[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Update status for CVE-2018-7440 and CVE-2018-3836
Salvatore Bonaccorso
carnil at debian.org
Fri Mar 2 19:24:30 UTC 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f6dd99b0 by Salvatore Bonaccorso at 2018-03-02T20:24:16+01:00
Update status for CVE-2018-7440 and CVE-2018-3836
Since the incomplete fix for CVE-2018-3836 was not applied to stretch
and jessie, mark those versions as not affected (with explanation). Add
a note to CVE-2018-3836 to make sure the issue is completely fixed
if/once it's adressed for stretch and jessie.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -9854,6 +9854,8 @@ CVE-2017-18196 (Leptonica 1.74.4 constructs unintended pathnames (containing dup
- leptonlib 1.74.4-2 (bug #885704)
CVE-2018-7440 (An issue was discovered in Leptonica through 1.75.3. The ...)
- leptonlib <unfixed> (bug #891932)
+ [stretch] - leptonlib <not-affected> (Incomplete fix for CVE-2018-3836 not applied)
+ [jessie] - leptonlib <not-affected> (Incomplete fix for CVE-2018-3836 not applied)
NOTE: https://github.com/DanBloomberg/leptonica/issues/303#issuecomment-366472212
NOTE: https://github.com/DanBloomberg/leptonica/pull/313/commits/49ecb6c2dfd6ed5078c62f4a8eeff03e3beced3b
CVE-2018-3836 [gplotMakeOutput Command Injection Vulnerability]
@@ -9862,6 +9864,9 @@ CVE-2018-3836 [gplotMakeOutput Command Injection Vulnerability]
- leptonlib 1.75.3-1 (bug #889759)
NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516
NOTE: https://github.com/DanBloomberg/leptonica/issues/303
+ NOTE: When fixing this issue make sure the fix is complete and includes as well
+ NOTE: https://github.com/DanBloomberg/leptonica/pull/313/commits/49ecb6c2dfd6ed5078c62f4a8eeff03e3beced3b
+ NOTE: to not open CVE-2018-7440.
CVE-2018-3835 (An exploitable out of bounds write vulnerability exists in version 2.2 ...)
NOT-FOR-US: Per Face Texture (PTEX)
CVE-2018-3834
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f6dd99b0c59554e0f0a8073f6bb13b1903897810
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f6dd99b0c59554e0f0a8073f6bb13b1903897810
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180302/abf4ff57/attachment-0001.html>
More information about the Secure-testing-commits
mailing list