[Git][security-tracker-team/security-tracker][master] Sync proposed update list with updates really included in point release

Salvatore Bonaccorso carnil at debian.org
Sat Nov 10 09:09:52 GMT 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0b5d0c1b by Salvatore Bonaccorso at 2018-11-10T09:07:45Z
Sync proposed update list with updates really included in point release

Verified against dak log itself, exception in version added is the
clamav version for the first upload round as the fix was already in the
earlier version uploaded and thus known in the archive.

- - - - -


2 changed files:

- data/CVE/list
- data/next-point-update.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1321,7 +1321,7 @@ CVE-2018-18576
 CVE-2018-18585 (chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts ...)
 	{DLA-1555-1}
 	- libmspack 0.8-1 (bug #911637)
-	[stretch] - libmspack <no-dsa> (Minor issue)
+	[stretch] - libmspack 0.5-1+deb9u3
 	NOTE: https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/22/1
 CVE-2018-18586 (** DISPUTED ** chmextract.c in the chmextract sample program, as ...)
@@ -1337,7 +1337,7 @@ CVE-2018-18584 (In mspack/cab.h in libmspack before 0.8alpha and cabextract befo
 	- cabextract 1.4-5
 	NOTE: Starting with 1.4-5 cabextract uses the mspack system library
 	- libmspack 0.8-1 (bug #911640)
-	[stretch] - libmspack <no-dsa> (Minor issue)
+	[stretch] - libmspack 0.5-1+deb9u3
 	NOTE: https://github.com/kyz/libmspack/commit/40ef1b4093d77ad3a5cfcee1f5cb6108b3a3bcc2
 	NOTE: https://www.openwall.com/lists/oss-security/2018/10/22/1
 CVE-2018-18575
@@ -6444,11 +6444,11 @@ CVE-2018-16514
 	RESERVED
 CVE-2018-17088 (The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may ...)
 	- jhead 1:3.00-8 (bug #907925)
-	[stretch] - jhead <no-dsa> (Minor issue)
+	[stretch] - jhead 1:3.00-4+deb9u1
 	[jessie] - jhead <no-dsa> (Minor issue)
 CVE-2018-16554 (The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may ...)
 	- jhead 1:3.00-8 (bug #908176)
-	[stretch] - jhead <no-dsa> (Minor issue)
+	[stretch] - jhead 1:3.00-4+deb9u1
 	[jessie] - jhead <no-dsa> (Minor issue)
 CVE-2018-16515 (Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events ...)
 	- matrix-synapse 0.33.3.1-1 (bug #908044)
@@ -6654,61 +6654,61 @@ CVE-2018-16428 (In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmar
 	NOTE: https://gitlab.gnome.org/GNOME/glib/issues/1364
 CVE-2018-16427 (Various out of bounds reads when handling responses in OpenSC before ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16426 (Endless recursion when handling responses from an IAS-ECC card in ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16425 (A double free when handling responses from an HSM Card in ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16424 (A double free when handling responses in read_file in tools/egk-tool.c ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16423 (A double free when handling responses from a smartcard in ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16422 (A single byte buffer overflow when handling responses from an esteid ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16421 (Several buffer overflows when handling responses from a CAC Card in ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16420 (Several buffer overflows when handling responses from an ePass 2003 ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16419 (Several buffer overflows when handling responses from a Cryptoflex card ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16418 (A buffer overflow when handling string concatenation in util_acl_to_str ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
@@ -6794,19 +6794,19 @@ CVE-2018-16394
 	RESERVED
 CVE-2018-16393 (Several buffer overflows when handling responses from a Gemsafe V1 ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16392 (Several buffer overflows when handling responses from a TCOS Card in ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16391 (Several buffer overflows when handling responses from a Muscle Card in ...)
 	- opensc 0.19.0~rc1-1 (low; bug #909444)
-	[stretch] - opensc <no-dsa> (Minor issue)
+	[stretch] - opensc 0.16.0-3+deb9u1
 	[jessie] - opensc <no-dsa> (Minor issue)
 	NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
 	NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
@@ -8552,10 +8552,10 @@ CVE-2018-15689
 	RESERVED
 CVE-2018-15688 (A buffer overflow vulnerability in the dhcp6 client of systemd allows ...)
