[Git][security-tracker-team/security-tracker][master] new radare issues

Moritz Muehlenhoff jmm at debian.org
Tue May 22 22:26:30 BST 2018


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a1c1a04c by Moritz Muehlenhoff at 2018-05-22T23:25:59+02:00
new radare issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1,23 +1,60 @@
 CVE-2018-11384 (The sh_op() function in radare2 2.5.0 allows remote attackers to cause ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add
+	NOTE: https://github.com/radare/radare2/issues/9903
 CVE-2018-11383 (The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a
+	NOTE: https://github.com/radare/radare2/issues/9943
 CVE-2018-11382 (The _inst__sts() function in radare2 2.5.0 allows remote attackers to ...)
-	TODO: check
+	- radare2 <not-affected> (Vulnerable code not yet present)
+	NOTE: https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff
+	NOTE: https://github.com/radare/radare2/issues/10091
 CVE-2018-11381 (The string_scan_range() function in radare2 2.5.0 allows remote ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3
+	NOTE: https://github.com/radare/radare2/issues/9902
 CVE-2018-11380 (The parse_import_ptr() function in radare2 2.5.0 allows remote ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134
+	NOTE: https://github.com/radare/radare2/issues/9970
 CVE-2018-11379 (The get_debug_info() function in radare2 2.5.0 allows remote attackers ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c
+	NOTE: https://github.com/radare/radare2/issues/9926
 CVE-2018-11378 (The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <not-affected> (Vulnerable code not present)
+	[jessie] - radare2 <not-affected> (Vulnerable code not present)
+	NOTE: https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
+	NOTE: https://github.com/radare/radare2/issues/9969
 CVE-2018-11377 (The avr_op_analyze() function in radare2 2.5.0 allows remote attackers ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4
+	NOTE: https://github.com/radare/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422
+	NOTE: https://github.com/radare/radare2/issues/9901
 CVE-2018-11376 (The r_read_le32() function in radare2 2.5.0 allows remote attackers to ...)
-	TODO: check
+	- radare2 <unfixed> (low)
+	[stretch] - radare2 <no-dsa> (Minor issue)
+	[jessie] - radare2 <no-dsa> (Minor issue)
+	NOTE: https://github.com/radare/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf
+	NOTE: https://github.com/radare/radare2/issues/9904
 CVE-2018-11375 (The _inst__lds() function in radare2 2.5.0 allows remote attackers to ...)
-	TODO: check
+	- radare2 <not-affected> (Vulnerable code not yet present)
+	NOTE: https://github.com/radare/radare2/commit/041e53cab7ca33481ae45ecd65ad596976d78e68
+	NOTE: https://github.com/radare/radare2/issues/9928
 CVE-2018-11374
 	RESERVED
 CVE-2018-11373 (iScripts eSwap v2.4 has SQL injection via the "salelistdetailed.php" ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/a1c1a04c1ed786c0ef42f03bc09a618879ab24bc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/a1c1a04c1ed786c0ef42f03bc09a618879ab24bc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180522/21c65843/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list