[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Sat Nov 3 20:11:12 GMT 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
083199f1 by security tracker role at 2018-11-03T20:10:15Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -12,8 +12,8 @@ CVE-2018-18911
 	RESERVED
 CVE-2018-18910
 	RESERVED
-CVE-2018-18909
-	RESERVED
+CVE-2018-18909 (xhEditor 1.2.2 allows XSS via JavaScript code in the SRC attribute of ...)
+	TODO: check
 CVE-2018-18908
 	RESERVED
 CVE-2018-18907
@@ -6199,7 +6199,7 @@ CVE-2018-16397 (In LimeSurvey before 3.14.7, an admin user can leverage a "
 	- limesurvey <itp> (bug #472802)
 CVE-2018-16396 [Tainted flags are not propagated in Array#pack and String#unpack with some directives]
 	RESERVED
-	{DLA-1558-1}
+	{DSA-4332-1 DLA-1558-1}
 	- ruby2.5 <unfixed> (bug #911920)
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
@@ -6207,7 +6207,7 @@ CVE-2018-16396 [Tainted flags are not propagated in Array#pack and String#unpack
 	NOTE: https://github.com/ruby/ruby/commit/a2958f6743664006d21fc0bafd4ca6214df1d429
 CVE-2018-16395 [OpenSSL::X509::Name equality check does not work correctly]
 	RESERVED
-	{DLA-1558-1}
+	{DSA-4332-1 DLA-1558-1}
 	- ruby-openssl <unfixed> (bug #911918)
 	- ruby2.5 <unfixed> (bug #911919)
 	- ruby2.3 <removed>
@@ -10393,18 +10393,21 @@ CVE-2018-14663
 CVE-2018-14662
 	RESERVED
 CVE-2018-14661 (It was found that usage of snprintf function in feature/locks ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1636880
 	NOTE: https://review.gluster.org/#/c/glusterfs/+/21532/
 	NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=74dbf0a9aac4b960832029ec122685b5b5009127
 CVE-2018-14660 (A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1635926
 	NOTE: https://review.gluster.org/#/c/glusterfs/+/21531/
 	NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=9232f3937f81749120e2b1150116b09e7c575354
 CVE-2018-14659 (The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1635929
@@ -10422,12 +10425,14 @@ CVE-2018-14656 (A missing address check in the callers of the show_opcodes() in
 CVE-2018-14655
 	RESERVED
 CVE-2018-14654 (The Gluster file system through version 4.1.4 is vulnerable to abuse ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1631576
 	NOTE: https://review.gluster.org/#/c/glusterfs/+/21534/
 	NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=923d0a56525111e1e24db19817419b4519a98090
 CVE-2018-14653 (The Gluster file system through versions 4.1.4 and 3.12 is vulnerable ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1633431
@@ -10436,11 +10441,13 @@ CVE-2018-14653 (The Gluster file system through versions 4.1.4 and 3.12 is vulne
 	NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=d3ec5f5a089edb68206b5d4a469358867340d4f7
 	NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=e2712fbd38477e736f157c9dbfbbae9c253b6c13
 CVE-2018-14652 (The Gluster file system through versions 3.12 and 4.1.4 is vulnerable ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1632974
 	NOTE: https://review.gluster.org/#/c/glusterfs/+/21535/
 CVE-2018-14651 (It was found that the fix for CVE-2018-10927, CVE-2018-10928, ...)
+	{DLA-1565-1}
 	- glusterfs <unfixed>
 	[stretch] - glusterfs <not-affected> (Incomplete fixes for CVE-2018-109{26,27,28,29,30} not applied)
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/083199f1a747510ba6c85ab89b648d3f7523c76a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/083199f1a747510ba6c85ab89b648d3f7523c76a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181103/1e92e601/attachment.html>


More information about the debian-security-tracker-commits mailing list