 	- network-manager 1.14.4-2
-	[stretch] - network-manager <no-dsa> (Minor issue; internal dhcp implementation not used by default)
+	[stretch] - network-manager 1.6.2-3+deb9u2
 	[jessie] - network-manager <not-affected> (vulnerable code not present)
 	- systemd 239-11 (bug #912008)
-	[stretch] - systemd <postponed> (Minor issue; not enabled by default in Debian, will be fixed via point release)
+	[stretch] - systemd 232-25+deb9u6
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1639067
 	NOTE: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921
 	NOTE: https://github.com/systemd/systemd/commit/49653743f69658aeeebdb14faf1ab158f1f2cb20
@@ -8761,7 +8761,7 @@ CVE-2018-15600
 CVE-2018-15599 (The recv_msg_userauth_request function in svr-auth.c in Dropbear ...)
 	{DLA-1476-1}
 	- dropbear 2018.76-4 (bug #906890)
-	[stretch] - dropbear <no-dsa> (Minor issue)
+	[stretch] - dropbear 2016.74-5+deb9u1
 	NOTE: http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html
 	NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00
 CVE-2018-15598 (Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the ...)
@@ -8778,7 +8778,7 @@ CVE-2018-1000224 (Godot Engine version All versions prior to 2.1.5, all 3.0 vers
 	NOT-FOR-US: Godot
 CVE-2018-1000222 (Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability ...)
 	- libgd2 2.2.5-4.1 (low; bug #906886)
-	[stretch] - libgd2 <no-dsa> (Minor issue, will be fixed via point release)
+	[stretch] - libgd2 2.2.4-2+deb9u3
 	[jessie] - libgd2 <postponed> (Minor issue)
 	NOTE: https://github.com/libgd/libgd/issues/447
 	NOTE: https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
@@ -8890,7 +8890,7 @@ CVE-2018-1000633 (The Open Microscopy Environment OMERO.web version prior to 5.4
 CVE-2018-1000632 (dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection ...)
 	{DLA-1517-1}
 	- dom4j 2.1.1-1 (low)
-	[stretch] - dom4j <no-dsa> (Minor issue, will be fixed via spu)
+	[stretch] - dom4j 1.6.1+dfsg.3-2+deb9u1
 	NOTE: https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387
 	NOTE: https://github.com/dom4j/dom4j/issues/48
 CVE-2003-1605 (curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote ...)
@@ -9321,7 +9321,7 @@ CVE-2018-15379 (A vulnerability in which the HTTP web server for Cisco Prime ...
 CVE-2018-15378 (A vulnerability in ClamAV versions prior to 0.100.2 could allow an ...)
 	{DLA-1553-1}
 	- clamav 0.100.2+dfsg-1 (bug #910430)
-	[stretch] - clamav <no-dsa> (clamav is updated via -updates)
+	[stretch] - clamav 0.100.2+dfsg-0+deb9u1
 	NOTE: https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html
 	NOTE: http://lists.clamav.net/pipermail/clamav-announce/2018/000033.html
 CVE-2018-15377 (A vulnerability in the Cisco Network Plug and Play agent, also ...)
@@ -10251,7 +10251,7 @@ CVE-2018-14939 (The get_app_path function in desktop/unx/source/start.c in Libre
 CVE-2018-1000637 (zutils version prior to version 1.8-pre2 contains a Buffer Overflow ...)
 	{DLA-1505-1}
 	- zutils 1.7-3 (bug #902936; bug #904819)
-	[stretch] - zutils <no-dsa> (Minor issue)
+	[stretch] - zutils 1.5-5+deb9u1
 	NOTE: http://www.openwall.com/lists/oss-security/2018/08/05/1
 	NOTE: https://lists.nongnu.org/archive/html/zutils-bug/2018-08/msg00000.html
 	NOTE: Fixed by: upstream/0001-zcat-buffer-overrun.patch (in 1.7-3)
@@ -10631,7 +10631,7 @@ CVE-2018-14778
 CVE-2015-9262 (_XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows ...)
