[Git][security-tracker-team/security-tracker][master] Triage radare2 for Wheezy.
Markus Koschany
apo at debian.org
Thu May 24 22:30:58 BST 2018
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
aeeac963 by Markus Koschany at 2018-05-24T23:30:33+02:00
Triage radare2 for Wheezy.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -75,12 +75,14 @@ CVE-2018-11384 (The sh_op() function in radare2 2.5.0 allows remote attackers to
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add
NOTE: https://github.com/radare/radare2/issues/9903
CVE-2018-11383 (The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers ...)
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a
NOTE: https://github.com/radare/radare2/issues/9943
CVE-2018-11382 (The _inst__sts() function in radare2 2.5.0 allows remote attackers to ...)
@@ -91,30 +93,35 @@ CVE-2018-11381 (The string_scan_range() function in radare2 2.5.0 allows remote
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3
NOTE: https://github.com/radare/radare2/issues/9902
CVE-2018-11380 (The parse_import_ptr() function in radare2 2.5.0 allows remote ...)
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134
NOTE: https://github.com/radare/radare2/issues/9970
CVE-2018-11379 (The get_debug_info() function in radare2 2.5.0 allows remote attackers ...)
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c
NOTE: https://github.com/radare/radare2/issues/9926
CVE-2018-11378 (The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly ...)
- radare2 <unfixed> (low)
[stretch] - radare2 <not-affected> (Vulnerable code not present)
[jessie] - radare2 <not-affected> (Vulnerable code not present)
+ [wheezy] - radare2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
NOTE: https://github.com/radare/radare2/issues/9969
CVE-2018-11377 (The avr_op_analyze() function in radare2 2.5.0 allows remote attackers ...)
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4
NOTE: https://github.com/radare/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422
NOTE: https://github.com/radare/radare2/issues/9901
@@ -122,6 +129,7 @@ CVE-2018-11376 (The r_read_le32() function in radare2 2.5.0 allows remote attack
- radare2 <unfixed> (low)
[stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <no-dsa> (Minor issue)
+ [wheezy] - radare2 <no-dsa> (Minor issue)
NOTE: https://github.com/radare/radare2/commit/1f37c04f2a762500222dda2459e6a04646feeedf
NOTE: https://github.com/radare/radare2/issues/9904
CVE-2018-11375 (The _inst__lds() function in radare2 2.5.0 allows remote attackers to ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/aeeac9638bd701c1aed0693f0cca5a5607281e82
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/aeeac9638bd701c1aed0693f0cca5a5607281e82
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180524/c19ddcb4/attachment.html>
More information about the debian-security-tracker-commits
mailing list