[Git][security-tracker-team/security-tracker][master] Sync proposed update list with updates really included in point release
Salvatore Bonaccorso
carnil at debian.org
Sat Nov 10 09:09:52 GMT 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0b5d0c1b by Salvatore Bonaccorso at 2018-11-10T09:07:45Z
Sync proposed update list with updates really included in point release
Verified against dak log itself, exception in version added is the
clamav version for the first upload round as the fix was already in the
earlier version uploaded and thus known in the archive.
- - - - -
2 changed files:
- data/CVE/list
- data/next-point-update.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1321,7 +1321,7 @@ CVE-2018-18576
CVE-2018-18585 (chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts ...)
{DLA-1555-1}
- libmspack 0.8-1 (bug #911637)
- [stretch] - libmspack <no-dsa> (Minor issue)
+ [stretch] - libmspack 0.5-1+deb9u3
NOTE: https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f
NOTE: https://www.openwall.com/lists/oss-security/2018/10/22/1
CVE-2018-18586 (** DISPUTED ** chmextract.c in the chmextract sample program, as ...)
@@ -1337,7 +1337,7 @@ CVE-2018-18584 (In mspack/cab.h in libmspack before 0.8alpha and cabextract befo
- cabextract 1.4-5
NOTE: Starting with 1.4-5 cabextract uses the mspack system library
- libmspack 0.8-1 (bug #911640)
- [stretch] - libmspack <no-dsa> (Minor issue)
+ [stretch] - libmspack 0.5-1+deb9u3
NOTE: https://github.com/kyz/libmspack/commit/40ef1b4093d77ad3a5cfcee1f5cb6108b3a3bcc2
NOTE: https://www.openwall.com/lists/oss-security/2018/10/22/1
CVE-2018-18575
@@ -6444,11 +6444,11 @@ CVE-2018-16514
RESERVED
CVE-2018-17088 (The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may ...)
- jhead 1:3.00-8 (bug #907925)
- [stretch] - jhead <no-dsa> (Minor issue)
+ [stretch] - jhead 1:3.00-4+deb9u1
[jessie] - jhead <no-dsa> (Minor issue)
CVE-2018-16554 (The ProcessGpsInfo function of the gpsinfo.c file of jhead 3.00 may ...)
- jhead 1:3.00-8 (bug #908176)
- [stretch] - jhead <no-dsa> (Minor issue)
+ [stretch] - jhead 1:3.00-4+deb9u1
[jessie] - jhead <no-dsa> (Minor issue)
CVE-2018-16515 (Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events ...)
- matrix-synapse 0.33.3.1-1 (bug #908044)
@@ -6654,61 +6654,61 @@ CVE-2018-16428 (In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmar
NOTE: https://gitlab.gnome.org/GNOME/glib/issues/1364
CVE-2018-16427 (Various out of bounds reads when handling responses in OpenSC before ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16426 (Endless recursion when handling responses from an IAS-ECC card in ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16425 (A double free when handling responses from an HSM Card in ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16424 (A double free when handling responses in read_file in tools/egk-tool.c ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16423 (A double free when handling responses from a smartcard in ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16422 (A single byte buffer overflow when handling responses from an esteid ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16421 (Several buffer overflows when handling responses from a CAC Card in ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16420 (Several buffer overflows when handling responses from an ePass 2003 ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16419 (Several buffer overflows when handling responses from a Cryptoflex card ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16418 (A buffer overflow when handling string concatenation in util_acl_to_str ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
@@ -6794,19 +6794,19 @@ CVE-2018-16394
RESERVED
CVE-2018-16393 (Several buffer overflows when handling responses from a Gemsafe V1 ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16392 (Several buffer overflows when handling responses from a TCOS Card in ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
CVE-2018-16391 (Several buffer overflows when handling responses from a Muscle Card in ...)
