[Git][security-tracker-team/security-tracker][master] stretch triage
Moritz Muehlenhoff
jmm at debian.org
Mon Jan 21 22:12:57 GMT 2019
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
915804fa by Moritz Muehlenhoff at 2019-01-21T22:12:23Z
stretch triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -928,11 +928,12 @@ CVE-2019-6134
RESERVED
CVE-2019-6133 (In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism ...)
- policykit-1 0.105-25 (bug #918985)
+ [stretch] - policykit-1 <no-dsa> (Minor issue, kernel mitigation will land in next 4.9.x rebase)
NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1692
NOTE: https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19
NOTE: https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81
NOTE: Issue can be mitigated in kernel with
- NOTE: https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf
+ NOTE: https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf (landed in 4.9.150)
CVE-2019-6132 (An issue was discovered in Bento4 v1.5.1-627. There is a memory leak in ...)
NOT-FOR-US: Bento4
CVE-2019-6131 (svg-run.c in Artifex MuPDF 1.14.0 has infinite recursion with stack ...)
@@ -6966,7 +6967,8 @@ CVE-2018-20550
RESERVED
CVE-2018-20549 (There is an illegal WRITE memory access at caca/file.c (function ...)
{DLA-1631-1}
- - libcaca <unfixed> (bug #917807)
+ - libcaca <unfixed> (low; bug #917807)
+ [stretch] - libcaca <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1652628
NOTE: https://github.com/cacalabs/libcaca/issues/41
NOTE: Fixed by: https://github.com/cacalabs/libcaca/commit/3e52dabe3e64dc50f4422effe364a1457a8a8592
@@ -6979,13 +6981,15 @@ CVE-2018-20548 (There is an illegal WRITE memory access at common-image.c (funct
NOTE: Debian binary packages built with the Imlib2 library
CVE-2018-20547 (There is an illegal READ memory access at caca/dither.c (function ...)
{DLA-1631-1}
- - libcaca <unfixed> (bug #917807)
+ - libcaca <unfixed> (low; bug #917807)
+ [stretch] - libcaca <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1652624
NOTE: https://github.com/cacalabs/libcaca/issues/39
NOTE: Fixed by: https://github.com/cacalabs/libcaca/commit/02a09ec9e5ed8981e7a810bfb6a0172dc24f0790
CVE-2018-20546 (There is an illegal READ memory access at caca/dither.c (function ...)
{DLA-1631-1}
- - libcaca <unfixed> (bug #917807)
+ - libcaca <unfixed> (low; bug #917807)
+ [stretch] - libcaca <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1652622
NOTE: https://github.com/cacalabs/libcaca/issues/38
NOTE: Fixed by: https://github.com/cacalabs/libcaca/commit/02a09ec9e5ed8981e7a810bfb6a0172dc24f0790
@@ -6998,7 +7002,8 @@ CVE-2018-20545 (There is an illegal WRITE memory access at common-image.c (funct
NOTE: Debian binary packages built with the Imlib2 library
CVE-2018-20544 (There is floating point exception at caca/dither.c (function ...)
{DLA-1631-1}
- - libcaca <unfixed> (bug #917807)
+ - libcaca <unfixed> (low; bug #917807)
+ [stretch] - libcaca <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1652627
NOTE: https://github.com/cacalabs/libcaca/issues/36
NOTE: Upstream fix: https://github.com/cacalabs/libcaca/commit/84bd155087b93ab2d8d7cb5b1ac94ecd4cf4f93c
=====================================
data/dsa-needed.txt
=====================================
@@ -40,6 +40,8 @@ mbedtls
--
mercurial
--
+openjdk-8 (jmm)
+--
openjpeg2 (luciano)
--
openssh (corsac)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/915804fa12a0bde55db368b16581bbd89fe40adb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/915804fa12a0bde55db368b16581bbd89fe40adb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190121/df3d0984/attachment.html>
More information about the debian-security-tracker-commits
mailing list