[Git][security-tracker-team/security-tracker][master] glusterfs, link to fixing commits

Markus Koschany apo at debian.org
Thu Nov 1 17:51:48 GMT 2018


Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f29af771 by Markus Koschany at 2018-11-01T17:51:15Z
glusterfs,link to fixing commits

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -10308,6 +10308,7 @@ CVE-2018-14661 (It was found that usage of snprintf function in feature/locks ..
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1636880
+	NOTE: https://review.gluster.org/#/c/glusterfs/+/21532/
 CVE-2018-14660
 	RESERVED
 	- glusterfs <unfixed>
@@ -10317,6 +10318,7 @@ CVE-2018-14659 (The Gluster file system through versions 4.1.4 and 3.1.2 is vuln
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1635929
+	NOTE: https://review.gluster.org/#/c/glusterfs/+/21530/
 CVE-2018-14658
 	RESERVED
 CVE-2018-14657
@@ -10332,10 +10334,13 @@ CVE-2018-14654 (The Gluster file system through version 4.1.4 is vulnerable to a
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1631576
+	NOTE: https://review.gluster.org/#/c/glusterfs/+/21534/
 CVE-2018-14653 (The Gluster file system through versions 4.1.4 and 3.12 is vulnerable ...)
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1633431
+	NOTE: https://review.gluster.org/#/c/glusterfs/+/21528/
+	NOTE: https://review.gluster.org/#/c/glusterfs/+/21529/
 CVE-2018-14652 (The Gluster file system through versions 3.12 and 4.1.4 is vulnerable ...)
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
@@ -10345,6 +10350,7 @@ CVE-2018-14651 (It was found that the fix for CVE-2018-10927, CVE-2018-10928, ..
 	[stretch] - glusterfs <not-affected> (Incomplete fixes for CVE-2018-109{26,27,28,29,30} not applied)
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1632557
+	NOTE: https://review.gluster.org/#/c/glusterfs/+/21527/
 CVE-2018-14650 (It was discovered that sos-collector does not properly set the default ...)
 	NOT-FOR-US: sos-collector (not same as sosreport itself, additional tool to sosreport)
 CVE-2018-14649 (It was found that ceph-isci-cli package as shipped by Red Hat Ceph ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f29af771d80b6224a64acb65895d052fd88ebaab

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f29af771d80b6224a64acb65895d052fd88ebaab
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181101/09f50992/attachment.html>


More information about the debian-security-tracker-commits mailing list