[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] 2 commits: no-dsa: electrum, bro, osc
Moritz Muehlenhoff
jmm at debian.org
Mon Jan 15 20:21:01 UTC 2018
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8de78b99 by Moritz Muehlenhoff at 2018-01-15T21:19:31+01:00
no-dsa: electrum, bro, osc
- - - - -
2818c674 by Moritz Muehlenhoff at 2018-01-15T21:20:45+01:00
Merge branch 'master' of salsa.debian.org:security-tracker-team/security-tracker
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -925,6 +925,7 @@ CVE-2017-18023 (Office Tracker 11.2.5 has XSS via the logincount parameter to th
NOT-FOR-US: Office Tracker
CVE-2018-XXXX [Password protect the JSONRPC interface]
- electrum 3.0.5-1 (bug #886683)
+ [stretch] - electrum <ignored> (The version in stretch is unable to connect to current Etherum servers and thus not exploitable, see #886683)
[jessie] - electrum <not-affected> (Only affects >= 2.6)
NOTE: https://github.com/spesmilo/electrum/issues/3374
NOTE: http://www.openwall.com/lists/oss-security/2018/01/10/4
@@ -4074,6 +4075,7 @@ CVE-2017-1000425 (Cross-site scripting (XSS) vulnerability in the /html/portal/f
NOT-FOR-US: Liferay Portal CE
CVE-2017-1000458 (Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ...)
- bro 2.5.2-1
+ [stretch] - bro <no-dsa> (Minor issue)
NOTE: https://bro-tracker.atlassian.net/browse/BIT-1856
NOTE: https://github.com/bro/bro/commit/6c0f101a62489b1c5927b4ed63b0e1d37db40282
CVE-2017-1000457 (Cross-site scripting (XSS) vulnerability in Help.aspx in mojoPortal ...)
@@ -37695,6 +37697,8 @@ CVE-2017-9275
CVE-2017-9274 [osc executes spec code during "osc commit"]
RESERVED
- osc <unfixed>
+ [stretch] - osc <no-dsa> (Minor issue)
+ [jessie] - osc <no-dsa> (Minor issue)
NOTE: Details in https://bugzilla.novell.com/show_bug.cgi?id=938556
NOTE: SUSE adressed the issue not only in the obs-service-source_validator
NOTE: and adding a validation in 0.162.0 when using OBS 2.9, cf.:
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/41851999934d011e154ea1690b9a0021d18761ce...2818c674ca281ee516164489dcf522946b7a983c
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/compare/41851999934d011e154ea1690b9a0021d18761ce...2818c674ca281ee516164489dcf522946b7a983c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180115/8e486c6a/attachment.html>
More information about the Secure-testing-commits
mailing list