 	{DLA-1469-1}
 	- libxcursor 1:1.1.15-1 (low; bug #906012)
-	[stretch] - libxcursor <no-dsa> (Minor issue)
+	[stretch] - libxcursor 1:1.1.14-1+deb9u2
 	NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=90857
 	NOTE: https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05
 CVE-2018-14777 (An issue was discovered in DataLife Engine (DLE) through 13.0. An ...)
@@ -11155,7 +11155,7 @@ CVE-2018-14622 (A null-pointer dereference vulnerability was found in libtirpc b
 	{DLA-1487-1}
 	[experimental] - libtirpc 1.0.2-0.1
 	- libtirpc 0.2.5-1.3 (bug #907608)
-	[stretch] - libtirpc <no-dsa> (Minor issue)
+	[stretch] - libtirpc 0.2.5-1.2+deb9u1
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1620293
 	NOTE: https://bugzilla.novell.com/show_bug.cgi?id=968175
 	NOTE: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0
@@ -11222,19 +11222,19 @@ CVE-2018-14607 (Thomson Reuters UltraTax CS 2017 on Windows, in a client/server
 CVE-2018-14600 (An issue was discovered in libX11 through 1.6.5. The function ...)
 	{DLA-1482-1}
 	- libx11 2:1.6.6-1 (low)
-	[stretch] - libx11 <no-dsa> (Minor issue)
+	[stretch] - libx11 2:1.6.4-3+deb9u1
 	[wheezy] - libx11 <no-dsa> (Minor issue)
 	NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/dbf72805fd9d7b1846fe9a11b46f3994bfc27fea
 CVE-2018-14599 (An issue was discovered in libX11 through 1.6.5. The function ...)
 	{DLA-1482-1}
 	- libx11 2:1.6.6-1 (low)
-	[stretch] - libx11 <no-dsa> (Minor issue)
+	[stretch] - libx11 2:1.6.4-3+deb9u1
 	[wheezy] - libx11 <no-dsa> (Minor issue)
 	NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/b469da1430cdcee06e31c6251b83aede072a1ff0
 CVE-2018-14598 (An issue was discovered in XListExtensions in ListExt.c in libX11 ...)
 	{DLA-1482-1}
 	- libx11 2:1.6.6-1 (low)
-	[stretch] - libx11 <no-dsa> (Minor issue)
+	[stretch] - libx11 2:1.6.4-3+deb9u1
 	[wheezy] - libx11 <no-dsa> (Minor issue)
 	NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/e83722768fd5c467ef61fa159e8c6278770b45c2
 CVE-2018-14606 (An issue was discovered in GitLab Community and Enterprise Edition ...)
@@ -11509,7 +11509,7 @@ CVE-2018-14527 (Feedback.asp in Xiao5uCompany 1.7 has XSS because the XSS protec
 CVE-2018-14526 (An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 ...)
 	{DLA-1462-1}
 	- wpa 2:2.6-18 (bug #905739)
-	[stretch] - wpa <no-dsa> (Minor issue)
+	[stretch] - wpa 2:2.4-1+deb9u2
 	NOTE: https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
 	NOTE: https://w1.fi/security/2018-1/0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
 	NOTE: https://w1.fi/security/2018-1/rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
@@ -11578,7 +11578,7 @@ CVE-2018-14500 (joyplus-cms 1.6.0 has XSS via the ...)
 CVE-2018-1999023 (The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a ...)
 	- wesnoth-1.14 1:1.14.4-1
 	- wesnoth-1.12 <removed>
-	[stretch] - wesnoth-1.12 <no-dsa> (Minor issue)
+	[stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1
 	- wesnoth-1.10 <removed>
 	[jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in Jessie)
 	NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/1
@@ -11712,7 +11712,7 @@ CVE-2018-14448 (Codec::parse in track.cpp in Untrunc through 2018-06-07 has a NU
 CVE-2018-14447 (trim_whitespace in lexer.l in libConfuse v3.2.1 has an out-of-bounds ...)
