[Git][security-tracker-team/security-tracker][master] buster triage
Moritz Muehlenhoff
jmm at debian.org
Sat Mar 30 15:25:41 GMT 2019
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2576ab77 by Moritz Muehlenhoff at 2019-03-30T15:25:17Z
buster triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2941,7 +2941,9 @@ CVE-2019-9660 (Stored XSS exists in YzmCMS 5.2 via the admin/category/edit.html
CVE-2019-9659 (The Chuango 433 MHz burglar-alarm product line uses static codes in th ...)
NOT-FOR-US: Chuango
CVE-2019-9658 (Checkstyle before 8.18 loads external DTDs by default. ...)
- - checkstyle <unfixed> (bug #924598)
+ - checkstyle <unfixed> (low; bug #924598)
+ [buster] - checkstyle <no-dsa> (Minor issue)
+ [stretch] - checkstyle <no-dsa> (Minor issue)
NOTE: https://github.com/checkstyle/checkstyle/issues/6474
NOTE: https://github.com/checkstyle/checkstyle/issues/6478
NOTE: https://github.com/checkstyle/checkstyle/pull/6476
@@ -8265,6 +8267,7 @@ CVE-2019-7443 [Insecure handling of arguments in helpers]
- kauth 5.54.0-2 (bug #921995)
[stretch] - kauth <no-dsa> (Minor issue, will be fixed in a point release)
- kde4libs <unfixed> (bug #922727)
+ [buster] - kde4libs <no-dsa> (Minor issue)
[stretch] - kde4libs <no-dsa> (Minor issue)
[jessie] - kde4libs <no-dsa> (Minor issue)
NOTE: https://mail.kde.org/pipermail/kde-announce/2019-February/000011.html
@@ -60298,7 +60301,7 @@ CVE-2018-1000078 (RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3
- ruby2.1 <removed>
- ruby1.9.1 <removed>
- rubygems <removed>
- - jruby <unfixed> (bug #895778)
+ - jruby 9.1.17.0-1 (bug #895778)
[jessie] - jruby <end-of-life> (See DSA-4219-1)
NOTE: https://github.com/rubygems/rubygems/commit/66a28b9275551384fdab45f3591a82d6b59952cb
NOTE: https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/
@@ -162278,7 +162281,8 @@ CVE-2015-8567 (Memory leak in net/vmxnet3.c in QEMU allows remote attackers to c
NOTE: https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html
NOTE: http://www.openwall.com/lists/oss-security/2015/12/15/4
CVE-2015-8559 (The knife bootstrap command in chef leaks the validator.pem private RS ...)
- - chef <unfixed> (bug #809670)
+ - chef <unfixed> (low; bug #809670)
+ [buster] - chef <ignored> (Minor issue; workaround using validatorless bootstrapping)
[stretch] - chef <ignored> (Minor issue; workaround using validatorless bootstrapping)
[jessie] - chef <ignored> (Minor issue; workaround using validatorless bootstrapping)
[wheezy] - chef <ignored> (Minor issue; workaround using validatorless bootstrapping)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/2576ab770ee0c87cc0bc4a2da3be92d336970e6f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/2576ab770ee0c87cc0bc4a2da3be92d336970e6f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190330/8577b7aa/attachment.html>
More information about the debian-security-tracker-commits
mailing list