0800\n\nsysvinit (2.88dsf-32) unstable; urgency=low\n\n [ Roger Leigh ]\n * Apply patch to startpar to prevent the use of mlockall on\n kFreeBSD, which was causing a kernel panic at boot. Thanks to\n Petr Salinger for this patch. Closes: #672959.\n * Correctly detect service availability with service(8). Thanks\n to Alexander Golov for this patch. Closes: #685212.\n\n -- Roger Leigh \[email protected]\u003e Fri, 31 Aug 2012 23:03:14 +0100\n\nsysvinit (2.88dsf-31) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Remove debugging echo statement from postinst.\n\n -- Roger Leigh \[email protected]\u003e Sat, 11 Aug 2012 18:27:50 +0100\n\nsysvinit (2.88dsf-30) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Fix /dev/shm to /run/shm migration bug which occurred in chroots\n when /dev/shm was a mountpoint but /dev was not. Check\n specifially for /dev, /dev/shm, run or /run/shm being a mountpoint\n before attempting to migrate. This copes with all combinations of\n mountpoints, directories and symlinks. Closes: #683103.\n\n -- Roger Leigh \[email protected]\u003e Sat, 11 Aug 2012 16:44:22 +0100\n\nsysvinit (2.88dsf-29) unstable; urgency=low\n\n [ Steve Langasek ]\n * initscripts:\n - Improve /dev/shm to /run/shm upgrade handling in the postinst\n (improvement for #674178).\n\n [ Roger Leigh ]\n * initscripts:\n - Remove /lib/init/rw if possible. Closes: #679612.\n - If /run is a symlink to /var/run, correct this on both upgrade\n and on boot. On upgrade, the proper /run migration will occur\n on reboot. On boot, the system will require rebooting to fully\n migrate /run to a working configuration (but this will only\n occur on systems which are already broken, it's not an upgrade\n path). This correct problems with udev breakage due to /run\n being mounted twice when /run is a symlink.\n Closes: #677097, #679523.\n - Start urandom on initial install, so that a random seed exists on\n first boot. Closes: #679972.\n - Restore creation of /var/log/dmesg (Closes: #681639).\n * sysv-rc:\n Remove unused debconf logic in postinst.\n\n -- Roger Leigh \[email protected]\u003e Sat, 30 Jun 2012 23:21:06 +0100\n\nsysvinit (2.88dsf-28) unstable; urgency=low\n\n [ Steve Langasek ]\n * debian/patches/upstart_support.patch: add missing\n startpar-upstart-inject manpage.\n\n [ Roger Leigh ]\n * Updated debconf translations:\n - ca. Thanks to Innocent De Marchi. Closes: #677904.\n - cs. Thanks to Miroslav Kure. Closes: #678680.\n - da. Thanks to Joe Hansen. Closes: #676893.\n - de. Thanks to Chris Leick. Closes: #677753.\n - fr. Thanks to Steve Petruzzello. Closes: #677590.\n - gl. Thanks to Jorge Barreiro. Closes: #678627.\n - nl. Thanks to Jeroen Schot. Closes: #677333.\n - pl. Thanks to Michał Kułach. Closes: #676773.\n - pt. Thanks to Miguel Figueiredo. Closes: #676814.\n - ru. Thanks to Yuri Kozlov. Closes: #677011.\n - sk. Thanks to Slavko. Closes: #676721.\n - sv. Thanks to Martin Bagge. Closes: #676791.\n - zh_CN. Thanks to YunQiang Su. Closes: #676725.\n * Add missing hardening CPPFLAGS. Thanks to Simon Ruderich.\n Closes: #678878.\n * Update clean run to cope with nonexistent startpar.\n * initscripts:\n - Only run update-rc.d in maintainer scripts when the init\n script exists and is executable. Closes: #671124.\n - Break initramfs-tools (\u003c\u003c 0.104), needed to prevent initrd\n generation failure since older initramfs-tools can't cope with\n /etc/mtab being a symlink. Closes: #668650.\n - Don't mount with -o nodev on kFreeBSD. Closes: #669162.\n - Set up /run correctly in a chroot when running debootstrap.\n Thanks to Serge Hallyn. initscripts.postinst: if /dev is not a\n separate partition and we're in a chroot, then create /run/shm\n and make /dev/shm a symbolic link to it, as we would expect to\n find in a upgraded and rebooted running system. LP: #974584.\n Closes: #674178.\n * sysvinit:\n - rc and startpar distinguish between LSB not installed and\n not configured failure conditions. Thanks to Nate Coraor.\n Closes: #625463.\n * sysv-rc:\n - Dependency-based booting is activated unconditionally. Scripts\n without LSB headers will generally be ordered after all other\n scripts, but before scripts requiring $all to be started, such as\n rc.local, but this is not guaranteed. Add an LSB header if you\n need to guarantee the ordering of scripts.\n Closes: #676463, #678231, #676473.\n - update-rc.d uses absolute path to insserv, to give better error\n messages to non-root users where /sbin is not in the PATH.\n Thanks to Regid Ichira. Closes: #637390.\n\n [ Paul Menzel ]\n * Fix usage message in /etc/init.d/motd. Closes: #676910.\n\n -- Roger Leigh \[email protected]\u003e Wed, 27 Jun 2012 23:00:45 +0100\n\nsysvinit (2.88dsf-27) unstable; urgency=low\n\n [ Salvatore Bonaccorso ]\n * Remove reference to /usr/share/initscripts/default.rcS.\n With commit d0388ba464e69b1b7915a3d9071cfcba21d0102c /etc/default/rcS\n was made a regular conffile. Remove reference to original location with\n default values.\n\n [ Roger Leigh ]\n * initscripts:\n - Don't fail in the absence of /proc/meminfo. The ram_size and\n swap_size functions in /lib/init/tmpfs.sh always return true.\n Closes: #676669.\n\n -- Roger Leigh \[email protected]\u003e Fri, 08 Jun 2012 22:29:04 +0100\n\nsysvinit (2.88dsf-26) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - /run/shm is mounted noexec. Closes: #386368.\n - The RAMSHM and RAMTMP settings in /etc/default/rcS are used if\n present, though the replacement settings in /etc/default/tmpfs\n will override these, if enabled.\n - Revert RAMTMP setting to be disabled by default.\n Closes: #630615, #665635, #666698, #674517.\n - Don't prompt the user on upgrade if rcS was not modified by\n the admin. Closes: #674460.\n * sysvinit-utils:\n - Fix typo in fstab-decode(8). Thanks to Bjarni Ingi Gislason.\n Closes: #674208.\n\n -- Roger Leigh \[email protected]\u003e Mon, 28 May 2012 17:58:38 +0100\n\nsysvinit (2.88dsf-25) experimental; urgency=low\n\n [ Roger Leigh ]\n * Build with hardening flags enabled; CFLAGS and LDFLAGS are passed\n to all build commands.\n * initscripts:\n - /etc/default/rcS is no longer managed by ucf, and is a regular\n conffile. Drop the UTC setting, which has been migrated to\n /etc/adjtime by util-linux. Break util-linux \u003c\u003c 2.20.1-5 in order\n to ensure correct migration of the UTC setting before the file is\n upgraded.\n - Use ifquery in /etc/network/if-up.d/mountnfs to replace complex\n parsing. Also only run if inet or inet6 interfaces have been\n configured, to avoid freezing when the interface hasn't yet\n been configured (Closes: #674039).\n - %VM tmpfs size calculation works when swap is disabled.\n\n -- Roger Leigh \[email protected]\u003e Tue, 22 May 2012 23:46:14 +0100\n\nsysvinit (2.88dsf-24) experimental; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Don't generate or touch /etc/motd. Instead, the dynamic part of\n /etc/motd is created as /run/motd.dynamic, leaving /etc/motd\n entirely under the control of the system administrator. If\n /etc/motd is a symlink to /run/motd, /etc/motd.tail is moved\n back to /etc/motd. Closes: #353229, #624391, #668307. /etc/motd\n is not removed if initscripts is purged, since it's not owned by\n initscripts.\n - By default, /run/motd is just the output of uname, preserving the\n existing behaviour. However, should the administrator wish to\n include dynamic information in the motd, they may write scripts\n to update /run/motd.dynamic as they please. Closes: #437176.\n - motd generation is split from bootlogs into a separate motd\n init script.\n - bootlogs init script has been removed; current logging daemons\n handle this themselves, making this script redundant.\n - tmpfs mounts are never cleaned by bootclean.sh. Cleaning /run\n can lead to nonfunctional input when Xorg starts. Closes: #669949.\n * sysvinit-utils:\n - Suggest rather than Recommend bootlogd.\n\n [ Kel Modderman ]\n * sysv-rc:\n - Run check_divert in postinst to make sure /usr/sbin/update-rc.d\n not symlinked to /usr/sbin/update-rc.d-insserv. Closes: #670085.\n\n [ Steve Langasek ]\n * Install the startpar bridge now that dh_installinit in Debian handles\n this. Closes: #660824.\n * Give startpar a listening backlog on its socket for upstart connections,\n since there's no protocol-level queuing for unix sockets and these\n connections tend to come in fast and furious at boot.\n * Add upstart support to invoke-rc.d, per the policy discussion in bug\n #591791. Closes: #671284.\n\n -- Roger Leigh \[email protected]\u003e Sun, 29 Apr 2012 23:52:14 +0100\n\nsysvinit (2.88dsf-23) experimental; urgency=low\n\n [ Roger Leigh ]\n * Acknowledge NMU for translation updates. Thanks to Christian\n Perrier.\n * debian/control:\n - Upgrade to Standards-Version 3.9.3.\n - Build-Depend on debhelper v9.\n - Correct Vcs-Git URL.\n * debian/rules:\n - Use DEB_HOST_ARCH_OS = hurd rather than\n DEB_HOST_ARCH = hurd-i386. Thanks to Pino Toscano.\n * debian/patches:\n - 11_lfs_cflags.patch: Add patch for enabling large file support,\n needed on GNU/Hurd, but useful for all platforms.\n - 73_lfs_cflags.patch: Add patch for enabling large file support\n in startpar.\n * initscripts:\n - Moved RAM* settings from /etc/default/rcS to /etc/default/tmpfs.\n This ensures that the settings are equivalent for upgrades and\n new installations, but will require manual configuration of the\n settings for upgrades (no migration from /etc/default/rcS to\n /etc/default/tmpfs will take place, due to tmpfs being a\n conffile). tmpf(5) manual page added to document all aspects\n of tmpfs configuration, including the existing documentation in\n rcS(5).\n - Drop the use of .ramfs dotfiles in /run and /run/lock. These\n were a legacy of /lib/init/rw and were not actually used by\n anything. Closes: #403863.\n - Drop /etc/init.d/mountoverflowtmp. This has been merged into\n the general tmpfs on /tmp handling functions. This means the\n generic RAMTMP configuration is used for the overflowtmp.\n Closes: #567539.\n - It is now possible to configure a tmpfs mount size limit as a\n percentage of the total VM size (%VM) as well as a percentage\n of the RAM size (%). This is computed by tmpfs.sh and the\n tmpfs mounts are remounted with the updated size limit after\n swap becomes available.\n - An fstab entry for /tmp overrides RAMTMP. Document tmpfs\n override and tmpfs defaults in tmpfs(5), also undeprecating the\n tmpfs settings. Closes: #585540, #665995.\n - An fstab entry for /run/lock or /run/shm overrides RAMLOCK and\n RAMSHM.\n - bootclean cleans /tmp, /run and /run/lock before any filesystems\n are mounted as well as after local and network mounts. This\n permits cleaning of directories which would otherwise be hidden\n by mountpoints later in the boot process.\n Closes: #55707, #558000, #666871. Additionally clean up\n /lib/init/rw in case any files were hidden by the (now removed)\n tmpfs mount at this location. Closes: #652625.\n - Removed last trace of the long-removed EDITMOTD from the\n postinst. Closes: #438895.\n - Removed documentation of #346342 in rcS(5). This is no longer\n an issue now tzdata keeps a copy of the data on the rootfs.\n Closes: #385172.\n - Correct description of TMPTIME in rcS(5). Thanks to Alan J.\n Greenberger. Closes: #562500.\n - urandom: Applied a series of patches from John Denker to\n improve the integrity of random number generation. Many thanks.\n Closes: #596479, #596480, #596481, #596482, #596483.\n * sysv-rc:\n - Remove old upgrade logic from maintainer scripts not required\n for wheezy.\n - Migrate users of obsolete static boot ordering to dynamic boot\n ordering.\n - Remove use of /etc/init.d/.legacy-bootordering. Closes: #668312.\n - Improve help text of debconf message when it is not possible to\n automatically enable dynamic boot ordering. Provide explicit\n instructions for how to purge obsolete init scripts.\n Closes: #550425.\n - etc/init.d/rc: Ensure linprocfs is mounted on kFreeBSD. Thanks\n to Robert Millan. Closes: #659480.\n - Drop undocumented CONCURRENCY setting from /etc/init.d/rc.\n Closes: #518249, #540448, #539261. Note that this still contains\n internal fallbacks to support non-insserv booting, which may be\n removed at a later date.\n - invoke-rc.d:\n + Minor manual page corrections. Thanks to Anthony Fiumara.\n Closes: #664816.\n + Remove mention of the \"dpkg Programmers' Manual\" and replace\n with references to Debian Policy. Closes: #543793.\n - update-rc.d:\n + Correctly warn about non-LSB standard runlevels. Thanks to\n Chris Hiestand for this patch. Closes: #614895.\n + Remove obsolete documentation of\n /var/lib/sysv-rc/legacy-bootsequence. Thanks to Thomas Hood.\n Closes: #623051.\n * sysvinit:\n - Minor corrections for halt(8) manual page. Thanks to\n Christoph Anton Mitterer. Closes: #587923.\n - Installation with debootstrap --variant=fakechroot now works, due\n to only migrating the old control channel when it is still\n present. Thanks to Michael Gilbert. Closes: #596284.\n * sysvinit-utils:\n - Recommend bootlogd. Closes: #659490. This means that booklogd\n will be installed by default, but will be removable.\n Closes: #232569.\n - Correct documentation of the startpar -i option. Closes: #545438.\n - Correct startpar(8) SEE ALSO section. Closes: #634146.\n - Correct wording in service(8). Thanks to Joey Hess and Regid\n Ichira. Closes: #545401, #667745.\n\n [ Steve Langasek ]\n * debian/service/service: fix upstart compatibility to not try to use the\n upstart commands when init isn't upstart. Closes: #636054.\n * debian/rules: pass CFLAGS when building startpar.\n * Fix startpar to not run init scripts that have matching upstart jobs,\n instead waiting for a signal from upstart. Closes: #660824.\n * sysvinit:\n - Don't restart or perform initctl migration if systemd is\n running.\n\n -- Roger Leigh \[email protected]\u003e Sat, 21 Apr 2012 12:11:45 +0100\n\nsysvinit (2.88dsf-22.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Dutch; (Jeroen Schot). Closes: #626270\n - Polish (Michał Kułach). Closes: #658156\n\n -- Christian Perrier \[email protected]\u003e Tue, 13 Mar 2012 07:03:06 +0100\n\nsysvinit (2.88dsf-22) unstable; urgency=low\n\n [ Roger Leigh ]\n * mountall.sh uses mknod rather than mkfifo (Closes: #658045).\n\n -- Roger Leigh \[email protected]\u003e Mon, 30 Jan 2012 23:44:21 +0000\n\nsysvinit (2.88dsf-21) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/patches/72_path_max.patch: New patch for startpar. Don't\n use PATH_MAX, to fix compilation on GNU/Hurd.\n\n -- Roger Leigh \[email protected]\u003e Sat, 28 Jan 2012 11:14:53 +0000\n\nsysvinit (2.88dsf-20) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/patches/71_signalfd.patch: New patch for startpar. Don't\n include \u003csys/signalfd.h\u003e, which is not used and breaks\n compilation on architectures not having this Linux-specific\n header. (Closes: #657676)\n * sysvinit:\n - Don't restart init when a chroot is detected, to avoid lengthy\n timeouts. Use ischroot from debianutils to determine whether\n the postinst is being run in a chroot environment, as already\n done by initscripts.\n\n -- Roger Leigh \[email protected]\u003e Sat, 28 Jan 2012 00:07:39 +0000\n\nsysvinit (2.88dsf-19) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/control:\n - initscripts adds versioned Breaks on autofs (\u003c\u003c 5) since\n autofs 4.x does not cope with /etc/mtab symlinked to\n /proc/mounts. Users should upgrade to autofs5, which works\n correctly. (Closes: #653126)\n - initscripts Breaks aide \u003c\u003c 0.15.1-5 and sysklogd \u003c\u003c 1.5-6.2 now\n they support /run.\n - sysvinit Pre-Depends on initscripts \u003e= 2.88dsf-13.3 in order\n to transition initctl to /run.\n * sysvinit:\n - /sbin/init control channel FIFO is /run/initctl rather than\n /dev/initctl (Linux) or /etc/.initctl (FreeBSD). The postinst\n migrates the running init to use the new control channel by\n replacing the old channel with a symlink prior to issuing a\n SIGUSR1 to cause init to reopen its control channel and then\n exec of the new version of init using the new path. Thanks\n to Robert Millan. (Closes: #638019)\n - Add Catalan (ca) translation. Thanks to Innocent De Marchi.\n (Closes: #622785)\n * sysvinit-utils:\n - Upgrade to startpar 0.58. Thanks to Dr. Werner Fink at SuSE for\n this updated release. This release incorporates all of the\n existing Debian patchset; debian/patches/7[1-9]* have now been\n dropped.\n * initscripts:\n - mountall.sh recreates /run/initctl and sends SIGUSR1 to init\n if needed.\n - /etc/init.d/rc.local uses only $all in Required-Start;\n $remote_fs and $syslog being redundant. Thanks to Regid Ichira.\n (Closes: #635025)\n - rcS.5 documents that RAMTMP defaults to yes for new\n installations, and no for upgrades (since RAMTMP is not present\n in /etc/default/rcS). (Closes: #652337)\n - /etc/default/rcS is updated using ucf. (Closes: #648433)\n - umountfs uses more sophisticated sed expression to compute\n PROTECTED_MOUNTS, to support unionfs and more complex cases.\n Thanks to Michele Mazzucchi for this patch. (Closes: #655582)\n\n -- Roger Leigh \[email protected]\u003e Sun, 22 Jan 2012 17:07:46 +0000\n\nsysvinit (2.88dsf-18) unstable; urgency=low\n\n [ Roger Leigh ]\n debian/rules: Fix FTBFS on Hurd by moving file renaming to a later\n point in the build.\n\n -- Roger Leigh \[email protected]\u003e Thu, 22 Dec 2011 22:59:47 +0000\n\nsysvinit (2.88dsf-17) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/control:\n - initscripts adds versioned Breaks on readahead-fedora\n (\u003c\u003c 2:1.5.6-3), which removed splash support. Thanks to Sven\n Joachim.\n - Update initscripts Breaks for fixed version of libpam-mount.\n * initscripts:\n - Document /lib/init/rw removal and cleanup in NEWS.\n (Closes: #652512).\n - /etc/network/if-up.d/mountnfs handles whitespace correctly\n (Closes: #612378). grep on /etc/network/run/ifstate is corrected\n (inverted the logic). Thanks to Jamie Heilman and Corey Hickey.