[Git][security-tracker-team/security-tracker][master] stretch triage
Moritz Muehlenhoff
jmm at debian.org
Wed Feb 20 22:01:48 GMT 2019
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6680eaab by Moritz Muehlenhoff at 2019-02-20T22:01:13Z
stretch triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1181,8 +1181,9 @@ CVE-2019-8383 (An issue was discovered in AdvanceCOMP before 2.1. An invalid mem
CVE-2019-8382 (An issue was discovered in Bento4 1.5.1-628. A NULL pointer dereference ...)
NOT-FOR-US: Bento4
CVE-2019-8381 (An issue was discovered in Tcpreplay 4.3.1. An invalid memory access ...)
- - tcpreplay <unfixed> (bug #922622)
+ - tcpreplay <unfixed> (unimportant; bug #922622)
NOTE: https://github.com/appneta/tcpreplay/issues/538
+ NOTE: Crash in a CLI tool, no security impact
CVE-2019-8380 (An issue was discovered in Bento4 1.5.1-628. A NULL pointer dereference ...)
NOT-FOR-US: Bento4
CVE-2019-8379 (An issue was discovered in AdvanceCOMP before 2.1. A NULL pointer ...)
@@ -1190,11 +1191,13 @@ CVE-2019-8379 (An issue was discovered in AdvanceCOMP before 2.1. A NULL pointer
CVE-2019-8378 (An issue was discovered in Bento4 1.5.1-628. A heap-based buffer ...)
NOT-FOR-US: Bento4
CVE-2019-8377 (An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference ...)
- - tcpreplay <unfixed> (bug #922623)
+ - tcpreplay <unfixed> (unimportant; bug #922623)
NOTE: https://github.com/appneta/tcpreplay/issues/536
+ NOTE: Crash in a CLI tool, no security impact
CVE-2019-8376 (An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference ...)
- - tcpreplay <unfixed> (bug #922624)
+ - tcpreplay <unfixed> (unimportant; bug #922624)
NOTE: https://github.com/appneta/tcpreplay/issues/537
+ NOTE: Crash in a CLI tool, no security impact
CVE-2019-8375
RESERVED
CVE-2019-8374
@@ -4479,7 +4482,8 @@ CVE-2019-6977 (gdImageColorMatch in gd_color_match.c in the GD Graphics Library
NOTE: PHP Bug: https://bugs.php.net/bug.php?id=77270
NOTE: Proposed patch: https://gist.github.com/cmb69/1f36d285eb297ed326f5c821d7aafced
CVE-2019-6976 (libvips before 8.7.4 writes to uninitialized memory locations in ...)
- - vips 8.7.4-1
+ - vips 8.7.4-1 (low)
+ [stretch] - vips <no-dsa> (Minor issue)
[jessie] - vips <ignored> (Minor Issue)
NOTE: https://github.com/libvips/libvips/commit/00622428bda8d7521db8d74260b519fa41d69d0a
CVE-2019-6975 (Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before ...)
@@ -5700,6 +5704,9 @@ CVE-2019-6454 [systemd (PID1) crash with specially crafted D-Bus message]
{DSA-4393-1 DLA-1684-1}
- systemd 240-6
NOTE: https://www.openwall.com/lists/oss-security/2019/02/18/3
+ NOTE: https://github.com/systemd/systemd/commit/798ebaf9aea9b8ae3b8a0cc2702bc8de71acb3c6
+ NOTE: https://github.com/systemd/systemd/commit/6d586a13717ae057aa1b4127400c3de61cd5b9e7
+ NOTE: https://github.com/systemd/systemd/commit/f519a19bcd5afe674a9b8fc462cd77d8bad403c1
CVE-2019-6453 (mIRC before 7.55 allows remote command execution by using argument ...)
NOT-FOR-US: mIRC
CVE-2019-6452
@@ -13014,37 +13021,44 @@ CVE-2018-20463 (An issue was discovered in the JSmol2WP plugin 1.07 for WordPres
CVE-2018-20462 (An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A ...)
NOT-FOR-US: JSmol2WP plugin for WordPress
CVE-2018-20461 (In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c ...)
