[Git][security-tracker-team/security-tracker][master] stretch triage
Moritz Muehlenhoff
jmm at debian.org
Sat Oct 27 08:46:56 BST 2018
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6e3d2c46 by Moritz Muehlenhoff at 2018-10-27T07:45:31Z
stretch triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4,7 +4,8 @@ CVE-2018-18653 (The Linux kernel, as used in Ubuntu 18.10 and when booted with U
CVE-2018-18652 (A remote command execution vulnerability in Veritas NetBackup Appliance ...)
NOT-FOR-US: Veritas NetBackup Appliance
CVE-2018-18655 (Prayer through 1.3.5 sends a Referer header, containing a user's ...)
- - prayer <unfixed> (bug #911842)
+ - prayer <unfixed> (low; bug #911842)
+ [stretch] - prayer <no-dsa> (Minor issue)
CVE-2018-18654 (Crossroads 2.81 does not properly handle the /tmp directory during a ...)
- crossroads <unfixed> (unimportant; bug #911877)
NOTE: Issue exploitable only during build of package
@@ -240,7 +241,8 @@ CVE-2018-18557 (LibTIFF 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG
NOTE: https://gitlab.com/libtiff/libtiff/merge_requests/38
NOTE: https://gitlab.com/libtiff/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66
CVE-2018-XXXX [out of bounds memory read in MED files]
- - libopenmpt 0.3.13-1 (bug #911584)
+ - libopenmpt 0.3.13-1 (low; bug #911584)
+ [stretch] - libopenmpt <no-dsa> (Minor issue)
NOTE: https://lib.openmpt.org/libopenmpt/2018/10/21/security-updates-0.3.13-0.2.10933-beta36-0.2.7561-beta20.5-p11-0.2.7386-beta20.3-p14/
NOTE: https://source.openmpt.org/browse/openmpt/trunk/?op=revision&rev=10903
CVE-2018-18556
@@ -1867,7 +1869,8 @@ CVE-2018-17943
RESERVED
CVE-2018-17942 (The convert_to_decimal function in vasnprintf.c in Gnulib before ...)
{DLA-1543-1}
- - gnulib <unfixed> (bug #910757)
+ - gnulib <unfixed> (low; bug #910757)
+ [stretch] - gnulib <no-dsa> (Minor issue)
NOTE: pspp affecting bug: https://savannah.gnu.org/bugs/?func=detailitem&item_id=54686
NOTE: https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html
NOTE: https://github.com/coreutils/gnulib/commit/278b4175c9d7dd47c1a3071554aac02add3b3c35
@@ -10275,6 +10278,7 @@ CVE-2018-14500 (joyplus-cms 1.6.0 has XSS via the ...)
CVE-2018-1999023 (The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a ...)
- wesnoth-1.14 1:1.14.4-1
- wesnoth-1.12 <removed>
+ [stretch] - wesnoth-1.12 <ignored> (Scheduled for removal from stretch)
- wesnoth-1.10 <removed>
[jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in Jessie)
NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/1
@@ -11458,7 +11462,8 @@ CVE-2018-14043 (mstdlib (aka the M Standard Library for C) 1.2.0 has incorrect f
NOT-FOR-US: mstdlib
CVE-2018-14042 (In Bootstrap before 4.1.2, XSS is possible in the data-container ...)
- twitter-bootstrap <not-affected> (Vulnerable code not present)
- - twitter-bootstrap3 <unfixed> (bug #907414)
+ - twitter-bootstrap3 <unfixed> (low; bug #907414)
+ [stretch] - twitter-bootstrap3 <no-dsa> (Minor issue)
[jessie] - twitter-bootstrap3 <not-affected> (Vulnerable code not present)
NOTE: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
NOTE: https://github.com/twbs/bootstrap/issues/26423
@@ -11467,7 +11472,8 @@ CVE-2018-14042 (In Bootstrap before 4.1.2, XSS is possible in the data-container
NOTE: https://github.com/twbs/bootstrap/pull/26630/commits/efca80bb5bb34546a2e7a9488b89f71457d2ad92
CVE-2018-14041 (In Bootstrap before 4.1.2, XSS is possible in the data-target property ...)
- twitter-bootstrap <not-affected> (Vulnerable code not present)
- - twitter-bootstrap3 <unfixed> (bug #907414)
+ - twitter-bootstrap3 <unfixed> (low; bug #907414)
+ [stretch] - twitter-bootstrap3 <no-dsa> (Minor issue)
[jessie] - twitter-bootstrap3 <not-affected> (Vulnerable code not present)
NOTE: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
NOTE: https://github.com/twbs/bootstrap/issues/26423
@@ -11477,7 +11483,8 @@ CVE-2018-14041 (In Bootstrap before 4.1.2, XSS is possible in the data-target pr
CVE-2018-14040 (In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent ...)
{DLA-1479-1}
- twitter-bootstrap <not-affected> (Vulnerable code not present)
- - twitter-bootstrap3 <unfixed> (bug #907414)
+ - twitter-bootstrap3 <unfixed> (low; bug #907414)
+ [stretch] - twitter-bootstrap3 <no-dsa> (Minor issue)
NOTE: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/
NOTE: https://github.com/twbs/bootstrap/issues/26423
NOTE: https://github.com/twbs/bootstrap/issues/26625
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6e3d2c46e00da9585e0e8c586ee1fbc5a70b5467
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6e3d2c46e00da9585e0e8c586ee1fbc5a70b5467
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20181027/65e93dbf/attachment.html>
More information about the debian-security-tracker-commits
mailing list