[Git][security-tracker-team/security-tracker][master] stretch triage
Moritz Muehlenhoff
jmm at debian.org
Mon Mar 4 21:37:26 GMT 2019
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
73941fc3 by Moritz Muehlenhoff at 2019-03-04T21:36:52Z
stretch triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -39,8 +39,9 @@ CVE-2019-9550 (DhCms through 2017-09-18 has admin.php?r=admin/Index/index XSS. .
CVE-2019-9549 (An issue was discovered in PopojiCMS v2.0.1. It has CSRF via the ...)
NOT-FOR-US: PopojiCMS
CVE-2019-XXXX [insecure use of /tmp]
- - bubblewrap 0.3.1-3 (bug #923557)
+ - bubblewrap 0.3.1-3 (unimportant; bug #923557)
NOTE: https://github.com/projectatomic/bubblewrap/issues/304
+ NOTE: Negligable security impact
CVE-2019-1002100 [kube-apiserver: DoS with crafted patch of type json-patch]
- kubernetes <unfixed> (bug #923686)
NOTE: https://github.com/kubernetes/kubernetes/issues/74534
@@ -5336,6 +5337,7 @@ CVE-2019-7252
CVE-2019-7251 [Remote crash vulnerability with SDP protocol violation]
RESERVED
- asterisk <unfixed> (bug #923690)
+ [stretch] - asterisk <not-affected> (Vulnerable code not present)
[jessie] - asterisk <not-affected> (Vulnerable code introduced later)
NOTE: https://downloads.asterisk.org/pub/security/AST-2019-001.html
CVE-2019-7250 (An issue was discovered in the Cross Reference Add-on 36 for Google ...)
@@ -8953,7 +8955,8 @@ CVE-2018-20685 (In OpenSSH 7.9, scp.c in the scp client allows remote SSH server
CVE-2018-20682 (Fork CMS 5.0.6 allows stored XSS via the private/en/settings ...)
NOT-FOR-US: Fork CMS
CVE-2018-20681 (mate-screensaver before 1.20.2 in MATE Desktop Environment allows ...)
- - mate-screensaver 1.20.2-1
+ - mate-screensaver 1.20.2-1 (low)
+ [stretch] - mate-screensaver <no-dsa> (Minor issue)
[jessie] - mate-screensaver <not-affected> (Vulnerability only manifests when built against GTK-3.22)
NOTE: https://github.com/mate-desktop/mate-screensaver/issues/152
NOTE: https://github.com/mate-desktop/mate-screensaver/issues/155
@@ -12991,6 +12994,7 @@ CVE-2019-3842
RESERVED
CVE-2019-3841
RESERVED
+ NOT-FOR-US: KubeVirt
CVE-2019-3840 [NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function]
RESERVED
- libvirt 5.0.0-1
@@ -43241,6 +43245,8 @@ CVE-2018-12180 [Buffer Overflow in BlockIo service for RAM disk]
NOTE: https://lists.01.org/pipermail/edk2-devel/2019-February/037248.html
NOTE: https://lists.01.org/pipermail/edk2-devel/2019-February/037249.html
NOTE: https://lists.01.org/pipermail/edk2-devel/2019-February/037250.html
+ NOTE: https://github.com/tianocore/edk2/commit/38c9fbdcaa0219eb86fe82d90e3f8cfb5a54be9f
+ NOTE: https://github.com/tianocore/edk2/commit/fccdb88022c1f6d85c773fce506b10c879063f1d
CVE-2018-12179
RESERVED
CVE-2018-12178 [improper DNS packet size check]
@@ -43248,6 +43254,7 @@ CVE-2018-12178 [improper DNS packet size check]
- edk2 <unfixed>
[jessie] - edk2 <end-of-life> (non-free is not supported)
NOTE: https://lists.01.org/pipermail/edk2-devel/2019-February/037251.html
+ NOTE: https://github.com/tianocore/edk2/commit/84110bbe4bb3a346514b9bb12eadb7586bca7dfd
CVE-2018-12177 (Improper directory permissions in the ZeroConfig service in Intel(R) ...)
NOT-FOR-US: Intel PROSet/Wireless WiFi Software
CVE-2018-12176 (Improper input validation in firmware for Intel NUC Kits may allow a ...)
@@ -67370,9 +67377,10 @@ CVE-2018-3631
RESERVED
CVE-2018-3630 [Logic error in FV parsing in MdeModulePkg\Core\Pei\FwVol\FwVol.c]
RESERVED
- - edk2 <undetermined>
+ - edk2 <unfixed> (unimportant)
[jessie] - edk2 <end-of-life> (non-free is not supported)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1683653
+ NOTE: No security impact
CVE-2018-3629 (Buffer overflow in event handler in Intel Active Management Technology ...)
NOT-FOR-US: Intel
CVE-2018-3628 (Buffer overflow in HTTP handler in Intel Active Management Technology ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/73941fc35173e67bcacf7a932b1b751268133af8
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/73941fc35173e67bcacf7a932b1b751268133af8
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190304/bd92feda/attachment.html>
More information about the debian-security-tracker-commits
mailing list