[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Tue Jan 15 08:10:22 GMT 2019


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1e64335e by security tracker role at 2019-01-15T08:10:14Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,43 @@
+CVE-2019-6293 (An issue was discovered in the function mark_beginning_as_normal in ...)
+	TODO: check
+CVE-2019-6292 (An issue was discovered in singledocparser.cpp in yaml-cpp (aka ...)
+	TODO: check
+CVE-2019-6291 (An issue was discovered in the function expr6 in eval.c in Netwide ...)
+	TODO: check
+CVE-2019-6290 (An infinite recursion issue was discovered in eval.c in Netwide ...)
+	TODO: check
+CVE-2019-6289 (uploads/include/dialog/select_soft.php in DedeCMS V57_UTF8_SP2 allows ...)
+	TODO: check
+CVE-2019-6288
+	RESERVED
+CVE-2019-6287
+	RESERVED
+CVE-2019-6286 (In LibSass 3.5.5, a heap-based buffer over-read exists in ...)
+	TODO: check
+CVE-2019-6285 (The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka ...)
+	TODO: check
+CVE-2019-6284 (In LibSass 3.5.5, a heap-based buffer over-read exists in ...)
+	TODO: check
+CVE-2019-6283 (In LibSass 3.5.5, a heap-based buffer over-read exists in ...)
+	TODO: check
+CVE-2019-6282
+	RESERVED
+CVE-2019-6281
+	RESERVED
+CVE-2019-6280
+	RESERVED
+CVE-2019-6279
+	RESERVED
+CVE-2018-20712 (A heap-based buffer over-read exists in the function d_expression_1 in ...)
+	TODO: check
+CVE-2018-20711
+	RESERVED
+CVE-2018-20710
+	RESERVED
+CVE-2018-20709
+	RESERVED
+CVE-2018-20708
+	RESERVED
 CVE-2019-6278 (XSS exists in JPress v1.0.4 via Markdown input, or Markdown input with ...)
 	NOT-FOR-US: JPress
 CVE-2019-6277
@@ -20,8 +60,8 @@ CVE-2019-6269
 	RESERVED
 CVE-2019-6268
 	RESERVED
-CVE-2019-6267
-	RESERVED
+CVE-2019-6267 (The Premium WP Suite Easy Redirect Manager plugin 28.07-17 for ...)
+	TODO: check
 CVE-2019-6266
 	RESERVED
 CVE-2019-6265
@@ -67,6 +107,7 @@ CVE-2019-6251 (embed/ephy-web-view.c in GNOME Web (aka Epiphany) through 3.31.4
 CVE-2019-6249 (An issue was discovered in HuCart v5.7.4. There is a CSRF vulnerability ...)
 	NOT-FOR-US: HuCart
 CVE-2019-6250 (A pointer overflow, with code execution, was discovered in ZeroMQ ...)
+	{DSA-4368-1}
 	- zeromq3 4.3.1-1 (bug #919098)
 	[jessie] - zeromq3 <not-affected> (Vulnerable code introduced later)
 	NOTE: https://github.com/zeromq/libzmq/issues/3351
@@ -9857,19 +9898,25 @@ CVE-2018-20073 [chromium stores download meta data in extended attributes]
 CVE-2018-20072
 	RESERVED
 CVE-2018-20071 (Insufficiently strict origin checks during JIT payment app ...)
+	{DSA-4330-1}
 	- chromium-browser 70.0.3538.67-1
 	[jessie] - chromium-browser <end-of-life> (End of life, see DSA 4020)
 CVE-2018-20070 (Incorrect handling of confusable characters in URL Formatter in Google ...)
+	{DSA-4352-1}
 	- chromium 71.0.3578.80-1
 CVE-2018-20069 (Failure to prevent navigation to top frame to data URLs in Navigation ...)
 	- chromium <not-affected> (Specific to iOS)
 CVE-2018-20068 (Incorrect handling of 304 status codes in Navigation in Google Chrome ...)
+	{DSA-4352-1}
 	- chromium 71.0.3578.80-1
 CVE-2018-20067 (A renderer initiated back navigation was incorrectly allowed to cancel ...)
+	{DSA-4352-1}
 	- chromium 71.0.3578.80-1
 CVE-2018-20066 (Incorrect object lifecycle in Extensions in Google Chrome prior to ...)
+	{DSA-4352-1}
 	- chromium 71.0.3578.80-1
 CVE-2018-20065 (Handling of URI action in PDFium in Google Chrome prior to ...)
+	{DSA-4352-1}
 	- chromium 71.0.3578.80-1
 CVE-2018-20064 (doorGets 7.0 allows remote attackers to write to arbitrary files via ...)
 	NOT-FOR-US: doorGets
@@ -16090,9 +16137,11 @@ CVE-2018-19368
 CVE-2018-19367 (Portainer through 1.19.2 provides an API endpoint ...)
 	NOT-FOR-US: Portainer
 CVE-2018-19966 (An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS ...)
+	{DSA-4369-1}
 	- xen 4.11.1-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-280.txt
 CVE-2018-19965 (An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest ...)
+	{DSA-4369-1}
 	- xen 4.11.1-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-279.txt
 CVE-2018-19964 (An issue was discovered in Xen 4.11.x allowing x86 guest OS users to ...)
@@ -16106,9 +16155,11 @@ CVE-2018-19963 (An issue was discovered in Xen 4.11 allowing HVM guest OS users
 	[jessie] - xen <not-affected> (Only affects 4.11)
 	NOTE: https://xenbits.xen.org/xsa/advisory-276.txt
 CVE-2018-19962 (An issue was discovered in Xen through 4.11.x on AMD x86 platforms, ...)
+	{DSA-4369-1}
 	- xen 4.11.1-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-275.txt
 CVE-2018-19961 (An issue was discovered in Xen through 4.11.x on AMD x86 platforms, ...)
+	{DSA-4369-1}
 	- xen 4.11.1-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-275.txt
 CVE-2018-19366
@@ -17026,7 +17077,7 @@ CVE-2018-19117
 CVE-2018-19116
 	RESERVED
 CVE-2018-19967 (An issue was discovered in Xen through 4.11.x on Intel x86 platforms ...)
-	{DLA-1577-1}
+	{DSA-4369-1 DLA-1577-1}
 	- xen 4.11.1-1
 	NOTE: https://xenbits.xen.org/xsa/advisory-282.txt
 CVE-2018-19115 (keepalived before 2.0.7 has a heap-based buffer overflow when parsing ...)
@@ -22600,8 +22651,7 @@ CVE-2018-16889 [debug logging for v4 auth does not sanitize encryption keys]
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1665334
 	NOTE: http://tracker.ceph.com/issues/37847
 	NOTE: https://github.com/ceph/ceph/commit/ba55e2a96c9dfcc7aa2311431beaaa23cb05c30d
-CVE-2018-16888 [kills privileged process if unprivileged PIDFile was tampered]
-	RESERVED
+CVE-2018-16888 (It was discovered systemd does not correctly check the content of ...)
 	- systemd 237-1
 	[jessie] - systemd <no-dsa> (low priority because this is inherently a bug in the PID file logic)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1662867



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/1e64335ef412de2b2d656e2a9a3bae3aa9f91e64

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/1e64335ef412de2b2d656e2a9a3bae3aa9f91e64
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190115/82d6a407/attachment.html>


More information about the debian-security-tracker-commits mailing list