- opensc 0.19.0~rc1-1 (low; bug #909444)
- [stretch] - opensc <no-dsa> (Minor issue)
+ [stretch] - opensc 0.16.0-3+deb9u1
[jessie] - opensc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
@@ -8552,10 +8552,10 @@ CVE-2018-15689
RESERVED
CVE-2018-15688 (A buffer overflow vulnerability in the dhcp6 client of systemd allows ...)
- network-manager 1.14.4-2
- [stretch] - network-manager <no-dsa> (Minor issue; internal dhcp implementation not used by default)
+ [stretch] - network-manager 1.6.2-3+deb9u2
[jessie] - network-manager <not-affected> (vulnerable code not present)
- systemd 239-11 (bug #912008)
- [stretch] - systemd <postponed> (Minor issue; not enabled by default in Debian, will be fixed via point release)
+ [stretch] - systemd 232-25+deb9u6
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1639067
NOTE: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921
NOTE: https://github.com/systemd/systemd/commit/49653743f69658aeeebdb14faf1ab158f1f2cb20
@@ -8761,7 +8761,7 @@ CVE-2018-15600
CVE-2018-15599 (The recv_msg_userauth_request function in svr-auth.c in Dropbear ...)
{DLA-1476-1}
- dropbear 2018.76-4 (bug #906890)
- [stretch] - dropbear <no-dsa> (Minor issue)
+ [stretch] - dropbear 2016.74-5+deb9u1
NOTE: http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html
NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00
CVE-2018-15598 (Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the ...)
@@ -8778,7 +8778,7 @@ CVE-2018-1000224 (Godot Engine version All versions prior to 2.1.5, all 3.0 vers
NOT-FOR-US: Godot
CVE-2018-1000222 (Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability ...)
- libgd2 2.2.5-4.1 (low; bug #906886)
- [stretch] - libgd2 <no-dsa> (Minor issue, will be fixed via point release)
+ [stretch] - libgd2 2.2.4-2+deb9u3
[jessie] - libgd2 <postponed> (Minor issue)
NOTE: https://github.com/libgd/libgd/issues/447
NOTE: https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
@@ -8890,7 +8890,7 @@ CVE-2018-1000633 (The Open Microscopy Environment OMERO.web version prior to 5.4
CVE-2018-1000632 (dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection ...)
{DLA-1517-1}
- dom4j 2.1.1-1 (low)
- [stretch] - dom4j <no-dsa> (Minor issue, will be fixed via spu)
+ [stretch] - dom4j 1.6.1+dfsg.3-2+deb9u1
NOTE: https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387
NOTE: https://github.com/dom4j/dom4j/issues/48
CVE-2003-1605 (curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote ...)
@@ -9321,7 +9321,7 @@ CVE-2018-15379 (A vulnerability in which the HTTP web server for Cisco Prime ...
CVE-2018-15378 (A vulnerability in ClamAV versions prior to 0.100.2 could allow an ...)
{DLA-1553-1}
- clamav 0.100.2+dfsg-1 (bug #910430)
- [stretch] - clamav <no-dsa> (clamav is updated via -updates)
+ [stretch] - clamav 0.100.2+dfsg-0+deb9u1
NOTE: https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html
NOTE: http://lists.clamav.net/pipermail/clamav-announce/2018/000033.html
CVE-2018-15377 (A vulnerability in the Cisco Network Plug and Play agent, also ...)
@@ -10251,7 +10251,7 @@ CVE-2018-14939 (The get_app_path function in desktop/unx/source/start.c in Libre
CVE-2018-1000637 (zutils version prior to version 1.8-pre2 contains a Buffer Overflow ...)
{DLA-1505-1}
- zutils 1.7-3 (bug #902936; bug #904819)
- [stretch] - zutils <no-dsa> (Minor issue)
+ [stretch] - zutils 1.5-5+deb9u1
NOTE: http://www.openwall.com/lists/oss-security/2018/08/05/1
NOTE: https://lists.nongnu.org/archive/html/zutils-bug/2018-08/msg00000.html
NOTE: Fixed by: upstream/0001-zcat-buffer-overrun.patch (in 1.7-3)
@@ -10631,7 +10631,7 @@ CVE-2018-14778
CVE-2015-9262 (_XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows ...)
