[Git][security-tracker-team/security-tracker][master] new radare issues
Moritz Muehlenhoff
jmm at debian.org
Tue May 22 22:26:30 BST 2018
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a1c1a04c by Moritz Muehlenhoff at 2018-05-22T23:25:59+02:00
new radare issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1,23 +1,60 @@
CVE-2018-11384 (The sh_op() function in radare2 2.5.0 allows remote attackers to cause ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add
+ NOTE: https://github.com/radare/radare2/issues/9903
CVE-2018-11383 (The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a
+ NOTE: https://github.com/radare/radare2/issues/9943
CVE-2018-11382 (The _inst__sts() function in radare2 2.5.0 allows remote attackers to ...)
- TODO: check
+ - radare2 <not-affected> (Vulnerable code not yet present)
+ NOTE: https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff
+ NOTE: https://github.com/radare/radare2/issues/10091
CVE-2018-11381 (The string_scan_range() function in radare2 2.5.0 allows remote ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3
+ NOTE: https://github.com/radare/radare2/issues/9902
CVE-2018-11380 (The parse_import_ptr() function in radare2 2.5.0 allows remote ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134
+ NOTE: https://github.com/radare/radare2/issues/9970
CVE-2018-11379 (The get_debug_info() function in radare2 2.5.0 allows remote attackers ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c
+ NOTE: https://github.com/radare/radare2/issues/9926
CVE-2018-11378 (The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <not-affected> (Vulnerable code not present)
+ [jessie] - radare2 <not-affected> (Vulnerable code not present)
+ NOTE: https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
+ NOTE: https://github.com/radare/radare2/issues/9969
CVE-2018-11377 (The avr_op_analyze() function in radare2 2.5.0 allows remote attackers ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4
+ NOTE: https://github.com/radare/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422
+ NOTE: https://github.com/radare/radare2/issues/9901
CVE-2018-11376 (The r_read_le32() function in radare2 2.5.0 allows remote attackers to ...)
- TODO: check
+ - radare2 <unfixed> (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
+ [jessie] - radare2 <no-dsa> (Minor issue)
+ NOTE: https://github.com/radare/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf
+ NOTE: https://github.com/radare/radare2/issues/9904
CVE-2018-11375 (The _inst__lds() function in radare2 2.5.0 allows remote attackers to ...)
- TODO: check
+ - radare2 <not-affected> (Vulnerable code not yet present)
+ NOTE: https://github.com/radare/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68
+ NOTE: https://github.com/radare/radare2/issues/9928
CVE-2018-11374
RESERVED
CVE-2018-11373 (iScripts eSwap v2.4 has SQL injection via the "salelistdetailed.php" ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/a1c1a04c1ed786c0ef42f03bc09a618879ab24bc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/a1c1a04c1ed786c0ef42f03bc09a618879ab24bc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180522/21c65843/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list