[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] puppet modules unimportant
Moritz Muehlenhoff
jmm at debian.org
Tue Apr 3 21:21:55 BST 2018
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3567c990 by Moritz Muehlenhoff at 2018-04-03T22:21:29+02:00
puppet modules unimportant
add libslf4j-java to dsa-needed
libzypp ignored
radare, gpac, leptonlib no-dsa
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1029,14 +1029,20 @@ CVE-2018-8811 (Cross-site request forgery (CSRF) vulnerability in ...)
NOT-FOR-US: OpenCMS
CVE-2018-8810 (In radare2 2.4.0, there is a heap-based buffer over-read in the ...)
- radare2 <unfixed>
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
[wheezy] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/issues/9727
CVE-2018-8809 (In radare2 2.4.0, there is a heap-based buffer over-read in the ...)
- - radare2 <unfixed>
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
[wheezy] - radare2 <no-dsa> (minor issue, likely not even affected)
NOTE: https://github.com/radare/radare2/issues/9726
CVE-2018-8808 (In radare2 2.4.0, there is a heap-based buffer over-read in the ...)
- - radare2 <unfixed>
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
[wheezy] - radare2 <no-dsa> (minor issue, likely not even affected)
NOTE: https://github.com/radare/radare2/issues/9725
CVE-2018-8807 (In libming 0.4.8, these is a use-after-free in the function ...)
@@ -3575,6 +3581,8 @@ CVE-2018-7719 (Acrolinx Server before 5.2.5 on Windows allows Directory Traversa
NOT-FOR-US: Acrolinx Server
CVE-2018-7752 (GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps ...)
- gpac <unfixed> (bug #892526)
+ [stretch] - gpac <no-dsa> (Minor issue)
+ [jessie] - gpac <no-dsa> (Minor issue)
[wheezy] - gpac <not-affected> (vulnerable code not present)
NOTE: https://github.com/gpac/gpac/issues/997
NOTE: https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4
@@ -5470,7 +5478,9 @@ CVE-2017-18190 (A localhost.localdomain whitelist entry in valid_host() in ...)
NOTE: https://github.com/apple/cups/commit/afa80cb2b457bf8d64f775bed307588610476c41 (v2.2.2)
CVE-2018-7186 (Leptonica before 1.75.3 does not limit the number of characters in a %s ...)
{DLA-1302-1}
- - leptonlib 1.75.3-2 (bug #890548)
+ - leptonlib 1.75.3-2 (low; bug #890548)
+ [stretch] - leptonlib <no-dsa> (Minor issue)
+ [jessie] - leptonlib <no-dsa> (Minor issue)
NOTE: https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a
CVE-2018-7180 (SQL Injection exists in the Saxum Astro 4.0.14 component for Joomla! ...)
NOT-FOR-US: Saxum Astro component for Joomla!
@@ -7368,9 +7378,9 @@ CVE-2018-6510
CVE-2018-6509
RESERVED
CVE-2018-6508 (Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a ...)
- - puppet-module-puppetlabs-apt <unfixed>
- - puppet-module-puppetlabs-apache <unfixed>
- - puppet-module-puppetlabs-mysql <unfixed>
+ - puppet-module-puppetlabs-apt <unfixed> (unimportant)
+ - puppet-module-puppetlabs-apache <unfixed> (unimportant)
+ - puppet-module-puppetlabs-mysql <unfixed> (unimportant)
NOTE: https://puppet.com/security/cve/CVE-2018-6508
NOTE: Issue in various puppet modules: facter_task, puppet_conf, apt, apache and mysql modules
NOTE: https://github.com/puppetlabs/puppetlabs-facter_task/commit/dd37c72e78c8a37e671e20becb05d6ceafdbd81c
@@ -7378,6 +7388,7 @@ CVE-2018-6508 (Puppet Enterprise 2017.3.x prior to 2017.3.3 are vulnerable to a
NOTE: https://github.com/puppetlabs/puppetlabs-apt/commit/81879be960d5723016e3d0b4ff155ee704261bbc
NOTE: https://github.com/puppetlabs/puppetlabs-apache/commit/81bc5119ceced1faa4bf261efa4b7cd3731ef3ef
NOTE: https://github.com/puppetlabs/puppetlabs-mysql/commit/da3684c79d5fe6ece826e087e8693c75ac40414c
+ NOTE: This is only exploitable with Puppet Tasks, which aren't packaged/available in Debian
CVE-2018-6507
RESERVED
CVE-2018-6506 (Cross-Site Scripting (XSS) exists in the Add Forum feature in the ...)
