[Git][security-tracker-team/security-tracker][master] stretch triage

Moritz Muehlenhoff jmm at debian.org
Tue Mar 5 20:38:44 GMT 2019


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e4248732 by Moritz Muehlenhoff at 2019-03-05T20:38:13Z
stretch triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -4561,21 +4561,25 @@ CVE-2019-7542
 CVE-2018-20763 (In GPAC through 0.7.2, gf_text_get_utf8_line in ...)
 	{DLA-1693-1}
 	- gpac <unfixed> (bug #921969)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point update)
 	NOTE: https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
 	NOTE: https://github.com/gpac/gpac/issues/1188
 CVE-2018-20762 (GPAC version 0.7.2 and earlier has a buffer overflow vulnerability in ...)
 	{DLA-1693-1}
 	- gpac <unfixed> (bug #921969)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point update)
 	NOTE: https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
 	NOTE: https://github.com/gpac/gpac/issues/1187
 CVE-2018-20761 (GPAC version 0.7.2 and earlier has a Buffer Overflow vulnerability in ...)
 	{DLA-1693-1}
 	- gpac <unfixed> (bug #921969)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point update)
 	NOTE: https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
 	NOTE: https://github.com/gpac/gpac/issues/1186
 CVE-2018-20760 (In GPAC 0.7.2, gf_text_get_utf8_line in media_tools/text_import.c in ...)
 	{DLA-1693-1}
 	- gpac <unfixed> (bug #921969)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point update)
 	NOTE: https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d
 	NOTE: https://github.com/gpac/gpac/issues/1177
 CVE-2019-7541
@@ -30982,6 +30986,7 @@ CVE-2018-16870 (It was found that wolfssl before 3.15.7 is vulnerable to a new v
 	NOTE: https://github.com/wolfSSL/wolfssl/pull/1950
 CVE-2018-16869 (A Bleichenbacher type side-channel based padding oracle attack was ...)
 	- nettle 3.4.1~rc1-1
+	[stretch] - nettle <no-dsa> (Minor issue)
 	NOTE: http://cat.eyalro.net/
 	NOTE: https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
 	NOTE: The upstream correction is to make a new public function that packages using
@@ -38471,6 +38476,7 @@ CVE-2018-14037 (Cross-site scripting (XSS) vulnerability in Progress Kendo UI Ed
 	NOT-FOR-US: Progress Kendo UI Editor
 CVE-2018-1000211 (Doorkeeper version 4.2.0 and later contains a Incorrect Access Control ...)
 	- ruby-doorkeeper 4.4.2-1 (bug #903980)
+	[stretch] - ruby-doorkeeper <no-dsa> (Minor issue)
 	NOTE: https://github.com/doorkeeper-gem/doorkeeper/issues/891
 	NOTE: https://github.com/doorkeeper-gem/doorkeeper/pull/1119
 	NOTE: https://github.com/doorkeeper-gem/doorkeeper/pull/1031
@@ -40793,12 +40799,12 @@ CVE-2018-13007 (An issue was discovered in gpmf-parser 1.1.2. There is a heap-ba
 CVE-2018-13006 (An issue was discovered in MP4Box in GPAC 0.7.1. There is a heap-based ...)
 	{DLA-1432-1}
 	- gpac <unfixed> (bug #902782)
-	[stretch] - gpac <no-dsa> (Minor issue)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point update)
 	NOTE: https://github.com/gpac/gpac/commit/bceb03fd2be95097a7b409ea59914f332fb6bc86
 CVE-2018-13005 (An issue was discovered in MP4Box in GPAC 0.7.1. The function urn_Read ...)
 	{DLA-1432-1}
 	- gpac <unfixed> (bug #902782)
-	[stretch] - gpac <no-dsa> (Minor issue)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point update)
 	NOTE: https://github.com/gpac/gpac/issues/1088
 	NOTE: https://github.com/gpac/gpac/commit/bceb03fd2be95097a7b409ea59914f332fb6bc86
 CVE-2018-13004
@@ -55075,7 +55081,7 @@ CVE-2018-7719 (Acrolinx Server before 5.2.5 on Windows allows Directory Traversa
 CVE-2018-7752 (GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps ...)
 	{DLA-1693-1}
 	- gpac <unfixed> (bug #892526)
-	[stretch] - gpac <no-dsa> (Minor issue)
+	[stretch] - gpac <no-dsa> (Minor issue, will be fixed via point release)
 	[wheezy] - gpac <not-affected> (vulnerable code not present)
 	NOTE: https://github.com/gpac/gpac/issues/997
 	NOTE: https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4
@@ -56603,6 +56609,7 @@ CVE-2018-1000089 (Anymail django-anymail version version 0.2 through 1.3 contain
 	NOTE: https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef
 CVE-2018-1000088 (Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting ...)
 	- ruby-doorkeeper 4.3.1-1 (bug #891069)
+	[stretch] - ruby-doorkeeper <no-dsa> (Minor issue)
 	NOTE: https://github.com/doorkeeper-gem/doorkeeper/issues/969
 	NOTE: https://github.com/doorkeeper-gem/doorkeeper/pull/970
 CVE-2018-1000087 (WolfCMS version version 0.8.3.1 contains a Reflected Cross Site ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -38,7 +38,7 @@ mariadb-10.1
 --
 mercurial
 
-mumble
+mumble (jmm)
 --
 nss
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/e42487324fbc083637e33f723bf9a25e5986d1db

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/e42487324fbc083637e33f723bf9a25e5986d1db
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190305/55d55cf0/attachment.html>


More information about the debian-security-tracker-commits mailing list