\n * sysvinit: Install reboot and halt commands with a -sysv suffix\n on GNU/Hurd. (Closes: #652830)\n\n [ Josh Triplett ]\n * Split bootlogd into a separate package. (Closes: #545181)\n\n -- Roger Leigh \[email protected]\u003e Thu, 22 Dec 2011 20:58:36 +0000\n\nsysvinit (2.88dsf-16) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/control:\n - initscripts versioned Breaks use correct epochs and binary\n package names.\n - initscripts Breaks libpam-mount \u003c= 2.11-1, which does not\n support a read-only mtab. This is supported in new upstream\n versions.\n\n -- Roger Leigh \[email protected]\u003e Sat, 17 Dec 2011 15:57:24 +0000\n\nsysvinit (2.88dsf-15) experimental; urgency=low\n\n [ Roger Leigh ]\n * /etc/init.d/skeleton: Small whitespace cleanup. Thanks to\n Peter Eisentraut. (Closes: #651862)\n * Move all patches in debian/startpar/patches to debian/patches\n and make debian/startpar/ content a separate patch applied to\n startpar/. Build and install startpar in debian/rules.\n (Closes: #652097).\n\n -- Roger Leigh \[email protected]\u003e Thu, 15 Dec 2011 00:24:22 +0000\n\nsysvinit (2.88dsf-14) experimental; urgency=low\n\n [ Kel Modderman ]\n * Add support for s390x, thanks to Aurelien Jarno \[email protected]\u003e.\n (Closes: #641107)\n\n [ Roger Leigh ]\n * debian/rules:\n - Add build-arch and -indep rules. (Closes: #648472)\n - Remove dpatch usage.\n - Use dh and debhelper compat level 9.\n * debian/control:\n - Add git version control information.\n - Upgrade to Standards-Version 3.9.2.\n - Add myself to Uploaders.\n * Use dpkg 3.0 (quilt) source format. Rediffed\n debian/patches/40_multiarch_libcrypt.patch which was not well\n formed and failed to apply.\n * initscripts:\n - Make /etc/mtab a symlink to /proc/mounts. (Closes: #494001)\n Note that this is only done when the root filesystem is writable\n and /proc/mount is readable.\n - Support the ceph network filesystem. (Closes: #580579). Thanks\n to Sage Weil.\n - Restore boot-time cleaning of /var/run and /var/lock, used by\n systems which currently do not use a tmpfs for /run.\n - Remove /lib/init/rw: Add Breaks for all packages which used\n /lib/init/rw, and which now use /run. Unmount and remove\n following upgrade.\n - Don't create /run/.run-transition on upgrade, only on actually\n setting up a transitional bind mount.\n - Add Breaks on all packages previously using /lib/init/rw, in\n order to permit removal of /lib/init/rw. It is not possible to\n remove prior to rebooting due to initscripts being required to\n be configured by the packages transitioning to /run. Remove in\n wheezy+1.\n - Remove trailing period from the initscripts init script log\n message. (Closes: #648881). Thanks to Clint Byrum.\n - /etc/network/if-up.d/mountnfs: grep: character class syntax is\n [[:space:]], not [:space:]. (Closes: #631077, #645655). Thanks to\n Milan Kocian and Jan-Benedict Glaw. Also simplify function logic\n using a for loop rather than a while loop. Thanks to Corey Hickey.\n * sysv-rc:\n - Remove splash support and use of removed /dev/.initramfs.\n (Closes: #643558). Thanks to Michael Biebl.\n\n -- Roger Leigh \[email protected]\u003e Tue, 13 Dec 2011 20:11:48 +0000\n\nsysvinit (2.88dsf-13.13) unstable; urgency=low\n\n * Non-maintainer upload.\n * Replace \"cons25\" with \"xterm\" on GNU/kFreeBSD.\n\n -- Robert Millan \[email protected]\u003e Wed, 02 Nov 2011 23:42:14 +0000\n\nsysvinit (2.88dsf-13.12) unstable; urgency=low\n\n * Non-maintainer upload.\n * 92_kfreebsd_ifdown.patch: Shut down network interfaces correctly on\n GNU/kFreeBSD. Thanks Guillem. (Closes: #606565)\n * Replace `ttyd' with `cuau' in inittab for GNU/kFreeBSD. Thanks Tuco.\n (Closes: #587162)\n * Use linux-any in debian/control to avoid hardcoded lists of non-Linux\n arches. (Closes: #634514)\n\n -- Robert Millan \[email protected]\u003e Fri, 14 Oct 2011 23:27:34 +0200\n\nsysvinit (2.88dsf-13.11) unstable; urgency=low\n\n * Non-maintainer upload.\n * initscripts provides /run/sendsigs.omit.d as soon as /run is\n available.\n * initscripts bootlogs: Remove support for /dev/.udev.log,\n which is no longer needed now udev uses /run.\n * initscripts umountroot: Remove ubuntu-specific patch which\n created directories on the root filesystem prior to umounting it.\n This was never applicable to Debian, and is now no longer required\n following the introduction of /run (Closes: #633541).\n\n -- Roger Leigh \[email protected]\u003e Wed, 13 Jul 2011 19:47:10 +0100\n\nsysvinit (2.88dsf-13.10) unstable; urgency=low\n\n * Non-maintainer upload.\n * Correct selinux-policy-default Breaks versioning (use \u003c= rather\n than \u003c\u003c).\n\n -- Roger Leigh \[email protected]\u003e Thu, 09 Jun 2011 20:31:00 +0100\n\nsysvinit (2.88dsf-13.9) unstable; urgency=low\n\n * Non-maintainer upload.\n * Try both old and multiarch paths to cope with buildds which don't\n yet have a multiarch libc installed.\n\n -- Roger Leigh \[email protected]\u003e Thu, 09 Jun 2011 14:50:53 +0100\n\nsysvinit (2.88dsf-13.8) unstable; urgency=low\n\n * Non-maintainer upload.\n * initscripts Breaks all selinux-policy-default versions up to and\n including 2:0.2.20100524-9, which do not support /run.\n * Add restorecon support for selinux to /run in mountkernfs.\n (Closes: #628107). Thanks to Martin Orr for this patch.\n * Search for libcrypt using multiarch path (Closes: #629677).\n\n -- Roger Leigh \[email protected]\u003e Thu, 09 Jun 2011 13:35:56 +0100\n\nsysvinit (2.88dsf-13.7) unstable; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Correct version check used for reboot notification in initscripts\n postinst.\n * Don't use \"rm -rf\" when creating compatibility links in chroots;\n use plain rmdir and abort with an error if it fails. This is in\n order to avoid removing host data if e.g. /run from the host is\n already bind mounted on the chroot /run, which would remove the\n contents of the host /run if upgrading initscripts in the chroot.\n * Restore rpcbind/portmap changes from 2.88dsf-13.5.\n * Add restorecon support for selinux using new paths. (Closes: #626725)\n Thanks to Martin Orr for this patch.\n * Use new debianutils \"ischroot\" program to detect if in a chroot in\n the initscripts postinst more reliably. Depend on initscripts\n version 4 or greater to ensure ischroot is available.\n (Closes: #626846)\n\n -- Roger Leigh \[email protected]\u003e Wed, 18 May 2011 23:12:30 +0100\n\nsysvinit (2.88dsf-13.6) unstable; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Don't remount filesystems mounted in the initramfs until mtab\n exists. Use the existing reload functionality of mountkernfs\n an mountdevsubfs to allow mtab.sh to trigger the remounts.\n (Closes: #623174)\n * Revert to using absolute paths in compatibility symlinks in order\n to comply with Policy §10.5 symlink rules. (Closes: #626263)\n * The permissions of /tmp are only set when root is writable.\n (Closes: #623934)\n\n -- Roger Leigh \[email protected]\u003e Sat, 14 May 2011 00:30:52 +0100\n\nsysvinit (2.88dsf-13.5) experimental; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Unify mount logic shared between mountkernfs.sh, mountdevsubfs.sh\n and mtab.sh\n - all functions use domount() from /lib/init/mount-functions. This\n merges in the functionality of domtab() in mtab.sh, which was\n almost entirely identical. domount is now capable of mounting and\n remounting (with and without mtab updates) as well as updating\n /etc/mtab.\n - mtab.sh calls mountkernfs.sh and mountdevsubfs with an \"mtab\"\n argument to do the mtab generation for early mounts. This means\n that the mount logic is not needlessly duplicated, and does not\n require two copies to be kept exactly in sync. This reduces the\n risk of problems as a consequence of subtle differences between\n the two scripts.\n - mount options may be specified in either /etc/default/tmpfs or\n in /etc/fstab, and will supersede hard coded defaults. The\n the values in fstab (if any) will supersede those in\n /etc/default/tmpfs should an entry be present. These values are\n also used for remounting, which means that filesystems mounted in\n an initramfs and moved onto the root filesystem prior to init\n starting will be remounted with the correct user-specified\n options.\n - Improve robustness of stat checks when comparing directories.\n - mountkernfs.sh and mountdevsubfs.sh are idempotent, so allow for\n repeated invocation. This is needed to allow the same code to\n be used for mounting, remounting and mtab generation.\n - Enabling RAMLOCK, RAMSHM and RAMTMP in /etc/default/rcS is no longer\n required if the filesystems are present in /etc/fstab\n * /etc/default/tmpfs is deprecated\n - If changing the default size limits, adding an entry to /etc/fstab\n is preferred compared with editing /etc/default/tmpfs. This also\n permits modifying the default mount options, and setting additional\n mount options.\n - If /etc/default/tmpfs has been modified from the defaults, any\n needed entries will be created in /etc/fstab on upgrade, to\n preserve the settings from /etc/default/tmpfs. The entries in\n /etc/fstab will subsequently override the settings in\n /etc/default/tmpfs.\n * The mount options for /run are made stricter when possible. For\n example, if /run/shm is a separate filesystem, it may be safely\n mounted with \"noexec\".\n * Compatibility symbolic links are relative, not absolute. e.g.\n /var/lock is ../run/lock rather than /run/lock. This means that if\n you're using a chroot from the host system, you'll always be using\n locations in the chroot, rather than the host, when following the\n links.\n * Updated documentation in initscripts README.Debian and rcS(5).\n\n [ Kel Modderman ]\n * Consider rpcbind as alternative to portmap in mountnfs ifupdown\n script. Thanks to Jamie Heilman and Arthur de Jong.\n (Closes: #620788)\n\n -- Roger Leigh \[email protected]\u003e Fri, 22 Apr 2011 15:25:25 +0100\n\nsysvinit (2.88dsf-13.4) experimental; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n\n [ Kel Modderman ]\n * Remove code from /etc/init.d/bootmisc.sh which is not needed with modern\n kernel which do not support BSD ptys. The udev check is not reliable\n anymore due to /run/. Thanks Marco d'Itri (Closes: #620784)\n * Handle user interupt of fsck in etc/init.d/checkfs.sh and\n init.d/checkroot.sh. Trap SIGINT and handle fsck exit status of 32.\n (Closes: #608534)\n\n -- Roger Leigh \[email protected]\u003e Sat, 16 Apr 2011 16:50:51 +0100\n\nsysvinit (2.88dsf-13.3) experimental; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Support for new top-level directory /run to replace /var/run,\n /var/lock, /dev/shm and /lib/init/rw as a place to store transient\n writable data which should not be preserved across a system\n reboot (Closes: #186892, #616571, #620191). /run fixes existing\n issues with RAMRUN and RAMLOCK options using tmpfs on /var/run and\n /var/lock (Closes: #423405, #481546, #564635, #607136, #620735).\n Additionally, /run/shm replaces /dev/shm and may share the same\n tmpfs as /run if RAMSHM is set to \"no\" in /etc/default/rcS. /tmp\n may also be configured to be a tmpfs if RAMTMP is set to \"yes\" in\n /etc/default/rcS. /tmp may also be configured to use /run directly if\n it is symlinked to /run/tmp, for example.\n Summary:\n /var/run → /run\n /var/lock → /run/lock\n /dev/shm → /run/shm\n /lib/init/rw → /run (not transitioned automatically)\n /dev/.* → /run (not transitioned automatically)\n These changes do not take effect until the system is rebooted as\n is currently done for /lib/init/rw setup. Prior to a reboot, the\n paths are made available via bind/nullfs/firmlink mounts, depending on\n the platform. Following a reboot, the old paths will be converted to\n symlinks, or bind/nullfs/firmlink mounts where symlinking is not\n possible, to allow access via either the old or new paths, to permit\n programs using the old paths to transition to use the new paths for\n wheezy.\n - debian/initscripts.postinst:\n Take chroot detection logic from udev postinst (existing logic was\n broken). Add detection logic for vserver environments and Hurd.\n Trigger reboot to complete transition.\n If the system has not yet transitioned to a tmpfs-based /run, set up\n bind mounts as follows:\n /var/run → /run\n /var/lock → /run/lock\n /dev/shm → /run/shm\n On reboot, the system will complete the migration to a tmpfs-based\n /run; this creates the directory heierachy from the old paths to\n enable the use of the new /run paths prior to a restart. This means\n packages may transition to using /run with a versioned dependency\n upon initscripts.\n Remove special handling for RAMRUN and RAMLOCK, which is now taken\n care of by /run.\n If in a chroot environment, just create symlinks from the new names\n to the existing locations, since otherwise the changes would be\n lost, and since rcS scripts aren't run the transition won't\n complete.\n - debian/src/initscripts/Makefile:\n Provide top-level /run.\n - debian/src/initscripts/doc/README.Debian:\n Document new use of RUN_SIZE and LOCK_SIZE.\n Document use of /run rather than /lib/init/rw.\n Document use of SHM_SIZE and TMP_SIZE.\n - debian/src/initscripts/etc/init.d/checkroot.sh:\n Use /run in place of /lib/init/rw.\n - debian/src/initscripts/etc/default/tmpfs:\n Document TMPFS_SIZE, RUN_SIZE and LOCK_SIZE (Closes: #483643).\n Document TMP_SIZE and SHM_SIZE.\n - debian/src/initscripts/etc/init.d/mountkernfs.sh:\n Create /run, /run/sendsigs.omit.d and /run/lock.\n Mount /run/lock as a separate tmpfs if RAMLOCK=yes.\n /run/lock has 01777 permissions to match /var/lock.\n Mount /tmp as a separate tmpfs if RAMTMP=yes or / is being mounted\n read-only (Closes: #503805, #585543).\n Drop mounting of /var/run and /var/lock.\n - debian/src/initscripts/etc/init.d/mountdevsubfs.sh:\n Create /run/shm. Mount /run/shm as a separate tmpfs if RAMSHM=yes.\n - debian/src/initscripts/etc/init.d/mtab.sh:\n domtab mirrors behaviour of domount in mount-functions exactly, to\n prevent duplicate mounts (required for bind mount support).\n Bind mount /run/init and drop mounting of /var/run. Mount /run/lock\n in place of /var/lock.\n Mount /tmp if RAMTMP=yes.\n Mount /run/shm if RAMSHM=yes.\n - debian/src/initscripts/etc/init.d/sendsigs:\n Use new paths:\n files: /run/sendsigs.omit /lib/init/rw/sendsigs.omit\n dirs: /run/sendsigs.omit.d/ /lib/init/rw/sendsigs.omit.d/\n - debian/src/initscripts/etc/init.d/umountfs:\n Ignore /run. Continue to ignore /lib/init/rw in order to handle\n clean shutdown. No longer ignore /var/run and /var/lock.\n - debian/src/initscripts/etc/init.d/umountnfs.sh:\n Check for presence of .ramfs than configuration variable when\n skipping /var/run and /var/lock.\n Ignore /run. Continue to ignore /lib/init/rw in order to handle\n clean shutdown. No longer ignore /var/run and /var/lock.\n - debian/src/initscripts/lib/init/bootclean.sh\n Don't clean /var/run and /var/lock (Closes: #378776). Because\n these directories are now a tmpfs, cleaning no longer makes sense.\n - debian/src/initscripts/lib/init/tmpfs.sh:\n Read /etc/default/tmpfs and provide defaults if unset.\n - debian/src/initscripts/lib/init/mount-functions.sh:\n Support bind mounts in domount() (Closes: #353943).\n Drop support for mounting /var/run and /var/lock as separate\n tmpfs filesystems. Symlink /var/run to /run and /var/lock to\n /run/lock if possible. If /var/run and /var/lock are directories,\n attempt to remove and symlink if successful, or else bind mount.\n - debian/src/initscripts/lib/init/vars.sh:\n Read /etc/default/rcS and provide defaults if unset.\n - debian/src/initscripts/man/rcS.5:\n Drop documentation of RAMRUN.\n Update documentation for RAMLOCK (Closes: #406685).\n Document RAMTMP and RAMSHM.\n - debian/src/initscripts/share/default.rcS:\n Remove RAMRUN.\n Add RAMSHM and RAMTMP.\n RAMLOCK, RAMSHM and RAMTMP default to enabled for new installs.\n\n [ Michael Biebl ]\n * Remove dead usplash support code (Closes: #599241, #599734, #612594).\n\n [ Martin F. Krafft ]\n * Add comments to /etc/default/rcS (Closes: #530582).\n\n [ Samuel Thibault ]\n * Hurd portability for initscripts postinst and init scripts.\n Hurd does not currently support tmpfs mounts, but will do in the\n future. Use firmlinks in place of bind mounts.\n\n -- Roger Leigh \[email protected]\u003e Sat, 16 Apr 2011 01:17:29 +0100\n\nsysvinit (2.88dsf-13.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Danish (Joe Hansen). Closes: #599430\n - Brazilian Portuguese (Adriano Rafael Gomes). Closes: #605851\n - Slovak (Slavko). Closes: #614193\n\n -- Christian Perrier \[email protected]\u003e Tue, 05 Apr 2011 07:24:09 +0200\n\nsysvinit (2.88dsf-13.1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"sysvinit","Version":"2.88dsf-13.1+squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"sysvinit-utils","Version":"2.88dsf-13.1+squeeze1","Release":"","NewVersion":"2.88dsf-41+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of sysvinit-utils\nsysvinit (2.88dsf-41+deb7u1) stable-proposed-updates; urgency=low\n\n [ Roger Leigh ]\n * Correct the Breaks on bootchart to ensure that all broken\n versions are removed on upgrade (Closes: #694252). Break\n bootchart \u003c\u003c 0.10~svn407-4 to ensure that 0.10~svn407-3.3\n and earlier are removed.\n\n -- Roger Leigh \[email protected]\u003e Sun, 14 Jul 2013 18:21:07 +0100\n\nsysvinit (2.88dsf-41) unstable; urgency=low\n\n [ Roger Leigh ]:\n * sysvinit postinst always creates /etc/inittab if absent during\n configuration (Closes: #700051).\n\n -- Roger Leigh \[email protected]\u003e Thu, 07 Feb 2013 23:32:12 +0000\n\nsysvinit (2.88dsf-40) unstable; urgency=low\n\n [ Roger Leigh ]:\n * Don't restart init on GNU/Hurd (Closes: #663009).\n * Handle PID detection more robustly, to work better with containers\n (Closes: #699523). Always use PID1, which avoids the need for\n fragile pidof usage.