[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Thu Dec 20 08:10:23 GMT 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b8366e2a by security tracker role at 2018-12-20T08:10:15Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,21 @@
+CVE-2018-20307
+	RESERVED
+CVE-2018-20306
+	RESERVED
+CVE-2018-20305 (D-Link DIR-816 A2 1.10 B05 devices allow arbitrary remote code ...)
+	TODO: check
+CVE-2018-20304 (wbook_addworksheet in workbook.c in libexcel.a in libexcel 0.01 allows ...)
+	TODO: check
+CVE-2018-20303 (In pkg/tool/path.go in Gogs before 0.11.82.1218, a directory traversal ...)
+	TODO: check
+CVE-2018-20302 (An XSS issue was discovered in Steve Pallen Xain before 0.6.2 via the ...)
+	TODO: check
+CVE-2018-20301
+	RESERVED
+CVE-2018-20300 (Empire CMS 7.5 allows remote attackers to execute arbitrary PHP code ...)
+	TODO: check
+CVE-2018-20299 (An issue was discovered in several Bosch Smart Home cameras (360 degree ...)
+	TODO: check
 CVE-2019-3408
 	RESERVED
 CVE-2019-3407
@@ -18133,14 +18151,14 @@ CVE-2018-15803
 	RESERVED
 CVE-2018-15802
 	RESERVED
-CVE-2018-15801
-	RESERVED
+CVE-2018-15801 (Spring Security versions 5.1.x prior to 5.1.2 contain an authorization ...)
+	TODO: check
 CVE-2018-15800 (Cloud Foundry Bits Service, versions prior to 2.18.0, includes an ...)
 	TODO: check
 CVE-2018-15799
 	RESERVED
-CVE-2018-15798
-	RESERVED
+CVE-2018-15798 (Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow ...)
+	TODO: check
 CVE-2018-15797 (Cloud Foundry NFS volume release, 1.2.x prior to 1.2.5, 1.5.x prior to ...)
 	NOT-FOR-US: Cloud Foundry
 CVE-2018-15796 (Cloud Foundry Bits Service Release, versions prior to 2.14.0, uses an ...)
@@ -18229,7 +18247,7 @@ CVE-2018-15756 (Spring Framework, version 5.1, versions 5.0.x prior to 5.0.10, .
 	NOTE: https://pivotal.io/security/cve-2018-15756
 CVE-2018-15755 (Cloud Foundry CF Networking Release, versions 2.11.0 prior to 2.16.0, ...)
 	NOT-FOR-US: Cloud Foundry
-CVE-2018-15754 (Cloud Foundry UAA, all versions in v60.x, v61.x, v62.x, v63.x, and ...)
+CVE-2018-15754 (Cloud Foundry UAA, versions 60 prior to 66.0, contain an authorization ...)
 	TODO: check
 CVE-2018-15753 (An issue was discovered in the MensaMax (aka com.breustedt.mensamax) ...)
 	NOT-FOR-US: MensaMax application for Android
@@ -28388,8 +28406,7 @@ CVE-2018-11801
 	RESERVED
 CVE-2018-11800
 	RESERVED
-CVE-2018-11799
-	RESERVED
+CVE-2018-11799 (Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 ...)
 	NOT-FOR-US: Apache Oozie
 CVE-2018-11798
 	RESERVED
@@ -46621,7 +46638,7 @@ CVE-2018-5409
 CVE-2018-5408
 	RESERVED
 CVE-2018-5407 (Simultaneous Multi-threading (SMT) in processors can enable local ...)
-	{DSA-4348-1 DLA-1586-1}
+	{DSA-4355-1 DSA-4348-1 DLA-1586-1}
 	- openssl 1.1.1~~pre9-1
 	- openssl1.0 1.0.2q-1
 	NOTE: https://www.openssl.org/news/secadv/20181112.txt
@@ -60786,7 +60803,7 @@ CVE-2018-0739 (Constructed ASN.1 types with a recursive definition (such as can
 CVE-2018-0738
 	RESERVED
 CVE-2018-0737 (The OpenSSL RSA Key generation algorithm has been shown to be ...)