 	{DLA-1470-1}
 	- confuse 3.2.1+dfsg-5 (bug #904159)
-	[stretch] - confuse <no-dsa> (Minor issue)
+	[stretch] - confuse 3.0+dfsg-2+deb9u1
 	NOTE: https://github.com/martinh/libconfuse/issues/109
 CVE-2018-14446 (MP4Integer32Property::Read in atom_avcC.cpp in MP4v2 2.1.0 allows ...)
 	- mp4v2 <unfixed> (bug #904896)
@@ -12062,7 +12062,7 @@ CVE-2018-14349 (An issue was discovered in Mutt before 1.10.1 and NeoMutt before
 CVE-2018-14348 (libcgroup up to and including 0.41 creates /var/log/cgred with mode ...)
 	{DLA-1472-1}
 	- libcgroup 0.41-8.1 (low; bug #906308)
-	[stretch] - libcgroup <no-dsa> (Minor issue)
+	[stretch] - libcgroup 0.41-8+deb9u1
 	NOTE: https://sourceforge.net/p/libcg/libcg/ci/0d88b73d189ea3440ccaab00418d6469f76fa590/
 	NOTE: cgred not enabled by default, shipped example config logs to syslog by default
 CVE-2018-14347 (GNU Libextractor before 1.7 contains an infinite loop vulnerability in ...)
@@ -13362,7 +13362,7 @@ CVE-2018-13798
 CVE-2018-13796 (An issue was discovered in GNU Mailman before 2.1.28. A crafted URL ...)
 	{DLA-1442-1}
 	- mailman 1:2.1.27-1.1 (bug #903674)
-	[stretch] - mailman <no-dsa> (Minor issue)
+	[stretch] - mailman 1:2.1.23-1+deb9u4
 	NOTE: Fixed in 2.1.28; Regression fix in 2.1.29
 	NOTE: https://mail.python.org/pipermail/mailman-users/2018-July/083536.html
 	NOTE: https://bugs.launchpad.net/mailman/+bug/1780874
@@ -18532,11 +18532,11 @@ CVE-2018-11782
 	RESERVED
 CVE-2018-11781 (Apache SpamAssassin 3.4.2 fixes a local user code injection in the ...)
 	- spamassassin 3.4.2-1 (bug #908971)
-	[stretch] - spamassassin <postponed> (Minor issue; can be fixed via point release)
+	[stretch] - spamassassin 3.4.2-1~deb9u1
 	NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
 CVE-2018-11780 (A potential Remote Code Execution bug exists with the PDFInfo plugin ...)
 	- spamassassin 3.4.2-1 (bug #908970)
-	[stretch] - spamassassin <postponed> (Minor issue; can be fixed via point release)
+	[stretch] - spamassassin 3.4.2-1~deb9u1
 	NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
 CVE-2018-11779
 	RESERVED
@@ -18583,7 +18583,7 @@ CVE-2018-11764
 	RESERVED
 CVE-2018-11763 (In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large ...)
 	- apache2 2.4.35-1 (bug #909591)
-	[stretch] - apache2 <no-dsa> (Minor issue, will be fixed via point release)
+	[stretch] - apache2 2.4.25-3+deb9u6
 	[jessie] - apache2 <not-affected> (Vulnerable code not present)
 	NOTE: HTTP/2 support introduced in 2.4.17
 	NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-11763
@@ -21279,7 +21279,7 @@ CVE-2018-10846 (A cache-based side channel in GnuTLS implementation that leads t
 CVE-2018-10845 (It was found that the GnuTLS implementation of HMAC-SHA-384 was ...)
 	{DLA-1560-1}
 	- gnutls28 3.5.19-1
-	[stretch] - gnutls28 <no-dsa> (Will be fixed via pu)
+	[stretch] - gnutls28 3.5.8-5+deb9u4
 	- gnutls26 <removed>
 	NOTE: https://gitlab.com/gnutls/gnutls/issues/455
 	NOTE: https://gitlab.com/gnutls/gnutls/commit/cc14ec5ece856cb083d64e6a5a8657323da661cb (master)
@@ -21289,7 +21289,7 @@ CVE-2018-10845 (It was found that the GnuTLS implementation of HMAC-SHA-384 was
 CVE-2018-10844 (It was found that the GnuTLS implementation of HMAC-SHA-256 was ...)