\n * Handle ischroot more gracefully on failure (Closes: #699566).\n\n -- Roger Leigh \[email protected]\u003e Sun, 03 Feb 2013 14:52:05 +0000\n\nsysvinit (2.88dsf-39) unstable; urgency=low\n\n [ Roger Leigh ]:\n * initscripts postinst calls urandom, not urandom.sh (Closes: #698966).\n * sysvinit postinst unconditionally creates a compatibility initctl\n link to ensure the migration to /run won't fail (Closes: #663009).\n\n -- Roger Leigh \[email protected]\u003e Sat, 26 Jan 2013 12:09:29 +0000\n\nsysvinit (2.88dsf-38) unstable; urgency=low\n\n [ Roger Leigh ]:\n * If pidof fails in the sysvinit postinst or initscripts, default\n to PID 1 (for /sbin/init) (Closes: #663009).\n * Make fstab globbing in initscripts completely robust.\n\n -- Roger Leigh \[email protected]\u003e Wed, 23 Jan 2013 22:43:55 +0000\n\nsysvinit (2.88dsf-37) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts: Remove all use of shell heredocs in shell libraries;\n these require a writable /tmp which will not be guaranteed to be\n present in early boot (Closes: #697994).\n\n -- Roger Leigh \[email protected]\u003e Mon, 14 Jan 2013 21:53:59 +0000\n\nsysvinit (2.88dsf-36) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Handle globbing of /etc/fstab.d/* safely.\n - Correct erroneous error that an entry for /dev/shm existed in\n /etc/fstab when no entry was present (Closes: #697537).\n\n -- Roger Leigh \[email protected]\u003e Fri, 11 Jan 2013 23:36:28 +0000\n\nsysvinit (2.88dsf-35) unstable; urgency=low\n\n [ David Prévot ]\n * Fix German translation charset.\n\n [ Roger Leigh ]\n * initscripts:\n - To permit enabling of dependency-based boot, add Breaks on older\n versions of bootchart. Thanks to Andreas Beckmann.\n Closes: #694252.\n - To work around a bug in the Oracle database, which has a faulty\n check for /dev/shm, continue to mount a tmpfs on /dev/shm rather\n than /run/shm if one is defined in /etc/fstab. Closes: #694379.\n * sysvinit-utils:\n - Add Breaks: upstart (\u003c\u003c 1.5-1) to avoid breaking the boot with\n older versions of upstart. Closes: #694961.\n\n -- Roger Leigh \[email protected]\u003e Mon, 17 Dec 2012 22:50:49 +0000\n\nsysvinit (2.88dsf-34) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts: Don't run mountall until checkroot-bootclean is finished.\n\n [ Steve Langasek ]\n * initscripts.postinst: hide from lintian the fact that we're removing\n /dev/shm, since otherwise a buggy lintian check prevents us from\n uploading legitimate code to the archive.\n\n -- Steve Langasek \[email protected]\u003e Fri, 16 Nov 2012 14:51:06 -0600\n\nsysvinit (2.88dsf-33) unstable; urgency=low\n\n [ David Prévot ]\n * Updated debconf translations:\n - es. Thanks to Javier Fernández-Sanguino. Closes: #686774, #682560.\n - pt_BR. Thanks to Adriano Rafael Gomes. Closes: #686906.\n\n [ Roger Leigh ]\n * All bootclean scripts run before bootmisc. Closes: #677097.\n\n [ Steve Langasek ]\n * when running under upstart, emit an 'unmounted-remote-filesystems' event\n when we're done unmounting in umountnfs.sh so that upstart can finish\n shutting down.\n * make the startpar bridge track stopped jobs, not just started ones;\n required for us to have a smooth event-based shutdown with upstart.\n\n -- Steve Langasek \[email protected]\u003e Fri, 16 Nov 2012 04:30:29 -0800\n\nsysvinit (2.88dsf-32) unstable; urgency=low\n\n [ Roger Leigh ]\n * Apply patch to startpar to prevent the use of mlockall on\n kFreeBSD, which was causing a kernel panic at boot. Thanks to\n Petr Salinger for this patch. Closes: #672959.\n * Correctly detect service availability with service(8). Thanks\n to Alexander Golov for this patch. Closes: #685212.\n\n -- Roger Leigh \[email protected]\u003e Fri, 31 Aug 2012 23:03:14 +0100\n\nsysvinit (2.88dsf-31) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Remove debugging echo statement from postinst.\n\n -- Roger Leigh \[email protected]\u003e Sat, 11 Aug 2012 18:27:50 +0100\n\nsysvinit (2.88dsf-30) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Fix /dev/shm to /run/shm migration bug which occurred in chroots\n when /dev/shm was a mountpoint but /dev was not. Check\n specifially for /dev, /dev/shm, run or /run/shm being a mountpoint\n before attempting to migrate. This copes with all combinations of\n mountpoints, directories and symlinks. Closes: #683103.\n\n -- Roger Leigh \[email protected]\u003e Sat, 11 Aug 2012 16:44:22 +0100\n\nsysvinit (2.88dsf-29) unstable; urgency=low\n\n [ Steve Langasek ]\n * initscripts:\n - Improve /dev/shm to /run/shm upgrade handling in the postinst\n (improvement for #674178).\n\n [ Roger Leigh ]\n * initscripts:\n - Remove /lib/init/rw if possible. Closes: #679612.\n - If /run is a symlink to /var/run, correct this on both upgrade\n and on boot. On upgrade, the proper /run migration will occur\n on reboot. On boot, the system will require rebooting to fully\n migrate /run to a working configuration (but this will only\n occur on systems which are already broken, it's not an upgrade\n path). This correct problems with udev breakage due to /run\n being mounted twice when /run is a symlink.\n Closes: #677097, #679523.\n - Start urandom on initial install, so that a random seed exists on\n first boot. Closes: #679972.\n - Restore creation of /var/log/dmesg (Closes: #681639).\n * sysv-rc:\n Remove unused debconf logic in postinst.\n\n -- Roger Leigh \[email protected]\u003e Sat, 30 Jun 2012 23:21:06 +0100\n\nsysvinit (2.88dsf-28) unstable; urgency=low\n\n [ Steve Langasek ]\n * debian/patches/upstart_support.patch: add missing\n startpar-upstart-inject manpage.\n\n [ Roger Leigh ]\n * Updated debconf translations:\n - ca. Thanks to Innocent De Marchi. Closes: #677904.\n - cs. Thanks to Miroslav Kure. Closes: #678680.\n - da. Thanks to Joe Hansen. Closes: #676893.\n - de. Thanks to Chris Leick. Closes: #677753.\n - fr. Thanks to Steve Petruzzello. Closes: #677590.\n - gl. Thanks to Jorge Barreiro. Closes: #678627.\n - nl. Thanks to Jeroen Schot. Closes: #677333.\n - pl. Thanks to Michał Kułach. Closes: #676773.\n - pt. Thanks to Miguel Figueiredo. Closes: #676814.\n - ru. Thanks to Yuri Kozlov. Closes: #677011.\n - sk. Thanks to Slavko. Closes: #676721.\n - sv. Thanks to Martin Bagge. Closes: #676791.\n - zh_CN. Thanks to YunQiang Su. Closes: #676725.\n * Add missing hardening CPPFLAGS. Thanks to Simon Ruderich.\n Closes: #678878.\n * Update clean run to cope with nonexistent startpar.\n * initscripts:\n - Only run update-rc.d in maintainer scripts when the init\n script exists and is executable. Closes: #671124.\n - Break initramfs-tools (\u003c\u003c 0.104), needed to prevent initrd\n generation failure since older initramfs-tools can't cope with\n /etc/mtab being a symlink. Closes: #668650.\n - Don't mount with -o nodev on kFreeBSD. Closes: #669162.\n - Set up /run correctly in a chroot when running debootstrap.\n Thanks to Serge Hallyn. initscripts.postinst: if /dev is not a\n separate partition and we're in a chroot, then create /run/shm\n and make /dev/shm a symbolic link to it, as we would expect to\n find in a upgraded and rebooted running system. LP: #974584.\n Closes: #674178.\n * sysvinit:\n - rc and startpar distinguish between LSB not installed and\n not configured failure conditions. Thanks to Nate Coraor.\n Closes: #625463.\n * sysv-rc:\n - Dependency-based booting is activated unconditionally. Scripts\n without LSB headers will generally be ordered after all other\n scripts, but before scripts requiring $all to be started, such as\n rc.local, but this is not guaranteed. Add an LSB header if you\n need to guarantee the ordering of scripts.\n Closes: #676463, #678231, #676473.\n - update-rc.d uses absolute path to insserv, to give better error\n messages to non-root users where /sbin is not in the PATH.\n Thanks to Regid Ichira. Closes: #637390.\n\n [ Paul Menzel ]\n * Fix usage message in /etc/init.d/motd. Closes: #676910.\n\n -- Roger Leigh \[email protected]\u003e Wed, 27 Jun 2012 23:00:45 +0100\n\nsysvinit (2.88dsf-27) unstable; urgency=low\n\n [ Salvatore Bonaccorso ]\n * Remove reference to /usr/share/initscripts/default.rcS.\n With commit d0388ba464e69b1b7915a3d9071cfcba21d0102c /etc/default/rcS\n was made a regular conffile. Remove reference to original location with\n default values.\n\n [ Roger Leigh ]\n * initscripts:\n - Don't fail in the absence of /proc/meminfo. The ram_size and\n swap_size functions in /lib/init/tmpfs.sh always return true.\n Closes: #676669.\n\n -- Roger Leigh \[email protected]\u003e Fri, 08 Jun 2012 22:29:04 +0100\n\nsysvinit (2.88dsf-26) unstable; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - /run/shm is mounted noexec. Closes: #386368.\n - The RAMSHM and RAMTMP settings in /etc/default/rcS are used if\n present, though the replacement settings in /etc/default/tmpfs\n will override these, if enabled.\n - Revert RAMTMP setting to be disabled by default.\n Closes: #630615, #665635, #666698, #674517.\n - Don't prompt the user on upgrade if rcS was not modified by\n the admin. Closes: #674460.\n * sysvinit-utils:\n - Fix typo in fstab-decode(8). Thanks to Bjarni Ingi Gislason.\n Closes: #674208.\n\n -- Roger Leigh \[email protected]\u003e Mon, 28 May 2012 17:58:38 +0100\n\nsysvinit (2.88dsf-25) experimental; urgency=low\n\n [ Roger Leigh ]\n * Build with hardening flags enabled; CFLAGS and LDFLAGS are passed\n to all build commands.\n * initscripts:\n - /etc/default/rcS is no longer managed by ucf, and is a regular\n conffile. Drop the UTC setting, which has been migrated to\n /etc/adjtime by util-linux. Break util-linux \u003c\u003c 2.20.1-5 in order\n to ensure correct migration of the UTC setting before the file is\n upgraded.\n - Use ifquery in /etc/network/if-up.d/mountnfs to replace complex\n parsing. Also only run if inet or inet6 interfaces have been\n configured, to avoid freezing when the interface hasn't yet\n been configured (Closes: #674039).\n - %VM tmpfs size calculation works when swap is disabled.\n\n -- Roger Leigh \[email protected]\u003e Tue, 22 May 2012 23:46:14 +0100\n\nsysvinit (2.88dsf-24) experimental; urgency=low\n\n [ Roger Leigh ]\n * initscripts:\n - Don't generate or touch /etc/motd. Instead, the dynamic part of\n /etc/motd is created as /run/motd.dynamic, leaving /etc/motd\n entirely under the control of the system administrator. If\n /etc/motd is a symlink to /run/motd, /etc/motd.tail is moved\n back to /etc/motd. Closes: #353229, #624391, #668307. /etc/motd\n is not removed if initscripts is purged, since it's not owned by\n initscripts.\n - By default, /run/motd is just the output of uname, preserving the\n existing behaviour. However, should the administrator wish to\n include dynamic information in the motd, they may write scripts\n to update /run/motd.dynamic as they please. Closes: #437176.\n - motd generation is split from bootlogs into a separate motd\n init script.\n - bootlogs init script has been removed; current logging daemons\n handle this themselves, making this script redundant.\n - tmpfs mounts are never cleaned by bootclean.sh. Cleaning /run\n can lead to nonfunctional input when Xorg starts. Closes: #669949.\n * sysvinit-utils:\n - Suggest rather than Recommend bootlogd.\n\n [ Kel Modderman ]\n * sysv-rc:\n - Run check_divert in postinst to make sure /usr/sbin/update-rc.d\n not symlinked to /usr/sbin/update-rc.d-insserv. Closes: #670085.\n\n [ Steve Langasek ]\n * Install the startpar bridge now that dh_installinit in Debian handles\n this. Closes: #660824.\n * Give startpar a listening backlog on its socket for upstart connections,\n since there's no protocol-level queuing for unix sockets and these\n connections tend to come in fast and furious at boot.\n * Add upstart support to invoke-rc.d, per the policy discussion in bug\n #591791. Closes: #671284.\n\n -- Roger Leigh \[email protected]\u003e Sun, 29 Apr 2012 23:52:14 +0100\n\nsysvinit (2.88dsf-23) experimental; urgency=low\n\n [ Roger Leigh ]\n * Acknowledge NMU for translation updates. Thanks to Christian\n Perrier.\n * debian/control:\n - Upgrade to Standards-Version 3.9.3.\n - Build-Depend on debhelper v9.\n - Correct Vcs-Git URL.\n * debian/rules:\n - Use DEB_HOST_ARCH_OS = hurd rather than\n DEB_HOST_ARCH = hurd-i386. Thanks to Pino Toscano.\n * debian/patches:\n - 11_lfs_cflags.patch: Add patch for enabling large file support,\n needed on GNU/Hurd, but useful for all platforms.\n - 73_lfs_cflags.patch: Add patch for enabling large file support\n in startpar.\n * initscripts:\n - Moved RAM* settings from /etc/default/rcS to /etc/default/tmpfs.\n This ensures that the settings are equivalent for upgrades and\n new installations, but will require manual configuration of the\n settings for upgrades (no migration from /etc/default/rcS to\n /etc/default/tmpfs will take place, due to tmpfs being a\n conffile). tmpf(5) manual page added to document all aspects\n of tmpfs configuration, including the existing documentation in\n rcS(5).\n - Drop the use of .ramfs dotfiles in /run and /run/lock. These\n were a legacy of /lib/init/rw and were not actually used by\n anything. Closes: #403863.\n - Drop /etc/init.d/mountoverflowtmp. This has been merged into\n the general tmpfs on /tmp handling functions. This means the\n generic RAMTMP configuration is used for the overflowtmp.\n Closes: #567539.\n - It is now possible to configure a tmpfs mount size limit as a\n percentage of the total VM size (%VM) as well as a percentage\n of the RAM size (%). This is computed by tmpfs.sh and the\n tmpfs mounts are remounted with the updated size limit after\n swap becomes available.\n - An fstab entry for /tmp overrides RAMTMP. Document tmpfs\n override and tmpfs defaults in tmpfs(5), also undeprecating the\n tmpfs settings. Closes: #585540, #665995.\n - An fstab entry for /run/lock or /run/shm overrides RAMLOCK and\n RAMSHM.\n - bootclean cleans /tmp, /run and /run/lock before any filesystems\n are mounted as well as after local and network mounts. This\n permits cleaning of directories which would otherwise be hidden\n by mountpoints later in the boot process.\n Closes: #55707, #558000, #666871. Additionally clean up\n /lib/init/rw in case any files were hidden by the (now removed)\n tmpfs mount at this location. Closes: #652625.\n - Removed last trace of the long-removed EDITMOTD from the\n postinst. Closes: #438895.\n - Removed documentation of #346342 in rcS(5). This is no longer\n an issue now tzdata keeps a copy of the data on the rootfs.\n Closes: #385172.\n - Correct description of TMPTIME in rcS(5). Thanks to Alan J.\n Greenberger. Closes: #562500.\n - urandom: Applied a series of patches from John Denker to\n improve the integrity of random number generation. Many thanks.\n Closes: #596479, #596480, #596481, #596482, #596483.\n * sysv-rc:\n - Remove old upgrade logic from maintainer scripts not required\n for wheezy.\n - Migrate users of obsolete static boot ordering to dynamic boot\n ordering.\n - Remove use of /etc/init.d/.legacy-bootordering. Closes: #668312.\n - Improve help text of debconf message when it is not possible to\n automatically enable dynamic boot ordering. Provide explicit\n instructions for how to purge obsolete init scripts.\n Closes: #550425.\n - etc/init.d/rc: Ensure linprocfs is mounted on kFreeBSD. Thanks\n to Robert Millan. Closes: #659480.\n - Drop undocumented CONCURRENCY setting from /etc/init.d/rc.\n Closes: #518249, #540448, #539261. Note that this still contains\n internal fallbacks to support non-insserv booting, which may be\n removed at a later date.\n - invoke-rc.d:\n + Minor manual page corrections. Thanks to Anthony Fiumara.\n Closes: #664816.\n + Remove mention of the \"dpkg Programmers' Manual\" and replace\n with references to Debian Policy. Closes: #543793.\n - update-rc.d:\n + Correctly warn about non-LSB standard runlevels. Thanks to\n Chris Hiestand for this patch. Closes: #614895.\n + Remove obsolete documentation of\n /var/lib/sysv-rc/legacy-bootsequence. Thanks to Thomas Hood.\n Closes: #623051.\n * sysvinit:\n - Minor corrections for halt(8) manual page. Thanks to\n Christoph Anton Mitterer. Closes: #587923.\n - Installation with debootstrap --variant=fakechroot now works, due\n to only migrating the old control channel when it is still\n present. Thanks to Michael Gilbert. Closes: #596284.\n * sysvinit-utils:\n - Recommend bootlogd. Closes: #659490. This means that booklogd\n will be installed by default, but will be removable.\n Closes: #232569.\n - Correct documentation of the startpar -i option. Closes: #545438.\n - Correct startpar(8) SEE ALSO section. Closes: #634146.\n - Correct wording in service(8). Thanks to Joey Hess and Regid\n Ichira. Closes: #545401, #667745.\n\n [ Steve Langasek ]\n * debian/service/service: fix upstart compatibility to not try to use the\n upstart commands when init isn't upstart. Closes: #636054.\n * debian/rules: pass CFLAGS when building startpar.\n * Fix startpar to not run init scripts that have matching upstart jobs,\n instead waiting for a signal from upstart. Closes: #660824.\n * sysvinit:\n - Don't restart or perform initctl migration if systemd is\n running.\n\n -- Roger Leigh \[email protected]\u003e Sat, 21 Apr 2012 12:11:45 +0100\n\nsysvinit (2.88dsf-22.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Dutch; (Jeroen Schot). Closes: #626270\n - Polish (Michał Kułach). Closes: #658156\n\n -- Christian Perrier \[email protected]\u003e Tue, 13 Mar 2012 07:03:06 +0100\n\nsysvinit (2.88dsf-22) unstable; urgency=low\n\n [ Roger Leigh ]\n * mountall.sh uses mknod rather than mkfifo (Closes: #658045).\n\n -- Roger Leigh \[email protected]\u003e Mon, 30 Jan 2012 23:44:21 +0000\n\nsysvinit (2.88dsf-21) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/patches/72_path_max.patch: New patch for startpar. Don't\n use PATH_MAX, to fix compilation on GNU/Hurd.