[Secure-testing-commits] r55444 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Sep 4 20:14:10 UTC 2017


Author: carnil
Date: 2017-09-04 20:14:10 +0000 (Mon, 04 Sep 2017)
New Revision: 55444

Modified:
   data/CVE/list
Log:
Add bug reference for liblouis, #874302

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-09-04 20:03:28 UTC (rev 55443)
+++ data/CVE/list	2017-09-04 20:14:10 UTC (rev 55444)
@@ -912,48 +912,48 @@
 	- jasper <removed> (unimportant)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1485274
 CVE-2017-13744 (There is an illegal address access in the function _lou_getALine() in ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484338
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/edf8ee00197e5a9b062554bdca00fe1617d257a4
 CVE-2017-13743 (There is a buffer overflow in Liblouis 3.2.0, triggered in the function ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484335
 CVE-2017-13742 (There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484334
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
 CVE-2017-13741 (There is a use-after-free in the function compileBrailleIndicator() in ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484332
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/af5791ea792acc0a9707738001aa1df3daff7a66
 CVE-2017-13740 (There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484306
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
 CVE-2017-13739 (There is a heap-based buffer overflow that causes a more than two ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484299
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
 CVE-2017-13738 (There is an illegal address access in the _lou_getALine function in ...)
-	- liblouis <unfixed> (low)
+	- liblouis <unfixed> (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)




More information about the Secure-testing-commits mailing list