[Git][security-tracker-team/security-tracker][master] buster triage

Moritz Muehlenhoff jmm at debian.org
Sun Feb 10 18:44:08 GMT 2019


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
82a8541d by Moritz Muehlenhoff at 2019-02-10T18:43:41Z
buster triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -29934,11 +29934,11 @@ CVE-2018-1000656 (The Pallets Project flask version Before 0.12.3 contains a CWE
 CVE-2018-1000655 (Jsish version 2.4.65 contains a CWE-476: NULL Pointer Dereference ...)
 	NOT-FOR-US: Jsish
 CVE-2018-1000654 (GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 ...)
-	- libtasn1-6 <unfixed> (bug #906768)
-	[stretch] - libtasn1-6 <no-dsa> (Minor issue)
-	[jessie] - libtasn1-6 <no-dsa> (Minor issue since this cannot be exploited at runtime)
+	- libtasn1-6 <unfixed> (unimportant; bug #906768)
 	- libtasn1-3 <removed>
 	NOTE: https://gitlab.com/gnutls/libtasn1/issues/4
+	NOTE: No security impact, does not affect libtasn, but only the asn1Parser from
+	NOTE: libtasn1-bin
 CVE-2018-1000653 (zzcms version 8.3 and earlier contains a SQL Injection vulnerability ...)
 	NOT-FOR-US: zzcms
 CVE-2018-1000652 (JabRef version <=4.3.1 contains a XML External Entity (XXE) ...)
@@ -78279,6 +78279,7 @@ CVE-2017-15638 (The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux ..
 	NOT-FOR-US: SuSEfirewall2 in SUSE
 CVE-2012-6707 (WordPress through 4.8.2 uses a weak MD5-based password hashing ...)
 	- wordpress <unfixed> (bug #880868)
+	[buster] - wordpress <postponed> (Minor issue, can be revisited with upstream has picked a new hashing solution)
 	[stretch] - wordpress <postponed> (Minor issue, can be revisited with upstream has picked a new hashing solution)
 	[jessie] - wordpress <postponed> (Minor issue, can be revisited with upstream has picked a new hashing solution)
 	[wheezy] - wordpress <postponed> (Minor issue, can be revisited with upstream has picked a new hashing solution)
@@ -232280,6 +232281,7 @@ CVE-2012-4231 (Cross-site scripting (XSS) vulnerability in admin/index.php in jC
 	NOT-FOR-US: jCore
 CVE-2012-4230 (The bbcode plugin in TinyMCE 3.5.8 does not properly enforce the ...)
 	- tinymce <unfixed> (low; bug #796117)
+	[buster] - tinymce <no-dsa> (Minor issue)
 	[stretch] - tinymce <no-dsa> (Minor issue)
 	[jessie] - tinymce <no-dsa> (Minor issue)
 	[squeeze] - tinymce <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/82a8541d73f997d03c5e6def88ac86ddd41a4254

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/82a8541d73f997d03c5e6def88ac86ddd41a4254
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190210/f28384fa/attachment.html>


More information about the debian-security-tracker-commits mailing list