[Secure-testing-commits] r30362 - in data: . CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Wed Nov 26 18:42:44 UTC 2014
Author: jmm
Date: 2014-11-26 18:42:44 +0000 (Wed, 26 Nov 2014)
New Revision: 30362
Modified:
data/CVE/list
data/dsa-needed.txt
Log:
dpkg issue neutralised by toolchain hardening
no-dsa for ntop and sprockets
add smarty3 to dsa-needed
older psql issue fixed
erlang has its own ssl, which yaws uses
remove older bogus phpbb issue
no security impact for gdb/bfd
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2014-11-26 17:26:53 UTC (rev 30361)
+++ data/CVE/list 2014-11-26 18:42:44 UTC (rev 30362)
@@ -1652,8 +1652,9 @@
NOTE: http://git.php.net/?p=php-src.git;a=commit;h=c818d0d01341907fee82bdb81cab07b7d93bb9db
CVE-2014-8625 [format string vulnerability]
RESERVED
- - dpkg <unfixed> (bug #768485)
+ - dpkg <unfixed> (unimportant; bug #768485)
[squeeze] - dpkg <not-affected> (Regression introduced in 1.16.2)
+ NOTE: Rendered non-exploitable by toolchain hardening
NOTE: https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135
NOTE: Regression introduced with https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/?id=0b8652b226a7601dfd71471797d15168a7337242 (1.16.2)
CVE-2014-8598 (The XML Import/Export plugin in MantisBT 1.2.x does not restrict ...)
@@ -1894,7 +1895,7 @@
CVE-2014-8501 [out-of-bounds write when parsing specially crafted PE executable]
RESERVED
- binutils 2.24.90.20141104-1
- - gdb <unfixed>
+ - gdb <unfixed> (unimportant)
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e
CVE-2014-8500
RESERVED
@@ -3646,6 +3647,7 @@
RESERVED
CVE-2014-7819 (Multiple directory traversal vulnerabilities in server.rb in Sprockets ...)
- ruby-sprockets 2.12.3-1
+ [wheezy] - ruby-sprockets <no-dsa> (Minor issue)
CVE-2014-7818 (Directory traversal vulnerability in ...)
- rails <unfixed> (bug #770934)
[wheezy] - rails <not-affected> (src:rails in wheezy is just a transition package)
@@ -12111,6 +12113,7 @@
NOT-FOR-US: SHOUTcast DNAS
CVE-2014-4165 (Cross-site scripting (XSS) vulnerability in ntop allows remote ...)
- ntop <unfixed> (bug #751946)
+ [jessie] - ntop <no-dsa> (Minor issue)
[wheezy] - ntop <no-dsa> (Minor issue)
CVE-2014-4164 (Cross-site scripting (XSS) vulnerability in AlgoSec FireFlow 6.3-b230 ...)
NOT-FOR-US: AlogoSec FireFlow
@@ -13705,9 +13708,7 @@
- tlslite <removed>
[wheezy] - tlslite <no-dsa> (Minor issue)
- uzbl <unfixed> (unimportant)
- - yaws <unfixed>
- [wheezy] - yaws <no-dsa> (Minor issue)
- [squeeze] - yaws <no-dsa> (Minor issue)
+ - erlang <unfixed>
NOTE: https://www.openssl.org/~bodo/ssl-poodle.pdf
NOTE: http://googleonlinesecurity.blogspot.fr/2014/10/this-poodle-bites-exploiting-ssl-30.html
NOTE: This is only about the SSLv3 CBC padding, not about any downgrade attack or support for the fallback SCSV
@@ -18224,11 +18225,6 @@
NOTE: squeeze: DecodePSDPixels not present but there was a rewrite from DecodeImage?
NOTE: http://secunia.com/advisories/56844/
NOTE: http://trac.imagemagick.org/changeset/14801
-CVE-2014-XXXX [phpbb3: denial of service vulnerability]
- - phpbb3 <unfixed> (low)
- [wheezy] - phpbb3 <no-dsa> (Minor issue)
- [squeeze] - phpbb3 <no-dsa> (Minor issue)
- NOTE: http://seclists.org/bugtraq/2014/Feb/33
CVE-2014-1950 (Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen ...)
{DSA-3006-1}
- xen 4.4.0-1
@@ -24094,7 +24090,7 @@
{DSA-2865-1 DSA-2864-1}
- postgresql-9.1 9.1.12-1 (low)
- postgresql-8.4 <removed>
- [wheezy] - postgresql-8.4 <no-dsa> (Minor issue)
+ [wheezy] - postgresql-8.4 8.4.20-0wheezy1
- postgresql-9.3 9.3.3-1
- postgresql-plsh 1.20140221-1
[wheezy] - postgresql-plsh <no-dsa> (Minor issue)
@@ -65052,13 +65048,16 @@
- cyassl <unfixed>
- gnutls26 <unfixed> (unimportant)
- gnutls28 <unfixed> (unimportant)
- NOTE: No mitigation for gnutls, it is recommended to use TLS 1.1 or 1.2 which is supported 2.0.0
+ NOTE: No mitigation for gnutls, it is recommended to use TLS 1.1 or 1.2 which is supported since 2.0.0
- haskell-tls <unfixed>
- matrixssl <removed> (low)
[squeeze] - matrixssl <no-dsa> (Minor issue)
[wheezy] - matrixssl <no-dsa> (Minor issue)
NOTE: matrixssl fix this upstream in 3.2.2
- - bouncycastle <unfixed>
+ - bouncycastle 1.49+dfsg-1
+ [squeeze] - bouncycastle <no-dsa> (Minor issue)
+ [wheezy] - bouncycastle <no-dsa> (Minor issue)
+ NOTE: No mitigation for bouncycastle, it is recommended to use TLS 1.1, which is supported since 1.4.9
- nss 3.13.1.with.ckbi.1.88-1
- polarssl <unfixed>
- tlslite <removed>
Modified: data/dsa-needed.txt
===================================================================
--- data/dsa-needed.txt 2014-11-26 17:26:53 UTC (rev 30361)
+++ data/dsa-needed.txt 2014-11-26 18:42:44 UTC (rev 30362)
@@ -41,6 +41,8 @@
ruby1.9.1
(no-dsa issues CVE-2013-2065 and CVE-2014-4975 could be fixed along)
--
+smarty3
+--
wordpress
--
zendframework
More information about the Secure-testing-commits
mailing list