[Git][security-tracker-team/security-tracker][master] faad2, ghostscript, file, blktrace fixes included in 8.11
Salvatore Bonaccorso
carnil at debian.org
Sat Jun 23 10:36:05 BST 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f6958d3a by Salvatore Bonaccorso at 2018-06-23T11:35:24+02:00
faad2, ghostscript, file, blktrace fixes included in 8.11
- - - - -
2 changed files:
- data/CVE/list
- data/next-oldstable-point-update.txt
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -5150,7 +5150,7 @@ CVE-2018-10690
CVE-2018-10689 (blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel ...)
- blktrace 1.2.0-1 (low; bug #897695)
[stretch] - blktrace <no-dsa> (Minor issue)
- [jessie] - blktrace <no-dsa> (Minor issue)
+ [jessie] - blktrace 1.0.5-1+deb8u1
[wheezy] - blktrace <no-dsa> (Minor issue)
NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7
NOTE: https://www.spinics.net/lists/linux-btrace/msg00847.html
@@ -5979,7 +5979,7 @@ CVE-2018-10363 (An issue was discovered in the WpDevArt "Booking calendar,
CVE-2018-10360 (The do_core_note function in readelf.c in libmagic.a in file 5.33 ...)
- file 1:5.33-3 (bug #901351)
[stretch] - file <no-dsa> (Minor issue; will be fixed via pu)
- [jessie] - file <no-dsa> (Minor issue; will be fixed via pu)
+ [jessie] - file 1:5.22+15-2+deb8u4
NOTE: https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22
CVE-2018-10359 (A pool corruption privilege escalation vulnerability in Trend Micro ...)
NOT-FOR-US: Trend Micro
@@ -6366,7 +6366,7 @@ CVE-2018-10194 (The set_text_distance function in devices/vector/gdevpdts.c in t
{DLA-1363-1}
- ghostscript 9.22~dfsg-2.1 (bug #896069)
[stretch] - ghostscript <no-dsa> (Minor issue)
- [jessie] - ghostscript <no-dsa> (Minor issue)
+ [jessie] - ghostscript 9.06~dfsg-2+deb8u7
NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=699255 (not yet public)
CVE-2018-1000200 (The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer ...)
@@ -58792,27 +58792,27 @@ CVE-2017-9257 (The mp4ff_read_ctts function in common/mp4ff/mp4atom.c in Freewar
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9256 (The mp4ff_read_stco function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9255 (The mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9254 (The mp4ff_read_stts function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9253 (The mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2016-10377 (In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch ...)
- openvswitch 2.6.1+git20161123-1
[jessie] - openvswitch <not-affected> (Vulnerable code using tot_len introduced later)
@@ -58935,32 +58935,32 @@ CVE-2017-9223 (The mp4ff_read_stts function in common/mp4ff/mp4atom.c in Freewar
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9222 (The mp4ff_parse_tag function in common/mp4ff/mp4meta.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9221 (The mp4ff_read_mdhd function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9220 (The mp4ff_read_stco function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9219 (The mp4ff_read_stsc function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9218 (The mp4ff_read_stsd function in common/mp4ff/mp4atom.c in Freeware ...)
{DLA-1077-1}
- faad2 2.8.1-1 (low; bug #867724)
[stretch] - faad2 <no-dsa> (Minor issue)
- [jessie] - faad2 <no-dsa> (Minor issue)
+ [jessie] - faad2 2.7-8+deb8u1
CVE-2017-9217 (systemd-resolved through 233 allows remote attackers to cause a denial ...)
[experimental] - systemd 233-8
- systemd 232-24 (bug #863277)
@@ -64737,7 +64737,7 @@ CVE-2017-7400 (OpenStack Horizon 9.x through 9.1.1, 10.x through 10.0.2, and 11.
CVE-2016-10317 (The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex ...)
- ghostscript 9.22~dfsg-2.1 (bug #860869)
[stretch] - ghostscript <no-dsa> (Minor issue)
- [jessie] - ghostscript <no-dsa> (Minor issue)
+ [jessie] - ghostscript 9.06~dfsg-2+deb8u7
[wheezy] - ghostscript <no-dsa> (Not directly reproducible, to re-evaluate once the upstream fix is known)
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=697459
NOTE: http://git.ghostscript.com/?p=ghostpdl.git;h=362ec9daadb9992b0def3520cd1dc6fa52edd1c4
=====================================
data/next-oldstable-point-update.txt
=====================================
--- a/data/next-oldstable-point-update.txt
+++ b/data/next-oldstable-point-update.txt
@@ -1,33 +1,5 @@
-CVE-2017-9218
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9219
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9220
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9221
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9222
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9223
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9253
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9254
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9256
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2017-9257
- [jessie] - faad2 2.7-8+deb8u1
-CVE-2018-10194
- [jessie] - ghostscript 9.06~dfsg-2+deb8u7
-CVE-2016-10317
- [jessie] - ghostscript 9.06~dfsg-2+deb8u7
-CVE-2018-10689
- [jessie] - blktrace 1.0.5-1+deb8u1
CVE-2017-5715
[jessie] - intel-microcode 3.20180425.1~deb8u1
-CVE-2018-10360
- [jessie] - file 1:5.22+15-2+deb8u4
CVE-2017-9872
[jessie] - lame 3.99.5+repack1-7+deb8u2
CVE-2017-9871
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f6958d3aabc7a70e6bcce6d8d946da2a6be0c1eb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f6958d3aabc7a70e6bcce6d8d946da2a6be0c1eb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180623/ae3d7786/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list