[Git][security-tracker-team/security-tracker][master] Reference Debian bug for glusterfs issues.
Markus Koschany
apo at debian.org
Mon Nov 5 18:14:54 GMT 2018
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
24e0b3e7 by Markus Koschany at 2018-11-05T18:14:22Z
Reference Debian bug for glusterfs issues.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -10458,13 +10458,13 @@ CVE-2018-14662
RESERVED
CVE-2018-14661 (It was found that usage of snprintf function in feature/locks ...)
{DLA-1565-1}
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1636880
NOTE: https://review.gluster.org/#/c/glusterfs/+/21532/
NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=74dbf0a9aac4b960832029ec122685b5b5009127
CVE-2018-14660 (A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 ...)
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
[jessie] - glusterfs <not-affected> (vulnerable code not present)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1635926
@@ -10472,7 +10472,7 @@ CVE-2018-14660 (A flaw was found in glusterfs server through versions 4.1.4 and
NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=9232f3937f81749120e2b1150116b09e7c575354
CVE-2018-14659 (The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable ...)
{DLA-1565-1}
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1635929
NOTE: https://review.gluster.org/#/c/glusterfs/+/21530/
@@ -10489,7 +10489,7 @@ CVE-2018-14656 (A missing address check in the callers of the show_opcodes() in
CVE-2018-14655
RESERVED
CVE-2018-14654 (The Gluster file system through version 4.1.4 is vulnerable to abuse ...)
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
[jessie] - glusterfs <not-affected> (vulnerable code not present)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1631576
@@ -10497,7 +10497,7 @@ CVE-2018-14654 (The Gluster file system through version 4.1.4 is vulnerable to a
NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=923d0a56525111e1e24db19817419b4519a98090
CVE-2018-14653 (The Gluster file system through versions 4.1.4 and 3.12 is vulnerable ...)
{DLA-1565-1}
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1633431
NOTE: https://review.gluster.org/#/c/glusterfs/+/21528/
@@ -10506,14 +10506,14 @@ CVE-2018-14653 (The Gluster file system through versions 4.1.4 and 3.12 is vulne
NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=e2712fbd38477e736f157c9dbfbbae9c253b6c13
CVE-2018-14652 (The Gluster file system through versions 3.12 and 4.1.4 is vulnerable ...)
{DLA-1565-1}
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1632974
NOTE: https://review.gluster.org/#/c/glusterfs/+/21535/
NOTE: http://git.gluster.org/cgit/glusterfs.git/commit/?id=e2c195712a9ecbda4fa02f5308138a1257a2558a
CVE-2018-14651 (It was found that the fix for CVE-2018-10927, CVE-2018-10928, ...)
{DLA-1565-1}
- - glusterfs <unfixed>
+ - glusterfs <unfixed> (bug #912997)
[stretch] - glusterfs <not-affected> (Incomplete fixes for CVE-2018-109{26,27,28,29,30} not applied)
NOTE: https://www.openwall.com/lists/oss-security/2018/10/31/5
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1632557
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/24e0b3e7a854638b382d9b44ac9733b5a35f143f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/24e0b3e7a854638b382d9b44ac9733b5a35f143f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181105/16a069c0/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list