 	{DLA-1560-1}
 	- gnutls28 3.5.19-1
-	[stretch] - gnutls28 <no-dsa> (Will be fixed via pu)
+	[stretch] - gnutls28 3.5.8-5+deb9u4
 	- gnutls26 <removed>
 	NOTE: https://gitlab.com/gnutls/gnutls/issues/456
 	NOTE: https://gitlab.com/gnutls/gnutls/commit/29ffa2a1fa4cc396c5d1563a3e5cdca0174de28b (master)
@@ -23461,7 +23461,7 @@ CVE-2018-10018 (The GDASPAMLib.AntiSpam ActiveX control ASK\GDASpam.dll in G DAT
 	NOT-FOR-US: GDASPAMLib.AntiSpam ActiveX control
 CVE-2018-10017 (soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before ...)
 	- libopenmpt 0.3.8-1 (bug #895406)
-	[stretch] - libopenmpt <no-dsa> (Minor issue)
+	[stretch] - libopenmpt 0.2.7386~beta20.3-3+deb9u3
 	NOTE: https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76
 CVE-2018-10016 (Netwide Assembler (NASM) 2.14rc0 has a division-by-zero vulnerability ...)
 	- nasm <unfixed> (bug #895408)
@@ -28368,12 +28368,12 @@ CVE-2018-8021 (Versions of Superset prior to 0.23 used an unsafe load method fro
 CVE-2018-8020 (Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw ...)
 	{DLA-1475-1}
 	- tomcat-native 1.2.17-1
-	[stretch] - tomcat-native <no-dsa> (Minor issue)
+	[stretch] - tomcat-native 1.2.12-2+deb9u2
 	NOTE: https://svn.apache.org/r1832863
 CVE-2018-8019 (When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and ...)
 	{DLA-1475-1}
 	- tomcat-native 1.2.17-1
-	[stretch] - tomcat-native <no-dsa> (Minor issue)
+	[stretch] - tomcat-native 1.2.12-2+deb9u2
 	NOTE: https://svn.apache.org/r1832832
 CVE-2018-8018 (In Apache Ignite before 2.4.8 and 2.5.x before 2.5.3, the serialization  ...)
 	NOT-FOR-US: Apache Ignite
@@ -36021,7 +36021,7 @@ CVE-2018-5711 (gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PH
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=75571
 	NOTE: https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html
 	- libgd2 2.2.5-4.1 (bug #887485)
-	[stretch] - libgd2 <no-dsa> (Minor issue, will be fixed via point release)
+	[stretch] - libgd2 2.2.4-2+deb9u3
 	[jessie] - libgd2 <postponed> (Minor issue, can be fixed along in a future update)
 	NOTE: https://github.com/libgd/libgd/issues/420
 	NOTE: https://github.com/libgd/libgd/commit/a11f47475e6443b7f32d21f2271f28f417e2ac04
@@ -48274,7 +48274,7 @@ CVE-2018-1334 (In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when u
 	NOT-FOR-US: Apache Spark
 CVE-2018-1333 (By specially crafting HTTP/2 requests, workers would be allocated 60 ...)
 	- apache2 2.4.34-1 (bug #904106)
-	[stretch] - apache2 <no-dsa> (Minor issue)
+	[stretch] - apache2 2.4.25-3+deb9u6
 	[jessie] - apache2 <not-affected> (Vulnerable code not present)
 	NOTE: Affects 2.4.18-2.4.33
 	NOTE: HTTP/2 support introduced in 2.4.17
@@ -51927,12 +51927,12 @@ CVE-2018-0362 (A vulnerability in BIOS authentication management of Cisco 5000 S
 CVE-2018-0361 (ClamAV before 0.100.1 lacks a PDF object length check, resulting in an ...)
 	{DLA-1461-1}
 	- clamav 0.100.1+dfsg-1
-	[stretch] - clamav <no-dsa> (clamav is updated via -updates)
+	 [stretch] - clamav 0.100.1+dfsg-0+deb9u1
 	NOTE: https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
 CVE-2018-0360 (ClamAV before 0.100.1 has an HWP integer overflow with a resultant ...)
