[Git][security-tracker-team/security-tracker][master] Add epoch to version string for italc versions
Salvatore Bonaccorso
carnil at debian.org
Thu Nov 28 15:20:46 GMT 2019
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
26caa520 by Salvatore Bonaccorso at 2019-11-28T15:19:47Z
Add epoch to version string for italc versions
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -154343,14 +154343,14 @@ CVE-2016-9943
CVE-2016-9942 (Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer ...)
{DSA-3753-1 DLA-1979-1 DLA-777-1}
- libvncserver 0.9.11+dfsg-1 (bug #850008)
- - italc 3.0.2+dfsg1-1
+ - italc 1:3.0.2+dfsg1-1
- veyon 4.1.4+repack1-1
NOTE: https://github.com/LibVNC/libvncserver/pull/137
NOTE: https://github.com/LibVNC/libvncserver/pull/137/commits/5fff4353f66427b467eb29e5fdc1da4f2be028bb
CVE-2016-9941 (Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServ ...)
{DSA-3753-1 DLA-1979-1 DLA-777-1}
- libvncserver 0.9.11+dfsg-1 (bug #850007)
- - italc 3.0.2+dfsg1-1
+ - italc 1:3.0.2+dfsg1-1
- veyon 4.1.4+repack1-1
NOTE: https://github.com/LibVNC/libvncserver/pull/137
NOTE: https://github.com/LibVNC/libvncserver/pull/137/commits/5418e8007c248bf9668d22a8c1fa9528149b69f2
@@ -229599,7 +229599,7 @@ CVE-2014-6056
CVE-2014-6055 (Multiple stack-based buffer overflows in the File Transfer feature in ...)
{DSA-3081-1 DLA-1979-1 DLA-197-1}
- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
- - italc 3.0.1+dfsg1-1
+ - italc 1:3.0.1+dfsg1-1
NOTE: https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e
NOTE: https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677
NOTE: https://github.com/newsoft/libvncserver/commit/256964b884c980038cd8b2f0d180fbb295b1c748 (improvement)
@@ -229607,7 +229607,7 @@ CVE-2014-6055 (Multiple stack-based buffer overflows in the File Transfer featur
CVE-2014-6054 (The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c ...)
{DSA-3081-1 DLA-1979-1 DLA-197-1}
- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
- - italc 3.0.1+dfsg1-1
+ - italc 1:3.0.1+dfsg1-1
NOTE: https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
NOTE: https://github.com/newsoft/libvncserver/commit/f18f24ce65f5cac22ddcf3ed51417e477f9bad09 (hardening)
NOTE: https://github.com/newsoft/libvncserver/commit/5dee1cbcd83920370a487c4fd2718aa4d3eba548 (required for sparc)
@@ -229616,18 +229616,18 @@ CVE-2014-6054 (The rfbProcessClientNormalMessage function in libvncserver/rfbser
CVE-2014-6053 (The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c ...)
{DSA-3081-1 DLA-1979-1 DLA-197-1}
- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
- - italc 3.0.1+dfsg1-1
+ - italc 1:3.0.1+dfsg1-1
NOTE: https://github.com/newsoft/libvncserver/commit/6037a9074d52b1963c97cb28ea1096c7c14cbf28
CVE-2014-6052 (The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibV ...)
{DSA-3081-1 DLA-1979-1 DLA-197-1}
- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
- - italc 3.0.1+dfsg1-1
+ - italc 1:3.0.1+dfsg1-1
- veyon 4.1.4+repack1-1
NOTE: https://github.com/newsoft/libvncserver/commit/85a778c0e45e87e35ee7199f1f25020648e8b812
CVE-2014-6051 (Integer overflow in the MallocFrameBuffer function in vncviewer.c in L ...)
{DSA-3081-1 DLA-1979-1 DLA-197-1}
- libvncserver 0.9.9+dfsg-6.1 (bug #762745)
- - italc 3.0.1+dfsg1-1
+ - italc 1:3.0.1+dfsg1-1
- veyon 4.1.4+repack1-1
NOTE: https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
CVE-2014-6050 (phpMyFAQ before 2.8.13 allows remote attackers to bypass the CAPTCHA p ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/26caa5203ec5889c4ef03440d9c9aed7af1076dd
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/26caa5203ec5889c4ef03440d9c9aed7af1076dd
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20191128/0e34af58/attachment.html>
More information about the debian-security-tracker-commits
mailing list