[Git][security-tracker-team/security-tracker][master] Add epoch to version string for italc versions

Salvatore Bonaccorso carnil at debian.org
Thu Nov 28 15:20:46 GMT 2019



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
26caa520 by Salvatore Bonaccorso at 2019-11-28T15:19:47Z
Add epoch to version string for italc versions

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -154343,14 +154343,14 @@ CVE-2016-9943
 CVE-2016-9942 (Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer  ...)
 	{DSA-3753-1 DLA-1979-1 DLA-777-1}
 	- libvncserver 0.9.11+dfsg-1 (bug #850008)
-	- italc 3.0.2+dfsg1-1
+	- italc 1:3.0.2+dfsg1-1
 	- veyon 4.1.4+repack1-1
 	NOTE: https://github.com/LibVNC/libvncserver/pull/137
 	NOTE: https://github.com/LibVNC/libvncserver/pull/137/commits/5fff4353f66427b467eb29e5fdc1da4f2be028bb
 CVE-2016-9941 (Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServ ...)
 	{DSA-3753-1 DLA-1979-1 DLA-777-1}
 	- libvncserver 0.9.11+dfsg-1 (bug #850007)
-	- italc 3.0.2+dfsg1-1
+	- italc 1:3.0.2+dfsg1-1
 	- veyon 4.1.4+repack1-1
 	NOTE: https://github.com/LibVNC/libvncserver/pull/137
 	NOTE: https://github.com/LibVNC/libvncserver/pull/137/commits/5418e8007c248bf9668d22a8c1fa9528149b69f2
@@ -229599,7 +229599,7 @@ CVE-2014-6056
 CVE-2014-6055 (Multiple stack-based buffer overflows in the File Transfer feature in  ...)
 	{DSA-3081-1 DLA-1979-1 DLA-197-1}
 	- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
-	- italc 3.0.1+dfsg1-1
+	- italc 1:3.0.1+dfsg1-1
 	NOTE: https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e
 	NOTE: https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677
 	NOTE: https://github.com/newsoft/libvncserver/commit/256964b884c980038cd8b2f0d180fbb295b1c748 (improvement)
@@ -229607,7 +229607,7 @@ CVE-2014-6055 (Multiple stack-based buffer overflows in the File Transfer featur
 CVE-2014-6054 (The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c ...)
 	{DSA-3081-1 DLA-1979-1 DLA-197-1}
 	- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
-	- italc 3.0.1+dfsg1-1
+	- italc 1:3.0.1+dfsg1-1
 	NOTE: https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
 	NOTE: https://github.com/newsoft/libvncserver/commit/f18f24ce65f5cac22ddcf3ed51417e477f9bad09 (hardening)
 	NOTE: https://github.com/newsoft/libvncserver/commit/5dee1cbcd83920370a487c4fd2718aa4d3eba548 (required for sparc)
@@ -229616,18 +229616,18 @@ CVE-2014-6054 (The rfbProcessClientNormalMessage function in libvncserver/rfbser
 CVE-2014-6053 (The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c ...)
 	{DSA-3081-1 DLA-1979-1 DLA-197-1}
 	- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
-	- italc 3.0.1+dfsg1-1
+	- italc 1:3.0.1+dfsg1-1
 	NOTE: https://github.com/newsoft/libvncserver/commit/6037a9074d52b1963c97cb28ea1096c7c14cbf28
 CVE-2014-6052 (The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibV ...)
 	{DSA-3081-1 DLA-1979-1 DLA-197-1}
 	- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
-	- italc 3.0.1+dfsg1-1
+	- italc 1:3.0.1+dfsg1-1
 	- veyon 4.1.4+repack1-1
 	NOTE: https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
 CVE-2014-6051 (Integer overflow in the MallocFrameBuffer function in vncviewer.c in L ...)
 	{DSA-3081-1 DLA-1979-1 DLA-197-1}
 	- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
-	- italc 3.0.1+dfsg1-1
+	- italc 1:3.0.1+dfsg1-1
 	- veyon 4.1.4+repack1-1
 	NOTE: https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
 CVE-2014-6050 (phpMyFAQ before 2.8.13 allows remote attackers to bypass the CAPTCHA p ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/26caa5203ec5889c4ef03440d9c9aed7af1076dd

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/26caa5203ec5889c4ef03440d9c9aed7af1076dd
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20191128/0e34af58/attachment.html>


More information about the debian-security-tracker-commits mailing list