[Secure-testing-commits] r31191 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Jan 8 06:30:03 UTC 2015


Author: jmm
Date: 2015-01-08 06:30:03 +0000 (Thu, 08 Jan 2015)
New Revision: 31191

Modified:
   data/CVE/list
Log:
track kernel fix for AMD CPU erratum instead of unclear amd64-microcode
arc no-dsa
cabextract fixed nby moving to system-copy of mspack
solr n/a


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-01-08 05:31:58 UTC (rev 31190)
+++ data/CVE/list	2015-01-08 06:30:03 UTC (rev 31191)
@@ -331,6 +331,7 @@
 	[squeeze] - zoo <no-dsa> (Minor issue)
 CVE-2015-XXXX [buffer over-read]
 	- arc <unfixed> (low; bug #774439)
+	[jessie] - arc <no-dsa> (Minor issue)
 	[wheezy] - arc <no-dsa> (Minor issue)
 	[squeeze] - arc <no-dsa> (Minor issue)
 CVE-2015-0557 [directory traversal via //multiple/leading/slash]
@@ -418,7 +419,7 @@
 	NOTE: Plain bug, security implications rather far-fetched
 CVE-2014-9556 [DoS; infinite loop]
 	- libmspack 0.4-2 (bug #773041)
-	- cabextract <unfixed> (bug #772891)
+	- cabextract 1.4-5 (bug #772891)
 	[wheezy] - cabextract <no-dsa> (Minor issue)
 	[squeeze] - cabextract <no-dsa> (Minor issue)
 CVE-2012-6685 [ruby-nokogiri XXE]
@@ -15632,8 +15633,8 @@
 	NOTE: https://issues.apache.org/jira/secure/attachment/12680198/QPID-6218.patch
 CVE-2014-3628 [Cross-site scripting (XSS) vulnerability via the fieldvaluecache object]
 	RESERVED
-	- lucene-solr <unfixed>
-	TODO: check, search for more details
+	- lucene-solr <not-affected> (Only affects later 4.x releases)
+	NOTE: https://issues.apache.org/jira/browse/SOLR-6738
 CVE-2014-3627 (The YARN NodeManager daemon in Apache Hadoop 0.23.0 through 0.23.11 ...)
 	NOT-FOR-US: Apache Hadoop
 CVE-2014-3626
@@ -26630,10 +26631,11 @@
 CVE-2012-6608 (Cross-site scripting (XSS) vulnerability in xmlservices/E_book.php in ...)
 	NOT-FOR-US: Elastix
 CVE-2013-6885 (The microcode on AMD 16h 00h through 0Fh processors does not properly ...)
-	- amd64-microcode <unfixed>
-	[wheezy] - amd64-microcode <no-dsa> (Non-free not supported)
-	NOTE: Workaround in Linux via https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=3b56496865f9f7d9bcb2f93b44c63f274f08e3b6 (v3.14-rc1)
-	NOTE: http://www.openwall.com/lists/oss-security/2013/11/28/1
+	- linux 3.14.2-1
+	- linux-2.6 <removed>
+	NOTE: https://lkml.org/lkml/2014/1/14/198
+	NOTE: Might also be fixed in amd64-microcode, but details are not published (https://packages.qa.debian.org/a/amd64-microcode/news/20141218T224849Z.html)
+	NOTE: and since this is fixed on the kernel-side, only track the kernel packages
 CVE-2013-6857
 	RESERVED
 CVE-2013-6856




More information about the Secure-testing-commits mailing list