\n\n -- Roger Leigh \[email protected]\u003e Sat, 28 Jan 2012 11:14:53 +0000\n\nsysvinit (2.88dsf-20) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/patches/71_signalfd.patch: New patch for startpar. Don't\n include \u003csys/signalfd.h\u003e, which is not used and breaks\n compilation on architectures not having this Linux-specific\n header. (Closes: #657676)\n * sysvinit:\n - Don't restart init when a chroot is detected, to avoid lengthy\n timeouts. Use ischroot from debianutils to determine whether\n the postinst is being run in a chroot environment, as already\n done by initscripts.\n\n -- Roger Leigh \[email protected]\u003e Sat, 28 Jan 2012 00:07:39 +0000\n\nsysvinit (2.88dsf-19) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/control:\n - initscripts adds versioned Breaks on autofs (\u003c\u003c 5) since\n autofs 4.x does not cope with /etc/mtab symlinked to\n /proc/mounts. Users should upgrade to autofs5, which works\n correctly. (Closes: #653126)\n - initscripts Breaks aide \u003c\u003c 0.15.1-5 and sysklogd \u003c\u003c 1.5-6.2 now\n they support /run.\n - sysvinit Pre-Depends on initscripts \u003e= 2.88dsf-13.3 in order\n to transition initctl to /run.\n * sysvinit:\n - /sbin/init control channel FIFO is /run/initctl rather than\n /dev/initctl (Linux) or /etc/.initctl (FreeBSD). The postinst\n migrates the running init to use the new control channel by\n replacing the old channel with a symlink prior to issuing a\n SIGUSR1 to cause init to reopen its control channel and then\n exec of the new version of init using the new path. Thanks\n to Robert Millan. (Closes: #638019)\n - Add Catalan (ca) translation. Thanks to Innocent De Marchi.\n (Closes: #622785)\n * sysvinit-utils:\n - Upgrade to startpar 0.58. Thanks to Dr. Werner Fink at SuSE for\n this updated release. This release incorporates all of the\n existing Debian patchset; debian/patches/7[1-9]* have now been\n dropped.\n * initscripts:\n - mountall.sh recreates /run/initctl and sends SIGUSR1 to init\n if needed.\n - /etc/init.d/rc.local uses only $all in Required-Start;\n $remote_fs and $syslog being redundant. Thanks to Regid Ichira.\n (Closes: #635025)\n - rcS.5 documents that RAMTMP defaults to yes for new\n installations, and no for upgrades (since RAMTMP is not present\n in /etc/default/rcS). (Closes: #652337)\n - /etc/default/rcS is updated using ucf. (Closes: #648433)\n - umountfs uses more sophisticated sed expression to compute\n PROTECTED_MOUNTS, to support unionfs and more complex cases.\n Thanks to Michele Mazzucchi for this patch. (Closes: #655582)\n\n -- Roger Leigh \[email protected]\u003e Sun, 22 Jan 2012 17:07:46 +0000\n\nsysvinit (2.88dsf-18) unstable; urgency=low\n\n [ Roger Leigh ]\n debian/rules: Fix FTBFS on Hurd by moving file renaming to a later\n point in the build.\n\n -- Roger Leigh \[email protected]\u003e Thu, 22 Dec 2011 22:59:47 +0000\n\nsysvinit (2.88dsf-17) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/control:\n - initscripts adds versioned Breaks on readahead-fedora\n (\u003c\u003c 2:1.5.6-3), which removed splash support. Thanks to Sven\n Joachim.\n - Update initscripts Breaks for fixed version of libpam-mount.\n * initscripts:\n - Document /lib/init/rw removal and cleanup in NEWS.\n (Closes: #652512).\n - /etc/network/if-up.d/mountnfs handles whitespace correctly\n (Closes: #612378). grep on /etc/network/run/ifstate is corrected\n (inverted the logic). Thanks to Jamie Heilman and Corey Hickey.\n * sysvinit: Install reboot and halt commands with a -sysv suffix\n on GNU/Hurd. (Closes: #652830)\n\n [ Josh Triplett ]\n * Split bootlogd into a separate package. (Closes: #545181)\n\n -- Roger Leigh \[email protected]\u003e Thu, 22 Dec 2011 20:58:36 +0000\n\nsysvinit (2.88dsf-16) unstable; urgency=low\n\n [ Roger Leigh ]\n * debian/control:\n - initscripts versioned Breaks use correct epochs and binary\n package names.\n - initscripts Breaks libpam-mount \u003c= 2.11-1, which does not\n support a read-only mtab. This is supported in new upstream\n versions.\n\n -- Roger Leigh \[email protected]\u003e Sat, 17 Dec 2011 15:57:24 +0000\n\nsysvinit (2.88dsf-15) experimental; urgency=low\n\n [ Roger Leigh ]\n * /etc/init.d/skeleton: Small whitespace cleanup. Thanks to\n Peter Eisentraut. (Closes: #651862)\n * Move all patches in debian/startpar/patches to debian/patches\n and make debian/startpar/ content a separate patch applied to\n startpar/. Build and install startpar in debian/rules.\n (Closes: #652097).\n\n -- Roger Leigh \[email protected]\u003e Thu, 15 Dec 2011 00:24:22 +0000\n\nsysvinit (2.88dsf-14) experimental; urgency=low\n\n [ Kel Modderman ]\n * Add support for s390x, thanks to Aurelien Jarno \[email protected]\u003e.\n (Closes: #641107)\n\n [ Roger Leigh ]\n * debian/rules:\n - Add build-arch and -indep rules. (Closes: #648472)\n - Remove dpatch usage.\n - Use dh and debhelper compat level 9.\n * debian/control:\n - Add git version control information.\n - Upgrade to Standards-Version 3.9.2.\n - Add myself to Uploaders.\n * Use dpkg 3.0 (quilt) source format. Rediffed\n debian/patches/40_multiarch_libcrypt.patch which was not well\n formed and failed to apply.\n * initscripts:\n - Make /etc/mtab a symlink to /proc/mounts. (Closes: #494001)\n Note that this is only done when the root filesystem is writable\n and /proc/mount is readable.\n - Support the ceph network filesystem. (Closes: #580579). Thanks\n to Sage Weil.\n - Restore boot-time cleaning of /var/run and /var/lock, used by\n systems which currently do not use a tmpfs for /run.\n - Remove /lib/init/rw: Add Breaks for all packages which used\n /lib/init/rw, and which now use /run. Unmount and remove\n following upgrade.\n - Don't create /run/.run-transition on upgrade, only on actually\n setting up a transitional bind mount.\n - Add Breaks on all packages previously using /lib/init/rw, in\n order to permit removal of /lib/init/rw. It is not possible to\n remove prior to rebooting due to initscripts being required to\n be configured by the packages transitioning to /run. Remove in\n wheezy+1.\n - Remove trailing period from the initscripts init script log\n message. (Closes: #648881). Thanks to Clint Byrum.\n - /etc/network/if-up.d/mountnfs: grep: character class syntax is\n [[:space:]], not [:space:]. (Closes: #631077, #645655). Thanks to\n Milan Kocian and Jan-Benedict Glaw. Also simplify function logic\n using a for loop rather than a while loop. Thanks to Corey Hickey.\n * sysv-rc:\n - Remove splash support and use of removed /dev/.initramfs.\n (Closes: #643558). Thanks to Michael Biebl.\n\n -- Roger Leigh \[email protected]\u003e Tue, 13 Dec 2011 20:11:48 +0000\n\nsysvinit (2.88dsf-13.13) unstable; urgency=low\n\n * Non-maintainer upload.\n * Replace \"cons25\" with \"xterm\" on GNU/kFreeBSD.\n\n -- Robert Millan \[email protected]\u003e Wed, 02 Nov 2011 23:42:14 +0000\n\nsysvinit (2.88dsf-13.12) unstable; urgency=low\n\n * Non-maintainer upload.\n * 92_kfreebsd_ifdown.patch: Shut down network interfaces correctly on\n GNU/kFreeBSD. Thanks Guillem. (Closes: #606565)\n * Replace `ttyd' with `cuau' in inittab for GNU/kFreeBSD. Thanks Tuco.\n (Closes: #587162)\n * Use linux-any in debian/control to avoid hardcoded lists of non-Linux\n arches. (Closes: #634514)\n\n -- Robert Millan \[email protected]\u003e Fri, 14 Oct 2011 23:27:34 +0200\n\nsysvinit (2.88dsf-13.11) unstable; urgency=low\n\n * Non-maintainer upload.\n * initscripts provides /run/sendsigs.omit.d as soon as /run is\n available.\n * initscripts bootlogs: Remove support for /dev/.udev.log,\n which is no longer needed now udev uses /run.\n * initscripts umountroot: Remove ubuntu-specific patch which\n created directories on the root filesystem prior to umounting it.\n This was never applicable to Debian, and is now no longer required\n following the introduction of /run (Closes: #633541).\n\n -- Roger Leigh \[email protected]\u003e Wed, 13 Jul 2011 19:47:10 +0100\n\nsysvinit (2.88dsf-13.10) unstable; urgency=low\n\n * Non-maintainer upload.\n * Correct selinux-policy-default Breaks versioning (use \u003c= rather\n than \u003c\u003c).\n\n -- Roger Leigh \[email protected]\u003e Thu, 09 Jun 2011 20:31:00 +0100\n\nsysvinit (2.88dsf-13.9) unstable; urgency=low\n\n * Non-maintainer upload.\n * Try both old and multiarch paths to cope with buildds which don't\n yet have a multiarch libc installed.\n\n -- Roger Leigh \[email protected]\u003e Thu, 09 Jun 2011 14:50:53 +0100\n\nsysvinit (2.88dsf-13.8) unstable; urgency=low\n\n * Non-maintainer upload.\n * initscripts Breaks all selinux-policy-default versions up to and\n including 2:0.2.20100524-9, which do not support /run.\n * Add restorecon support for selinux to /run in mountkernfs.\n (Closes: #628107). Thanks to Martin Orr for this patch.\n * Search for libcrypt using multiarch path (Closes: #629677).\n\n -- Roger Leigh \[email protected]\u003e Thu, 09 Jun 2011 13:35:56 +0100\n\nsysvinit (2.88dsf-13.7) unstable; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Correct version check used for reboot notification in initscripts\n postinst.\n * Don't use \"rm -rf\" when creating compatibility links in chroots;\n use plain rmdir and abort with an error if it fails. This is in\n order to avoid removing host data if e.g. /run from the host is\n already bind mounted on the chroot /run, which would remove the\n contents of the host /run if upgrading initscripts in the chroot.\n * Restore rpcbind/portmap changes from 2.88dsf-13.5.\n * Add restorecon support for selinux using new paths. (Closes: #626725)\n Thanks to Martin Orr for this patch.\n * Use new debianutils \"ischroot\" program to detect if in a chroot in\n the initscripts postinst more reliably. Depend on initscripts\n version 4 or greater to ensure ischroot is available.\n (Closes: #626846)\n\n -- Roger Leigh \[email protected]\u003e Wed, 18 May 2011 23:12:30 +0100\n\nsysvinit (2.88dsf-13.6) unstable; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Don't remount filesystems mounted in the initramfs until mtab\n exists. Use the existing reload functionality of mountkernfs\n an mountdevsubfs to allow mtab.sh to trigger the remounts.\n (Closes: #623174)\n * Revert to using absolute paths in compatibility symlinks in order\n to comply with Policy §10.5 symlink rules. (Closes: #626263)\n * The permissions of /tmp are only set when root is writable.\n (Closes: #623934)\n\n -- Roger Leigh \[email protected]\u003e Sat, 14 May 2011 00:30:52 +0100\n\nsysvinit (2.88dsf-13.5) experimental; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Unify mount logic shared between mountkernfs.sh, mountdevsubfs.sh\n and mtab.sh\n - all functions use domount() from /lib/init/mount-functions. This\n merges in the functionality of domtab() in mtab.sh, which was\n almost entirely identical. domount is now capable of mounting and\n remounting (with and without mtab updates) as well as updating\n /etc/mtab.\n - mtab.sh calls mountkernfs.sh and mountdevsubfs with an \"mtab\"\n argument to do the mtab generation for early mounts. This means\n that the mount logic is not needlessly duplicated, and does not\n require two copies to be kept exactly in sync. This reduces the\n risk of problems as a consequence of subtle differences between\n the two scripts.\n - mount options may be specified in either /etc/default/tmpfs or\n in /etc/fstab, and will supersede hard coded defaults. The\n the values in fstab (if any) will supersede those in\n /etc/default/tmpfs should an entry be present. These values are\n also used for remounting, which means that filesystems mounted in\n an initramfs and moved onto the root filesystem prior to init\n starting will be remounted with the correct user-specified\n options.\n - Improve robustness of stat checks when comparing directories.\n - mountkernfs.sh and mountdevsubfs.sh are idempotent, so allow for\n repeated invocation. This is needed to allow the same code to\n be used for mounting, remounting and mtab generation.\n - Enabling RAMLOCK, RAMSHM and RAMTMP in /etc/default/rcS is no longer\n required if the filesystems are present in /etc/fstab\n * /etc/default/tmpfs is deprecated\n - If changing the default size limits, adding an entry to /etc/fstab\n is preferred compared with editing /etc/default/tmpfs. This also\n permits modifying the default mount options, and setting additional\n mount options.\n - If /etc/default/tmpfs has been modified from the defaults, any\n needed entries will be created in /etc/fstab on upgrade, to\n preserve the settings from /etc/default/tmpfs. The entries in\n /etc/fstab will subsequently override the settings in\n /etc/default/tmpfs.\n * The mount options for /run are made stricter when possible. For\n example, if /run/shm is a separate filesystem, it may be safely\n mounted with \"noexec\".\n * Compatibility symbolic links are relative, not absolute. e.g.\n /var/lock is ../run/lock rather than /run/lock. This means that if\n you're using a chroot from the host system, you'll always be using\n locations in the chroot, rather than the host, when following the\n links.\n * Updated documentation in initscripts README.Debian and rcS(5).\n\n [ Kel Modderman ]\n * Consider rpcbind as alternative to portmap in mountnfs ifupdown\n script. Thanks to Jamie Heilman and Arthur de Jong.\n (Closes: #620788)\n\n -- Roger Leigh \[email protected]\u003e Fri, 22 Apr 2011 15:25:25 +0100\n\nsysvinit (2.88dsf-13.4) experimental; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n\n [ Kel Modderman ]\n * Remove code from /etc/init.d/bootmisc.sh which is not needed with modern\n kernel which do not support BSD ptys. The udev check is not reliable\n anymore due to /run/. Thanks Marco d'Itri (Closes: #620784)\n * Handle user interupt of fsck in etc/init.d/checkfs.sh and\n init.d/checkroot.sh. Trap SIGINT and handle fsck exit status of 32.\n (Closes: #608534)\n\n -- Roger Leigh \[email protected]\u003e Sat, 16 Apr 2011 16:50:51 +0100\n\nsysvinit (2.88dsf-13.3) experimental; urgency=low\n\n [ Roger Leigh ]\n * Non-maintainer upload.\n * Support for new top-level directory /run to replace /var/run,\n /var/lock, /dev/shm and /lib/init/rw as a place to store transient\n writable data which should not be preserved across a system\n reboot (Closes: #186892, #616571, #620191). /run fixes existing\n issues with RAMRUN and RAMLOCK options using tmpfs on /var/run and\n /var/lock (Closes: #423405, #481546, #564635, #607136, #620735).\n Additionally, /run/shm replaces /dev/shm and may share the same\n tmpfs as /run if RAMSHM is set to \"no\" in /etc/default/rcS. /tmp\n may also be configured to be a tmpfs if RAMTMP is set to \"yes\" in\n /etc/default/rcS. /tmp may also be configured to use /run directly if\n it is symlinked to /run/tmp, for example.\n Summary:\n /var/run → /run\n /var/lock → /run/lock\n /dev/shm → /run/shm\n /lib/init/rw → /run (not transitioned automatically)\n /dev/.* → /run (not transitioned automatically)\n These changes do not take effect until the system is rebooted as\n is currently done for /lib/init/rw setup. Prior to a reboot, the\n paths are made available via bind/nullfs/firmlink mounts, depending on\n the platform. Following a reboot, the old paths will be converted to\n symlinks, or bind/nullfs/firmlink mounts where symlinking is not\n possible, to allow access via either the old or new paths, to permit\n programs using the old paths to transition to use the new paths for\n wheezy.\n - debian/initscripts.postinst:\n Take chroot detection logic from udev postinst (existing logic was\n broken). Add detection logic for vserver environments and Hurd.\n Trigger reboot to complete transition.\n If the system has not yet transitioned to a tmpfs-based /run, set up\n bind mounts as follows:\n /var/run → /run\n /var/lock → /run/lock\n /dev/shm → /run/shm\n On reboot, the system will complete the migration to a tmpfs-based\n /run; this creates the directory heierachy from the old paths to\n enable the use of the new /run paths prior to a restart. This means\n packages may transition to using /run with a versioned dependency\n upon initscripts.\n Remove special handling for RAMRUN and RAMLOCK, which is now taken\n care of by /run.\n If in a chroot environment, just create symlinks from the new names\n to the existing locations, since otherwise the changes would be\n lost, and since rcS scripts aren't run the transition won't\n complete.\n - debian/src/initscripts/Makefile:\n Provide top-level /run.\n - debian/src/initscripts/doc/README.Debian:\n Document new use of RUN_SIZE and LOCK_SIZE.\n Document use of /run rather than /lib/init/rw.\n Document use of SHM_SIZE and TMP_SIZE.\n - debian/src/initscripts/etc/init.d/checkroot.sh:\n Use /run in place of /lib/init/rw.\n - debian/src/initscripts/etc/default/tmpfs:\n Document TMPFS_SIZE, RUN_SIZE and LOCK_SIZE (Closes: #483643).\n Document TMP_SIZE and SHM_SIZE.\n - debian/src/initscripts/etc/init.d/mountkernfs.sh:\n Create /run, /run/sendsigs.omit.d and /run/lock.\n Mount /run/lock as a separate tmpfs if RAMLOCK=yes.\n /run/lock has 01777 permissions to match /var/lock.\n Mount /tmp as a separate tmpfs if RAMTMP=yes or / is being mounted\n read-only (Closes: #503805, #585543).\n Drop mounting of /var/run and /var/lock.\n - debian/src/initscripts/etc/init.d/mountdevsubfs.sh:\n Create /run/shm. Mount /run/shm as a separate tmpfs if RAMSHM=yes.\n - debian/src/initscripts/etc/init.d/mtab.sh:\n domtab mirrors behaviour of domount in mount-functions exactly, to\n prevent duplicate mounts (required for bind mount support).\n Bind mount /run/init and drop mounting of /var/run. Mount /run/lock\n in place of /var/lock.\n Mount /tmp if RAMTMP=yes.\n Mount /run/shm if RAMSHM=yes.\n - debian/src/initscripts/etc/init.d/sendsigs:\n Use new paths:\n files: /run/sendsigs.omit /lib/init/rw/sendsigs.omit\n dirs: /run/sendsigs.omit.d/ /lib/init/rw/sendsigs.omit.d/\n - debian/src/initscripts/etc/init.d/umountfs:\n Ignore /run. Continue to ignore /lib/init/rw in order to handle\n clean shutdown. No longer ignore /var/run and /var/lock.