{DLA-1469-1}
- libxcursor 1:1.1.15-1 (low; bug #906012)
- [stretch] - libxcursor <no-dsa> (Minor issue)
+ [stretch] - libxcursor 1:1.1.14-1+deb9u2
NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=90857
NOTE: https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05
CVE-2018-14777 (An issue was discovered in DataLife Engine (DLE) through 13.0. An ...)
@@ -11155,7 +11155,7 @@ CVE-2018-14622 (A null-pointer dereference vulnerability was found in libtirpc b
{DLA-1487-1}
[experimental] - libtirpc 1.0.2-0.1
- libtirpc 0.2.5-1.3 (bug #907608)
- [stretch] - libtirpc <no-dsa> (Minor issue)
+ [stretch] - libtirpc 0.2.5-1.2+deb9u1
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1620293
NOTE: https://bugzilla.novell.com/show_bug.cgi?id=968175
NOTE: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0
@@ -11222,19 +11222,19 @@ CVE-2018-14607 (Thomson Reuters UltraTax CS 2017 on Windows, in a client/server
CVE-2018-14600 (An issue was discovered in libX11 through 1.6.5. The function ...)
{DLA-1482-1}
- libx11 2:1.6.6-1 (low)
- [stretch] - libx11 <no-dsa> (Minor issue)
+ [stretch] - libx11 2:1.6.4-3+deb9u1
[wheezy] - libx11 <no-dsa> (Minor issue)
NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/dbf72805fd9d7b1846fe9a11b46f3994bfc27fea
CVE-2018-14599 (An issue was discovered in libX11 through 1.6.5. The function ...)
{DLA-1482-1}
- libx11 2:1.6.6-1 (low)
- [stretch] - libx11 <no-dsa> (Minor issue)
+ [stretch] - libx11 2:1.6.4-3+deb9u1
[wheezy] - libx11 <no-dsa> (Minor issue)
NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/b469da1430cdcee06e31c6251b83aede072a1ff0
CVE-2018-14598 (An issue was discovered in XListExtensions in ListExt.c in libX11 ...)
{DLA-1482-1}
- libx11 2:1.6.6-1 (low)
- [stretch] - libx11 <no-dsa> (Minor issue)
+ [stretch] - libx11 2:1.6.4-3+deb9u1
[wheezy] - libx11 <no-dsa> (Minor issue)
NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/e83722768fd5c467ef61fa159e8c6278770b45c2
CVE-2018-14606 (An issue was discovered in GitLab Community and Enterprise Edition ...)
@@ -11509,7 +11509,7 @@ CVE-2018-14527 (Feedback.asp in Xiao5uCompany 1.7 has XSS because the XSS protec
CVE-2018-14526 (An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 ...)
{DLA-1462-1}
- wpa 2:2.6-18 (bug #905739)
- [stretch] - wpa <no-dsa> (Minor issue)
+ [stretch] - wpa 2:2.4-1+deb9u2
NOTE: https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
NOTE: https://w1.fi/security/2018-1/0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
NOTE: https://w1.fi/security/2018-1/rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
@@ -11578,7 +11578,7 @@ CVE-2018-14500 (joyplus-cms 1.6.0 has XSS via the ...)
CVE-2018-1999023 (The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a ...)
- wesnoth-1.14 1:1.14.4-1
- wesnoth-1.12 <removed>
- [stretch] - wesnoth-1.12 <no-dsa> (Minor issue)
+ [stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1
- wesnoth-1.10 <removed>
[jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in Jessie)
NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/1
@@ -11712,7 +11712,7 @@ CVE-2018-14448 (Codec::parse in track.cpp in Untrunc through 2018-06-07 has a NU
CVE-2018-14447 (trim_whitespace in lexer.l in libConfuse v3.2.1 has an out-of-bounds ...)
