[Git][security-tracker-team/security-tracker][master] buster triage

Moritz Muehlenhoff jmm at debian.org
Sat Mar 30 23:34:58 GMT 2019



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
18ca403c by Moritz Muehlenhoff at 2019-03-30T23:34:33Z
buster triage

- - - - -


2 changed files:

- data/CVE/list
- data/DSA/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2732,6 +2732,7 @@ CVE-2019-9755 [heap buffer overflow]
 	NOTE: https://sourceforge.net/p/ntfs-3g/ntfs-3g/ci/85c1634a26faa572d3c558d4cf8aaaca5202d4e9/
 CVE-2019-9754 (An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. ...)
 	- tcc <unfixed> (low; bug #925127)
+	[buster] - tcc <no-dsa> (Minor issue)
 	[stretch] - tcc <no-dsa> (Minor issue)
 	[jessie] - tcc <no-dsa> (Minor issue)
 	NOTE: https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html
@@ -44678,6 +44679,8 @@ CVE-2018-12929 (ntfs_read_locked_inode in the ntfs.ko filesystem driver in the L
 	- linux <unfixed>
 CVE-2018-12928 (In the Linux kernel 4.15.0, a NULL pointer dereference was discovered  ...)
 	- linux <unfixed> (low)
+	[buster] - linux <ignored> (Minor issue)
+	[stretch] - linux <ignored> (Minor issue)
 	[jessie] - linux-4.9 <unfixed>
 	NOTE: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1763384
 	NOTE: https://marc.info/?l=linux-fsdevel&m=152407263325766&w=2
@@ -116378,8 +116381,8 @@ CVE-2017-5978 (The zzip_mem_entry_new function in memdisk.c in zziplib 0.13.62 a
 	- zziplib 0.13.62-3.1 (bug #854727)
 	NOTE: http://blogs.gentoo.org/ago/2017/02/09/zziplib-out-of-bounds-read-in-zzip_mem_entry_new-memdisk-c/
 CVE-2017-5977 (The zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.6 ...)
-	- zziplib <unfixed> (bug #864150; bug #854727)
-	[stretch] - zziplib <ignored> (Minor issue)
+	{DSA-3878-1}
+	- zziplib 0.13.62-3.1 (bug #864150; bug #854727)
 	[jessie] - zziplib <ignored> (Minor issue)
 	[wheezy] - zziplib <ignored> (Minor issue)
 	NOTE: http://blogs.gentoo.org/ago/2017/02/09/zziplib-invalid-memory-read-in-zzip_mem_entry_extra_block-memdisk-c/
@@ -162254,6 +162257,7 @@ CVE-2015-8553 (Xen allows guest OS users to obtain sensitive information from un
 	NOTE: http://xenbits.xen.org/xsa/advisory-120.html
 	NOTE: Patch is discussed in http://thread.gmane.org/gmane.comp.emulators.xen.devel/140440/focus=140441
 	NOTE: and http://thread.gmane.org/gmane.linux.kernel/1924087/focus=1924088
+	NOTE: https://git.kernel.org/linus/7681f31ec9cdacab4fd10570be924f2cef6669ba
 CVE-2015-8552 (The PCI backend driver in Xen, when running on an x86 system and using ...)
 	{DSA-3434-1}
 	[experimental] - linux 4.4~rc6-1~exp1
@@ -166280,6 +166284,7 @@ CVE-2015-7812 (The hypercall_create_continuation function in arch/arm/domain.c i
 	NOTE: http://xenbits.xen.org/xsa/advisory-145.html
 CVE-2013-7445 (The Direct Rendering Manager (DRM) subsystem in the Linux kernel throu ...)
 	- linux <unfixed>
+	[buster] - linux <ignored> (Minor issue, requires invasive changes)
 	[stretch] - linux <ignored> (Minor issue, requires invasive changes)
 	[jessie] - linux <ignored> (Minor issue, requires invasive changes)
 	[wheezy] - linux <no-dsa> (Minor issue, requires invasive changes)


=====================================
data/DSA/list
=====================================
@@ -1869,7 +1869,7 @@
 	{CVE-2016-10324 CVE-2016-10325 CVE-2016-10326 CVE-2017-7853}
 	[jessie] - libosip2 4.1.0-2+deb8u1
 [12 Jun 2017] DSA-3878-1 zziplib - security update
-	{CVE-2017-5974 CVE-2017-5975 CVE-2017-5976 CVE-2017-5978 CVE-2017-5979 CVE-2017-5980 CVE-2017-5981}
+	{CVE-2017-5974 CVE-2017-5975 CVE-2017-5976 CVE-2017-5977 CVE-2017-5978 CVE-2017-5979 CVE-2017-5980 CVE-2017-5981}
 	[jessie] - zziplib 0.13.62-3+deb8u1
 [10 Jun 2017] DSA-3877-1 tor - security update
 	{CVE-2017-0376}



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/18ca403c2a20a11c2ae0836e7fa7873b76ad1319

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/18ca403c2a20a11c2ae0836e7fa7873b76ad1319
You're receiving this email because of your account on salsa.debian.org.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190330/89b8eff0/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list