[Secure-testing-commits] r54686 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Sat Aug 12 16:08:48 UTC 2017


Author: jmm
Date: 2017-08-12 16:08:47 +0000 (Sat, 12 Aug 2017)
New Revision: 54686

Modified:
   data/CVE/list
Log:
curl fixed
libapache2-mod-auth-mellon, libapache2-mod-auth-openidc no-dsa


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-08-12 15:58:45 UTC (rev 54685)
+++ data/CVE/list	2017-08-12 16:08:47 UTC (rev 54686)
@@ -333,15 +333,15 @@
 CVE-2017-12694
 	RESERVED
 CVE-2017-1000101 [URL globbing out of bounds read]
-	- curl <unfixed> (bug #871554)
+	- curl 7.55.0-1 (bug #871554)
 	NOTE: https://curl.haxx.se/docs/adv_20170809A.html
 	NOTE: https://curl.haxx.se/CVE-2017-1000101.patch
 CVE-2017-1000100 [TFTP sends more than buffer size]
-	- curl <unfixed> (bug #871555)
+	- curl 7.55.0-1 (bug #871555)
 	NOTE: https://curl.haxx.se/docs/adv_20170809B.html
 	NOTE: https://curl.haxx.se/CVE-2017-1000100.patch
 CVE-2017-1000099 [FILE buffer read out of bounds]
-	- curl <not-affected> (Only affects 7.54.1)
+	- curl <not-affected> (Only affects 7.54.1, no affected version ever in the archive)
 	NOTE: https://curl.haxx.se/docs/adv_20170809C.html
 	NOTE: https://curl.haxx.se/CVE-2017-1000099.patch
 	NOTE: Introduced by: https://github.com/curl/curl/commit/7c312f84ea930d8
@@ -17110,6 +17110,7 @@
 	NOT-FOR-US: MaNGOSWebV4
 CVE-2017-6807 (mod_auth_mellon before 0.13.1 is vulnerable to a Cross-Site Session ...)
 	- libapache2-mod-auth-mellon 0.12.0-2
+	[jessie] - libapache2-mod-auth-mellon <no-dsa> (Minor issue)
 CVE-2017-6806
 	RESERVED
 CVE-2017-6805 (Directory traversal vulnerability in the TFTP server in MobaXterm ...)
@@ -18344,6 +18345,7 @@
 	NOTE: Fixed by: https://cgit.freedesktop.org/spice/libcacard/commit/?id=9113dc6a303604a2d9812ac70c17d076ef11886c
 CVE-2017-6413 (The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...)
 	- libapache2-mod-auth-openidc 2.1.6-1
+	[jessie] - libapache2-mod-auth-openidc <no-dsa> (Minor issue)
 	NOTE: https://github.com/pingidentity/mod_auth_openidc/commit/21e3728a825c41ab41efa75e664108051bb9665e
 CVE-2017-6412 (In Sophos Web Appliance (SWA) before 4.3.1.2, Session Fixation could ...)
 	NOT-FOR-US: Sophos
@@ -19895,6 +19897,7 @@
 	[wheezy] - gnome-keyring <no-dsa> (Minor issue)
 CVE-2017-6059 (Mod_auth_openidc.c in the Ping Identity OpenID Connect authentication ...)
 	- libapache2-mod-auth-openidc 2.1.5-1
+	[jessie] - libapache2-mod-auth-openidc <no-dsa> (Minor issue)
 	NOTE: https://github.com/pingidentity/mod_auth_openidc/issues/212
 CVE-2017-6062 (The "OpenID Connect Relying Party and OAuth 2.0 Resource Server" (aka ...)
 	- libapache2-mod-auth-openidc 2.1.5-1




More information about the Secure-testing-commits mailing list