{DLA-1470-1}
- confuse 3.2.1+dfsg-5 (bug #904159)
- [stretch] - confuse <no-dsa> (Minor issue)
+ [stretch] - confuse 3.0+dfsg-2+deb9u1
NOTE: https://github.com/martinh/libconfuse/issues/109
CVE-2018-14446 (MP4Integer32Property::Read in atom_avcC.cpp in MP4v2 2.1.0 allows ...)
- mp4v2 <unfixed> (bug #904896)
@@ -12062,7 +12062,7 @@ CVE-2018-14349 (An issue was discovered in Mutt before 1.10.1 and NeoMutt before
CVE-2018-14348 (libcgroup up to and including 0.41 creates /var/log/cgred with mode ...)
{DLA-1472-1}
- libcgroup 0.41-8.1 (low; bug #906308)
- [stretch] - libcgroup <no-dsa> (Minor issue)
+ [stretch] - libcgroup 0.41-8+deb9u1
NOTE: https://sourceforge.net/p/libcg/libcg/ci/0d88b73d189ea3440ccaab00418d6469f76fa590/
NOTE: cgred not enabled by default, shipped example config logs to syslog by default
CVE-2018-14347 (GNU Libextractor before 1.7 contains an infinite loop vulnerability in ...)
@@ -13362,7 +13362,7 @@ CVE-2018-13798
CVE-2018-13796 (An issue was discovered in GNU Mailman before 2.1.28. A crafted URL ...)
{DLA-1442-1}
- mailman 1:2.1.27-1.1 (bug #903674)
- [stretch] - mailman <no-dsa> (Minor issue)
+ [stretch] - mailman 1:2.1.23-1+deb9u4
NOTE: Fixed in 2.1.28; Regression fix in 2.1.29
NOTE: https://mail.python.org/pipermail/mailman-users/2018-July/083536.html
NOTE: https://bugs.launchpad.net/mailman/+bug/1780874
@@ -18532,11 +18532,11 @@ CVE-2018-11782
RESERVED
CVE-2018-11781 (Apache SpamAssassin 3.4.2 fixes a local user code injection in the ...)
- spamassassin 3.4.2-1 (bug #908971)
- [stretch] - spamassassin <postponed> (Minor issue; can be fixed via point release)
+ [stretch] - spamassassin 3.4.2-1~deb9u1
NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
CVE-2018-11780 (A potential Remote Code Execution bug exists with the PDFInfo plugin ...)
- spamassassin 3.4.2-1 (bug #908970)
- [stretch] - spamassassin <postponed> (Minor issue; can be fixed via point release)
+ [stretch] - spamassassin 3.4.2-1~deb9u1
NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
CVE-2018-11779
RESERVED
@@ -18583,7 +18583,7 @@ CVE-2018-11764
RESERVED
CVE-2018-11763 (In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large ...)
- apache2 2.4.35-1 (bug #909591)
- [stretch] - apache2 <no-dsa> (Minor issue, will be fixed via point release)
+ [stretch] - apache2 2.4.25-3+deb9u6
[jessie] - apache2 <not-affected> (Vulnerable code not present)
NOTE: HTTP/2 support introduced in 2.4.17
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-11763
@@ -21279,7 +21279,7 @@ CVE-2018-10846 (A cache-based side channel in GnuTLS implementation that leads t
CVE-2018-10845 (It was found that the GnuTLS implementation of HMAC-SHA-384 was ...)
{DLA-1560-1}
- gnutls28 3.5.19-1
- [stretch] - gnutls28 <no-dsa> (Will be fixed via pu)
+ [stretch] - gnutls28 3.5.8-5+deb9u4
- gnutls26 <removed>
NOTE: https://gitlab.com/gnutls/gnutls/issues/455
NOTE: https://gitlab.com/gnutls/gnutls/commit/cc14ec5ece856cb083d64e6a5a8657323da661cb (master)
@@ -21289,7 +21289,7 @@ CVE-2018-10845 (It was found that the GnuTLS implementation of HMAC-SHA-384 was
CVE-2018-10844 (It was found that the GnuTLS implementation of HMAC-SHA-256 was ...)
