[Secure-testing-commits] r32353 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Thu Feb 19 15:35:31 UTC 2015
Author: jmm
Date: 2015-02-19 15:35:31 +0000 (Thu, 19 Feb 2015)
New Revision: 32353
Modified:
data/CVE/list
Log:
no-dsa for jessie: binutils-mingw-w64
spencer regex: openrtp w/o security impact, z88dk n/a
no-dsa for wheezy/squeeze: nut, macchanger
one freetype issue n/a for squeeze/wheezy
busybox tpu fix
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2015-02-19 14:46:23 UTC (rev 32352)
+++ data/CVE/list 2015-02-19 15:35:31 UTC (rev 32353)
@@ -694,8 +694,8 @@
- haskell-regex-posix <not-affected> (only when building on Windows, see bug #778395)
- cups <not-affected> (Local regex copy only used when building on Windows, see #778396)
- librcsb-core-wrapper 1.005-3 (bug #778397)
- - openrpt <unfixed> (bug #778398)
- - z88dk <unfixed> (bug #778399)
+ - openrpt <unfixed> (unimportant; bug #778398)
+ - z88dk <not-affected> (Local regex copy only used when building on Windows, see bug #778399)
- newlib <unfixed> (bug #778408)
[squeeze] - newlib <no-dsa> (Minor issue)
[wheezy] - newlib <no-dsa> (Minor issue)
@@ -716,12 +716,14 @@
NOTE: alpine uses the regex code from glibc, local fallback code not used
- vigor 0.016-24 (unimportant; bug #778409)
- nvi <unfixed> (unimportant; bug #778412)
- NOTE: No security impact in nvi/vigor
+ NOTE: No security impact in nvi/vigor and openrpt
NOTE: http://www.kb.cert.org/vuls/id/695940
NOTE: https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/16/8
-CVE-2015-XXXX [insecure storage of password]
- - nut 2.7.2-2 (bug #777706)
+CVE-2015-XXXX [insecure storage of password in the NUT-monitor app]
+ - nut 2.7.2-2 (low; bug #777706)
+ [wheezy] - nut <no-dsa> (Minor issue)
+ [squeeze] - nut <no-dsa> (Minor issue)
CVE-2015-1877 [command injection vulnerability]
- xdg-utils <unfixed> (bug #777722)
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/18/7
@@ -918,6 +920,8 @@
NOTE: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565
CVE-2014-9668 (The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 ...)
- freetype <unfixed> (bug #777656)
+ [wheezy] - freetype <not-affected> (Vulnerable code not present)
+ [squeeze] - freetype <not-affected> (Vulnerable code not present)
NOTE: http://code.google.com/p/google-security-research/issues/detail?id=164
NOTE: http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f46add13895337ece929b18bb8f036431b3fb538
CVE-2014-9667 (sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length ...)
@@ -999,6 +1003,7 @@
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/02/09/10
CVE-2015-XXXX [fails to detect silent driver failure to change MAC]
- macchanger 1.7.0-5.3 (bug #774898)
+ [wheezy] - macchanger <no-dsa> (Minor issue)
CVE-2015-XXXX [lame missing check for samplerate]
- lame 3.99.5+repack1-6 (bug #775959; bug #777160; bug #777161)
[wheezy] - lame <no-dsa> (Minor issue)
@@ -7840,12 +7845,14 @@
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141124-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: Upstream tracker: https://sourceware.org/bugzilla/show_bug.cgi?id=17533
NOTE: Upstream patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bb0d867169d7e9743d229804106a8fbcab7f3b3f
CVE-2014-8737 (Multiple directory traversal vulnerabilities in GNU binutils 2.24 and ...)
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141124-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: Upstream tracker: https://sourceware.org/bugzilla/show_bug.cgi?id=17552
NOTE: Upstream patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dd9b91de2149ee81d47f708e7b0bbf57da10ad42
CVE-2014-8732 (Cross-site scripting (XSS) vulnerability in phpMemcachedAdmin 1.2.2 ...)
@@ -8154,6 +8161,7 @@
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141104-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: http://openwall.com/lists/oss-security/2014/10/27/4
NOTE: http://openwall.com/lists/oss-security/2014/10/27/5
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=17510#c7
@@ -8163,6 +8171,7 @@
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141104-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c33
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c34
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0102ea8cec5fc509bba6c91df61b7ce23a799d32
@@ -8170,12 +8179,14 @@
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141104-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: See https://sourceware.org/bugzilla/show_bug.cgi?id=17512#c17
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5a4b0ccc20ba30caef53b01bee2c0aaa5b855339
CVE-2014-8501 (The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU ...)
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141104-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
- gdb <unfixed> (unimportant)
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e1e19887abd24aeb15066b141cdff5541e0ec8e
CVE-2014-8500 (ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through ...)
@@ -8329,6 +8340,7 @@
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.90.20141104-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: http://lcamtuf.blogspot.com.au/2014/10/psa-dont-run-strings-on-untrusted-files.html
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=493a33860c71cac998f1a56d6d87d6faa801fbaa
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=17510
@@ -8336,6 +8348,7 @@
{DSA-3123-2 DSA-3123-1}
- binutils 2.24.51.20140903-1
- binutils-mingw-w64 <unfixed>
+ [jessie] - binutils-mingw-w64 <no-dsa> (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=17509
NOTE: Upstream commit: https://sourceware.org/git/?p=binutils-gdb.git;a=commit;h=bd25671c6f202c4a5108883caa2adb24ff6f361f
NOTE: http://openwall.com/lists/oss-security/2014/10/23/5
@@ -17708,6 +17721,7 @@
- lzo <removed>
- lzo2 2.08-1 (bug #752861)
- busybox 1:1.22.0-10 (bug #768945)
+ [jessie] - busybox 1:1.22.0-9+deb8u1
[wheezy] - busybox <no-dsa> (Minor issue)
[squeeze] - busybox <no-dsa> (Minor issue)
CVE-2014-4606 (Cross-site scripting (XSS) vulnerability in redirect_to_zeenshare.php ...)
More information about the Secure-testing-commits
mailing list