 	{DLA-1461-1}
 	- clamav 0.100.1+dfsg-1
-	[stretch] - clamav <no-dsa> (clamav is updated via -updates)
+	[stretch] - clamav 0.100.1+dfsg-0+deb9u1
 	NOTE: https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
 CVE-2018-0359 (A vulnerability in the session identification management functionality ...)
 	NOT-FOR-US: Cisco
@@ -56726,7 +56726,7 @@ CVE-2017-15706 (As part of the fix for bug 61201, the documentation for Apache T
 	NOTE: https://lists.apache.org/thread.html/e1ef853fc0079cdb55befbd2dac042934e49288b476d5f6a649e5da2@%3Cannounce.tomcat.apache.org%3E
 CVE-2017-15705 (A denial of service vulnerability was identified that exists in Apache ...)
 	- spamassassin 3.4.2-1 (bug #908969)
-	[stretch] - spamassassin <postponed> (Minor issue; can be fixed via point release)
+	[stretch] - spamassassin 3.4.2-1~deb9u1
 	NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
 CVE-2017-15704
 	REJECTED
@@ -58533,7 +58533,7 @@ CVE-2017-15106
 CVE-2017-15105 (A flaw was found in the way unbound before 1.6.8 validated ...)
 	{DLA-1264-1}
 	- unbound 1.7.1-1 (bug #887733)
-	[stretch] - unbound <no-dsa> (Minor issue, can be fixed via point release)
+	[stretch] - unbound 1.6.0-3+deb9u2
 	[jessie] - unbound <no-dsa> (Minor issue, can be fixed via point release)
 	NOTE: https://unbound.net/downloads/CVE-2017-15105.txt
 	NOTE: https://unbound.net/downloads/patch_cve_2017_15105.diff
@@ -64302,14 +64302,14 @@ CVE-2017-13082 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r
 CVE-2017-13081 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w ...)
 	{DSA-3999-1 DLA-1150-1}
 	- firmware-nonfree 20180825-1
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 	- wpa 2:2.4-1.1
 	NOTE: https://w1.fi/security/2017-1/
 CVE-2017-13080 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the ...)
 	{DSA-3999-1 DLA-1200-1 DLA-1150-1}
 	- firmware-nonfree 20180825-1
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 	- wpa 2:2.4-1.1
 	- linux 4.13.13-1
@@ -64320,21 +64320,21 @@ CVE-2017-13080 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of t
 CVE-2017-13079 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w ...)
 	{DSA-3999-1 DLA-1150-1}
 	- firmware-nonfree 20180825-1
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 	- wpa 2:2.4-1.1
 	NOTE: https://w1.fi/security/2017-1/
 CVE-2017-13078 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the ...)
 	{DSA-3999-1 DLA-1150-1}
 	- firmware-nonfree 20180825-1
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 	- wpa 2:2.4-1.1
 	NOTE: https://w1.fi/security/2017-1/
 CVE-2017-13077 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the ...)
 	{DSA-3999-1 DLA-1150-1}
 	- firmware-nonfree 20180825-1
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 	- wpa 2:2.4-1.1
 	NOTE: https://w1.fi/security/2017-1/
@@ -75588,7 +75588,7 @@ CVE-2017-9418 (SQL injection vulnerability in the WP-Testimonials plugin 3.4.1 f
 	NOT-FOR-US: WP-Testimonials plugin for WordPress
 CVE-2017-9417 (Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute ...)
 	- firmware-nonfree 20180518-1 (bug #869639)
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 	[wheezy] - firmware-nonfree <no-dsa> (non-free not supported)
 	NOTE: https://www.blackhat.com/us-17/briefings/schedule/#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets-7603
@@ -101653,7 +101653,7 @@ CVE-2017-0562 (An elevation of privilege vulnerability in the MediaTek touchscre
 	NOT-FOR-US: MediaTek driver for Android
 CVE-2017-0561 (A remote code execution vulnerability in the Broadcom Wi-Fi firmware ...)
 	- firmware-nonfree 20180518-1 (bug #869639)
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 CVE-2017-0560 (An information disclosure vulnerability in the factory reset process ...)