{DLA-1560-1}
- gnutls28 3.5.19-1
- [stretch] - gnutls28 <no-dsa> (Will be fixed via pu)
+ [stretch] - gnutls28 3.5.8-5+deb9u4
- gnutls26 <removed>
NOTE: https://gitlab.com/gnutls/gnutls/issues/456
NOTE: https://gitlab.com/gnutls/gnutls/commit/29ffa2a1fa4cc396c5d1563a3e5cdca0174de28b (master)
@@ -23461,7 +23461,7 @@ CVE-2018-10018 (The GDASPAMLib.AntiSpam ActiveX control ASK\GDASpam.dll in G DAT
NOT-FOR-US: GDASPAMLib.AntiSpam ActiveX control
CVE-2018-10017 (soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and libopenmpt before ...)
- libopenmpt 0.3.8-1 (bug #895406)
- [stretch] - libopenmpt <no-dsa> (Minor issue)
+ [stretch] - libopenmpt 0.2.7386~beta20.3-3+deb9u3
NOTE: https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76
CVE-2018-10016 (Netwide Assembler (NASM) 2.14rc0 has a division-by-zero vulnerability ...)
- nasm <unfixed> (bug #895408)
@@ -28368,12 +28368,12 @@ CVE-2018-8021 (Versions of Superset prior to 0.23 used an unsafe load method fro
CVE-2018-8020 (Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw ...)
{DLA-1475-1}
- tomcat-native 1.2.17-1
- [stretch] - tomcat-native <no-dsa> (Minor issue)
+ [stretch] - tomcat-native 1.2.12-2+deb9u2
NOTE: https://svn.apache.org/r1832863
CVE-2018-8019 (When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and ...)
{DLA-1475-1}
- tomcat-native 1.2.17-1
- [stretch] - tomcat-native <no-dsa> (Minor issue)
+ [stretch] - tomcat-native 1.2.12-2+deb9u2
NOTE: https://svn.apache.org/r1832832
CVE-2018-8018 (In Apache Ignite before 2.4.8 and 2.5.x before 2.5.3, the serialization ...)
NOT-FOR-US: Apache Ignite
@@ -36021,7 +36021,7 @@ CVE-2018-5711 (gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PH
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=75571
NOTE: https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html
- libgd2 2.2.5-4.1 (bug #887485)
- [stretch] - libgd2 <no-dsa> (Minor issue, will be fixed via point release)
+ [stretch] - libgd2 2.2.4-2+deb9u3
[jessie] - libgd2 <postponed> (Minor issue, can be fixed along in a future update)
NOTE: https://github.com/libgd/libgd/issues/420
NOTE: https://github.com/libgd/libgd/commit/a11f47475e6443b7f32d21f2271f28f417e2ac04
@@ -48274,7 +48274,7 @@ CVE-2018-1334 (In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when u
NOT-FOR-US: Apache Spark
CVE-2018-1333 (By specially crafting HTTP/2 requests, workers would be allocated 60 ...)
- apache2 2.4.34-1 (bug #904106)
- [stretch] - apache2 <no-dsa> (Minor issue)
+ [stretch] - apache2 2.4.25-3+deb9u6
[jessie] - apache2 <not-affected> (Vulnerable code not present)
NOTE: Affects 2.4.18-2.4.33
NOTE: HTTP/2 support introduced in 2.4.17
@@ -51927,12 +51927,12 @@ CVE-2018-0362 (A vulnerability in BIOS authentication management of Cisco 5000 S
CVE-2018-0361 (ClamAV before 0.100.1 lacks a PDF object length check, resulting in an ...)
{DLA-1461-1}
- clamav 0.100.1+dfsg-1
- [stretch] - clamav <no-dsa> (clamav is updated via -updates)
+ [stretch] - clamav 0.100.1+dfsg-0+deb9u1
NOTE: https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
CVE-2018-0360 (ClamAV before 0.100.1 has an HWP integer overflow with a resultant ...)