\n - debian/src/initscripts/etc/init.d/umountnfs.sh:\n Check for presence of .ramfs than configuration variable when\n skipping /var/run and /var/lock.\n Ignore /run. Continue to ignore /lib/init/rw in order to handle\n clean shutdown. No longer ignore /var/run and /var/lock.\n - debian/src/initscripts/lib/init/bootclean.sh\n Don't clean /var/run and /var/lock (Closes: #378776). Because\n these directories are now a tmpfs, cleaning no longer makes sense.\n - debian/src/initscripts/lib/init/tmpfs.sh:\n Read /etc/default/tmpfs and provide defaults if unset.\n - debian/src/initscripts/lib/init/mount-functions.sh:\n Support bind mounts in domount() (Closes: #353943).\n Drop support for mounting /var/run and /var/lock as separate\n tmpfs filesystems. Symlink /var/run to /run and /var/lock to\n /run/lock if possible. If /var/run and /var/lock are directories,\n attempt to remove and symlink if successful, or else bind mount.\n - debian/src/initscripts/lib/init/vars.sh:\n Read /etc/default/rcS and provide defaults if unset.\n - debian/src/initscripts/man/rcS.5:\n Drop documentation of RAMRUN.\n Update documentation for RAMLOCK (Closes: #406685).\n Document RAMTMP and RAMSHM.\n - debian/src/initscripts/share/default.rcS:\n Remove RAMRUN.\n Add RAMSHM and RAMTMP.\n RAMLOCK, RAMSHM and RAMTMP default to enabled for new installs.\n\n [ Michael Biebl ]\n * Remove dead usplash support code (Closes: #599241, #599734, #612594).\n\n [ Martin F. Krafft ]\n * Add comments to /etc/default/rcS (Closes: #530582).\n\n [ Samuel Thibault ]\n * Hurd portability for initscripts postinst and init scripts.\n Hurd does not currently support tmpfs mounts, but will do in the\n future. Use firmlinks in place of bind mounts.\n\n -- Roger Leigh \[email protected]\u003e Sat, 16 Apr 2011 01:17:29 +0100\n\nsysvinit (2.88dsf-13.2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Danish (Joe Hansen). Closes: #599430\n - Brazilian Portuguese (Adriano Rafael Gomes). Closes: #605851\n - Slovak (Slavko). Closes: #614193\n\n -- Christian Perrier \[email protected]\u003e Tue, 05 Apr 2011 07:24:09 +0200\n\nsysvinit (2.88dsf-13.1) unstable; urgency=low","Method":"ChangelogLenientMatch"}},{"Name":"tar","Version":"1.23-3","Release":"","NewVersion":"1.26+dfsg-0.1+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"tasksel","Version":"2.88","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"tasksel-data","Version":"2.88","Release":"","NewVersion":"3.14.1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of tasksel-data\ntasksel (3.14.1) stable; urgency=low\n\n * Fix broken test for non-desktop systems which caused the ssh server task\n to be selected by default on systems with a desktop.\n\n -- Joey Hess \[email protected]\u003e Tue, 07 May 2013 13:57:43 -0400\n\ntasksel (3.14+nmu2) unstable; urgency=low\n\n * Downgrade network-manager-gnome from Depends to Recommends. It's\n only available on Linux, so let's avoid making task-gnome-desktop\n uninstallable on kfreebsd-*. Closes: #704748\n * Update Dutch translation (Thijs Kinkhorst).\n\n -- Cyril Brulebois \[email protected]\u003e Mon, 15 Apr 2013 20:05:02 +0200\n\ntasksel (3.14+nmu1) unstable; urgency=low\n\n [ Julien Cristau ]\n * Non-maintainer upload.\n\n [ Joey Hess ]\n * Fix typo in changelog. Closes: #694894\n \n [ Christian Perrier ]\n * Add Depends to network-manager-gnome on task-gnome-desktop\n Closes: #697868\n\n -- Julien Cristau \[email protected]\u003e Thu, 31 Jan 2013 19:19:25 +0100\n\ntasksel (3.14) unstable; urgency=low\n\n [ Joey Hess ]\n * Work around dpkg's failure to replace directory with symlink on upgrade.\n Only tasksel-data was affected. Closes: #687858\n\n [ Christian Perrier ]\n * As suggested by GNOME maintainers, drop system-config-printer from\n the task-gnome-desktop task as the GNOME control center now\n includes a configuration tool for cups. Closes: #691334\n * Add myself to Uploaders\n * Drop duplicate iceweasel-l10n-fa from task-persian-desktop\n\n -- Christian Perrier \[email protected]\u003e Tue, 30 Oct 2012 19:09:30 +0100\n\ntasksel (3.13+nmu1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Depend on perl-base \u003e= 5.14.0 (closes: #690594).\n\n -- Michael Gilbert \[email protected]\u003e Thu, 25 Oct 2012 13:59:44 -0400\n\ntasksel (3.13) unstable; urgency=low\n\n [ Christian Perrier ]\n * Replace gdm3 by lightdm in lxde-desktop task. Closes: #683345\n\n [ Joey Hess ]\n * Don't force browser-plugin-gnash onto desktops that don't themselves\n pull it in. This means gnome still installs it, but kde, xfce,\n and lxde do not. Closes: #655841\n * Use dh_perl -d, as tasksel does not need perl, only perl-base.\n Closes: #686021\n * Add gstreamer0.10-alsa to task-xfce-desktop, as a workaround for\n bug #651495, which was resulting in the mixer being broken.\n \n [ Debconf translations ]\n * Brazilian Portuguese (Adriano Rafael Gomes). Closes: #685181\n\n -- Joey Hess \[email protected]\u003e Sun, 02 Sep 2012 20:51:05 -0400\n\ntasksel (3.12) unstable; urgency=low\n\n [ Andrew Lee (李健秋) ]\n * Really depending on gdm3 in task-lxde-desktop (Closes: #680519).\n\n [ Joey Hess ]\n * xfce: Use network-manager-gnome.\n Rationale: Everyone I've polled who has installed xfce for nontechnical\n users has had to switch out wicd due to its non-user-friendliness,\n which includes not managing wireless interfaces at all by default,\n and presenting the user with a screen full of dozens of configuration\n settings when a network requires a password.\n Technical users who want wicd will have no difficulty installing it.\n\n [ Christian Perrier ]\n * Use xul-ext-mozvoikko instead of transitional mozvoikko in\n task-finnish-desktop. Closes: #680952\n * Remove freedict-*, openddict-* and texlive-* from bosnian,\n croatian and serbian tasks. Thanks to Josip Rodin for\n reporting and investigating. Closes: #565209\n * Replace apache2-mpm-prefork by apache2. Closes: #678749\n * Replace qpopper and uw-imapd by dovecot-{pop3d,imapd} in the mail server\n task. Closes: #560696\n * Create en \"english\" task with both British and American\n dictionaries and word lists. Consequently drop the \"british\"\n task and modify british-desktop. Closes: #545047\n * Changes related to hunspell used in favoir of aspell:\n - Add hunspell-ro to romanian-desktop. Closes: #583195\n - Add hunspell-be to belarusian-desktop.\n - Replace myspell-en-us by hunspell-en-us in *-desktop.\n - Use hunspell-gl-es instead of hunspell-gl in galician-desktop.\n - Add hunspell-ml to malayalam-desktop.\n - Replace myspell-ru by hunspell-ru in russian-desktop.\n - Replace myspell-fr-gut by hunspell-fr in french-desktop.\n - Add hunspell-ne to nepali-desktop.\n - Add hunspell-sr to serbian-desktop.\n - Add hunspell-vi to vietnamese-desktop.\n - Add hunspell-eu-es to basque-desktop.\n * Remove the mention that poppler-data is non-free in\n tasks descriptions.\n * Replace synaptic by apper in kde-desktop. Closes: #681964\n\n [ Translations of programs ]\n * Uyghur added. Closes: #627005\n\n [ Translations of debconf templates ]\n * Uyghur added. Closes: #627005\n\n [ Translations of tasks ]\n * Uyghur added. Closes: #627005\n * Fix an horrible grammar error in the translation of\n \"standard\" in French. Thanks to Cyril Brulebois for\n hitting me with a cluebat.\n\n [ Aron Xu ]\n * Update input method support and Chinese tasks. Closes: #681466\n\n [ Joey Hess ]\n * Add synaptic to task-gnome-desktop. It had been pulled in by\n nautilus, but that Recommends has been dropped.\n\n -- Joey Hess \[email protected]\u003e Sat, 21 Jul 2012 19:41:30 -0400\n\ntasksel (3.11) unstable; urgency=low\n\n [ Josh Triplett ]\n * Drop cpufrequtils from laptop and desktop tasks\n Closes: #678726\n * Drop kerneloops-applet as it is no longer working\n because the site it submits to is down.\n Closes: #678756\n * Replace hpijs, cups-driver-gutenprint, and foo2zjs by\n printer-driver-all in desktop and print-server tasks\n Closes: #678794\n\n [ Christian Perrier ]\n * Changes related to LibreOffice packages and l10n:\n - Replace libreoffice-l10n-be-by by libreoffice-l10n-be\n - Add libreoffice-l10n-pt-br to Brazilian Portuguese desktop task\n - Replace libreoffice-l10n-gu-in by libreoffice-l10n-gu\n - Add libreoffice-l10n-is to Icelandic desktop task\n - Replace libreoffice-l10n-ml-in by libreoffice-l10n-ml\n - Replace libreoffice-l10n-mr-in by libreoffice-l10n-mr\n - Add libreoffice-l10n-ug to Uyghur desktop task\n - Replace libreoffice-l10n-ta-in by libreoffice-l10n-ta\n - Replace libreoffice-l10n-te-in by libreoffice-l10n-te\n * Changes related to Iceweasel packages and l10n:\n - Add iceweasel-l10n-ast to Asturian desktop task\n - Add iceweasel-l10n-bs to Bosnian desktop task\n - Add iceweasel-l10n-kk to Kazakh desktop task\n - Add iceweasel-l10n-km to Kmehr desktop task\n - Add iceweasel-l10n-en-za to South African English desktop task\n - Drop iceweasel-l10n-dz-bt from Dzongkha desktop task\n - Drop iceweasel-l10n-ka from Georgian desktop task\n - Replace iceweasel-l10n-fa-ir by iceweasel-l10n-fa in Persian\n desktop task\n * Changes related to KDE packages and l10n:\n - Drop kde-l10n-bn from Bengali KDE desktop task\n - Drop kde-l10n-srlatin from Serbian KDE desktop task\n - Add bosnian-kde-desktop task\n - Add kannada-kde-desktop task\n - Add persian-kde-desktop task\n - Add sinhala-kde-desktop task\n - Add uyghur-kde-desktop task\n - Add kde-l10n-vi to Vietnamese KDE desktop task\n * Changes related to LXDE task\n - Add libreoffice-gtk to lxde-desktop. Closes: #679668\n\n [ Per Olofsson ]\n * Replace myspell-sv-se with hunspell-sv-se in swedish-desktop task.\n * Remove iswedish from swedish task. ispell is old and doesn't work\n well with UTF-8.\n\n [ Joey Hess ]\n * Move lxde to depends of task-lxde-desktop. Closes: #680519\n\n [ Andrew Lee (李健秋) ]\n * Depending on gdm3 rather than gdm in task-lxde-desktop (Closes: #680519).\n\n [ Joey Hess ]\n * Removed printing stuff from task-desktop, and make task-print-server\n be auto-selected on machines likely to be a desktop. This decreases\n the overall size of task-desktop, and may allow gnome to fit on the\n first CD again, with the printing stuff omitted to the second CD.\n * Added openssh-client to recommends of task-ssh-server. Closes: #68067\n * Move libreoffice, iceweasel from task-desktop to\n task-{gnome,kde,lxde,xfce}-desktop. This allows them to be omitted from\n the desktop CDs if they don't fit.\n\n -- Joey Hess \[email protected]\u003e Sun, 08 Jul 2012 10:45:41 -0600\n\ntasksel (3.10) unstable; urgency=low\n\n [ Christian Perrier ]\n * Add uyghur-desktop task\n * Move scim-tables-additional to Recommends for task-kannada-desktop\n Closes: #672423\n * Move scim-tables-additional to Recommends for task-malayalam-desktop\n Closes: #672424\n * Drop outdated manpages-cs from task-czech. Closes: #649846\n * Drop libapache2-mod-perl2 and libapache2-mod-python. The former is not\n popular enough to be installed by default and the latter is dead\n upstream and outdated by mod_wsgi. Closes: #673401\n * Add hunspell-gl to task-desktop-galician and util-linux-locales to\n task-galician. Closes: #675438\n * Drop task-kannada-kde-desktop. Closes: #677957\n\n [ Joey Hess ]\n * Xfce caps. Closes: #665786\n * Include synaptic in the xfce, lxde, and kde tasks, as none of these\n desktop environments currently have their own package management UI.\n Closes: #667703\n * Automatically select the ssh server task on new installs when\n the desktop task is not selected. Popcon indicates that the ssh server\n task is the most commonly manually selected task.\n * Also remove php from task-web-server, as it was the only remaining\n web development thing in it. This leaves the task more generally\n focused on getting a web server installed, for whatever reason.\n * Don't install the gimp with XFCE and LXDE desktops, to work around #525077\n\n [ Cyril Brulebois ]\n * Update task-serbian-kde-desktop's Depends: Drop koffice-i18n-sr and\n koffice-i18n-srlatin, thanks to Ana Guerrero (Closes: #673470).\n Indeed, koffice is being removed from the archive.\n\n [ Bastian Blank ]\n * Remove manual task.\n * Remove unused support for Packages: task-fields.\n * Completely remove support for aptitude task syntax.\n * Use apt-get.\n - Force installation of recommends even if turned off.\n - Force auto-removal of packages.\n - Don't longer remove packages. (closes: #579522)\n * Support standard task with apt-get.\n * Drop ding and trans-de-en from german task.\n * Act only on specified tasks if used non-interactive.\n\n [ Translations of programs ]\n * Latvian (Rūdolfs Mazurs). Closes: #674691\n * Lithuanian (Rimas Kudelis). Closes: #675851\n * Welsh (Daffyd Tomos).\n\n [ Translations of debconf templates ]\n * Latvian (Rūdolfs Mazurs). Closes: #674691\n * Lithuanian (Rimas Kudelis). Closes: #675851\n * Welsh (Daffyd Tomos).\n\n [ Translations of tasks ]\n * Marathi (Sampada Nakhare)\n * Latvian (Rūdolfs Mazurs). Closes: #674691\n * Lithuanian (Rimas Kudelis). Closes: #675851\n * Welsh (Daffyd Tomos).\n\n -- Joey Hess \[email protected]\u003e Thu, 21 Jun 2012 11:35:18 -0400\n\ntasksel (3.09) unstable; urgency=low\n\n [ Translations of tasks ]\n * Polish (Michał Kułach). Closes: #657267\n * Kannada (Prabodh C P). Closes: #660071\n\n [ Translations of debconf templates ]\n * Kannada (Vikram Vincent). Closes: #660070\n\n [ Christian Perrier ]\n * No longer install x-ttcidfont-conf for chinese-s-desktop\n Closes: #660057\n * No longer install x-ttcidfont-conf for chinese-t-desktop\n Closes: #660058\n * Add util-linux-locales to French, Polish and Czech tasks\n Closes: #659840\n\n [ Joey Hess ]\n * Remove apmd. Closes: #665466\n\n -- Otavio Salvador \[email protected]\u003e Sat, 24 Mar 2012 17:41:35 -0300\n\ntasksel (3.08) unstable; urgency=low\n\n [ Christian Perrier ]\n * Switch from kerneloops to kerneloops-applet. Closes: #650960\n\n [ Joey Hess ]\n * Remove broffice.org from pt_BR desktop, package is removed from debian.\n\n [ Theppitak Karoonboonyanan ]\n * Update task-thai-gnome-desktop and task-thai-kde-desktop:\n - task-thai-gnome-desktop: Add gtk3-im-libthai\n - task-thai-kde-desktop: Add libthai-dev (which enhances libkhtml5)\n \n [ Changwoo Ryu ]\n * Update task-korean-desktop and task-korean-gnome-desktop:\n - Add ibus-gtk3 to task-korean-gnome-desktop\n - Replace ttf-* with fonts-*\n\n [ Joey Hess ]\n * Use dpkg-query to list packages, rather than parsing the status file.\n * Deal with Description-md5 fields in apt-cache show output.\n Closes: #657389\n\n -- Joey Hess \[email protected]\u003e Sun, 29 Jan 2012 17:48:39 -0400\n\ntasksel (3.07) unstable; urgency=low\n\n * Team upload\n * Changes requested by the GNOME maintenance team for GNOME 3\n transition. Closes: #646741. That includes the following changes in\n gnome tasks:\n - a typo fix in the package description\n - gdm3 being dropped from Depends, as it is a dependency of gnome-core now.\n - gnome-accessibility no longer exists as a separate meta-package. Its\n functionality will be merged into gnome-core directly.\n - gnome-desktop-environment is a transitional package, which has been\n replaced by gnome, so drop it.\n - iceweasel-gnome-support no longer exists, its functionality has been\n merged into iceweasel, so drop it.\n - the gnome meta-package already depends on inkscape, so drop it.\n - the gnome-core meta-package already depends on epiphany-browser, so drop it. \n\n -- Christian Perrier \[email protected]\u003e Sat, 05 Nov 2011 18:04:25 +0100\n\ntasksel (3.06) unstable; urgency=low\n\n [ Joey Hess ]\n * Remove the now empty task overrides file.\n * Add Vcs-Browser field. Closes: #636209\n\n [ Christian Perrier ]\n * Recommend cifs-utils in task-file-server instead of deprecated smbfs\n Closes: #638606\n\n [ Yves-Alexis Perez ]\n * debian/control:\n - switch Xfce login manager to LightDM now that it has reached testing.\n\n [ Translations of tasks ]\n * Sinhala (Danishka Navin). Closes: #640761\n\n [ Translations of debconf templates ]\n * Sinhala (Danishka Navin). Closes: #640761\n\n [ Translations of programs ]\n * Sinhala (Danishka Navin). Closes: #640761\n\n [ Kenshi Muto ]\n * Update task-japanese, task-japanese-desktop and task-japanese-kde-desktop.\n - task-japanese: remove obsolete package: doc-linux-ja-text.\n - task-japanese-desktop: remove obsolete package: doc-linux-ja-html and\n ttf-sazanami-*.\n replace package: ttf-vlgothic with fonts-vlgothic,\n otf-ipafont with fonts-ipafont.\n - task-japanese-kde-desktop: replace package: uim-applet-kde with\n plasma-widget-uim.\n\n -- Joey Hess \[email protected]\u003e Fri, 04 Nov 2011 17:07:22 -0400\n\ntasksel (3.05) unstable; urgency=low\n\n * Fix logic error.\n * Avoid installing kazakh-desktop by default when desktop task is selected.\n\n -- Joey Hess \[email protected]\u003e Tue, 26 Jul 2011 14:01:28 +0200\n\ntasksel (3.04) unstable; urgency=low\n\n * Avoid installation of task-portuguese in pt_BR locale. Closes: #627108\n * Add lxde suggested packages lxtask and lxlauncher.\n\n -- Joey Hess \[email protected]\u003e Sat, 16 Jul 2011 14:52:56 -0400\n\ntasksel (3.03) unstable; urgency=low\n\n * Upload to unstable.\n * Re-enabled the byhand overrides file, which was disabled while in\n experimental.\n\n -- Joey Hess \[email protected]\u003e Sun, 15 May 2011 19:59:02 -0400\n\ntasksel (3.02) experimental; urgency=low\n\n * Team upload\n\n [ Christian Perrier ]\n * Drop ttf-devanagari-fonts from the hindi task. It belongs to\n hindi-desktop\n * Fix spelling in French translation of tasks\n \n [ Rene Engelhard ]\n * update tasks for openoffice.org-* -\u003e libreoffice-*. Closes: #623769\n * add libreoffice-help-sk to slovak-desktop\n * add hyphen-en-us to desktop\n\n [ Timur Birsh ]\n * Add Kazakh environment task. Closes: #620816\n\n [ Joey Hess ]\n * Typo fix. Closes; #622825\n * gdm is gone, and gdm3 pulls in much gnome, so for lxde and xfce,\n use xdm. This is provisional, pending changes in the lxde and xfce\n dependencies. Closes: #506406\n\n -- Christian Perrier \[email protected]\u003e Sat, 23 Apr 2011 07:52:28 +0200\n\ntasksel (3.01) experimental; urgency=low\n\n * Upload without byhand override file as that is not supported for\n experimental.