[Git][security-tracker-team/security-tracker][master] buster/stretch triage

Moritz Muehlenhoff jmm at debian.org
Mon Dec 16 19:43:44 GMT 2019



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
2f06c1f1 by Moritz Muehlenhoff at 2019-12-16T19:43:23Z
buster/stretch triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -12667,7 +12667,9 @@ CVE-2019-17546 (tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL throug
 	NOTE: gdal uses system libtiff libraries since 2.0.1+dfsg-1~exp1 (#684233)
 CVE-2019-17545 (GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ...)
 	{DLA-1984-1}
-	- gdal 2.4.2+dfsg-2
+	- gdal 2.4.2+dfsg-2 (low)
+	[buster] - gdal <no-dsa> (Minor issue)
+	[stretch] - gdal <no-dsa> (Minor issue)
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178
 	NOTE: https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb
 CVE-2019-17544 (libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over- ...)
@@ -14400,6 +14402,8 @@ CVE-2019-16885 (In OkayCMS through 2.3.4, an unauthenticated attacker can achiev
 	NOT-FOR-US: OkayCMS
 CVE-2019-16884 (runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other ...)
 	- runc 1.0.0~rc9+dfsg1-1 (bug #942026)
+	[buster] - runc <no-dsa> (Minor issue)
+	[stretch] - runc <no-dsa> (Minor issue)
 	- golang-github-opencontainers-selinux <unfixed> (bug #942027)
 	NOTE: https://github.com/opencontainers/runc/issues/2128
 CVE-2019-16883
@@ -15762,6 +15766,8 @@ CVE-2019-16371 (LogMeIn LastPass before 4.33.0 allows attackers to construct a c
 	NOT-FOR-US: LogMeIn LastPass
 CVE-2019-16370 (The PGP signing plugin in Gradle before 6.0 relies on the SHA-1 algori ...)
 	- gradle <unfixed> (low; bug #941186)
+	[buster] - gradle <no-dsa> (Minor issue)
+	[stretch] - gradle <no-dsa> (Minor issue)
 	[jessie] - gradle <postponed> (Minor issue, old gradle mainly used for building Debian packages with apt signatures)
 	NOTE: https://github.com/gradle/gradle/commit/425b2b7a50cd84106a77cdf1ab665c89c6b14d2f
 CVE-2019-16369
@@ -19000,7 +19006,9 @@ CVE-2019-15239 (In the Linux kernel, a certain net/ipv4/tcp_output.c change, whi
 CVE-2019-15238 (The cforms2 plugin before 15.0.2 for WordPress has CSRF related to the ...)
 	NOT-FOR-US: Wordpress plugin
 CVE-2019-15237 (Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, ...)
-	- roundcube <unfixed>
+	- roundcube <unfixed> (low)
+	[buster] - roundcube <no-dsa> (Minor issue)
+	[stretch] - roundcube <no-dsa> (Minor issue)
 	NOTE: https://github.com/roundcube/roundcubemail/issues/6891
 CVE-2019-15236
 	RESERVED
@@ -19761,6 +19769,8 @@ CVE-2019-15053 (The "HTML Include and replace macro" plugin before 1.5.0 for Con
 	NOT-FOR-US: "HTML Include and replace macro" plugin for Confluence Server
 CVE-2019-15052 (The HTTP client in Gradle before 5.6 sends authentication credentials  ...)
 	- gradle <unfixed> (low; bug #941187)
+	[buster] - gradle <no-dsa> (Minor issue)
+	[stretch] - gradle <no-dsa> (Minor issue)
 	[jessie] - gradle <postponed> (Minor issue, old gradle mainly used for building Debian packages with system libraries)
 	NOTE: https://github.com/gradle/gradle/issues/10278
 	NOTE: https://github.com/gradle/gradle/pull/10176
@@ -21533,6 +21543,8 @@ CVE-2019-14494 (An issue was discovered in Poppler through 0.78.0. There is a di
 CVE-2019-14493 (An issue was discovered in OpenCV before 4.1.1. There is a NULL pointe ...)