- - radare2 3.1.2+dfsg-1
+ - radare2 3.1.2+dfsg-1 (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/a1bc65c3db593530775823d6d7506a457ed95267
NOTE: https://github.com/radare/radare2/issues/12375
CVE-2018-20460 (In radare2 prior to 3.1.2, the parseOperands function in ...)
- - radare2 3.1.2+dfsg-1
+ - radare2 3.1.2+dfsg-1 (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/df167c7db545953bb7f71c72e98e7a3ca0c793bf
NOTE: https://github.com/radare/radare2/issues/12376
CVE-2018-20459 (In radare2 through 3.1.3, the armass_assemble function in ...)
- - radare2 3.2.1+dfsg-1 (bug #917322)
+ - radare2 3.2.1+dfsg-1 (low; bug #917322)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
NOTE: https://github.com/radare/radare2/issues/12418
CVE-2018-20458 (In radare2 prior to 3.1.1, r_bin_dyldcache_extract in ...)
- - radare2 3.1.2+dfsg-1
+ - radare2 3.1.2+dfsg-1 (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/30f4c7b52a4e2dc0d0b1bae487d90f5437c69d19
NOTE: https://github.com/radare/radare2/issues/12374
CVE-2018-20457 (In radare2 through 3.1.3, the assemble function inside ...)
- - radare2 3.2.1+dfsg-1 (bug #917322)
+ - radare2 3.2.1+dfsg-1 (low; bug #917322)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/e5c14c167b0dcf0a53d76bd50bacbbcc0dfc1ae7
NOTE: https://github.com/radare/radare2/issues/12417
CVE-2018-20456 (In radare2 prior to 3.1.1, the parseOperand function inside ...)
- - radare2 3.1.2+dfsg-1
+ - radare2 3.1.2+dfsg-1 (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185
NOTE: https://github.com/radare/radare2/issues/12372
CVE-2018-20455 (In radare2 prior to 3.1.1, the parseOperand function inside ...)
- - radare2 3.1.2+dfsg-1
+ - radare2 3.1.2+dfsg-1 (low)
+ [stretch] - radare2 <no-dsa> (Minor issue)
[jessie] - radare2 <not-affected> (vulnerable code not present)
NOTE: https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185
NOTE: https://github.com/radare/radare2/issues/12373
@@ -13263,6 +13277,7 @@ CVE-2018-20366
RESERVED
CVE-2018-20365 (LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow. ...)
- libraw 0.19.2-2 (bug #917111)
+ [stretch] - libraw <no-dsa> (Minor issue)
[jessie] - libraw <not-affected> (Vulnerable code not present)
NOTE: https://github.com/LibRaw/LibRaw/issues/195
NOTE: Fixed by: https://github.com/LibRaw/LibRaw/commit/7e29b9f29449fde30cc878fbb137d61c14bba3a4
@@ -13270,6 +13285,7 @@ CVE-2018-20365 (LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer ov
NOTE: CVE-2018-20363, CVE-2018-20364 and CVE-2018-20365 have same root cause
CVE-2018-20364 (LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL ...)
- libraw 0.19.2-2 (bug #917112)
+ [stretch] - libraw <no-dsa> (Minor issue)
[jessie] - libraw <not-affected> (Vulnerable code not present)
NOTE: https://github.com/LibRaw/LibRaw/issues/194
NOTE: Fixed by: https://github.com/LibRaw/LibRaw/commit/7e29b9f29449fde30cc878fbb137d61c14bba3a4
@@ -13277,6 +13293,7 @@ CVE-2018-20364 (LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL
NOTE: CVE-2018-20363, CVE-2018-20364 and CVE-2018-20365 have same root cause
CVE-2018-20363 (LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer ...)
- libraw 0.19.2-2 (bug #917113)
+ [stretch] - libraw <no-dsa> (Minor issue)
[jessie] - libraw <not-affected> (Vulnerable code not present)
NOTE: https://github.com/LibRaw/LibRaw/issues/193
NOTE: Fixed by: https://github.com/LibRaw/LibRaw/commit/7e29b9f29449fde30cc878fbb137d61c14bba3a4
@@ -13364,6 +13381,7 @@ CVE-2018-20338 (Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL
NOT-FOR-US: Zoho ManageEngine OpManager
CVE-2018-20337 (There is a stack-based buffer overflow in the parse_makernote function ...)
