[Secure-testing-commits] r56997 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Oct 26 17:26:32 UTC 2017


Author: jmm
Date: 2017-10-26 17:26:32 +0000 (Thu, 26 Oct 2017)
New Revision: 56997

Modified:
   data/CVE/list
Log:
ffmpeg upstream reference (checked with upstream)
unrar-free, libsdl no-dsa


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-10-26 16:53:48 UTC (rev 56996)
+++ data/CVE/list	2017-10-26 17:26:32 UTC (rev 56997)
@@ -1711,9 +1711,10 @@
 	NOTE: https://github.com/Cacti/cacti/commit/93f661d8adcfa6618b11522cdab30e97bada33fd
 	NOTE: https://github.com/Cacti/cacti/commit/4f87256e63859117f81d2a2bd40c9c730e39b65d
 CVE-2017-15186 (Double free vulnerability in FFmpeg 3.3.4 and earlier allows remote ...)
-	- ffmpeg <undetermined>
+	- ffmpeg <unfixed>
+	- libav <undetermined>
 	NOTE: http://www.openwall.com/lists/oss-security/2017/10/20/4
-	TODO: check
+	NOTE: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/df62b70de8aaa285168e72fe8f6e740843ca91fa
 CVE-2017-15185 (plugins/ogg.c in Libmp3splt 0.9.2 calls the libvorbis ...)
 	- mp3splt 2.6.2+20170630-2
 	[jessie] - mp3splt <not-affected> (Vulnerable code not present)
@@ -4830,6 +4831,8 @@
 CVE-2017-14120 (unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory ...)
 	{DLA-1091-1}
 	- unrar-free 1:0.0.1+cvs20140707-2 (bug #874059)
+	[stretch] - unrar-free <no-dsa> (Minor issue)
+	[jessie] - unrar-free <no-dsa> (Minor issue)
 	NOTE: http://www.openwall.com/lists/oss-security/2017/08/20/1
 	NOTE: Proposed patch: https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=874059;filename=874059.diff.txt;msg=29
 CVE-2017-14119 (In the EyesOfNetwork web interface (aka eonweb) 5.1-0, ...)
@@ -38697,6 +38700,8 @@
 	RESERVED
 CVE-2017-2888 (An exploitable integer overflow vulnerability exists when creating a ...)
 	- libsdl2 2.0.6+dfsg1-4 (bug #878264)
+	[stretch] - libsdl2 <no-dsa> (Minor issue)
+	[jessie] - libsdl2 <no-dsa> (Minor issue)
 	- libsdl1.2 <not-affected> (Issue not present, SDL_CreateRGBSurface contains further check for too large width or height)
 	NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0395
 	NOTE: https://hg.libsdl.org/SDL/rev/7e0f1498ddb5




More information about the Secure-testing-commits mailing list