[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] mariadb/mysql postponed until next micro releases

Moritz Muehlenhoff jmm at debian.org
Mon Apr 9 21:45:39 BST 2018


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f41d7aba by Moritz Muehlenhoff at 2018-04-09T22:45:08+02:00
mariadb/mysql postponed until next micro releases
libraw, add wordpress to dsa-needed
guacamole, nmap, cfitsio no-dsa
jquery, pjproject ignored for jessie

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -161,8 +161,12 @@ CVE-2018-9840
 CVE-2018-9839
 	RESERVED
 CVE-2018-1000166 [Unsafe use of sprintf() can allow a remote unauthenticated attacker to execute arbitrary code]
+	- cfitsio 3.430-1 (low; bug #892458)
+	[stretch] - cfitsio <no-dsa> (Minor issue)
+	[jessie] - cfitsio <no-dsa> (Minor issue)
 	- cfitsio 3.430-1 (bug #892458)
 	NOTE: https://github.com/astropy/astropy/pull/7274
+	NOTE: Mitigated to a crash due to hardened build flags
 CVE-2018-1000164 [Improper neutralization of CRLF Sequences http/wsgi.py:process_headers() can allow an attacker to cause a server to return arbitrary HTTP headers]
 	- gunicorn 19.5.0-1
 	NOTE: https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5
@@ -170,6 +174,8 @@ CVE-2018-1000164 [Improper neutralization of CRLF Sequences http/wsgi.py:process
 	NOTE: https://github.com/benoitc/gunicorn/commit/5263a4ef2a63c62216680876f3813959839608ff
 CVE-2018-1000161 [directory traversal in the way the non-default http-fetch script sanitized URLs]
 	- nmap 7.70+dfsg1-1
+	[stretch] - nmap <no-dsa> (Minor issue)
+	[jessie] - nmap <no-dsa> (Minor issue)
 CVE-2018-1000157
 	REJECTED
 CVE-2018-9838 (The caml_ba_deserialize function in byterun/bigarray.c in the standard ...)
@@ -5977,12 +5983,16 @@ CVE-2017-18200 (The f2fs implementation in the Linux kernel before 4.14 mishandl
 	- linux <not-affected> (Vulnerable code not present)
 CVE-2018-1000099 (Teluu PJSIP version 2.7.1 and earlier contains a Access of ...)
 	- pjproject 2.7.2~dfsg-1
+	[jessie] - pjproject <ignored> (Minor issue)
 	NOTE: http://downloads.asterisk.org/pub/security/AST-2018-003.html
 	NOTE: https://trac.pjsip.org/repos/ticket/2092
+	NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN)
 CVE-2018-1000098 (Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow ...)
 	- pjproject 2.7.2~dfsg-1
+	[jessie] - pjproject <ignored> (Minor issue)
 	NOTE: http://downloads.asterisk.org/pub/security/AST-2018-002.html
 	NOTE: https://trac.pjsip.org/repos/ticket/2093
+	NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN)
 CVE-2018-1000101 (Mingw-w64 version 5.0.3 and earlier contains an Improper Null ...)
 	- mingw-w64 <unfixed> (low)
 	[stretch] - mingw-w64 <no-dsa> (Minor issue)
@@ -10994,16 +11004,22 @@ CVE-2018-5803 [Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp
 CVE-2018-5802 [Out-of-bounds read in kodak_radc_load_raw function internal/dcraw_common.cpp]
 	RESERVED
 	- libraw 0.18.7-1
+	[stretch] - libraw <no-dsa> (Minor issue)
+	[jessie] - libraw <no-dsa> (Minor issue)
 	NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt
 	NOTE: https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
 CVE-2018-5801 [NULL pointer dereference in LibRaw::unpack function src/libraw_cxx.cpp]
 	RESERVED
 	- libraw 0.18.7-1
+	[stretch] - libraw <no-dsa> (Minor issue)
+	[jessie] - libraw <no-dsa> (Minor issue)
 	NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt
 	NOTE: https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
 CVE-2018-5800 [Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function in internal/dcraw_common.cpp]
 	RESERVED
 	- libraw 0.18.7-1
+	[stretch] - libraw <no-dsa> (Minor issue)
+	[jessie] - libraw <no-dsa> (Minor issue)
 	NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt
 	NOTE: https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
 CVE-2018-1000006 (GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, ...)
@@ -11100,6 +11116,7 @@ CVE-2016-10707 (jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due t
