[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Fri Dec 28 08:10:31 GMT 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ebfd5e1e by security tracker role at 2018-12-28T08:10:23Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,45 @@
+CVE-2018-20551 (A reachable Object::getString assertion in Poppler 0.72.0 allows ...)
+	TODO: check
+CVE-2018-20550
+	RESERVED
+CVE-2018-20549 (There is an illegal WRITE memory access at caca/file.c (function ...)
+	TODO: check
+CVE-2018-20548 (There is an illegal WRITE memory access at common-image.c (function ...)
+	TODO: check
+CVE-2018-20547 (There is an illegal READ memory access at caca/dither.c (function ...)
+	TODO: check
+CVE-2018-20546 (There is an illegal READ memory access at caca/dither.c (function ...)
+	TODO: check
+CVE-2018-20545 (There is an illegal WRITE memory access at common-image.c (function ...)
+	TODO: check
+CVE-2018-20544 (There is floating point exception at caca/dither.c (function ...)
+	TODO: check
+CVE-2018-20543 (There is an attempted excessive memory allocation at ...)
+	TODO: check
+CVE-2018-20542 (There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c ...)
+	TODO: check
+CVE-2018-20541 (There is a heap-based buffer overflow in libxsmm_sparse_csc_reader at ...)
+	TODO: check
+CVE-2018-20540 (There is memory leak at liblas::Open (liblas/liblas.hpp) in libLAS ...)
+	TODO: check
+CVE-2018-20539 (There is a Segmentation fault triggered by illegal address access at ...)
+	TODO: check
+CVE-2018-20538 (There is a use-after-free at asm/preproc.c (function pp_getline) in ...)
+	TODO: check
+CVE-2018-20537 (There is a NULL pointer dereference at ...)
+	TODO: check
+CVE-2018-20536 (There is a heap-based buffer over-read at ...)
+	TODO: check
+CVE-2018-20535 (There is a use-after-free at asm/preproc.c (function pp_getline) in ...)
+	TODO: check
+CVE-2018-20534 (There is an illegal address access at src/pool.h (function ...)
+	TODO: check
+CVE-2018-20533 (There is a NULL pointer dereference at ext/testcase.c (function ...)
+	TODO: check
+CVE-2018-20532 (There is a NULL pointer dereference at ext/testcase.c (function ...)
+	TODO: check
+CVE-2018-20531
+	RESERVED
 CVE-2018-20530 (PHP Scripts Mall Website Seller Script 2.0.5 has XSS via a Profile ...)
 	NOT-FOR-US: PHP Scripts Mall Website Seller Script
 CVE-2018-20529



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/ebfd5e1e74175f96dd98491f40af85abc993361e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/ebfd5e1e74175f96dd98491f40af85abc993361e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181228/d06409f7/attachment.html>


More information about the debian-security-tracker-commits mailing list