[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Wed Feb 7 09:10:26 UTC 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
87baaf23 by security tracker role at 2018-02-07T09:10:17+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1,8 +1,101 @@
-CVE-2018-6767 [wavpack: stack buffer overflow via crafted wav file]
+CVE-2018-6807
+	RESERVED
+CVE-2018-6806 (Marked 2 through 2.5.11 allows remote attackers to read arbitrary files ...)
+	TODO: check
+CVE-2018-6805
+	RESERVED
+CVE-2018-6804
+	RESERVED
+CVE-2018-6803
+	RESERVED
+CVE-2018-6802
+	RESERVED
+CVE-2018-6801
+	RESERVED
+CVE-2018-6800
+	RESERVED
+CVE-2018-6799 (The AcquireCacheNexus function in magick/pixel_cache.c in ...)
+	TODO: check
+CVE-2018-6798
+	RESERVED
+CVE-2018-6797
+	RESERVED
+CVE-2018-6796
+	RESERVED
+CVE-2018-6795
+	RESERVED
+CVE-2018-6794 (Suricata before 4.1 is prone to an HTTP detection bypass vulnerability ...)
+	TODO: check
+CVE-2018-6793
+	RESERVED
+CVE-2018-6792 (Multiple SQL injection vulnerabilities in Saifor CVMS HUB 1.3.1 allow ...)
+	TODO: check
+CVE-2018-6791 (An issue was discovered in soliduiserver/deviceserviceaction.cpp in KDE ...)
+	TODO: check
+CVE-2018-6790 (An issue was discovered in KDE Plasma Workspace before 5.12.0. ...)
+	TODO: check
+CVE-2018-6789
+	RESERVED
+CVE-2018-6788 (In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows ...)
+	TODO: check
+CVE-2018-6787 (In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows ...)
+	TODO: check
+CVE-2018-6786 (In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows ...)
+	TODO: check
+CVE-2018-6785 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6784 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6783 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6782 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6781 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6780 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6779 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6778 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6777 (In Jiangmin Antivirus 16.0.0.100, the driver file (KVFG.sys) allows ...)
+	TODO: check
+CVE-2018-6776 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6775 (In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows ...)
+	TODO: check
+CVE-2018-6774 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6773 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6772 (In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows ...)
+	TODO: check
+CVE-2018-6771 (In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows ...)
+	TODO: check
+CVE-2018-6770 (In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows ...)
+	TODO: check
+CVE-2018-6769 (In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows ...)
+	TODO: check
+CVE-2018-6768 (In Jiangmin Antivirus 16.0.0.100, the driver file (KSysCall.sys) allows ...)
+	TODO: check
+CVE-2018-6766
+	RESERVED
+CVE-2018-6765
+	RESERVED
+CVE-2018-6763
+	RESERVED
+CVE-2018-6762
+	RESERVED
+CVE-2018-6761
+	RESERVED
+CVE-2018-6760
+	RESERVED
+CVE-2018-6767 (A stack-based buffer over-read in the ParseRiffHeaderConfig function of ...)
 	- wavpack <unfixed> (bug #889276)
 	NOTE: https://github.com/dbry/WavPack/issues/27
 	NOTE: https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5
 CVE-2018-6764 [guest could inject executable code via libnss_dns.so loaded by libvirt_lxc before init]
+	RESERVED
 	- libvirt <undetermined>
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1541444
 	TODO: check, Red Hat does not provide much references
@@ -469,8 +562,8 @@ CVE-2018-6605 (SQL Injection exists in the Zh BaiduMap 3.0.0.1 component for Joo
 	NOT-FOR-US: Zh BaiduMap component for Joomla!
 CVE-2018-6604 (SQL Injection exists in the Zh YandexMap 6.2.1.0 component for Joomla! ...)
 	NOT-FOR-US: Zh YandexMap component for Joomla!
-CVE-2018-6603
-	RESERVED
+CVE-2018-6603 (Promise Technology WebPam Pro-E devices allow remote attackers to ...)
+	TODO: check
 CVE-2018-6602
 	RESERVED
 CVE-2018-6601
@@ -1229,6 +1322,7 @@ CVE-2018-6362
 CVE-2018-6361
 	RESERVED
 CVE-2018-6360 (mpv through 0.28.0 allows remote attackers to execute arbitrary code ...)
+	{DSA-4105-1}
 	- mpv 0.27.0-3 (bug #888654)
 	[jessie] - mpv <not-affected> (Vulnerable code not present, youtube-dl hook script added in 0.7.0)
 	NOTE: https://github.com/mpv-player/mpv/issues/5456



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/87baaf23091d0e75766c5784099ec5c1779e8af9

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/87baaf23091d0e75766c5784099ec5c1779e8af9
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180207/a0a9e12c/attachment.html>


More information about the Secure-testing-commits mailing list