[Git][security-tracker-team/security-tracker][master] glusterfs, link to fixing commits
Markus Koschany
apo at debian.org
Thu Nov 1 17:51:48 GMT 2018
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f29af771 by Markus Koschany at 2018-11-01T17:51:15Z
glusterfs,link to fixing commits
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -10308,6 +10308,7 @@ CVE-2018-14661 (It was found that usage of snprintf function in feature/locks ..
- glusterfs <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1636880
+ NOTE: https://review.gluster.org/#/c/glusterfs/+/21532/
CVE-2018-14660
RESERVED
- glusterfs <unfixed>
@@ -10317,6 +10318,7 @@ CVE-2018-14659 (The Gluster file system through versions 4.1.4 and 3.1.2 is vuln
- glusterfs <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1635929
+ NOTE: https://review.gluster.org/#/c/glusterfs/+/21530/
CVE-2018-14658
RESERVED
CVE-2018-14657
@@ -10332,10 +10334,13 @@ CVE-2018-14654 (The Gluster file system through version 4.1.4 is vulnerable to a
- glusterfs <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1631576
+ NOTE: https://review.gluster.org/#/c/glusterfs/+/21534/
CVE-2018-14653 (The Gluster file system through versions 4.1.4 and 3.12 is vulnerable ...)
- glusterfs <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1633431
+ NOTE: https://review.gluster.org/#/c/glusterfs/+/21528/
+ NOTE: https://review.gluster.org/#/c/glusterfs/+/21529/
CVE-2018-14652 (The Gluster file system through versions 3.12 and 4.1.4 is vulnerable ...)
- glusterfs <unfixed>
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
@@ -10345,6 +10350,7 @@ CVE-2018-14651 (It was found that the fix for CVE-2018-10927, CVE-2018-10928, ..
[stretch] - glusterfs <not-affected> (Incomplete fixes for CVE-2018-109{26,27,28,29,30} not applied)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1632557
+ NOTE: https://review.gluster.org/#/c/glusterfs/+/21527/
CVE-2018-14650 (It was discovered that sos-collector does not properly set the default ...)
NOT-FOR-US: sos-collector (not same as sosreport itself, additional tool to sosreport)
CVE-2018-14649 (It was found that ceph-isci-cli package as shipped by Red Hat Ceph ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f29af771d80b6224a64acb65895d052fd88ebaab
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f29af771d80b6224a64acb65895d052fd88ebaab
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181101/09f50992/attachment.html>
More information about the debian-security-tracker-commits
mailing list