[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Add various bug references for exiv2 issues only affected in experimental
Salvatore Bonaccorso
carnil at debian.org
Tue Jan 30 19:57:17 UTC 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f079523a by Salvatore Bonaccorso at 2018-01-30T20:56:40+01:00
Add various bug references for exiv2 issues only affected in experimental
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1621,7 +1621,7 @@ CVE-2018-5776 (WordPress before 4.9.2 has XSS in the Flash fallback files in ...
NOTE: https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/
NOTE: https://github.com/WordPress/WordPress/commit/3fe9cb61ee71fcfadb5e002399296fcc1198d850
CVE-2018-5772 (In Exiv2 0.26, there is a segmentation fault caused by uncontrolled ...)
- [experimental] - exiv2 <unfixed>
+ [experimental] - exiv2 <unfixed> (bug #888862)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/216
CVE-2018-5771
@@ -17080,12 +17080,12 @@ CVE-2017-1000128 (Exiv2 0.26 contains a stack out of bounds read in JPEG2000 par
NOTE: http://www.openwall.com/lists/oss-security/2017/06/30/1
NOTE: https://github.com/Exiv2/exiv2/issues/177
CVE-2017-1000127 (Exiv2 0.26 contains a heap buffer overflow in tiff parser ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888863)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: http://www.openwall.com/lists/oss-security/2017/06/30/1
NOTE: https://github.com/Exiv2/exiv2/issues/176
CVE-2017-1000126 (exiv2 0.26 contains a Stack out of bounds read in webp parser ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888864)
- exiv2 <not-affected> (WebP support introduced in 0.26)
NOTE: http://www.openwall.com/lists/oss-security/2017/06/30/1
NOTE: https://github.com/Exiv2/exiv2/issues/175
@@ -23392,7 +23392,7 @@ CVE-2017-14866 (There is a heap-based buffer overflow in the Exiv2::s2Data funct
NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
NOTE: Reproducible in experimental(0.26-1) with valgrind (and "free(): corrupted unsorted chunks" without valgrind).
CVE-2017-14865 (There is a heap-based buffer overflow in the Exiv2::us2Data function of ...)
- [experimental] - exiv2 <unfixed>
+ [experimental] - exiv2 <unfixed> (bug #888865)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/134
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1494778
@@ -23411,7 +23411,7 @@ CVE-2017-14864 (An Invalid memory address dereference was discovered in Exiv2::g
NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
NOTE: Reproducible in experimental(0.26-1) with valgrind (and segfault without valgrind).
CVE-2017-14863 (A NULL pointer dereference was discovered in ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888866)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/132
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1494443
@@ -23436,7 +23436,7 @@ CVE-2017-14861 (There is a stack consumption vulnerability in the ...)
NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
NOTE: Reproducible in experimental(0.26-1) with valgrind (and segfault without valgrind).
CVE-2017-14860 (There is a heap-based buffer over-read in the ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888867)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/71
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1494776
@@ -23463,7 +23463,7 @@ CVE-2017-14858 (There is a heap-based buffer overflow in the Exiv2::l2Data funct
NOTE: Unreproducible on wheezy/jessie/stretch/sid(0.25-3.1).
NOTE: Reproducible in experimental(0.26-1) with a different error (double free or corruption (out))
CVE-2017-14857 (In Exiv2 0.26, there is an invalid free in the Image class in image.cpp ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888869)
- exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/76
NOTE: https://github.com/Exiv2/exiv2/issues/124
@@ -28665,14 +28665,14 @@ CVE-2017-12957 (There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1482423
NOTE: Experimental is affected, tracking as #876242
CVE-2017-12956 (There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888872)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/59
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1482296
NOTE: Not reproducible in wheezy/jessie/stretch/sid(0.25-3.1) => "The file contains data of an unknown image type"
NOTE: Reproducible in experimental (0.26-1).
CVE-2017-12955 (There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The ...)
- [experimental] - exiv2 <unfixed>
+ [experimental] - exiv2 <unfixed> (bug #888873)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/58
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1482295
@@ -33181,7 +33181,7 @@ CVE-2017-11554 (There is a stack consumption vulnerability in the lex function i
[stretch] - libsass <no-dsa> (Minor issue)
NOTE: https://github.com/sass/libsass/issues/2445
CVE-2017-11553 (There is an illegal address access in the extend_alias_table function ...)
- [experimental] - exiv2 <unfixed> (low)
+ [experimental] - exiv2 <unfixed> (low; bug #888874)
- exiv2 <not-affected> (Vulnerable code introduced after 0.25)
NOTE: https://github.com/Exiv2/exiv2/issues/54
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1471772
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f079523a2ac246c0f4ae5cac13d4e1d3d423ede4
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f079523a2ac246c0f4ae5cac13d4e1d3d423ede4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180130/28d40107/attachment-0001.html>
More information about the Secure-testing-commits
mailing list