\n\n -- Joey Hess \[email protected]\u003e Wed, 02 Mar 2011 15:17:46 -0400\n\ntasksel (3.00) experimental; urgency=low\n\n [ Joey Hess ]\n * Task packages are back! For now, the task-* metapackages are only\n used to hold Depends, Recommends, and Description; all other task\n info that tasksel uses remains in debian-tasks.desc. Plan is to\n migrate the rest into the task packages later, where possible.\n * FTP-master: I've put the task packages in a new section, \"tasks\",\n which I hope you'll approve \u0026 create.\n * Translators: DDTP translations of task packages are now displayed\n by tasksel, so it's important that the (visible) tasks' descriptions\n be translated there.\n * Don't generate Task field overrides for tasks that have only Key\n packages. In other words, the Task field overrides are not needed,\n and are going away. The overrides file uploaded with this version\n of tasksel is empty.\n * Tasksel no longer looks for desc files in /usr/share/tasksel/,\n instead it looks in /usr/share/tasksel/descs/. This was necessary\n because aptitude crashes on the new debian-tasks.desc file without\n Description fields.\n * Remove rarian-compat from task-gnome-desktop. Dependencies on\n scrollkeeper should default to rarian-compat by now.\n * Moved iceweasel to Recommends of task-desktop; was in Key/Depends.\n * Moved acpid to Recommends of task-laptop from Depends, anticipating\n kFreeBSD laptops.\n * Removed unnecessary Recommends of xfonts-base, which is included\n in X anyway, and lintian complains about.\n * Updated to debhelper v8.\n\n [ Christian Perrier ]\n * Replace aspell-fi by libenchant-voikko in finnish task\n Closes: #585840\n\n [ Translations of tasks ]\n * Nepali (shyam krishna bal). Closes: #615007\n\n -- Joey Hess \[email protected]\u003e Sun, 27 Feb 2011 00:04:29 -0400\n\ntasksel (2.89) unstable; urgency=low\n\n [ Joey Hess ]\n * kde-desktop: Add kdeaccessibility. Closes: #610790\n\n [ Otavio Salvador ]\n * gnome-desktop: drop xsane since gnome meta-package depends on\n simple-scan. Closes: #611951.\n * hungarian-desktop: use hunspell-hu instead of myspell-hu to fix\n spell checking on Iceweasel and OpenOffice. Thanks to Szabolcs\n Siebenhofer \[email protected]\u003e for the patch. Closes: #611937.\n\n [ Christian Perrier ]\n * Replace myspell-hu by hunspell-hu in hungarian task\n Closes: #611937\n\n -- Otavio Salvador \[email protected]\u003e Mon, 07 Feb 2011 19:20:28 -0200\n\ntasksel (2.88) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"tcpdump","Version":"4.1.1-1+deb6u2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"traceroute","Version":"1:2.0.15-1","Release":"","NewVersion":"1:2.0.18-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of traceroute\ntraceroute (1:2.0.18-3) unstable; urgency=low\n\n * Updating GPL boilerplate in copyright file.\n * Switching to xz compression.\n\n -- Daniel Baumann \[email protected]\u003e Sat, 30 Jun 2012 14:48:05 +0200\n\ntraceroute (1:2.0.18-2) unstable; urgency=low\n\n * Using compression level 9 also for binary packages.\n * Updating package to standards version 3.9.3.\n * Updating package to debhelper version 9.\n * Adding patch to avoid overwriting build environment.\n * Adding patch from Moritz Muehlenhoff \[email protected]\u003e to add missing\n format strings in order to build with hardening flags.\n * Enabling hardening build flags (Closes: #656014).\n * Updating copyright file to machine-readable format version 1.0.\n\n -- Daniel Baumann \[email protected]\u003e Fri, 18 May 2012 12:53:18 +0200\n\ntraceroute (1:2.0.18-1) unstable; urgency=low\n\n * Merging upstream version 2.0.18.\n * Updating maintainer and uploaders fields.\n * Removing vcs entries.\n * Removing references to my old email address.\n * Makging packaging distribution neutral.\n * Updating years in copyright file.\n * Updating to standards version 3.9.2.\n * Compacting copyright file.\n * Dropping conflicts on traceroute-nanog, not needed anymore.\n * Using common coding style for shell in rules and maintainer scripts.\n * Adding copyright stanza for libsupp/*.\n * Removing lintian overrides, not needed anymore.\n\n -- Daniel Baumann \[email protected]\u003e Sun, 28 Aug 2011 20:04:09 +0200\n\ntraceroute (1:2.0.17-1) experimental; urgency=low\n\n * Merging upstream version 2.0.17.\n * Switching to source format 3.0 (quilt).\n * Updating to debhelper version 8.\n * Updating to standards version 3.9.1.\n * Removing traceroute-nanog transitional package.\n\n -- Daniel Baumann \[email protected]\u003e Tue, 14 Dec 2010 19:29:54 +0100\n\ntraceroute (1:2.0.16-1) experimental; urgency=low\n\n * Merging upstream version 2.0.16.\n\n -- Daniel Baumann \[email protected]\u003e Wed, 15 Sep 2010 08:46:54 +0200\n\ntraceroute (1:2.0.15-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"tshark","Version":"1.2.11-6+squeeze15","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"tzdata","Version":"2015g-0+deb6u1","Release":"","NewVersion":"2017b-0+deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"ubnt-igmpproxy","Version":"0.1.0+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"ucf","Version":"3.0025+nmu1","Release":"","NewVersion":"3.0025+nmu3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of ucf\nucf (3.0025+nmu3) unstable; urgency=low\n\n * Non-maintainer upload.\n * No longer hardcode debconf templates file location\n Closes: #615931\n * Fix pending l10n issues. Debconf translations:\n - Slovak (Slavko). Closes: #639443\n - Polish (Michał Kułach). Closes: #661480\n\n -- Christian Perrier \[email protected]\u003e Thu, 05 Apr 2012 08:25:42 +0200\n\nucf (3.0025+nmu2) unstable; urgency=low\n\n * Non-maintainer upload.\n * Fix pending l10n issues. Debconf translations:\n - Brazilian Portuguese (Flamarion Jorge). Closes: #594786\n - Dutch; (Jeroen Schot). Closes: #622789\n\n -- Christian Perrier \[email protected]\u003e Fri, 15 Apr 2011 08:27:12 +0200\n\nucf (3.0025+nmu1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"udev","Version":"164-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"unionfs-fuse","Version":"0.24-2.1~bpo60+1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"usbutils","Version":"0.87-5squeeze1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"user-setup","Version":"1.38","Release":"","NewVersion":"1.48","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of user-setup\nuser-setup (1.48) unstable; urgency=low\n\n [ Updated translations ]\n * Japanese (ja.po) by Kenshi Muto\n\n -- Christian Perrier \[email protected]\u003e Thu, 13 Dec 2012 05:56:11 +0100\n\nuser-setup (1.47) unstable; urgency=low\n\n [ Updated translations ]\n * Asturian (ast.po) by ivarela\n * Spanish (es.po) by Javier Fernández-Sanguino\n * Ukrainian (uk.po) by Yuri Chornoivan\n\n -- Christian Perrier \[email protected]\u003e Wed, 17 Oct 2012 08:00:18 +0200\n\nuser-setup (1.46) unstable; urgency=low\n\n [ Updated translations ]\n * German (de.po) by Holger Wansing\n\n -- Christian Perrier \[email protected]\u003e Sat, 18 Aug 2012 18:13:54 +0200\n\nuser-setup (1.45) unstable; urgency=low\n\n * Team upload\n\n [ Updated translations ]\n * Galician (gl.po) by Jorge Barreiro\n\n -- Christian Perrier \[email protected]\u003e Fri, 22 Jun 2012 06:45:52 +0200\n\nuser-setup (1.44) unstable; urgency=low\n\n * Team upload\n\n [ Updated translations ]\n * Croatian (hr.po) by Tomislav Krznar\n\n -- Christian Perrier \[email protected]\u003e Wed, 20 Jun 2012 00:32:57 +0200\n\nuser-setup (1.43) unstable; urgency=low\n\n * Team upload\n * Replace XC-Package-Type with Package-Type\n * Explicitly link GPL-2 document in debian/copyright\n\n [ Updated translations ]\n * Amharic (am.po) by Tegegne Tefera\n * Asturian (ast.po) by ivarela\n * Tibetan (bo.po) by Tennom\n * Welsh (cy.po) by Dafydd Tomos\n * Basque (eu.po) by Piarres Beobide\n * Finnish (fi.po) by Timo Jyrinki\n * Galician (gl.po) by Jorge Barreiro\n * Hebrew (he.po) by Omer Zak\n * Hungarian (hu.po) by SZERVÁC Attila\n * Icelandic (is.po) by Sveinn í Felli\n * Lao (lo.po) by Anousak Souphavanh\n * Lithuanian (lt.po) by Rimas Kudelis\n * Latvian (lv.po) by Rūdolfs Mazurs\n * Macedonian (mk.po) by Arangel Angov\n * Malayalam (ml.po) by Praveen Arimbrathodiyil\n * Panjabi (pa.po) by A S Alam\n * Portuguese (Brazil) (pt_BR.po) by Felipe Augusto van de Wiel (faw)\n * Romanian (ro.po) by ioan-eugen stan\n * Slovenian (sl.po) by Vanja Cvelbar\n * Tamil (ta.po) by Kumar Appaiah\n * Vietnamese (vi.po) by Hai-Nam Nguyen\n * Traditional Chinese (zh_TW.po) by Yao Wei (魏銘廷)\n\n -- Christian Perrier \[email protected]\u003e Fri, 15 Jun 2012 18:19:02 +0200\n\nuser-setup (1.42) unstable; urgency=low\n\n [ Updated translations ]\n * Bengali (bn.po) by Ayesha Akhtar\n * Norwegian Bokmal (nb.po) by Hans Fredrik Nordhaug\n * Telugu (te.po) by Arjuna Rao Chavala\n\n -- Otavio Salvador \[email protected]\u003e Thu, 15 Mar 2012 15:29:21 -0300\n\nuser-setup (1.41) unstable; urgency=low\n\n * Check that usernames are no more than 32 characters long (closes:\n #571750).\n\n [ Updated translations ]\n * Arabic (ar.po) by Ossama Khayat\n * Asturian (ast.po) by Mikel González\n * Belarusian (be.po) by Viktar Siarheichyk\n * Bulgarian (bg.po) by Damyan Ivanov\n * Bosnian (bs.po) by Armin Besirovic\n * Catalan (ca.po) by Jordi Mallach\n * Czech (cs.po) by Miroslav Kure\n * Danish (da.po) by Joe Hansen\n * German (de.po) by Holger Wansing\n * Greek, Modern (1453-) (el.po)\n * Esperanto (eo.po) by Felipe Castro\n * Spanish (es.po) by Javier Fernández-Sanguino\n * Estonian (et.po) by Mattias Põldaru\n * Persian (fa.po) by Hamid\n * French (fr.po) by Christian Perrier\n * Hindi (hi.po) by Kumar Appaiah\n * Indonesian (id.po) by Mahyuddin Susanto\n * Icelandic (is.po) by Sveinn í Felli\n * Italian (it.po) by Milo Casagrande\n * Japanese (ja.po) by Kenshi Muto\n * Kazakh (kk.po) by Baurzhan Muftakhidinov\n * Kannada (kn.po) by Prabodh C P\n * Korean (ko.po) by Changwoo Ryu\n * Marathi (mr.po) by sampada\n * Dutch (nl.po) by Jeroen Schot\n * Polish (pl.po) by Marcin Owsiany\n * Portuguese (pt.po) by Miguel Figueiredo\n * Russian (ru.po) by Yuri Kozlov\n * Sinhala (si.po) by Danishka Navin\n * Slovak (sk.po) by Ivan Masár\n * Serbian (sr.po) by Karolina Kalic\n * Swedish (sv.po) by Martin Bagge / brother\n * Thai (th.po) by Kiatkachorn Ratanatharathorn\n * Turkish (tr.po) by Mert Dirik\n * Uyghur (ug.po) by Sahran\n * Simplified Chinese (zh_CN.po) by YunQiang Su\n\n -- Colin Watson \[email protected]\u003e Wed, 07 Mar 2012 23:56:11 +0000\n\nuser-setup (1.40) unstable; urgency=low\n\n [ Christian Perrier ]\n * Fix typo in German translation. Closes: #633553\n\n [ Joey Hess ]\n * Add first user to debian-tor group, which will allow vidalia to be used\n to control tor.\n\n [ Updated translations ]\n * Belarusian (be.po) by Viktar Siarheichyk\n * Bulgarian (bg.po) by Damyan Ivanov\n * German (de.po) by Holger Wansing\n * Hebrew (he.po) by Lior Kaplan\n * Hindi (hi.po) by Kumar Appaiah\n * Italian (it.po) by Milo Casagrande\n * Kannada (kn.po) by vignesh prabhu\n * Macedonian (mk.po) by Arangel Angov\n * Polish (pl.po) by Marcin Owsiany\n * Romanian (ro.po) by Ioan Eugen Stan\n * Sinhala (si.po) by Danishka Navin\n * Turkish (tr.po) by Mert Dirik\n * Simplified Chinese (zh_CN.po) by YunQiang Su\n\n -- Otavio Salvador \[email protected]\u003e Sat, 19 Nov 2011 16:21:23 -0200\n\nuser-setup (1.39) unstable; urgency=low\n\n * Bump Standards to 3.9.2\n \n [ Updated translations ]\n * Bulgarian (bg.po) by Damyan Ivanov\n * Czech (cs.po) by Miroslav Kure\n * Esperanto (eo.po) by Felipe Castro\n * Spanish (es.po) by Javier Fernández-Sanguino\n * Korean (ko.po) by Changwoo Ryu\n * Romanian (ro.po) by Eddy Petrișor\n * Russian (ru.po) by Yuri Kozlov\n * Northern Sami (se.po) by Børre Gaup\n * Slovak (sk.po) by Ivan Masár\n * Swedish (sv.po) by Daniel Nylander\n * Telugu (te.po) by Arjuna Rao Chavala\n * Thai (th.po) by Theppitak Karoonboonyanan\n * Uyghur (ug.po) by Sahran\n\n -- Christian Perrier \[email protected]\u003e Sun, 24 Apr 2011 08:57:14 +0200\n\nuser-setup (1.38) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"util-linux","Version":"2.17.2-9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vim-common","Version":"2:7.2.445+hg~cb94c42c0e1a-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vim-tiny","Version":"2:7.2.445+hg~cb94c42c0e1a-1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vlan","Version":"1.9-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-bash","Version":"4.1-3+vyos1+helium5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-biosdevname","Version":"1:0.3.11+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-busybox","Version":"1.19.0-1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg","Version":"0.102.0+vyos1+helium13","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-dhcp-relay","Version":"0.11.0+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-dhcp-server","Version":"0.12.36+vyos1+helium6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-firewall","Version":"0.13.91+vyos1+helium10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-op-pppoe","Version":"0.11.20+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-qos","Version":"0.15.42+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-quagga","Version":"0.19.0+vyos1+helium9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-system","Version":"0.20.43+vyos1+helium34","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cfg-vpn","Version":"0.12.105+vyos1+helium10","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cluster","Version":"0.11.25+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-config-mgmt","Version":"0.34+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-config-migrate","Version":"0.13.65+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-conntrack","Version":"0.54+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-conntrack-sync","Version":"0.46+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-cron","Version":"1.0.3+vyos1+helium9","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-dhcp3-client","Version":"4.1.8+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-dhcp3-common","Version":"4.1.8+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-dhcp3-relay","Version":"4.1.8+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-dhcp3-server","Version":"4.1.8+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-eventwatch","Version":"0.1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-ipv6-rtradv","Version":"0.38+vyos1+helium5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-keepalived","Version":"1.2.2-1+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-lldp","Version":"0.25+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-nat","Version":"0.13.0+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-netflow","Version":"0.42+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-op","Version":"0.14.0+vyos1+helium22","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-op-dhcp-server","Version":"0.14.0+vyos1+helium5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-op-firewall","Version":"0.11.0+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-op-qos","Version":"0.12.27+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-op-quagga","Version":"0.11.34+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-op-vpn","Version":"0.14.0+vyos1+helium5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-openvpn","Version":"0.2.60+vyos1+helium6","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-ppp","Version":"2.4.4rel-8+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-quagga","Version":"0.99.20.1-13+vyos1+helium1","Release":"","NewVersion":"0.99.20.1-13+vyos1+helium1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"vyatta-ravpn","Version":"0.12.44+vyos1+helium7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-util","Version":"0.13+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-version","Version":"1.1.7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-vrrp","Version":"0.11+vyos1+helium4","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-wanloadbalance","Version":"0.13.68+vyos1+helium5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-webgui","Version":"0.2.13-101+vyos1+helium1","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-webproxy","Version":"0.2.110+vyos1+helium7","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-wireless","Version":"0.3.41+vyos1+helium5","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-wirelessmodem","Version":"0.1.24+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyatta-zone","Version":"0.15+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyos-nhrp","Version":"0.1.0+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"vyos-opennhrp","Version":"0.14.1-1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"whois","Version":"5.0.10","Release":"","NewVersion":"5.1.1~deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of whois\nwhois (5.1.1~deb7u1) proposed-updates; urgency=low\n\n * Rebuilt for wheezy.\n\n -- Marco d'Itri \[email protected]\u003e Sat, 11 Jan 2014 03:16:43 +0100\n\nwhois (5.1.1) unstable; urgency=medium\n\n * Added the servers for 29 \"new\" gTLDs.\n\n -- Marco d'Itri \[email protected]\u003e Sat, 11 Jan 2014 00:51:05 +0100\n\nwhois (5.1.0) unstable; urgency=low\n\n * Added the .ga, .ml, .pf, .xn--l1acc (.МОН, Mongolia) and\n .xn--mgba3a4f16a (.ﺍیﺭﺎﻧ, Iran) TLD servers.\n * Added the servers for 54 \"new\" gTLDs.\n * Updated the .bw, .gd, .hn, .sb, .xn--j1amh and .xn--mgberp4a5d4ar\n TLD servers.\n * Added new RIPE and APNIC ASN allocations.\n * Removed the .ck TLD server.\n * Updated one or more translations.