 	NOTE: Only 3.0.0-rc1 affected: https://github.com/jquery/jquery/issues/3133#issuecomment-358978489
 CVE-2015-9251 (jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks ...)
 	- jquery 3.1.1-1
+	[jessie] - jquery <ignored> (Too intrusive to backport)
 	[wheezy] - jquery <ignored> (Too invasive to fix)
 	NOTE: https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
 	NOTE: https://github.com/jquery/jquery/issues/2432
@@ -11108,6 +11125,7 @@ CVE-2015-9251 (jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) a
 	NOTE: only 3.0 was fixed upstream, because fix considered too invasive: https://github.com/jquery/jquery/issues/2432#issuecomment-290983196
 CVE-2012-6708 (jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) ...)
 	- jquery 1.11.3+dfsg-1
+	[jessie] - jquery <ignored> (Too intrusive to backport)
 	[wheezy] - jquery <ignored> (Too invasive to fix)
 	NOTE: https://bugs.jquery.com/ticket/11290
 	NOTE: https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
@@ -19050,9 +19068,12 @@ CVE-2018-2767 [Use of SSL/TLS not enforced in client library (Return of BACKRONY
 	RESERVED
 	- mariadb-10.2 <unfixed>
 	- mariadb-10.1 <unfixed>
+	[stretch] - mariadb-10.1 <postponed> (Wait for next upstream security/bugfix release)
 	- mariadb-10.0 <removed>
+	[jessie] - mariadb-10.0 <postponed> (Wait for next upstream security/bugfix release)
 	- mysql-5.7 <unfixed>
 	- mysql-5.5 <removed>
+	[jessie] - mysql-5.5 <postponed> (Wait for next upstream security/bugfix release)
 	NOTE: http://www.openwall.com/lists/oss-security/2018/04/08/2
 	NOTE: Result from an incomplete fix for CVE-2015-3152 and related CVE for
 	NOTE: Oracle products.
@@ -27172,8 +27193,10 @@ CVE-2017-16876 (Cross-site scripting (XSS) vulnerability in the _keyify function
 	NOTE: https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98
 CVE-2017-16875 (An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in ...)
 	- pjproject 2.7.1~dfsg-1
+	[jessie] - pjproject <ignored> (Minor issue)
 	NOTE: https://trac.pjsip.org/repos/ticket/2055
 	NOTE: https://trac.pjsip.org/repos/changeset/5680
+	NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN)
 CVE-2017-16874
 	RESERVED
 CVE-2017-16873 (It is possible to exploit an unsanitized PATH in the suid binary that ...)
@@ -27218,8 +27241,10 @@ CVE-2017-1000161
 	REJECTED
 CVE-2017-16872 (An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in ...)
 	- pjproject 2.7.1~dfsg-1
+	[jessie] - pjproject <ignored> (Minor issue)
 	NOTE: https://trac.pjsip.org/repos/ticket/2056
 	NOTE: https://trac.pjsip.org/repos/changeset/5682
+	NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN)
 CVE-2017-16871 (** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for WordPress ...)
 	NOT-FOR-US: UpdraftPlus plugin for WordPress
 CVE-2017-16870 (** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for WordPress ...)
@@ -69569,6 +69594,8 @@ CVE-2017-3159 (Apache Camel's camel-snakeyaml component is vulnerable to Java ob
 	NOT-FOR-US: Apache Camel
 CVE-2017-3158 (A race condition in Guacamole's terminal emulator in versions 0.9.5 ...)
 	- guacamole-client <unfixed> (bug #891798)
+	[stretch] - guacamole-client <no-dsa> (Minor issue)
+	[jessie] - guacamole-client <no-dsa> (Minor issue)
 	- guacamole <removed>
 	[wheezy] - guacamole <not-affected> (Version not vulnerable)
 CVE-2017-3157 (By exploiting the way Apache OpenOffice before 4.1.4 renders embedded ...)


=====================================
data/dsa-needed.txt
=====================================
--- a/data/dsa-needed.txt
+++ b/data/dsa-needed.txt
@@ -92,6 +92,8 @@ undertow
 --
 vlc (jmm)
 --
+wordpress
+--
 xen/oldstable
 --
 zendframework/oldstable



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f41d7abab40575c86e93f696900add70648b5fc5

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f41d7abab40575c86e93f696900add70648b5fc5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180409/94d61eec/attachment.html>


More information about the debian-security-tracker-commits mailing list