 	[experimental] - opencv 4.1.1+dfsg-1
 	- opencv 4.1.2+dfsg-3
+	[buster] - opencv <no-dsa> (Minor issue)
+	[stretch] - opencv <no-dsa> (Minor issue)
 	[jessie] - opencv <postponed> (Minor issue, DoS, PoC not crashing)
 	NOTE: https://github.com/opencv/opencv/issues/15127
 	NOTE: https://github.com/opencv/opencv/commit/5691d998ead1d9b0542bcfced36c2dceb3a59023
@@ -26948,7 +26960,9 @@ CVE-2019-13040
 CVE-2019-13039
 	RESERVED
 CVE-2019-13038 (mod_auth_mellon through 0.14.2 has an Open Redirect via the login?Retu ...)
-	- libapache2-mod-auth-mellon <unfixed> (bug #931265)
+	- libapache2-mod-auth-mellon <unfixed> (low; bug #931265)
+	[buster] - libapache2-mod-auth-mellon <no-dsa> (Minor issue)
+	[stretch] - libapache2-mod-auth-mellon <no-dsa> (Minor issue)
 	[jessie] - libapache2-mod-auth-mellon <ignored> (Open Redirect protection not implemented yet)
 	NOTE: https://github.com/Uninett/mod_auth_mellon/issues/35#issuecomment-503974885
 CVE-2019-13037
@@ -57760,6 +57774,7 @@ CVE-2019-2213 (In binder_free_transaction of binder.c, there is a possible use-a
 	NOTE: https://lore.kernel.org/patchwork/patch/1087916/
 CVE-2019-2212 (In poisson_distribution of random, there is an out of bounds read. Thi ...)
 	- libc++ <removed>
+	[stretch] - libc++ <no-dsa> (Minor issue)
 	[jessie] - libc++ <no-dsa> (Minor issue, Jessie versions of software that uses poisson distribution have low popcon)
 	- llvm-toolchain-6.0 <unfixed>
 	[jessie] - llvm-toolchain-6.0 <no-dsa> (Minor issue, Jessie versions of software that uses poisson distribution have low popcon)
@@ -57794,6 +57809,7 @@ CVE-2019-2201 (In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, the
 	NOTE: https://android.googlesource.com/platform/external/libjpeg-turbo/+/d3db2a2634c422286f75c4b38af98837f3d2f0ff
 	NOTE: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/361
 	NOTE: https://github.com/libjpeg-turbo/libjpeg-turbo/commit/2a9e3bd7430cfda1bc812d139e0609c6aca0b884
+	NOTE: https://github.com/clearlinux-pkgs/libjpeg-turbo/commit/0a5d06c3dd4a64754d7e6ffa081fd9132714f74c
 CVE-2019-2200
 	RESERVED
 CVE-2019-2199 (In createSessionInternal of PackageInstallerService.java, there is a p ...)
@@ -60275,6 +60291,7 @@ CVE-2019-1551 (There is an overflow bug in the x64_64 Montgomery squaring proced
 	[stretch] - openssl <postponed> (Wait until next upstream security release)
 	[jessie] - openssl <not-affected> (Affected modules are not present in Jessie)
 	- openssl1.0 <removed> (low)
+	[buster] - openssl1.0 <postponed> (Wait until next upstream security release)
 	NOTE: https://www.openssl.org/news/secadv/20191206.txt
 	NOTE: OpenSSL_1_1_1-stable: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f
 	NOTE: OpenSSL_1_0_2-stable: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98


=====================================
data/dsa-needed.txt
=====================================
@@ -21,7 +21,7 @@ chromium
 --
 curl (ghedo)
 --
-cyrus-imapd
+cyrus-imapd (jmm)
 --
 evince/oldstable
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/2f06c1f12824e635bf58cd15b9cffe4aadba3a5b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/2f06c1f12824e635bf58cd15b9cffe4aadba3a5b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20191216/39aebe18/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list