\n * Applied multiple small fixes contributed by Petr Písař of Red Hat.\n * Correctly hide the disclaimers for .be and .sx. (Closes: #729366)\n * Direct queries for private ASN blocks to RIPE. (Closes: #724661)\n\n -- Marco d'Itri \[email protected]\u003e Thu, 26 Dec 2013 10:05:43 +0100\n\nwhois (5.0.26) unstable; urgency=low\n\n * Added the .cf TLD server.\n * Updated the .bi TLD server.\n * Added a new ASN allocation.\n\n -- Marco d'Itri \[email protected]\u003e Wed, 17 Jul 2013 00:48:12 +0200\n\nwhois (5.0.25) unstable; urgency=low\n\n * Added the .ax, .bn, .iq, .pw and .rw TLD servers.\n * Updated one or more translations.\n\n -- Marco d'Itri \[email protected]\u003e Fri, 10 May 2013 05:13:47 +0200\n\nwhois (5.0.24) unstable; urgency=low\n\n * Merged documentation fixes and the whois.conf(5) man page, courtesy of\n Petr Písař of Red Hat.\n * Added a new ASN allocation.\n * Updated one or more translations. (Closes: #705163)\n\n -- Marco d'Itri \[email protected]\u003e Thu, 18 Apr 2013 03:36:17 +0200\n\nwhois (5.0.23) unstable; urgency=medium\n\n * whois.nic.or.kr switched from EUC-KR to UTF-8. (LP#1132526)\n\n -- Marco d'Itri \[email protected]\u003e Mon, 08 Apr 2013 06:14:14 +0200\n\nwhois (5.0.22) unstable; urgency=low\n\n * Fixed cross-compiling, this time for real. (See #695442.)\n\n -- Marco d'Itri \[email protected]\u003e Sun, 31 Mar 2013 22:17:29 +0200\n\nwhois (5.0.21) unstable; urgency=low\n\n * Fixed parsing of 6to4 addresses: the last two bytes of the IPv4 address\n in 6to4 addresses were not parsed correctly since version 5.0.19.\n (Closes: #699928)\n * Added the .xn--j1amh (.укр, Ukraine) TLD server.\n * Updated the .bi, .se and .vn TLD servers. (Closes: #697753)\n * Removed whois.pandi.or.id from the list of servers which support the \n RIPE extensions, since it does not anymore and queries are broken.\n (Closes: #704115)\n * Updated some disclaimer suppression strings.\n * Respect DEB_HOST_GNU_TYPE when selecting CC for cross-compiling.\n (Closes: #695442)\n\n -- Marco d'Itri \[email protected]\u003e Sun, 31 Mar 2013 19:46:02 +0200\n\nwhois (5.0.20) unstable; urgency=low\n\n * Updated the .by, .ng, .om, .sm, .tn, .ug and .vn TLD servers.\n (Closes: #689486)\n * Added the .bw, .td, .xn--mgb9awbf (عمان., Oman), .xn--mgberp4a5d4ar \n (.السعودية, Saudi Arabia) and .xn--mgbx4cd0ab (ﻢﻠﻴﺴﻳﺍ., Malaysia)\n TLD servers.\n * Removed the .kp, .mc, .rw and .xn--mgba3a4f16a (ایران., Iran) TLD servers.\n\n -- Marco d'Itri \[email protected]\u003e Sun, 07 Oct 2012 01:25:05 +0200\n\nwhois (5.0.19) unstable; urgency=low\n\n * Added the .post TLD server.\n * Updated the .co.za SLD servers. (Closes: #687094)\n * Added the .alt.za, .net.za and .web.za SLD servers.\n * whois.ua changed (?) the encoding to utf-8. (Closes: #686715)\n * Fixed the parsing of 6to4 addresses like whois 2002:xxxx::. (LP#967311)\n * Modified the package version check in debian/rules to help Ubuntu\n maintainers. (Closes: #684526)\n\n -- Marco d'Itri \[email protected]\u003e Mon, 17 Sep 2012 21:41:29 +0200\n\nwhois (5.0.18) unstable; urgency=low\n\n * Updated the .ae and .xn--mgbaam7a8h (.امارات, United Arabs Emirates)\n TLDs.\n * Updated the server charset table for .fr and .it.\n\n -- Marco d'Itri \[email protected]\u003e Sun, 22 Jul 2012 20:35:18 +0200\n\nwhois (5.0.17) unstable; urgency=medium\n\n * Updated the .bi, .fo, .gr and .gt TLD servers.\n * Changed the version check in debian/rules to support Ubuntu backports.\n (Closes: #671097)\n * Removed support for recursion of .org queries, it has been a thick\n registry since 2005. (Closes: #678734)\n\n -- Marco d'Itri \[email protected]\u003e Mon, 25 Jun 2012 03:34:36 +0200\n\nwhois (5.0.16) unstable; urgency=medium\n\n * Added the .xn--80ao21a (.ҚАЗ, Kazakhstan) TLD server.\n * Updated the .ec and .ee TLD servers.\n * Removed the .xn--mgbc0a9azcg (.المغرب, Morocco) and .xn--mgberp4a5d4ar \n (.السعودية, Saudi Arabia) TLD servers.\n * Added a new ASN allocation.\n * Updated one or more translations.\n\n -- Marco d'Itri \[email protected]\u003e Mon, 30 Apr 2012 05:44:07 +0200\n\nwhois (5.0.15) unstable; urgency=medium\n\n * Added the .xn--mgba3a4f16a (ایران., Iran) TLD server.\n * Updated the .pe TLD server, this time for real. (Closes: #653105)\n * Updated one or more translations. (Closes: #654175)\n\n -- Marco d'Itri \[email protected]\u003e Mon, 05 Mar 2012 22:56:19 +0100\n\nwhois (5.0.14) unstable; urgency=medium\n\n * Added the .sx TLD server.\n * Updated the .pe TLD server. (Closes: #653105)\n\n -- Marco d'Itri \[email protected]\u003e Fri, 23 Dec 2011 23:55:47 +0100\n\nwhois (5.0.13) unstable; urgency=medium\n\n * Updated the .hr TLD server. (Closes: #646572)\n * Improved the package description, thanks to debian-l10n-english@.\n (Closes: #650111)\n * Updated the FSF address in licenses.\n\n -- Marco d'Itri \[email protected]\u003e Sun, 27 Nov 2011 21:19:28 +0100\n\nwhois (5.0.12) unstable; urgency=low\n\n * Recursion disabled when the query string contains spaces, because\n probably the query format will not be compatible with the referral\n server (e.g. whois to rwhois or ARIN to RIPE).\n * Add the \"+\" flag by default to queries to whois.arin.net if the\n argument looks like an IP address. Also add the \"a\" and \"n\" flags.\n No thanks to ARIN for breaking every whois client.\n * Added the .cv, .lk, .mq, .sy, .so, .biz.ua, .co.ua, .pp.ua, .qa,\n .xn--3e0b707e (.한국, Korea), .xn--45brj9c (.ভারত, India, Bengali),\n .xn--90a3ac (.СРБ, Serbia), .xn--clchc0ea0b2g2a9gcd (.சிங்கப்பூர்,\n Singapore, Tamil), .xn--fpcrj9c3d (.భారత్, India, Telugu), .xn--fzc2c9e2c\n (.ලංකා, Sri Lanka, Sinhala), .xn--gecrj9c (.ભારત, India, Gujarati),\n .xn--h2brj9c (.भारत, India, Hindi), .xn--lgbbat1ad8j (.الجزائر, Algeria),\n .xn--mgbayh7gpa (.الاردن, Jordan), .xn--mgbbh1a71e (.بھارت, India, Urdu),\n .xn--mgbc0a9azcg (.المغرب, Morocco), .xn--ogbpf8fl (.سورية, Syria),\n .xn--s9brj9c (.ਭਾਰਤ, India, Punjabi), .xn--xkc2al3hye2a (.இலங்கை, Sri\n Lanka, Tamil), .xn--wgbl6a (.قطر, Qatar), .xn--xkc2dl3a5ee0h\n (.இந்தியா, India, Tamil), .xn--yfro4i67o (.新加坡, Singapore, Chinese) and\n .xxx TLD servers. (Closes: #642424),\n * Added the .priv.at pseudo-SLD server.\n * Updated the .co, .gf, .gp, .kr, .li, .rs, .ru, .su, .sv, .ua and\n .xn--p1ai TLD servers. (Closes: #590425, #634830, #627478)\n * Added a new ASN allocation.\n * Fixed a typo and -t syntax in whois(1). (Closes: #614973, #632588)\n * Made whois return an error in some cases, code contributed by\n David Souther.\n * Split HAVE_LINUX_CRYPT_GENSALT from HAVE_XCRYPT to support SuSE,\n which has it builtin in the libc. Added untested support for Solaris'\n crypt_gensalt(3). This and the following changes have been contributed\n by Ludwig Nussel of SuSE.\n * mkpasswd: stop rejecting non-ASCII characters.\n * mkpasswd: added support for the 2y algorithm, which fixes CVE-2011-2483.\n * mkpasswd: raised the number of rounds for 2a/2y from 4 to 5, which is\n the current default.\n * mkpasswd: removed support for 2 and {SHA}, which actually are not\n supported by FreeBSD and libxcrypt.\n\n -- Marco d'Itri \[email protected]\u003e Mon, 10 Oct 2011 02:04:32 +0200\n\nwhois (5.0.11) unstable; urgency=medium\n\n * Added the remaining IPv4 allocations.\n * Added new ASN allocations.\n * Updated the .co and .gm TLD servers.\n\n -- Marco d'Itri \[email protected]\u003e Sun, 23 Jan 2011 18:08:55 +0100\n\nwhois (5.0.10) unstable; urgency=medium","Method":"ChangelogExactMatch"}},{"Name":"wireless-regdb","Version":"2011.04.28-1~bpo60+1","Release":"","NewVersion":"2016.06.10-1~deb7u1","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"wireshark-common","Version":"1.2.11-6+squeeze15","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"wpasupplicant","Version":"1.1+vyos1+helium2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"xkb-data","Version":"1.8-2","Release":"","NewVersion":"2.5.1-3","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of xkb-data\nxkeyboard-config (2.5.1-3) unstable; urgency=low\n\n * Cherry-picks from upstream:\n - A couple of missing chars in gr(polytonic), added on levels 3, 4\n (closes: #696126)\n - Reverting broken fix for is keyboard\n - symbols: ossmath is CTRL+ALT, not FOUR_LEVEL (closes: #657440)\n - symbols/gr: fix comment (closes: #696125)\n\n -- Julien Cristau \[email protected]\u003e Tue, 25 Dec 2012 12:37:00 +0100\n\nxkeyboard-config (2.5.1-2.1) unstable; urgency=low\n\n * Non-maintainer upload.\n * Preserve Shift modifier so GTK3 apps can properly differentiate between\n F10 and Shift+F10 (Closes: #656685).\n\n -- Michael Biebl \[email protected]\u003e Fri, 21 Sep 2012 18:12:52 +0200\n\nxkeyboard-config (2.5.1-2) unstable; urgency=low\n\n [ Ansgar Burchardt ]\n * Use xz compression for binary packages (Closes: #683891).\n\n -- Cyril Brulebois \[email protected]\u003e Sun, 05 Aug 2012 11:54:19 +0200\n\nxkeyboard-config (2.5.1-1) unstable; urgency=low\n\n * New upstream release:\n - Update translations, the previous release was rushed a bit for\n the security fix.\n\n -- Cyril Brulebois \[email protected]\u003e Thu, 02 Feb 2012 12:32:30 +0100\n\nxkeyboard-config (2.5-1) unstable; urgency=low\n\n * New upstream release, including:\n - Hide ClearGrab/CloseGrabs actions behind an option.\n * To get those actions back, use the grab:break_actions option. At\n the moment, the corresponding actionve has been disabled on the\n server side as a hot fix for CVE-2012-0064 (Closes: #656500).\n * Since there's a workaround on the server side already, do not use\n a high urgency, so that this new upstream release and its various\n changes can be tested for a while in unstable.\n * Update URL in watch file.\n * Add xsltproc, xutils-dev build-deps.\n * Keep /usr/share/man out of the udeb, due to a newly-added manpage.\n\n -- Cyril Brulebois \[email protected]\u003e Fri, 20 Jan 2012 18:21:03 +0100\n\nxkeyboard-config (2.3-2) unstable; urgency=low\n\n * Upload to unstable, for GNOME3 (Closes: #652871).\n * Adapt dh_autoreconf override since its behaviour changed.\n\n -- Cyril Brulebois \[email protected]\u003e Wed, 21 Dec 2011 10:52:00 +0100\n\nxkeyboard-config (2.3-1) experimental; urgency=low\n\n * New upstream release:\n - Since 2.1 is still supposed to be the best for GNOME2, and since\n GNOME3 is still being prepared in experimental, target that suite\n rather than unstable.\n * Add intltool build-dep.\n\n -- Cyril Brulebois \[email protected]\u003e Sat, 04 Jun 2011 00:35:16 +0200\n\nxkeyboard-config (2.2.1-1) experimental; urgency=low\n\n * New upstream release:\n - Big rewrite for GNOME3.\n * By default, run-time dependencies are checked at build-time:\n - Pass --disable-runtime-deps to disable that check since there's no\n point in doing so for Debian packages.\n - Break earlier versions of libx11-6.\n * Get rid of old maintainer scripts to upgrade from 1.6 since squeeze\n has 1.8.\n * Refresh patches.\n * Switch to dh:\n - Bump debhelper build-dep/compat to 8.\n - Use dh-autoreconf.\n - Rewrite debian/rules accordingly.\n - Build out-of-tree.\n * Remove debian/xsfbs/, no longer needed.\n * Remove debian/patches/quiltrc, not really needed.\n\n -- Cyril Brulebois \[email protected]\u003e Wed, 06 Apr 2011 02:41:25 +0200\n\nxkeyboard-config (2.1-2) unstable; urgency=low\n\n * Remove Mohammed Adnène Trojette from Uploaders. Thanks for your work!\n * Wrap build dependencies.\n * Drop Breaks on libx11-6 (\u003c\u003c 2:1.1), that was before lenny.\n * Bump Standards-Version to 3.9.1 (no changes needed).\n * Upload to unstable.\n\n -- Cyril Brulebois \[email protected]\u003e Wed, 06 Apr 2011 01:01:12 +0200\n\nxkeyboard-config (2.1-1) experimental; urgency=low\n\n * New upstream release:\n + Beware of the possible regressions, we're going 3 releases forward\n at once.\n * Rebuild ChangeLog using “git log” on the upstream branch. The NEWS\n file is a bit too lightweight. As a reminder, it's installed as:\n /usr/share/doc/xkb-data/changelog.gz\n * Point to /usr/share/X11/xkb/rules/base.lst in README.Debian, thanks to\n Riku Saikkonen for the suggestion (Closes: #487951).\n * Great debian/rules cleanup:\n + Remove deb target, dpkg-buildpackage's -i does the right thing, and\n “-rfakeroot” has been the default for a while.\n + Remove dir target, no longer used.\n + Stop removing rules/compat/base.l[2-4]*.part, they are no longer\n generated automatically.\n + More generically, stop removing files which weren't cleaned, that's\n been fixed.\n + Call touch in clean to restore the empty file which gets deleted by\n quilt when unpatching rules/base.o_k.part; this avoid its showing up\n as “deleted” in “git status”.\n + Try and keep the udeb's size low: Replace multiple spaces with a\n single space character. For this version, installed size goes down\n from 3.5MB to 3.0MB.\n + Additionally, remove comments starting with “//”. Down to 2.6MB, yay.\n + Also don't ship the newly-added pkg-config file in the udeb.\n + Stop removing $(xkb_base)/compiled, it's no longer created.\n + Stop passing --disable-xkbcomp-symlink to configure, it's gone.\n * Merge xsfbs/debian-unstable, which helps avoiding rebuilds.\n * Update download URL in watch file.\n\n -- Cyril Brulebois \[email protected]\u003e Fri, 28 Jan 2011 00:11:58 +0100\n\nxkeyboard-config (1.8-2) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"xl2tpd","Version":"1.2.7+dfsg-1","Release":"","NewVersion":"1.3.1+dfsg-1","NewRelease":"","Repository":"","Changelog":{"Contents":"Get: Changelog of xl2tpd\nxl2tpd (1.3.1+dfsg-1) unstable; urgency=low\n\n * New upstream release\n\n -- Roberto C. Sanchez \[email protected]\u003e Mon, 10 Oct 2011 11:57:19 -0400\n\nxl2tpd (1.3.0+dfsg-1) unstable; urgency=low\n\n * New upstream release (Closes: #611829)\n * Update debian/watch to account for upstream's RC numbering\n * Update to Standards-Version 3.9.2 (no changes)\n * Start when service is stopped and restart is attempted (Closes: #631369)\n\n -- Roberto C. Sanchez \[email protected]\u003e Tue, 13 Sep 2011 18:22:42 -0400\n\nxl2tpd (1.2.8+dfsg-1) unstable; urgency=low\n\n * New upstream release\n\n -- Roberto C. Sanchez \[email protected]\u003e Thu, 03 Mar 2011 13:31:28 -0500\n\nxl2tpd (1.2.7+dfsg-1) unstable; urgency=low","Method":"ChangelogExactMatch"}},{"Name":"xsltproc","Version":"1.1.26-6+squeeze3","Release":"","NewVersion":"1.1.26-14.1+deb7u3","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":"FailedToFindVersionInChangelog"}},{"Name":"xz-utils","Version":"5.0.0-2","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}},{"Name":"zlib1g","Version":"1:1.2.3.4.dfsg-3","Release":"","NewVersion":"","NewRelease":"","Repository":"","Changelog":{"Contents":"","Method":""}}],"Errors":[],"Optional":null}
This file has been truncated, but you can view the full file.
vyos117 (debian6.0.10)
======================
Total: 199 (High:38 Medium:135 Low:26 ?:0) 106 updatable packages
CVE-2015-0235
-------------
Score 10.0 (High)
Vector (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Summary Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc
2.2, and other 2.x versions before 2.18, allows context-dependent attackers to
execute arbitrary code via vectors related to the (1) gethostbyname or (2)
gethostbyname2 function, aka "GHOST."
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0235
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
CVE Details http://www.cvedetails.com/cve/CVE-2015-0235
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0235
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0235
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0235
CPE cpe:/a:gnu:glibc:2.11.3
Confidence 100 / CpeNameMatch
CVE-2015-0573
-------------
Score 10.0 (High)
Vector (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Summary drivers/media/platform/msm/broadcast/tsc.c in the TSC driver for the Linux
kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions
for MSM devices and other products, allows attackers to cause a denial of
service (invalid pointer dereference) or possibly have unspecified other impact
via a crafted application that makes a TSC_GET_CARD_STATUS ioctl call.
CWE https://cwe.mitre.org/data/definitions/476.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0573
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0573
CVE Details http://www.cvedetails.com/cve/CVE-2015-0573
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0573
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0573
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0573
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2063
-------------
Score 10.0 (High)
Vector (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Summary Stack-based buffer overflow in the supply_lm_input_write function in
drivers/thermal/supply_lm_core.c in the MSM Thermal driver for the Linux kernel
3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM
devices and other products, allows attackers to cause a denial of service or
possibly have unspecified other impact via a crafted application that sends a
large amount of data through the debugfs interface.
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2063
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2063
CVE Details http://www.cvedetails.com/cve/CVE-2016-2063
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2063
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2063
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2063
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2065
-------------
Score 10.0 (High)
Vector (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Summary sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver
for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android
contributions for MSM devices and other products, allows attackers to cause a
denial of service (out-of-bounds write and memory corruption) or possibly have
unspecified other impact via a crafted application that makes an ioctl call
triggering incorrect use of a parameters pointer.
