[Secure-testing-commits] r30497 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Tue Dec 2 22:28:53 UTC 2014
Author: jmm
Date: 2014-12-02 22:28:53 +0000 (Tue, 02 Dec 2014)
New Revision: 30497
Modified:
data/CVE/list
Log:
rails fixed
openjdk, util-linux no-dsa
older mcollective issues fixed
mark offlineimap as fixed
mark xorg as fixed
NFUs
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2014-12-02 21:56:40 UTC (rev 30496)
+++ data/CVE/list 2014-12-02 22:28:53 UTC (rev 30497)
@@ -495,6 +495,8 @@
CVE-2014-9114 [blkid command injection]
RESERVED
- util-linux <unfixed> (bug #771274)
+ [squeeze] - util-linux <no-dsa> (Minor issue)
+ [wheezy] - util-linux <no-dsa> (Minor issue)
NOTE: http://www.openwall.com/lists/oss-security/2014/11/26/13
NOTE: https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
CVE-2014-9112 [heap-based buffer overflow]
@@ -2797,7 +2799,6 @@
RESERVED
- glpi <unfixed> (unimportant)
NOTE: Only supported behind an authenticated HTTP zone
- TODO: check
NOTE: original bug: https://forge.indepnet.net/issues/5101
NOTE: followup: https://forge.indepnet.net/issues/5113
NOTE: appears to be a generic autoloading abuse; possibly with
@@ -4062,13 +4063,12 @@
- moodle <unfixed>
[squeeze] - moodle <end-of-life> (Unsupported in squeeze-lts)
NOTE: http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47766
- TODO: check, possibly affects only 2.7.x
CVE-2014-7830 (Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php ...)
- moodle <unfixed>
[squeeze] - moodle <end-of-life> (Unsupported in squeeze-lts)
NOTE: http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47865
CVE-2014-7829 (Directory traversal vulnerability in ...)
- - rails <unfixed> (bug #770934)
+ - rails 2:4.1.8-1 (bug #770934)
[wheezy] - rails <not-affected> (src:rails in wheezy is just a transition package)
[squeeze] - rails <not-affected> (Only affects >= 3)
- rails-3.2 <removed>
@@ -4114,7 +4114,7 @@
- ruby-sprockets 2.12.3-1
[wheezy] - ruby-sprockets <no-dsa> (Minor issue)
CVE-2014-7818 (Directory traversal vulnerability in ...)
- - rails <unfixed> (bug #770934)
+ - rails 2:4.1.8-1 (bug #770934)
[wheezy] - rails <not-affected> (src:rails in wheezy is just a transition package)
[squeeze] - rails <not-affected> (Only affects >= 3)
- rails-3.2 <removed>
@@ -11883,13 +11883,13 @@
CVE-2014-4463 (Apple iOS before 8.1.1 allows physically proximate attackers to bypass ...)
NOT-FOR-US: Apple
CVE-2014-4462 (WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, ...)
- TODO: check
+ NOT-FOR-US: Webkit / if anything of this affects Chromium, the Chrome sec team will know and fix
CVE-2014-4461 (The kernel in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does ...)
NOT-FOR-US: Apple
CVE-2014-4460 (CFNetwork in Apple iOS before 8.1.1 and OS X before 10.10.1 does not ...)
NOT-FOR-US: Apple
CVE-2014-4459 (Use-after-free vulnerability in WebKit, as used in Apple OS X before ...)
- TODO: check
+ NOT-FOR-US: Webkit / if anything of this affects Chromium, the Chrome sec team will know and fix
CVE-2014-4458 (The "System Profiler About This Mac" component in Apple OS X before ...)
NOT-FOR-US: Apple
CVE-2014-4457 (The Sandbox Profiles subsystem in Apple iOS before 8.1.1 does not ...)
@@ -11903,7 +11903,7 @@
CVE-2014-4453 (Apple iOS before 8.1.1 and OS X before 10.10.1 include location data ...)
NOT-FOR-US: Apple
CVE-2014-4452 (WebKit, as used in Apple iOS before 8.1.1 and Apple TV before 7.0.2, ...)
