[Git][security-tracker-team/security-tracker][master] stretch triage

Moritz Muehlenhoff jmm at debian.org
Mon Jun 3 21:20:46 BST 2019



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6d60ccf9 by Moritz Muehlenhoff at 2019-06-03T20:20:16Z
stretch triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -318,6 +318,7 @@ CVE-2019-12451
 	RESERVED
 CVE-2019-12450 (file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1  ...)
 	- glib2.0 <unfixed> (bug #929753)
+	[stretch] - glib2.0 <no-dsa> (Minor issue)
 	NOTE: https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174
 CVE-2019-12449 (An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gv ...)
 	- gvfs <unfixed> (bug #929755)
@@ -889,8 +890,10 @@ CVE-2019-12219 (An issue was discovered in libSDL2.a in Simple DirectMedia Layer
 	NOTE: https://bugzilla.libsdl.org/show_bug.cgi?id=4625
 CVE-2019-12218 (An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) ...)
 	- libsdl2-image <unfixed>
+	[stretch] - libsdl2-image <no-dsa> (Minor issue)
 	[jessie] - libsdl2-image <no-dsa> (Minor issue)
 	- sdl-image1.2 <unfixed>
+	[stretch] - sdl-image1.2 <no-dsa> (Minor issue)
 	[jessie] - sdl-image1.2 <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.libsdl.org/show_bug.cgi?id=4620
 	TODO: check details and correct vulnerability location
@@ -904,8 +907,10 @@ CVE-2019-12217 (An issue was discovered in libSDL2.a in Simple DirectMedia Layer
 	NOTE: https://bugzilla.libsdl.org/show_bug.cgi?id=4626
 CVE-2019-12216 (An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) ...)
 	- libsdl2-image <unfixed>
+	[stretch] - libsdl2-image <no-dsa> (Minor issue)
 	[jessie] - libsdl2-image <no-dsa> (Minor issue)
 	- sdl-image1.2 <unfixed>
+	[stretch] - sdl-image1.2 <no-dsa> (Minor issue)
 	[jessie] - sdl-image1.2 <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.libsdl.org/show_bug.cgi?id=4619
 	TODO: check details and correct vulnerability location
@@ -3752,7 +3757,8 @@ CVE-2019-11039 [Out-of-bounds read in iconv.c:_php_iconv_mime_decode() due to in
 	NOTE: PHP Bug: https://bugs.php.net/bug.php?id=78069
 CVE-2019-11038 [Uninitialized read in gdImageCreateFromXbm]
 	RESERVED
-	- libgd2 <unfixed> (bug #929821)
+	- libgd2 <unfixed> (low; bug #929821)
+	[stretch] - libgd2 <no-dsa> (Minor issue)
 	- php7.3 7.3.6-1 (unimportant)
 	- php7.0 <removed> (unimportant)
 	- php5 <removed> (unimportant)
@@ -11369,6 +11375,7 @@ CVE-2019-8340
 	RESERVED
 CVE-2019-8339 (An issue was discovered in Falco through 0.14.0. A missing indicator f ...)
 	- sysdig <unfixed>
+	[stretch] - sysdig <no-dsa> (Minor issue)
 CVE-2019-8338 (The signature verification routine in the Airmail GPG-PGP Plugin, vers ...)
 	NOT-FOR-US: Airmail
 CVE-2019-8336 (HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a c ...)
@@ -29849,12 +29856,14 @@ CVE-2018-19666 (The agent in OSSEC through 3.1.0 on Windows allows local users t
 	- ossec-hids <itp> (bug #361954)
 CVE-2018-19665 (The Bluetooth subsystem in QEMU mishandles negative values for length  ...)
 	- qemu 1:3.1+dfsg-2 (low; bug #916278)
-	[stretch] - qemu <postponed> (Revisit when final upstream patch is out)
+	[stretch] - qemu <ignored> (Minor issue)
 	[jessie] - qemu <postponed> (Revisit when final upstream patch is out)
 	- qemu-kvm <removed>
 	NOTE: https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg03570.html
 	NOTE: note that previously mentioned patch will never be merged by upstream, see
 	NOTE: https://lists.debian.org/debian-lts/2019/01/msg00073.html
+	NOTE: 3.1 marked bluetooth subsystem as unused/deprecated, will most likely be removed:
+	NOTE:  https://github.com/qemu/qemu/commit/c0188e69d
 CVE-2018-19664 (libjpeg-turbo 2.0.1 has a heap-based buffer over-read in the put_pixel ...)
 	- libjpeg-turbo <not-affected> (Vulnerable code introduced later)
 	NOTE: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/305
@@ -145880,7 +145889,8 @@ CVE-2016-7153 (The HTTP/2 protocol does not consider the role of the TCP congest
 CVE-2016-7152 (The HTTPS protocol does not consider the role of the TCP congestion wi ...)
 	NOTE: CVE assigned for the HTTP/2 protocol issue
 CVE-2016-7151 (Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a re ...)
-	- capstone <unfixed>
+	- capstone <unfixed> (low)
+	[stretch] - capstone <no-dsa> (Minor issue)
 	[jessie] - capstone <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/aquynh/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 (4.0-alpha4)
 	NOTE: https://github.com/aquynh/capstone/pull/725



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6d60ccf93e51597dbb0a7d56689aa0d2801c241d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/6d60ccf93e51597dbb0a7d56689aa0d2801c241d
You're receiving this email because of your account on salsa.debian.org.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190603/7c9df064/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list