[Secure-testing-commits] r55764 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Sep 14 15:07:11 UTC 2017


Author: carnil
Date: 2017-09-14 15:07:10 +0000 (Thu, 14 Sep 2017)
New Revision: 55764

Modified:
   data/CVE/list
Log:
Add fixing version for liblouis

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-09-14 14:57:42 UTC (rev 55763)
+++ data/CVE/list	2017-09-14 15:07:10 UTC (rev 55764)
@@ -1838,48 +1838,48 @@
 	- jasper <removed> (unimportant)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1485274
 CVE-2017-13744 (There is an illegal address access in the function _lou_getALine() in ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484338
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/edf8ee00197e5a9b062554bdca00fe1617d257a4
 CVE-2017-13743 (There is a buffer overflow in Liblouis 3.2.0, triggered in the function ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484335
 CVE-2017-13742 (There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484334
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
 CVE-2017-13741 (There is a use-after-free in the function compileBrailleIndicator() in ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484332
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/af5791ea792acc0a9707738001aa1df3daff7a66
 CVE-2017-13740 (There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484306
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
 CVE-2017-13739 (There is a heap-based buffer overflow that causes a more than two ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484299
 	NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
 CVE-2017-13738 (There is an illegal address access in the _lou_getALine function in ...)
-	- liblouis <unfixed> (low; bug #874302)
+	- liblouis 3.3.0-1 (low; bug #874302)
 	[stretch] - liblouis <no-dsa> (Minor issue)
 	[jessie] - liblouis <no-dsa> (Minor issue)
 	[wheezy] - liblouis <no-dsa> (Minor issue)




More information about the Secure-testing-commits mailing list