 	NOT-FOR-US: Android
@@ -132045,7 +132045,7 @@ CVE-2016-0802 (The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4
 	NOT-FOR-US: Android drivers
 CVE-2016-0801 (The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, ...)
 	- firmware-nonfree 20180518-1 (bug #869639)
-	[stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+	[stretch] - firmware-nonfree 20161130-4
 	[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 CVE-2016-0800 (The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ...)
 	- openssl 1.0.0c-2


=====================================
data/next-point-update.txt
=====================================
@@ -1,115 +1,3 @@
-CVE-2017-15105
-	[stretch] - unbound 1.6.0-3+deb9u2
-CVE-2018-10017
-	[stretch] - libopenmpt 0.2.7386~beta20.3-3+deb9u3
-CVE-2018-0360
-	[stretch] - clamav 0.100.1+dfsg-0+deb9u1
-CVE-2018-0361
-	[stretch] - clamav 0.100.1+dfsg-0+deb9u1
-CVE-2018-14526
-	[stretch] - wpa 2:2.4-1+deb9u2
-CVE-2015-9262
-	[stretch] - libxcursor 1:1.1.14-1+deb9u2
-CVE-2018-14447
-	[stretch] - confuse 3.0+dfsg-2+deb9u1
-CVE-2018-15599
-	[stretch] - dropbear 2016.74-5+deb9u1
-CVE-2018-14348
-	[stretch] - libcgroup 0.41-8+deb9u1
-CVE-2018-14622
-	[stretch] - libtirpc 0.2.5-1.2+deb9u1
-CVE-2018-13796
-	[stretch] - mailman 1:2.1.23-1+deb9u4
-CVE-2018-1000637
-	[stretch] - zutils 1.5-5+deb9u1
-CVE-2018-1000632
-	[stretch] - dom4j 1.6.1+dfsg.3-2+deb9u1
-CVE-2018-8019
-	[stretch] - tomcat-native 1.2.12-2+deb9u2
-CVE-2018-8020
-	[stretch] - tomcat-native 1.2.12-2+deb9u2
-CVE-2018-16391
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16392
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16393
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16418
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16419
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16420
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16421
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16422
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16423
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16424
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16425
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16426
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16427
-	[stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-5711
-	[stretch] - libgd2 2.2.4-2+deb9u3
-CVE-2018-1000222
-	[stretch] - libgd2 2.2.4-2+deb9u3
-CVE-2018-10844
-	[stretch] - gnutls28 3.5.8-5+deb9u4
-CVE-2018-10845
-	[stretch] - gnutls28 3.5.8-5+deb9u4
-CVE-2018-14598
-	[stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2018-14599
-	[stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2018-14600
-	[stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2016-0801
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-0561
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-9417
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-13077
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-13078
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-13079
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-13080
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2017-13081
-	[stretch] - firmware-nonfree 20161130-4
-CVE-2018-15378
-	[stretch] - clamav 0.100.2+dfsg-0+deb9u1
-CVE-2018-17088
-	[stretch] - jhead 1:3.00-4+deb9u1
-CVE-2018-16554
-	[stretch] - jhead 1:3.00-4+deb9u1
-CVE-2018-18584
-	[stretch] - libmspack 0.5-1+deb9u3
-CVE-2018-18585
-	[stretch] - libmspack 0.5-1+deb9u3
-CVE-2018-15688
-	[stretch] - systemd 232-25+deb9u6
-CVE-2017-15705
-	[stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-11780
-	[stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-11781
-	[stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-1999023
-	[stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1
-CVE-2018-15688
-	[stretch] - network-manager 1.6.2-3+deb9u2
-CVE-2018-1333
-	[stretch] - apache2 2.4.25-3+deb9u6
-CVE-2018-11763
-	[stretch] - apache2 2.4.25-3+deb9u6
 CVE-2017-12424
 	[stretch] - shadow 1:4.4-4.1+deb9u1
 CVE-2015-9261 [busybox: pointer misuse unziping files]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/0b5d0c1b989f2a36b7a45649c2fdf46bb3726170

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/0b5d0c1b989f2a36b7a45649c2fdf46bb3726170
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181110/4678ce39/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list