-	{DSA-4348-1 DLA-1449-1}
+	{DSA-4355-1 DSA-4348-1 DLA-1449-1}
 	- openssl 1.1.0h-3 (low; bug #895844)
 	[wheezy] - openssl <postponed> (Can wait for next update)
 	- openssl1.0 1.0.2q-1 (low; bug #895845)
@@ -60804,7 +60821,7 @@ CVE-2018-0735 (The OpenSSL ECDSA signature algorithm has been shown to be vulner
 	NOTE: OpenSSL_1_1_1-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4
 	NOTE: OpenSSL_1_1_0-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=56fb454d281a023b3f950d969693553d3f3ceea1
 CVE-2018-0734 (The OpenSSL DSA signature algorithm has been shown to be vulnerable to ...)
-	{DSA-4348-1}
+	{DSA-4355-1 DSA-4348-1}
 	- openssl 1.1.1a-1
 	[jessie] - openssl <postponed> (vulnerable code not present, but see note below)
 	- openssl1.0 1.0.2q-1
@@ -60826,7 +60843,7 @@ CVE-2018-0733 (Because of an implementation bug the PA-RISC CRYPTO_memcmp functi
 	NOTE: Issue specific to HP-UX
 	NOTE: https://www.openssl.org/news/secadv/20180327.txt
 CVE-2018-0732 (During key agreement in a TLS handshake using a DH(E) based ...)
-	{DSA-4348-1 DLA-1449-1}
+	{DSA-4355-1 DSA-4348-1 DLA-1449-1}
 	- openssl 1.1.1-1 (low)
 	- openssl1.0 1.0.2q-1 (low)
 	NOTE: OpenSSL_1_1_0-stable: https://git.openssl.org/?p=openssl.git;a=commit;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
@@ -97675,11 +97692,13 @@ CVE-2016-10192 (Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10
 	NOTE: Patch: https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/12
 CVE-2016-10191 (Heap-based buffer overflow in libavformat/rtmppkt.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:3.2.2-1
 	- libav <removed>
 	NOTE: Patch: https://github.com/FFmpeg/FFmpeg/commit/7d57ca4d9a75562fa32e40766211de150f8b3ee7
 	NOTE: http://www.openwall.com/lists/oss-security/2017/01/31/12
 CVE-2016-10190 (Heap-based buffer overflow in libavformat/http.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:3.2.2-1
 	- libav <removed>
 	NOTE: Patch: https://github.com/FFmpeg/FFmpeg/commit/2a05c8f813de6f2278827734bf8102291e7484aa
@@ -141053,18 +141072,21 @@ CVE-2015-8664 (Integer overflow in the WebCursor::Deserialize function in ...)
 	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
 	[squeeze] - chromium-browser <end-of-life> (Not supported in Squeeze LTS)
 CVE-2015-8663 (The ff_get_buffer function in libavcodec/utils.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.4-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commit;h=abee0a1c60612e8638640a8a3738fffb65e16dbf
 	NOTE: For libav in jessie the patch needs to applied in libavcodec/decode.c in line 1884.
 CVE-2015-8662 (The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.4-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	[wheezy] - libav <not-affected> (Vulnerable code not present)
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commit;h=75422280fbcdfbe9dc56bde5525b4d8b280f1bc5
 CVE-2015-8661 (The h264_slice_header_init function in libavcodec/h264_slice.c in ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.3-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
@@ -144867,11 +144889,13 @@ CVE-2015-8365 (The smka_decode_frame function in libavcodec/smacker.c in FFmpeg
 	NOTE: fix for the libav 11.9 branch: https://git.libav.org/?p=libav.git;a=commit;h=v11.9-5-g88762a0
 	NOTE: fix for the libav 0.8 branch: https://git.libav.org/?p=libav.git;a=commit;h=9fba59f471725e5235d5378e795ebf8b59472817
 CVE-2015-8364 (Integer overflow in the ff_ivi_init_planes function in ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.3-1 (bug #806519)
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commit;h=df91aa034b82b77a3c4e01791f4a2b2ff6c82066
 CVE-2015-8363 (The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.3-1 (bug #806519)
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
@@ -145342,6 +145366,7 @@ CVE-2015-8218 (The decode_uncompressed function in libavcodec/faxcompr.c in FFmp
 	NOTE: in libav 0.8 and 9. branches: https://lists.debian.org/debian-lts/2017/12/msg00011.html
 	NOTE: 11.x features G3 support, but the vulnerable code was introduced later
 CVE-2015-8217 (The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.2-1
 	[squeeze] - ffmpeg <not-affected> (Vulnerable code not present)
 	- libav <undetermined>
@@ -145349,6 +145374,7 @@ CVE-2015-8217 (The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in FFmpeg
 	[wheezy] - libav <not-affected> (Vulnerable code not present)
 	NOTE: https://git.videolan.org/?p=ffmpeg.git;a=commit;h=93f30f825c08477fe8f76be00539e96014cc83c8
 CVE-2015-8216 (The ljpeg_decode_yuv_scan function in libavcodec/mjpegdec.c in FFmpeg ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.8.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
@@ -149278,37 +149304,44 @@ CVE-2015-6828 (The tweet_info function in class/__functions.php in the SecureMoz
 CVE-2015-6827 (Cross-site request forgery (CSRF) vulnerability in Auto-Exchanger ...)