- TODO: check
+ NOT-FOR-US: Webkit / if anything of this affects Chromium, the Chrome sec team will know and fix
CVE-2014-4451 (Apple iOS before 8.1.1 does not properly enforce the failed-passcode ...)
NOT-FOR-US: Apple
CVE-2014-4450 (The QuickType feature in the Keyboards subsystem in Apple iOS before ...)
@@ -14177,6 +14177,7 @@
[wheezy] - openjdk-6 <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
- openjdk-7 <unfixed>
[wheezy] - openjdk-7 <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
+ [jessie] - openjdk-7 <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
- openjdk-8 <unfixed>
- polarssl 1.3.9-2
- surf <unfixed> (unimportant)
@@ -15100,7 +15101,7 @@
CVE-2014-3252
RESERVED
CVE-2014-3251 (The MCollective aes_security plugin, as used in Puppet Enterprise ...)
- - mcollective <unfixed> (low; bug #758701)
+ - mcollective 2.6.0+dfsg-1 (low; bug #758701)
[wheezy] - mcollective <no-dsa> (Minor issue)
NOTE: Mcollective are not configured to use the plugin and are not vulnerable by default.
NOTE: http://puppetlabs.com/security/cve/cve-2014-3251
@@ -15123,7 +15124,7 @@
- facter 2.0.1-1 (low)
[wheezy] - facter <no-dsa> (Minor issue)
[squeeze] - facter <no-dsa> (Minor issue)
- - mcollective <unfixed> (low)
+ - mcollective 2.5.2+dfsg-1 (low)
[wheezy] - mcollective <no-dsa> (Minor issue)
NOTE: http://puppetlabs.com/security/cve/cve-2014-3248
NOTE: problem in combination with ruby <= 1.9.1
@@ -26135,7 +26136,10 @@
- pixman 0.30.2-2
CVE-2013-6424 (Integer underflow in the xTrapezoidValid macro in render/picture.h in ...)
{DSA-2822-1}
- - xorg-server <unfixed> (low; bug #742922)
+ - xorg-server 2:1.14.2.901-1 (low; bug #742922)
+ NOTE: Band-aid fix in Wheezy not applicable to upstream code, fixed post-Wheezy
+ NOTE: in pixman: http://cgit.freedesktop.org/pixman/commit/?id=5e14da97f16e421d084a9e735be21b1025150f0c
+ NOTE: Mark the first post-wheezy xorg-server as a pseudo fixed version
CVE-2013-6423
RESERVED
CVE-2013-6422 (The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling ...)
@@ -65565,7 +65569,8 @@
- gnutls26 <unfixed> (unimportant)
- gnutls28 <unfixed> (unimportant)
NOTE: No mitigation for gnutls, it is recommended to use TLS 1.1 or 1.2 which is supported since 2.0.0
- - haskell-tls <unfixed>
+ - haskell-tls <unfixed> (unimportant)
+ NOTE: No mitigation for haskell-tls, it is recommended to use TLS 1.1, which is supported since 0.2
- matrixssl <removed> (low)
[squeeze] - matrixssl <no-dsa> (Minor issue)
[wheezy] - matrixssl <no-dsa> (Minor issue)
@@ -75796,8 +75801,8 @@
NOTE: http://www.djangoproject.com/weblog/2010/dec/22/security/
CVE-2010-4533 [offlineimap uses SSLv2]
RESERVED
- - offlineimap <unfixed> (low; bug #606962)
- [wheezy] - offlineimap <no-dsa> (Long-standing, documented behaviour, can be updated in spu if needed)
+ - offlineimap 6.3.4-1 (low; bug #606962)
+ NOTE: offlineimap uses the "ssl" standard lib in Python, marking the version of offlineimap in wheezy as fixed
[squeeze] - offlineimap <no-dsa> (Long-standing, documented behaviour, can be updated in spu if needed)
[lenny] - offlineimap <no-dsa> (Long-standing, documented behaviour, can be updated in spu if needed)
CVE-2010-4532 [no SSL cert validation]
More information about the Secure-testing-commits
mailing list