[Git][security-tracker-team/security-tracker][master] stretch triage
Moritz Muehlenhoff
jmm at debian.org
Thu Oct 4 21:56:57 BST 2018
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4e38ad89 by Moritz Muehlenhoff at 2018-10-04T20:56:29Z
stretch triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -328,6 +328,7 @@ CVE-2018-17826 (HisiPHP 1.0.8 allows CSRF via admin.php/admin/user/adduser.html
NOT-FOR-US: HisiPHP
CVE-2018-17825 (An issue was discovered in AdPlug 2.3.1. There are several double-free ...)
- adplug <unfixed>
+ [stretch] - adplug <no-dsa> (Minor issue)
NOTE: https://github.com/adplug/adplug/issues/67
NOTE: https://github.com/adplug/adplug/commit/19ebb61bf92262dc1868de10ba5a211db249ce76
CVE-2018-17824
@@ -3251,7 +3252,8 @@ CVE-2018-16550 (TeamViewer 10.x through 13.x allows remote attackers to bypass t
CVE-2018-16549 (HScripts PHP File Browser Script v1.0 allows Directory Traversal via ...)
NOT-FOR-US: HScripts PHP File Browser Script
CVE-2018-16548 (An issue was discovered in ZZIPlib through 0.13.69. There is a memory ...)
- - zziplib <unfixed>
+ - zziplib <unfixed> (low)
+ [stretch] - zziplib <no-dsa> (Minor issue)
[jessie] - zziplib <ignored> (Minor issue)
NOTE: https://github.com/gdraheim/zziplib/issues/58
CVE-2018-16547
@@ -15230,7 +15232,8 @@ CVE-2018-11776 (Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer fr
- libstruts1.2-java <not-affected> (Specific to 2.x)
NOTE: https://cwiki.apache.org/confluence/display/WW/S2-057
CVE-2018-11775 (TLS hostname verification when using the Apache ActiveMQ Client before ...)
- - activemq 5.15.6-1 (bug #908950)
+ - activemq 5.15.6-1 (low; bug #908950)
+ [stretch] - activemq <no-dsa> (Minor issue)
NOTE: http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt
NOTE: https://git-wip-us.apache.org/repos/asf?p=activemq.git;a=commit;h=bde7097fb8173cf871827df7811b3865679b963d
NOTE: https://git-wip-us.apache.org/repos/asf?p=activemq.git;a=commit;h=02971a40e281713a8397d3a1809c164b594abfbb
@@ -76769,6 +76772,7 @@ CVE-2017-7894 (WinDjView 2.1 might allow user-assisted attackers to execute code
NOT-FOR-US: WinDjView
CVE-2017-7893 (In SaltStack Salt before 2016.3.6, compromised salt-minions can ...)
- salt 2016.11.5+ds-1
+ [stretch] - salt <no-dsa> (Minor issue)
NOTE: https://docs.saltstack.com/en/2017.7/topics/releases/2016.3.6.html
NOTE: https://github.com/saltstack/salt/issues/48939
NOTE: https://github.com/saltstack/salt/commit/0a0f46fb1478be5eb2f90882a90390cb35ec43cb
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/4e38ad8905c952471a74d7f5573641591656e5e2
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/4e38ad8905c952471a74d7f5573641591656e5e2
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181004/8853ff37/attachment.html>
More information about the debian-security-tracker-commits
mailing list