CWE https://cwe.mitre.org/data/definitions/787.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2065
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2065
CVE Details http://www.cvedetails.com/cve/CVE-2016-2065
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2065
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2065
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2065
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-5344
-------------
Score 10.0 (High)
Vector (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Summary Multiple integer overflows in the MDSS driver for the Linux kernel 3.x, as used
in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and
other products, allow attackers to cause a denial of service or possibly have
unspecified other impact via a large size value, related to mdss_compat_utils.c,
mdss_fb.c, and mdss_rotator.c.
CWE https://cwe.mitre.org/data/definitions/190.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-5344
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5344
CVE Details http://www.cvedetails.com/cve/CVE-2016-5344
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-5344
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-5344
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-5344
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2015-0569
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary Heap-based buffer overflow in the private wireless extensions IOCTL
implementation in wlan_hdd_wext.c in the WLAN (aka Wi-Fi) driver for the Linux
kernel 3.x and 4.x, as used in Qualcomm Innovation Center (QuIC) Android
contributions for MSM devices and other products, allows attackers to gain
privileges via a crafted application that establishes a packet filter.
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0569
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0569
CVE Details http://www.cvedetails.com/cve/CVE-2015-0569
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0569
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0569
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0569
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2015-0570
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary Stack-based buffer overflow in the SET_WPS_IE IOCTL implementation in
wlan_hdd_hostapd.c in the WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and
4.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM
devices and other products, allows attackers to gain privileges via a crafted
application that uses a long WPS IE element.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0570
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0570
CVE Details http://www.cvedetails.com/cve/CVE-2015-0570
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0570
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0570
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0570
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2015-0571
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary The WLAN (aka Wi-Fi) driver for the Linux kernel 3.x and 4.x, as used in
Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and
other products, does not verify authorization for private SET IOCTL calls, which
allows attackers to gain privileges via a crafted application, related to
wlan_hdd_hostapd.c and wlan_hdd_wext.c.
CWE https://cwe.mitre.org/data/definitions/284.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0571
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0571
CVE Details http://www.cvedetails.com/cve/CVE-2015-0571
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0571
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0571
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0571
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2061
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary Integer signedness error in the MSM V4L2 video driver for the Linux kernel 3.x,
as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM
devices and other products, allows attackers to gain privileges or cause a
denial of service (array overflow and memory corruption) via a crafted
application that triggers an msm_isp_axi_create_stream call.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2061
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2061
CVE Details http://www.cvedetails.com/cve/CVE-2016-2061
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2061
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2061
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2061
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2062
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary The adreno_perfcounter_query_group function in
drivers/gpu/msm/adreno_perfcounter.c in the Adreno GPU driver for the Linux
kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions
for MSM devices and other products, uses an incorrect integer data type, which
allows attackers to cause a denial of service (integer overflow, heap-based
buffer overflow, and incorrect memory allocation) or possibly have unspecified
other impact via a crafted IOCTL_KGSL_PERFCOUNTER_QUERY ioctl call.
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2062
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2062
CVE Details http://www.cvedetails.com/cve/CVE-2016-2062
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2062
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2062
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2062
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2066
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary Integer signedness error in the MSM QDSP6 audio driver for the Linux kernel 3.x,
as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM
devices and other products, allows attackers to gain privileges or cause a
denial of service (memory corruption) via a crafted application that makes an
ioctl call.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2066
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2066
CVE Details http://www.cvedetails.com/cve/CVE-2016-2066
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2066
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2066
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2066
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2067
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary drivers/gpu/msm/kgsl.c in the MSM graphics driver (aka GPU driver) for the Linux
kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions
for MSM devices and other products, mishandles the KGSL_MEMFLAGS_GPUREADONLY
flag, which allows attackers to gain privileges by leveraging accidental
read-write mappings, aka Qualcomm internal bug CR988993.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2067
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2067
CVE Details http://www.cvedetails.com/cve/CVE-2016-2067
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2067
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2067
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2067
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2068
-------------
Score 9.3 (High)
Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Summary The MSM QDSP6 audio driver (aka sound driver) for the Linux kernel 3.x, as used
in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and
other products, allows attackers to gain privileges or cause a denial of service
(integer overflow, and buffer overflow or buffer over-read) via a crafted
application that performs a (1) AUDIO_EFFECTS_WRITE or (2) AUDIO_EFFECTS_READ
operation, aka Qualcomm internal bug CR1006609.
CWE https://cwe.mitre.org/data/definitions/189.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2068
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2068
CVE Details http://www.cvedetails.com/cve/CVE-2016-2068
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2068
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2068
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2068
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-3673
-------------
Score 7.8 (High)
Vector (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Summary The SCTP implementation in the Linux kernel through 3.17.2 allows remote
attackers to cause a denial of service (system crash) via a malformed ASCONF
chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
CWE https://cwe.mitre.org/data/definitions/399.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-3673
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673
CVE Details http://www.cvedetails.com/cve/CVE-2014-3673
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-3673
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-3673
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-3673
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-3687
-------------
Score 7.8 (High)
Vector (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Summary The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP
implementation in the Linux kernel through 3.17.2 allows remote attackers to
cause a denial of service (panic) via duplicate ASCONF chunks that trigger an
incorrect uncork within the side-effect interpreter.
CWE https://cwe.mitre.org/data/definitions/399.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-3687
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687
CVE Details http://www.cvedetails.com/cve/CVE-2014-3687
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-3687
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-3687
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-3687
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2017-5972
-------------
Score 7.8 (High)
Vector (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Summary The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie
protection mechanism for the case of a fast network connection, which allows
remote attackers to cause a denial of service (CPU consumption) by sending many
TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package
in CentOS Linux 7. NOTE: third parties have been unable to discern any
relationship between the GitHub Engineering finding and the Trigemini.c attack
code.
CWE https://cwe.mitre.org/data/definitions/399.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2017-5972
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5972
CVE Details http://www.cvedetails.com/cve/CVE-2017-5972
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2017-5972
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2017-5972
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2017-5972
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2012-2388
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary The GMP Plugin in strongSwan 4.2.0 through 4.6.3 allows remote attackers to
bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA
signature verification vulnerability."
CWE https://cwe.mitre.org/data/definitions/287.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2012-2388
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2388
CVE Details http://www.cvedetails.com/cve/CVE-2012-2388
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2012-2388
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2012-2388
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2012-2388
CPE cpe:/a:strongswan:strongswan:4.5.2
Confidence 100 / CpeNameMatch
CVE-2012-2663
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN
packets in --syn rules, which might allow remote attackers to bypass intended
firewall restrictions via crafted packets. NOTE: the CVE-2012-6638 fix makes
this issue less relevant.
CWE https://cwe.mitre.org/data/definitions/20.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2012-2663
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2663
CVE Details http://www.cvedetails.com/cve/CVE-2012-2663
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2012-2663
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2012-2663
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2012-2663
CPE cpe:/a:netfilter_core_team:iptables:1.4.10
Confidence 100 / CpeNameMatch
CVE-2012-4412
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6)
2.17 and earlier allows context-dependent attackers to cause a denial of service
(crash) or possibly execute arbitrary code via a long string, which triggers a
heap-based buffer overflow.
CWE https://cwe.mitre.org/data/definitions/189.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2012-4412
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412
CVE Details http://www.cvedetails.com/cve/CVE-2012-4412
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2012-4412
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2012-4412
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2012-4412
CPE cpe:/a:gnu:glibc:2.11.3
Confidence 100 / CpeNameMatch
CVE-2014-3158
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary Integer overflow in the getword function in options.c in pppd in Paul's PPP
Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a
long word in an options file, which triggers a heap-based buffer overflow that
"[corrupts] security-relevant variables."
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-3158
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158
CVE Details http://www.cvedetails.com/cve/CVE-2014-3158
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-3158
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-3158
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-3158
Package ppp-2.4.5-4+deb6u1 -> ppp-2.4.5-5.1+deb7u2
Confidence 50 / ChangelogLenientMatch
CVE-2014-4323
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary The mdp_lut_hw_update function in drivers/video/msm/mdp.c in the MDP display
driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC)
Android contributions for MSM devices and other products, does not validate
certain start and length values within an ioctl call, which allows attackers to
gain privileges via a crafted application.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-4323
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4323
CVE Details http://www.cvedetails.com/cve/CVE-2014-4323
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-4323
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-4323
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-4323
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-7209
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows
context-dependent attackers to execute arbitrary commands via shell
metacharacters in a filename.
CWE https://cwe.mitre.org/data/definitions/77.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-7209
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7209
CVE Details http://www.cvedetails.com/cve/CVE-2014-7209
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-7209
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-7209
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-7209
Package mime-support-3.48-1+deb6u1 -> mime-support-3.52-1+deb7u1
Confidence 50 / ChangelogLenientMatch
CVE-2015-0572
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary Multiple race conditions in drivers/char/adsprpc.c and
drivers/char/adsprpc_compat.c in the ADSPRPC driver for the Linux kernel 3.x, as
used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices
and other products, allow attackers to cause a denial of service (zero-value
write) or possibly have unspecified other impact via a
COMPAT_FASTRPC_IOCTL_INVOKE_FD ioctl call.
CWE https://cwe.mitre.org/data/definitions/362.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0572
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0572
CVE Details http://www.cvedetails.com/cve/CVE-2015-0572
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0572
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0572
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0572
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2015-5621
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not
remove the varBind variable in a netsnmp_variable_list item when parsing of the
SNMP PDU fails, which allows remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a crafted packet.
CWE https://cwe.mitre.org/data/definitions/19.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-5621
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621
CVE Details http://www.cvedetails.com/cve/CVE-2015-5621
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-5621
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-5621
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-5621
CPE cpe:/a:net-snmp:net-snmp:5.7.2
Confidence 100 / CpeNameMatch
CVE-2016-5343
-------------
Score 7.5 (High)
Vector (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Summary drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the
Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android
contributions for MSM devices and other products, allows attackers to cause a
denial of service (memory corruption) or possibly have unspecified other impact
via a write request, as demonstrated by a voice_svc_send_req buffer overflow.
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-5343
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5343
CVE Details http://www.cvedetails.com/cve/CVE-2016-5343
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-5343
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-5343
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-5343
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-0484
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain
privileges via vectors related to the "user's environment."
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-0484
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0484
CVE Details http://www.cvedetails.com/cve/CVE-2014-0484
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-0484
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-0484
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-0484
Package acpi-support-base-0.137-5+deb6u2 -> acpi-support-base-0.140-5+deb7u3
Confidence 50 / ChangelogLenientMatch
CVE-2014-1737
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel
through 3.14.3 does not properly handle error conditions during processing of an
FDRAWCMD ioctl call, which allows local users to trigger kfree operations and
gain privileges by leveraging write access to a /dev/fd device.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-1737
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737
CVE Details http://www.cvedetails.com/cve/CVE-2014-1737
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-1737
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-1737
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-1737
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-3534
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform
does not properly restrict address-space control operations in
PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write
access to kernel memory locations, and consequently gain privileges, via a
crafted application that makes a ptrace system call.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-3534
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3534
CVE Details http://www.cvedetails.com/cve/CVE-2014-3534
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-3534
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-3534
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-3534
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-4322
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used
in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and
other products, does not validate certain offset, length, and base values within
an ioctl call, which allows attackers to gain privileges or cause a denial of
service (memory corruption) via a crafted application.
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-4322
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4322
CVE Details http://www.cvedetails.com/cve/CVE-2014-4322
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-4322
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-4322
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-4322
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-5206
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1
does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount,
which allows local users to bypass an intended read-only restriction and defeat
certain sandbox protection mechanisms via a "mount -o remount" command within a
user namespace.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-5206
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5206
CVE Details http://www.cvedetails.com/cve/CVE-2014-5206
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-5206
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-5206
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-5206
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-9322
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly
handle faults associated with the Stack Segment (SS) segment register, which
allows local users to gain privileges by triggering an IRET instruction that
leads to access to a GS Base address from the wrong space.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-9322
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322
CVE Details http://www.cvedetails.com/cve/CVE-2014-9322
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-9322
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-9322
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-9322
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-9410
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary The vfe31_proc_general function in drivers/media/video/msm/vfe/msm_vfe31.c in
the MSM-VFE31 driver for the Linux kernel 3.x, as used in Qualcomm Innovation
Center (QuIC) Android contributions for MSM devices and other products, does not
validate a certain id value, which allows attackers to gain privileges or cause
a denial of service (memory corruption) via an application that makes a crafted
ioctl call.
CWE https://cwe.mitre.org/data/definitions/20.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-9410
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9410
CVE Details http://www.cvedetails.com/cve/CVE-2014-9410
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-9410
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-9410
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-9410
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-9529
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary Race condition in the key_gc_unused_keys function in security/keys/gc.c in the
Linux kernel through 3.18.2 allows local users to cause a denial of service
(memory corruption or panic) or possibly have unspecified other impact via
keyctl commands that trigger access to a key structure member during garbage
collection of a key.
CWE https://cwe.mitre.org/data/definitions/362.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-9529
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529
CVE Details http://www.cvedetails.com/cve/CVE-2014-9529
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-9529
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-9529
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-9529
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2015-0568
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary Use-after-free vulnerability in the msm_set_crop function in
drivers/media/video/msm/msm_camera.c in the MSM-Camera driver for the Linux
kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions
for MSM devices and other products, allows attackers to gain privileges or cause
a denial of service (memory corruption) via an application that makes a crafted
ioctl call.
CWE https://cwe.mitre.org/data/definitions/416.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2015-0568
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0568
CVE Details http://www.cvedetails.com/cve/CVE-2015-0568
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2015-0568
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2015-0568
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2015-0568
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2059
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary The msm_ipc_router_bind_control_port function in
net/ipc_router/ipc_router_core.c in the IPC router kernel module for the Linux
kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions
for MSM devices and other products, does not verify that a port is a client
port, which allows attackers to gain privileges or cause a denial of service
(race condition and list corruption) by making many BIND_CONTROL_PORT ioctl
calls.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2059
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2059
CVE Details http://www.cvedetails.com/cve/CVE-2016-2059
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2059
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2059
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2059
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-2064
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary sound/soc/msm/qdsp6v2/msm-audio-effects-q6-v2.c in the MSM QDSP6 audio driver
for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android
contributions for MSM devices and other products, allows attackers to cause a
denial of service (buffer over-read) or possibly have unspecified other impact
via a crafted application that makes an ioctl call specifying many commands.
CWE https://cwe.mitre.org/data/definitions/125.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-2064
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2064
CVE Details http://www.cvedetails.com/cve/CVE-2016-2064
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-2064
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-2064
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-2064
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-5340
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary The is_ashmem_file function in drivers/staging/android/ashmem.c in a certain
Qualcomm Innovation Center (QuIC) Android patch for the Linux kernel 3.x
mishandles pointer validation within the KGSL Linux Graphics Module, which
allows attackers to bypass intended access restrictions by using the /ashmem
string as the dentry name.
CWE https://cwe.mitre.org/data/definitions/20.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-5340
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5340
CVE Details http://www.cvedetails.com/cve/CVE-2016-5340
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-5340
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-5340
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-5340
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2016-5342
-------------
Score 7.2 (High)
Vector (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Summary Heap-based buffer overflow in the wcnss_wlan_write function in
drivers/net/wireless/wcnss/wcnss_wlan.c in the wcnss_wlan device driver for the
Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android
contributions for MSM devices and other products, allows attackers to cause a
denial of service or possibly have unspecified other impact by writing to
/dev/wcnss_wlan with an unexpected amount of data.
CWE https://cwe.mitre.org/data/definitions/119.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2016-5342
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5342
CVE Details http://www.cvedetails.com/cve/CVE-2016-5342
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2016-5342
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2016-5342
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2016-5342
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2010-3853
-------------
Score 6.9 (Medium)
Vector (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Summary pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3
uses the environment of the invoking application or service during execution of
the namespace.init script, which might allow local users to gain privileges by
running a setuid program that relies on the pam_namespace PAM check, as
demonstrated by the sudo program.
CWE https://cwe.mitre.org/data/definitions/.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2010-3853
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3853
CVE Details http://www.cvedetails.com/cve/CVE-2010-3853
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2010-3853
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2010-3853
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2010-3853
Package libpam-runtime-1.1.1-6.1+squeeze1 -> libpam-runtime-1.1.3-7.1
Confidence 50 / ChangelogLenientMatch
CVE-2011-0008
-------------
Score 6.9 (Medium)
Vector (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Summary A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14
does not properly interpret a system group (aka %group) in the sudoers file
during authorization decisions for a user who belongs to that group, which
allows local users to leverage an applicable sudoers file and gain root
privileges via a sudo command. NOTE: this vulnerability exists because of a
CVE-2009-0034 regression.
CWE https://cwe.mitre.org/data/definitions/.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2011-0008
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0008
CVE Details http://www.cvedetails.com/cve/CVE-2011-0008
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2011-0008
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2011-0008
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2011-0008
CPE cpe:/a:todd_miller:sudo:1.7.4p4
Confidence 100 / CpeNameMatch
CVE-2011-1154
-------------
Score 6.9 (Medium)
Vector (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Summary The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might
allow context-dependent attackers to execute arbitrary commands via shell
metacharacters in a log filename, as demonstrated by a filename that is
automatically constructed on the basis of a hostname or virtual machine name.
CWE https://cwe.mitre.org/data/definitions/20.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2011-1154
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154
CVE Details http://www.cvedetails.com/cve/CVE-2011-1154
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2011-1154
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2011-1154
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2011-1154
Package logrotate-3.7.8-6 -> logrotate-3.8.1-4
Confidence 95 / ChangelogExactMatch
CVE-2013-1775
-------------
Score 6.9 (Medium)
Vector (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Summary sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or
physically proximate attackers to bypass intended time restrictions and retain
privileges without re-authenticating by setting the system clock and sudo user
timestamp to the epoch.
CWE https://cwe.mitre.org/data/definitions/264.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2013-1775
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
CVE Details http://www.cvedetails.com/cve/CVE-2013-1775
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2013-1775
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2013-1775
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2013-1775
CPE cpe:/a:todd_miller:sudo:1.7.4p4
Confidence 100 / CpeNameMatch
CVE-2014-0196
-------------
Score 6.9 (Medium)
Vector (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Summary The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through
3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case,
which allows local users to cause a denial of service (memory corruption and
system crash) or gain privileges by triggering a race condition involving read
and write operations with long strings.
CWE https://cwe.mitre.org/data/definitions/362.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-0196
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196
CVE Details http://www.cvedetails.com/cve/CVE-2014-0196
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-0196
CVSSv3 Clac https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2014-0196
Debian-CVE https://security-tracker.debian.org/tracker/CVE-2014-0196
CPE cpe:/o:linux:linux_kernel:3.13.11
Confidence 100 / CpeNameMatch
CVE-2014-1419
-------------
Score 6.9 (Medium)
Vector (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Summary Race condition in the power policy functions in policy-funcs in acpi-support
before 0.142 allows local users to gain privileges via unspecified vectors.
CWE https://cwe.mitre.org/data/definitions/362.html
NVD https://nvd.nist.gov/vuln/detail/CVE-2014-1419
MITRE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1419
CVE Details http://www.cvedetails.com/cve/CVE-2014-1419
CVSSv2 Clac https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=CVE-2014-1419
CVSSv3
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment