[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Sun Jul 15 21:10:24 BST 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d6675d42 by security tracker role at 2018-07-15T20:10:18+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1,3 +1,39 @@
+CVE-2018-14079
+	RESERVED
+CVE-2018-14078
+	RESERVED
+CVE-2018-14077
+	RESERVED
+CVE-2018-14076
+	RESERVED
+CVE-2018-14075
+	RESERVED
+CVE-2018-14074
+	RESERVED
+CVE-2018-14073 (libsixel 1.8.1 has a memory leak in sixel_allocator_new in allocator.c. ...)
+	TODO: check
+CVE-2018-14072 (libsixel 1.8.1 has a memory leak in sixel_decoder_decode in decoder.c, ...)
+	TODO: check
+CVE-2018-14071
+	RESERVED
+CVE-2018-14070
+	RESERVED
+CVE-2018-14069 (An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability ...)
+	TODO: check
+CVE-2018-14068 (An issue was discovered in SRCMS V2.3.1. There is a CSRF vulnerability ...)
+	TODO: check
+CVE-2018-14067
+	RESERVED
+CVE-2018-14066 (The content://wappush content provider in ...)
+	TODO: check
+CVE-2018-14065 (XMLReader.php in PHPOffice Common before 0.2.9 allows XXE. ...)
+	TODO: check
+CVE-2018-14064 (The uc-http service 1.0.0 on VelotiSmart WiFi B-380 camera devices ...)
+	TODO: check
+CVE-2018-14063 (The increaseApproval function of a smart contract implementation for ...)
+	TODO: check
+CVE-2018-14062
+	RESERVED
 CVE-2018-14061
 	RESERVED
 CVE-2018-14060 (OS command injection in the AP mode settings feature in /cgi-bin/luci ...)
@@ -9,10 +45,12 @@ CVE-2018-14058
 CVE-2018-14057
 	RESERVED
 CVE-2018-14055 (ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming ...)
+	{DLA-1427-1}
 	- znc <unfixed> (bug #903787)
 	NOTE: https://github.com/znc/znc/commit/a7bfbd93812950b7444841431e8e297e62cb524e
 	NOTE: https://github.com/znc/znc/commit/d22fef8620cdd87490754f607e7153979731c69d
 CVE-2018-14056 (ZNC before 1.7.1-rc1 is prone to a path traversal flaw via ../ in a web ...)
+	{DLA-1427-1}
 	- znc <unfixed> (bug #903788)
 	NOTE: https://github.com/znc/znc/commit/a4a5aeeb17d32937d8c7d743dae9a4cc755ce773
 CVE-2018-14053
@@ -8065,6 +8103,7 @@ CVE-2018-10852 (The UNIX pipe which sudo uses to contact SSSD and read the avail
 CVE-2018-10851
 	RESERVED
 CVE-2018-10850 (389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race ...)
+	{DLA-1428-1}
 	- 389-ds-base <unfixed> (bug #903501)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1588056
 	NOTE: https://pagure.io/389-ds-base/c/8f04487f99a
@@ -35375,6 +35414,7 @@ CVE-2018-1091 (In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptr
 CVE-2018-1090 (In Pulp before version 2.16.2, secrets are passed into override_config ...)
 	NOT-FOR-US: Pulp (Red Hat)
 CVE-2018-1089 (389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not ...)
+	{DLA-1428-1}
 	- 389-ds-base 1.3.8.2-1 (bug #898138)
 	NOTE: http://www.openwall.com/lists/oss-security/2018/05/07/2
 CVE-2018-1088 (A privilege escalation flaw was found in gluster 3.x snapshot ...)
@@ -35568,6 +35608,7 @@ CVE-2018-1056 [heap buffer overflow while running advzip]
 CVE-2018-1055
 	REJECTED
 CVE-2018-1054 (An out-of-bounds memory read flaw was found in the way 389-ds-base ...)
+	{DLA-1428-1}
 	- 389-ds-base 1.3.7.10-1 (bug #892124)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1537314
 	NOTE: https://pagure.io/389-ds-base/issue/49545
@@ -37332,6 +37373,7 @@ CVE-2018-0619
 	RESERVED
 CVE-2018-0618
 	RESERVED
+	{DSA-4246-1}
 	- mailman 1:2.1.27-1
 	NOTE: https://mail.python.org/pipermail/mailman-announce/2018-June/000236.html
 	NOTE: https://launchpad.net/mailman/+milestone/2.1.27
@@ -44441,6 +44483,7 @@ CVE-2017-15135 (It was found that 389-ds-base since 1.3.6.1 up to and including 
 	- 389-ds-base 1.3.7.9-1 (bug #888451)
 	[jessie] - 389-ds-base <not-affected> (vulnerable code (patch for CVE-2016-5405) not applied)
 CVE-2017-15134 (A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x ...)
+	{DLA-1428-1}
 	- 389-ds-base 1.3.7.9-1 (bug #888452)
 	NOTE: Fixed by: https://pagure.io/389-ds-base/c/6aa2acdc3cad9
 CVE-2017-15133 (A denial of service flaw was found in miekg-dns before 1.0.4. A remote ...)
@@ -139768,6 +139811,7 @@ CVE-2015-1855 [OpenSSL extension hostname matching implementation violates RFC 6
 	NOTE: https://bugs.ruby-lang.org/issues/9644
 	NOTE: https://github.com/ruby/openssl/commit/e9a7bcb8bf2902f907c148a00bbcf21d3fa79596
 CVE-2015-1854 (389 Directory Server before 1.3.3.10 allows attackers to bypass ...)
+	{DLA-1428-1}
 	- 389-ds-base 1.3.3.10-1 (bug #783923)
 	NOTE: Patch applied to CentOS package: https://git.centos.org/raw/rpms!389-ds-base.git!/309aa9ee631432d72c845f70df2ce6475055423b/SOURCES!0062-CVE-2015-1854-389ds-base-access-control-bypass-with-.patch
 CVE-2015-1853 [authentication doesn't protect symmetric associations against DoS attacks]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d6675d42fc594b655795dd6631d676ddbcd137ae

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d6675d42fc594b655795dd6631d676ddbcd137ae
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180715/538f4fda/attachment.html>


More information about the debian-security-tracker-commits mailing list