[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Open issues in sam2p/Jessie will be fixed via point update.

Markus Koschany apo at debian.org
Fri Apr 6 22:59:34 BST 2018


Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6af5effc by Markus Koschany at 2018-04-06T23:59:08+02:00
Open issues in sam2p/Jessie will be fixed via point update.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -5513,22 +5513,18 @@ CVE-2018-7555
 CVE-2018-7554 (There is an invalid free in ReadImage in input-bmp.ci that leads to a ...)
 	{DLA-1340-1}
 	- sam2p <removed>
-	[jessie] - sam2p <ignored> (Consider removal in next point release)
 	NOTE: https://github.com/pts/sam2p/issues/29
 CVE-2018-7553 (There is a heap-based buffer overflow in the pcxLoadRaster function of ...)
 	{DLA-1340-1}
 	- sam2p <removed>
-	[jessie] - sam2p <ignored> (Consider removal in next point release)
 	NOTE: https://github.com/pts/sam2p/issues/32
 CVE-2018-7552 (There is an invalid free in Mapping::DoubleHash::clear in mapping.cpp ...)
 	{DLA-1340-1}
 	- sam2p <removed>
-	[jessie] - sam2p <ignored> (Consider removal in next point release)
 	NOTE: https://github.com/pts/sam2p/issues/30
 CVE-2018-7551 (There is an invalid free in MiniPS::delete0 in minips.cpp that leads to ...)
 	{DLA-1340-1}
 	- sam2p <removed>
-	[jessie] - sam2p <ignored> (Consider removal in next point release)
 	NOTE: https://github.com/pts/sam2p/issues/28
 CVE-2018-7550 (The load_multiboot function in hw/i386/multiboot.c in Quick Emulator ...)
 	- qemu <unfixed> (bug #892041)
@@ -5740,7 +5736,6 @@ CVE-2018-7488
 CVE-2018-7487 (There is a heap-based buffer overflow in the LoadPCX function of ...)
 	{DLA-1340-1}
 	- sam2p <removed>
-	[jessie] - sam2p <ignored> (Consider removal in next point release)
 	NOTE: https://github.com/pts/sam2p/issues/18
 CVE-2018-7486 (Blue River Mura CMS before v7.0.7029 supports inline function calls ...)
 	NOT-FOR-US: Blue River Mura CMS



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6af5effc3ef3e5a8e15f811a82f23b96849f2e54

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6af5effc3ef3e5a8e15f811a82f23b96849f2e54
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180406/aa53986f/attachment.html>


More information about the debian-security-tracker-commits mailing list