@@ -14096,12 +14107,16 @@ CVE-2018-3837
RESERVED
CVE-2018-7442 (An issue was discovered in Leptonica through 1.75.3. The ...)
- leptonlib <unfixed>
+ [stretch] - leptonlib <no-dsa> (Minor issue)
+ [jessie] - leptonlib <no-dsa> (Minor issue)
NOTE: https://lists.debian.org/debian-lts/2018/02/msg00086.html
CVE-2018-7441 (Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might ...)
- - leptonlib <unfixed>
+ - leptonlib <unfixed> (unimportant)
NOTE: https://lists.debian.org/debian-lts/2018/02/msg00054.html
+ NOTE: Neutralised by kernel hardening
CVE-2017-18196 (Leptonica 1.74.4 constructs unintended pathnames (containing duplicated ...)
- - leptonlib 1.74.4-2 (bug #885704)
+ - leptonlib 1.74.4-2 (low; bug #885704)
+ [stretch] - leptonlib <no-dsa> (Minor issue)
[jessie] - leptonlib <not-affected> (Vulnerable code not present)
[wheezy] - leptonlib <not-affected> (Vulnerable code not present)
CVE-2018-7440 (An issue was discovered in Leptonica through 1.75.3. The ...)
@@ -14115,6 +14130,8 @@ CVE-2018-3836 [gplotMakeOutput Command Injection Vulnerability]
RESERVED
{DLA-1284-1}
- leptonlib 1.75.3-1 (bug #889759)
+ [stretch] - leptonlib <no-dsa> (Minor issue)
+ [jessie] - leptonlib <no-dsa> (Minor issue)
NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516
NOTE: https://github.com/DanBloomberg/leptonica/issues/303
NOTE: When fixing this issue make sure the fix is complete and includes as well
@@ -48538,6 +48555,7 @@ CVE-2017-9270 (In cryptctl before version 2.0 a malicious server could send RPC
NOT-FOR-US: SuSE cryptctl
CVE-2017-9269 (In libzypp before August 2018 GPG keys attached to YUM repositories ...)
- libzypp <unfixed>
+ [jessie] - libzypp <ignored> (Minor issue)
CVE-2017-9268 (In the open build service before 201707022 the wipetrigger and rebuild ...)
- open-build-service <unfixed> (low)
[stretch] - open-build-service <no-dsa> (Minor issue)
@@ -54539,8 +54557,10 @@ CVE-2017-7437 (NetIQ Privileged Account Manager before 3.1 Patch Update 3 allowe
NOT-FOR-US: NetIQ Privileged Account Manager
CVE-2017-7436 (In libzypp before 20170803 it was possible to retrieve unsigned ...)
- libzypp <unfixed>
+ [jessie] - libzypp <ignored> (Minor issue)
CVE-2017-7435 (In libzypp before 20170803 it was possible to add unsigned YUM ...)
- libzypp <unfixed>
+ [jessie] - libzypp <ignored> (Minor issue)
CVE-2017-7434 (In the JDBC driver of NetIQ Identity Manager before 4.6 sending out ...)
NOT-FOR-US: NetIQ Identity Manager
CVE-2017-7433 (An absolute path traversal vulnerability (CWE-36) in Micro Focus Vibe ...)
=====================================
data/dsa-needed.txt
=====================================
--- a/data/dsa-needed.txt
+++ b/data/dsa-needed.txt
@@ -41,6 +41,8 @@ libav/oldstable
--
libidn
--
+libslf4j-java
+--
libmad
--
linux
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3567c990ffdf55a77d5f27b01ab1dee266ece832
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/3567c990ffdf55a77d5f27b01ab1dee266ece832
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180403/2aa6416f/attachment.html>
More information about the debian-security-tracker-commits
mailing list