[Git][security-tracker-team/security-tracker][master] Add upstream bug reference for CVE-2017-18342
Salvatore Bonaccorso
carnil at debian.org
Mon Jul 2 18:44:46 BST 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
95018333 by Salvatore Bonaccorso at 2018-07-02T19:42:02+02:00
Add upstream bug reference for CVE-2017-18342
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -314,6 +314,7 @@ CVE-2017-18342 (In PyYAML before 4.1, the yaml.load() API could execute arbitrar
NOTE: This is a well-known design deficiency in pyyaml, various CVE IDs have been assigned
NOTE: to applications misusing the API over the years. The CVE ID was assigned to raise
NOTE: awareness (and 4.1 now fixes the default behaviour as well)
+ NOTE: https://github.com/yaml/pyyaml/pull/74
CVE-2018-12904 (In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested ...)
- linux <not-affected> (Vulnerability introduced later)
NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1589
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/95018333bfaf9348ffbe38e42d6cfb4b1a199bff
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/95018333bfaf9348ffbe38e42d6cfb4b1a199bff
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180702/475b4352/attachment.html>
More information about the debian-security-tracker-commits
mailing list