[Git][security-tracker-team/security-tracker][master] stretch triage

Moritz Muehlenhoff jmm at debian.org
Sat Feb 2 05:06:40 GMT 2019


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9c3d4031 by Moritz Muehlenhoff at 2019-02-02T05:06:10Z
stretch triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -352,12 +352,14 @@ CVE-2019-7151 (A NULL pointer dereference was discovered in ...)
 	NOTE: https://github.com/WebAssembly/binaryen/commit/2127e64f42da55bb5b9b0ab1995b3ca7fc4e0d0b
 	NOTE: https://github.com/WebAssembly/binaryen/commit/85e95e315a8023c46eb804fe80ebc244bcfdae3e
 CVE-2019-7150 (An issue was discovered in elfutils 0.175. A segmentation fault can ...)
-	- elfutils <unfixed> (bug #920909)
+	- elfutils <unfixed> (low; bug #920909)
+	[stretch] - elfutils <no-dsa> (Minor issue)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=24103
 	NOTE: https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
 	NOTE: https://sourceware.org/git/?p=elfutils.git;a=commit;h=da5c5336a1eaf519de246f7d9f0f5585e1d4ac59
 CVE-2019-7149 (A heap-based buffer over-read was discovered in the function ...)
-	- elfutils <unfixed> (bug #920910)
+	- elfutils <unfixed> (low; bug #920910)
+	[stretch] - elfutils <no-dsa> (Minor issue)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=24102
 	NOTE: https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
 	NOTE: https://sourceware.org/git/?p=elfutils.git;a=commit;h=2562759d6fe5b364fe224852e64e8bda39eb2e35
@@ -1200,7 +1202,8 @@ CVE-2017-18360 (In change_port_settings in drivers/usb/serial/io_ti.c in the Lin
 	NOTE: Fixed by: https://git.kernel.org/linus/6aeb75e6adfaed16e58780309613a578fe1ee90b
 CVE-2017-18359 (PostGIS 2.x before 2.3.3, as used with PostgreSQL, allows remote ...)
 	{DLA-1653-1}
-	- postgis 2.3.3+dfsg-1
+	- postgis 2.3.3+dfsg-1 (low)
+	[stretch] - postgis <no-dsa> (Minor issue)
 	NOTE: https://trac.osgeo.org/postgis/ticket/3704
 	NOTE: https://trac.osgeo.org/postgis/changeset/15444
 	NOTE: https://trac.osgeo.org/postgis/changeset/15445
@@ -2034,7 +2037,8 @@ CVE-2019-6439 (examples/benchmark/tls_bench.c in a benchmark tool in wolfSSL thr
 	NOTE: https://github.com/wolfSSL/wolfssl/issues/2032
 	NOTE: Issue only in example code
 CVE-2019-6438 (SchedMD Slurm before 17.11.13 and 18.x before 18.08.5 mishandles 32-bit ...)
-	- slurm-llnl <unfixed> (bug #920997)
+	- slurm-llnl <unfixed> (low; bug #920997)
+	[stretch] - slurm-llnl <no-dsa> (Minor issue)
 	NOTE: https://www.schedmd.com/news.php?id=213
 	NOTE: https://lists.schedmd.com/pipermail/slurm-announce/2019/000018.html
 CVE-2019-6437
@@ -8838,12 +8842,14 @@ CVE-2018-20555
 CVE-2018-20554
 	RESERVED
 CVE-2018-20553 (Tcpreplay before 4.3.1 has a heap-based buffer over-read in get_l2len ...)
-	- tcpreplay <unfixed> (bug #917574)
+	- tcpreplay <unfixed> (low; bug #917574)
+	[stretch] - tcpreplay <no-dsa> (Minor issue)
 	[jessie] - tcpreplay <no-dsa> (not used by any sponsor, hard to exploit)
 	NOTE: https://github.com/appneta/tcpreplay/issues/530
 	NOTE: https://github.com/appneta/tcpreplay/pull/532/commits/6b830a1640ca20528032c89a4fdd8291a4d2d8b2
 CVE-2018-20552 (Tcpreplay before 4.3.1 has a heap-based buffer over-read in packet2tree ...)
-	- tcpreplay <unfixed> (bug #917574)
+	- tcpreplay <unfixed> (low; bug #917574)
+	[stretch] - tcpreplay <no-dsa> (Minor issue)
 	[jessie] - tcpreplay <no-dsa> (not used by any sponsor, hard to exploit)
 	NOTE: https://github.com/appneta/tcpreplay/issues/530
 	NOTE: https://github.com/appneta/tcpreplay/pull/532/commits/6b830a1640ca20528032c89a4fdd8291a4d2d8b2
@@ -18492,6 +18498,7 @@ CVE-2018-19518 (University of Washington IMAP Toolkit 2007f on UNIX, as used in
 	- php7.0 <removed> (bug #913836)
 	- php5 <removed>
 	- uw-imap <unfixed> (bug #914632)
+	[stretch] - uw-imap <no-dsa> (Minor issue)
 	NOTE: Fixed in 5.6.39, 7.0.33, 7.1.25, 7.2.13, 7.3.0
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=76428
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=77153
@@ -24537,7 +24544,8 @@ CVE-2018-17200
 	RESERVED
 CVE-2018-17199 (In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks ...)
 	{DLA-1647-1}
-	- apache2 2.4.38-1 (bug #920303)
+	- apache2 2.4.38-1 (low; bug #920303)
+	[stretch] - apache2 <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2019/01/22/3
 	NOTE: 2.4.x http://svn.apache.org/r1851409
 	NOTE: 2.5.x http://svn.apache.org/r1850947
@@ -24566,7 +24574,8 @@ CVE-2018-17191 (Apache NetBeans (incubating) 9.0 NetBeans Proxy Auto-Configurati
 CVE-2018-17190 (In all versions of Apache Spark, its standalone resource manager ...)
 	NOT-FOR-US: Apache Spark
 CVE-2018-17189 (In Apache HTTP server versions 2.4.37 and prior, by sending request ...)
-	- apache2 2.4.38-1 (bug #920302)
+	- apache2 2.4.38-1 (low; bug #920302)
+	[stretch] - apache2 <no-dsa> (Minor issue)
 	[jessie] - apache2 <not-affected> (Vulnerable code not present)
 	NOTE: HTTP/2 support introduced in 2.4.17
 	NOTE: https://www.openwall.com/lists/oss-security/2019/01/22/2


=====================================
data/dsa-needed.txt
=====================================
@@ -46,6 +46,8 @@ mbedtls
 --
 mercurial
 --
+mumble
+--
 mysql-connector-python
   Proposed to update to 2.1.9 via stretch-security
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/9c3d40319ee7b84b427f772a0d70c90e51d3a539

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/9c3d40319ee7b84b427f772a0d70c90e51d3a539
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190202/244d009b/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list