 	NOT-FOR-US: Auto-Exchanger
 CVE-2015-6826 (The ff_rv34_decode_init_thread_copy function in libavcodec/rv34.c in ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3197c0aa87a3b7190e17d49e6fbc7b554e4b3f0a
 CVE-2015-6825 (The ff_frame_thread_init function in libavcodec/pthread_frame.c in ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	[wheezy] - libav <not-affected> (Vulnerable code not present)
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=f1a38264f20382731cf2cc75fdd98f4c9a84a626
 CVE-2015-6824 (The sws_init_context function in libswscale/utils.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=39bbdebb1ed8eb9c9b0cd6db85afde6ba89d86e4
 CVE-2015-6823 (The allocate_buffers function in libavcodec/alac.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=39bbdebb1ed8eb9c9b0cd6db85afde6ba89d86e4
 CVE-2015-6822 (The destroy_buffers function in libavcodec/sanm.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=39bbdebb1ed8eb9c9b0cd6db85afde6ba89d86e4
 CVE-2015-6821 (The ff_mpv_common_init function in libavcodec/mpegvideo.c in FFmpeg ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
 	NOTE: http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=b160fc290cf49b516c5b6ee0730fd9da7fc623b1
 CVE-2015-6820 (The ff_sbr_apply function in libavcodec/aacsbr.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
@@ -149318,6 +149351,7 @@ CVE-2015-6819 (Multiple integer underflows in the ff_mjpeg_decode_frame function
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <not-affected> (Vulnerable code not present in any Libav version)
 CVE-2015-6818 (The decode_ihdr_chunk function in libavcodec/pngdec.c in FFmpeg before ...)
+	{DLA-1611-1}
 	- ffmpeg 7:2.7.2-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
@@ -149634,7 +149668,7 @@ CVE-2015-6762 (The CSSFontFaceSrcValue::fetch function in ...)
 	[wheezy] - chromium-browser <end-of-life>
 	[squeeze] - chromium-browser <end-of-life>
 CVE-2015-6761 (The update_dimensions function in libavcodec/vp8.c in FFmpeg through ...)
-	{DSA-3376-1}
+	{DSA-3376-1 DLA-1611-1}
 	- ffmpeg 7:2.8.1-1
 	[squeeze] - ffmpeg <end-of-life> (Not supported in Squeeze LTS)
 	- libav <removed>
@@ -169672,6 +169706,7 @@ CVE-2014-9318 (The raw_decode function in libavcodec/rawdec.c in FFMpeg before 2
 	[squeeze] - ffmpeg <not-affected> (Vulnerable code not present)
 	NOTE: ffmpeg: http://git.videolan.org/?p=ffmpeg.git;a=commit;h=1d3a3b9f8907625b361420d48fe05716859620ff
 CVE-2014-9317 (The decode_ihdr_chunk function in libavcodec/pngdec.c in FFMpeg before ...)
+	{DLA-1611-1}
 	- libav <removed>
 	- ffmpeg 2.4.4-1
 	[squeeze] - ffmpeg <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b8366e2a1f61343202301926e72c5cab58c09825

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/b8366e2a1f61343202301926e72c5cab58c09825
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181220/368eb75b/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list