- libraw 0.19.2-1 (bug #917080)
+ [stretch] - libraw <no-dsa> (Minor issue)
[jessie] - libraw <not-affected> (Vulnerable code not present)
NOTE: https://github.com/LibRaw/LibRaw/issues/192
CVE-2018-20336
@@ -18871,9 +18889,9 @@ CVE-2018-19779
CVE-2018-19778
RESERVED
CVE-2018-19777 (In Artifex MuPDF 1.14.0, there is an infinite loop in the function ...)
- - mupdf <unfixed> (bug #915137)
- [jessie] - mupdf <ignored> (Minor issue)
+ - mupdf <unfixed> (unimportant; bug #915137)
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=700301
+ NOTE: No security impact, hang in GUI/CLI tool
CVE-2018-19776
RESERVED
CVE-2018-19775 (Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 ...)
@@ -25948,18 +25966,23 @@ CVE-2019-0001 (Receipt of a malformed packet on MX Series devices with dynamic v
NOT-FOR-US: Juniper
CVE-2018-18250 (Icinga Web 2 before 2.6.2 allows parameters that break navigation ...)
- icingaweb2 2.6.2-1
+ [stretch] - icingaweb2 <no-dsa> (Minor issue)
NOTE: https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180030.txt
CVE-2018-18249 (Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives ...)
- icingaweb2 2.6.2-1
+ [stretch] - icingaweb2 <no-dsa> (Minor issue)
NOTE: https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180030.txt
CVE-2018-18248 (Icinga Web 2 has XSS via the /icingaweb2/monitoring/list/services dir ...)
- icingaweb2 2.6.2-1
+ [stretch] - icingaweb2 <no-dsa> (Minor issue)
NOTE: https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180028.txt
CVE-2018-18247 (Icinga Web 2 before 2.6.2 has XSS via the /icingaweb2/navigation/add ...)
- icingaweb2 2.6.2-1
+ [stretch] - icingaweb2 <no-dsa> (Minor issue)
NOTE: https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180029.txt
CVE-2018-18246 (Icinga Web 2 before 2.6.2 has CSRF via ...)
- icingaweb2 2.6.2-1
+ [stretch] - icingaweb2 <no-dsa> (Minor issue)
NOTE: https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180027.txt
CVE-2018-18245 (Nagios Core 4.4.2 has XSS via the alert summary reports of plugin ...)
{DLA-1615-1}
@@ -26414,6 +26437,7 @@ CVE-2018-1000807 (Python Cryptographic Authority pyopenssl version prior to vers
CVE-2018-1000805 (Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 ...)
{DLA-1556-1}
- paramiko 2.4.2-0.1 (bug #910760)
+ [stretch] - paramiko <no-dsa> (Minor issue)
NOTE: https://github.com/paramiko/paramiko/issues/1283
NOTE: https://github.com/paramiko/paramiko/commit/56c96a659658acdbb873aef8809a7b508434dcce
CVE-2018-1000804 (contiki-ng version 4 contains a Buffer Overflow vulnerability in AQL ...)
@@ -59754,11 +59778,13 @@ CVE-2018-5810 (An error within the "rollei_load_raw()" function ...)
NOTE: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
CVE-2018-5809 (An error within the "LibRaw::parse_exif()" function ...)
- libraw 0.18.11-1
+ [stretch] - libraw <no-dsa> (Minor issue)
[jessie] - libraw <ignored> (Minor issue)
NOTE: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/
NOTE: https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
CVE-2018-5808 (An error within the "find_green()" function ...)
- libraw 0.18.11-1
+ [stretch] - libraw <no-dsa> (Minor issue)
[jessie] - libraw <ignored> (Minor issue)
NOTE: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-9/
NOTE: https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9
=====================================
data/dsa-needed.txt
=====================================
@@ -45,6 +45,8 @@ mumble
mysql-connector-python
Proposed to update to 2.1.9 via stretch-security
--
+nss
+--
openjdk-8 (jmm)
--
openjpeg2 (luciano)
@@ -59,6 +61,8 @@ simplesamlphp
--
smarty3
--
+sox
+--
sssd
Maintainer prepared an update and proposed debdiff, acked for upload, but update needs further testing before release.
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6680eaab5224dd056b25158be80c50d578034289
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6680eaab5224dd056b25158be80c50d578034289
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190220/6472ae4a/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list