[Git][security-tracker-team/security-tracker][master] stretch triage

Moritz Muehlenhoff jmm at debian.org
Sat Oct 27 08:46:56 BST 2018


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6e3d2c46 by Moritz Muehlenhoff at 2018-10-27T07:45:31Z
stretch triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4,7 +4,8 @@ CVE-2018-18653 (The Linux kernel, as used in Ubuntu 18.10 and when booted with U
 CVE-2018-18652 (A remote command execution vulnerability in Veritas NetBackup Appliance ...)
 	NOT-FOR-US: Veritas NetBackup Appliance
 CVE-2018-18655 (Prayer through 1.3.5 sends a Referer header, containing a user's ...)
-	- prayer <unfixed> (bug #911842)
+	- prayer <unfixed> (low; bug #911842)
+	[stretch] - prayer <no-dsa> (Minor issue)
 CVE-2018-18654 (Crossroads 2.81 does not properly handle the /tmp directory during a ...)
 	- crossroads <unfixed> (unimportant; bug #911877)
 	NOTE: Issue exploitable only during build of package
@@ -240,7 +241,8 @@ CVE-2018-18557 (LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG
 	NOTE: https://gitlab.com/libtiff/libtiff/merge_requests/38
 	NOTE: https://gitlab.com/libtiff/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66
 CVE-2018-XXXX [out of bounds memory read in MED files]
-	- libopenmpt 0.3.13-1 (bug #911584)
+	- libopenmpt 0.3.13-1 (low; bug #911584)
+	[stretch] - libopenmpt <no-dsa> (Minor issue)
 	NOTE: https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/
 	NOTE: https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=10903
 CVE-2018-18556
@@ -1867,7 +1869,8 @@ CVE-2018-17943
 	RESERVED
 CVE-2018-17942 (The convert_to_decimal function in vasnprintf.c in Gnulib before ...)
 	{DLA-1543-1}
-	- gnulib <unfixed> (bug #910757)
+	- gnulib <unfixed> (low; bug #910757)
+	[stretch] - gnulib <no-dsa> (Minor issue)
 	NOTE: pspp affecting bug: https://savannah.gnu.org/bugs/?func=detailitem&item_id=54686
 	NOTE: https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html
 	NOTE: https://github.com/coreutils/gnulib/commit/278b4175c9d7dd47c1a3071554aac02add3b3c35
@@ -10275,6 +10278,7 @@ CVE-2018-14500 (joyplus-cms 1.6.0 has XSS via the ...)
 CVE-2018-1999023 (The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a ...)
 	- wesnoth-1.14 1:1.14.4-1
 	- wesnoth-1.12 <removed>
+	[stretch] - wesnoth-1.12 <ignored> (Scheduled for removal from stretch)
 	- wesnoth-1.10 <removed>
 	[jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in Jessie)
 	NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/1
@@ -11458,7 +11462,8 @@ CVE-2018-14043 (mstdlib (aka the M Standard Library for C) 1.2.0 has incorrect f
 	NOT-FOR-US: mstdlib
 CVE-2018-14042 (In Bootstrap before 4.1.2, XSS is possible in the data-container ...)
 	- twitter-bootstrap <not-affected> (Vulnerable code not present)
-	- twitter-bootstrap3 <unfixed> (bug #907414)
+	- twitter-bootstrap3 <unfixed> (low; bug #907414)
+	[stretch] - twitter-bootstrap3 <no-dsa> (Minor issue)
 	[jessie] - twitter-bootstrap3 <not-affected> (Vulnerable code not present)
 	NOTE: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
 	NOTE: https://github.com/twbs/bootstrap/issues/26423
@@ -11467,7 +11472,8 @@ CVE-2018-14042 (In Bootstrap before 4.1.2, XSS is possible in the data-container
 	NOTE: https://github.com/twbs/bootstrap/pull/26630/commits/efca80bb5bb34546a2e7a9488b89f71457d2ad92
 CVE-2018-14041 (In Bootstrap before 4.1.2, XSS is possible in the data-target property ...)
 	- twitter-bootstrap <not-affected> (Vulnerable code not present)
-	- twitter-bootstrap3 <unfixed> (bug #907414)
+	- twitter-bootstrap3 <unfixed> (low; bug #907414)
+	[stretch] - twitter-bootstrap3 <no-dsa> (Minor issue)
 	[jessie] - twitter-bootstrap3 <not-affected> (Vulnerable code not present)
 	NOTE: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
 	NOTE: https://github.com/twbs/bootstrap/issues/26423
@@ -11477,7 +11483,8 @@ CVE-2018-14041 (In Bootstrap before 4.1.2, XSS is possible in the data-target pr
 CVE-2018-14040 (In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent ...)
 	{DLA-1479-1}
 	- twitter-bootstrap <not-affected> (Vulnerable code not present)
-	- twitter-bootstrap3 <unfixed> (bug #907414)
+	- twitter-bootstrap3 <unfixed> (low; bug #907414)
+	[stretch] - twitter-bootstrap3 <no-dsa> (Minor issue)
 	NOTE: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
 	NOTE: https://github.com/twbs/bootstrap/issues/26423
 	NOTE: https://github.com/twbs/bootstrap/issues/26625



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6e3d2c46e00da9585e0e8c586ee1fbc5a70b5467

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6e3d2c46e00da9585e0e8c586ee1fbc5a70b5467
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181027/65e93dbf/attachment.html>


More information about the debian-security-tracker-commits mailing list