{DLA-1461-1}
- clamav 0.100.1+dfsg-1
- [stretch] - clamav <no-dsa> (clamav is updated via -updates)
+ [stretch] - clamav 0.100.1+dfsg-0+deb9u1
NOTE: https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
CVE-2018-0359 (A vulnerability in the session identification management functionality ...)
NOT-FOR-US: Cisco
@@ -56726,7 +56726,7 @@ CVE-2017-15706 (As part of the fix for bug 61201, the documentation for Apache T
NOTE: https://lists.apache.org/thread.html/e1ef853fc0079cdb55befbd2dac042934e49288b476d5f6a649e5da2@%3Cannounce.tomcat.apache.org%3E
CVE-2017-15705 (A denial of service vulnerability was identified that exists in Apache ...)
- spamassassin 3.4.2-1 (bug #908969)
- [stretch] - spamassassin <postponed> (Minor issue; can be fixed via point release)
+ [stretch] - spamassassin 3.4.2-1~deb9u1
NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
CVE-2017-15704
REJECTED
@@ -58533,7 +58533,7 @@ CVE-2017-15106
CVE-2017-15105 (A flaw was found in the way unbound before 1.6.8 validated ...)
{DLA-1264-1}
- unbound 1.7.1-1 (bug #887733)
- [stretch] - unbound <no-dsa> (Minor issue, can be fixed via point release)
+ [stretch] - unbound 1.6.0-3+deb9u2
[jessie] - unbound <no-dsa> (Minor issue, can be fixed via point release)
NOTE: https://unbound.net/downloads/CVE-2017-15105.txt
NOTE: https://unbound.net/downloads/patch_cve_2017_15105.diff
@@ -64302,14 +64302,14 @@ CVE-2017-13082 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r
CVE-2017-13081 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w ...)
{DSA-3999-1 DLA-1150-1}
- firmware-nonfree 20180825-1
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
- wpa 2:2.4-1.1
NOTE: https://w1.fi/security/2017-1/
CVE-2017-13080 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the ...)
{DSA-3999-1 DLA-1200-1 DLA-1150-1}
- firmware-nonfree 20180825-1
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
- wpa 2:2.4-1.1
- linux 4.13.13-1
@@ -64320,21 +64320,21 @@ CVE-2017-13080 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of t
CVE-2017-13079 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w ...)
{DSA-3999-1 DLA-1150-1}
- firmware-nonfree 20180825-1
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
- wpa 2:2.4-1.1
NOTE: https://w1.fi/security/2017-1/
CVE-2017-13078 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the ...)
{DSA-3999-1 DLA-1150-1}
- firmware-nonfree 20180825-1
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
- wpa 2:2.4-1.1
NOTE: https://w1.fi/security/2017-1/
CVE-2017-13077 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the ...)
{DSA-3999-1 DLA-1150-1}
- firmware-nonfree 20180825-1
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
- wpa 2:2.4-1.1
NOTE: https://w1.fi/security/2017-1/
@@ -75588,7 +75588,7 @@ CVE-2017-9418 (SQL injection vulnerability in the WP-Testimonials plugin 3.4.1 f
NOT-FOR-US: WP-Testimonials plugin for WordPress
CVE-2017-9417 (Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute ...)
- firmware-nonfree 20180518-1 (bug #869639)
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
[wheezy] - firmware-nonfree <no-dsa> (non-free not supported)
NOTE: https://www.blackhat.com/us-17/briefings/schedule/#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets-7603
@@ -101653,7 +101653,7 @@ CVE-2017-0562 (An elevation of privilege vulnerability in the MediaTek touchscre
NOT-FOR-US: MediaTek driver for Android
CVE-2017-0561 (A remote code execution vulnerability in the Broadcom Wi-Fi firmware ...)
- firmware-nonfree 20180518-1 (bug #869639)
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
CVE-2017-0560 (An information disclosure vulnerability in the factory reset process ...)
