[Secure-testing-commits] r55764 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Thu Sep 14 15:07:11 UTC 2017
Author: carnil
Date: 2017-09-14 15:07:10 +0000 (Thu, 14 Sep 2017)
New Revision: 55764
Modified:
data/CVE/list
Log:
Add fixing version for liblouis
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-09-14 14:57:42 UTC (rev 55763)
+++ data/CVE/list 2017-09-14 15:07:10 UTC (rev 55764)
@@ -1838,48 +1838,48 @@
- jasper <removed> (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1485274
CVE-2017-13744 (There is an illegal address access in the function _lou_getALine() in ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484338
NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/edf8ee00197e5a9b062554bdca00fe1617d257a4
CVE-2017-13743 (There is a buffer overflow in Liblouis 3.2.0, triggered in the function ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484335
CVE-2017-13742 (There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484334
NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
CVE-2017-13741 (There is a use-after-free in the function compileBrailleIndicator() in ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484332
NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/af5791ea792acc0a9707738001aa1df3daff7a66
CVE-2017-13740 (There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484306
NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
CVE-2017-13739 (There is a heap-based buffer overflow that causes a more than two ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1484299
NOTE: Proposed fix via pull request: https://github.com/liblouis/liblouis/pull/393/commits/d8cfdf1ab64a4c9c6685efe45bc735f68dac618c
CVE-2017-13738 (There is an illegal address access in the _lou_getALine function in ...)
- - liblouis <unfixed> (low; bug #874302)
+ - liblouis 3.3.0-1 (low; bug #874302)
[stretch] - liblouis <no-dsa> (Minor issue)
[jessie] - liblouis <no-dsa> (Minor issue)
[wheezy] - liblouis <no-dsa> (Minor issue)
More information about the Secure-testing-commits
mailing list