NOT-FOR-US: Android
@@ -132045,7 +132045,7 @@ CVE-2016-0802 (The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4
NOT-FOR-US: Android drivers
CVE-2016-0801 (The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, ...)
- firmware-nonfree 20180518-1 (bug #869639)
- [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+ [stretch] - firmware-nonfree 20161130-4
[jessie] - firmware-nonfree <no-dsa> (non-free not supported)
CVE-2016-0800 (The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ...)
- openssl 1.0.0c-2
=====================================
data/next-point-update.txt
=====================================
@@ -1,115 +1,3 @@
-CVE-2017-15105
- [stretch] - unbound 1.6.0-3+deb9u2
-CVE-2018-10017
- [stretch] - libopenmpt 0.2.7386~beta20.3-3+deb9u3
-CVE-2018-0360
- [stretch] - clamav 0.100.1+dfsg-0+deb9u1
-CVE-2018-0361
- [stretch] - clamav 0.100.1+dfsg-0+deb9u1
-CVE-2018-14526
- [stretch] - wpa 2:2.4-1+deb9u2
-CVE-2015-9262
- [stretch] - libxcursor 1:1.1.14-1+deb9u2
-CVE-2018-14447
- [stretch] - confuse 3.0+dfsg-2+deb9u1
-CVE-2018-15599
- [stretch] - dropbear 2016.74-5+deb9u1
-CVE-2018-14348
- [stretch] - libcgroup 0.41-8+deb9u1
-CVE-2018-14622
- [stretch] - libtirpc 0.2.5-1.2+deb9u1
-CVE-2018-13796
- [stretch] - mailman 1:2.1.23-1+deb9u4
-CVE-2018-1000637
- [stretch] - zutils 1.5-5+deb9u1
-CVE-2018-1000632
- [stretch] - dom4j 1.6.1+dfsg.3-2+deb9u1
-CVE-2018-8019
- [stretch] - tomcat-native 1.2.12-2+deb9u2
-CVE-2018-8020
- [stretch] - tomcat-native 1.2.12-2+deb9u2
-CVE-2018-16391
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16392
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16393
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16418
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16419
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16420
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16421
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16422
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16423
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16424
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16425
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16426
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16427
- [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-5711
- [stretch] - libgd2 2.2.4-2+deb9u3
-CVE-2018-1000222
- [stretch] - libgd2 2.2.4-2+deb9u3
-CVE-2018-10844
- [stretch] - gnutls28 3.5.8-5+deb9u4
-CVE-2018-10845
- [stretch] - gnutls28 3.5.8-5+deb9u4
-CVE-2018-14598
- [stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2018-14599
- [stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2018-14600
- [stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2016-0801
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-0561
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-9417
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13077
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13078
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13079
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13080
- [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13081
- [stretch] - firmware-nonfree 20161130-4
-CVE-2018-15378
- [stretch] - clamav 0.100.2+dfsg-0+deb9u1
-CVE-2018-17088
- [stretch] - jhead 1:3.00-4+deb9u1
-CVE-2018-16554
- [stretch] - jhead 1:3.00-4+deb9u1
-CVE-2018-18584
- [stretch] - libmspack 0.5-1+deb9u3
-CVE-2018-18585
- [stretch] - libmspack 0.5-1+deb9u3
-CVE-2018-15688
- [stretch] - systemd 232-25+deb9u6
-CVE-2017-15705
- [stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-11780
- [stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-11781
- [stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-1999023
- [stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1
-CVE-2018-15688
- [stretch] - network-manager 1.6.2-3+deb9u2
-CVE-2018-1333
- [stretch] - apache2 2.4.25-3+deb9u6
-CVE-2018-11763
- [stretch] - apache2 2.4.25-3+deb9u6
CVE-2017-12424
[stretch] - shadow 1:4.4-4.1+deb9u1
CVE-2015-9261 [busybox: pointer misuse unziping files]
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/0b5d0c1b989f2a36b7a45649c2fdf46bb3726170
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/0b5d0c1b989f2a36b7a45649c2fdf46bb3726170
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181110/4678ce39/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list