[Git][security-tracker-team/security-tracker][master] Reference upstream tags for several upstream commits for ndpi

Salvatore Bonaccorso carnil at debian.org
Sat Dec 19 10:06:01 GMT 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
da0d6197 by Salvatore Bonaccorso at 2020-12-19T11:05:49+01:00
Reference upstream tags for several upstream commits for ndpi

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -39051,29 +39051,29 @@ CVE-2020-15476 (In nDPI through 3.2, the Oracle protocol dissector has a heap-ba
 	{DLA-2354-1}
 	- ndpi <unfixed> (bug #972050)
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21780
-	NOTE: https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05
+	NOTE: https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05 (3.4)
 CVE-2020-15475 (In nDPI through 3.2, ndpi_reset_packet_line_info in lib/ndpi_main.c om ...)
 	- ndpi <unfixed> (bug #972050)
 	[stretch] - ndpi <not-affected> (Vulnerable code not present, content_disposition_line introduced later)
-	NOTE: https://github.com/ntop/nDPI/commit/6a9f5e4f7c3fd5ddab3e6727b071904d76773952
+	NOTE: https://github.com/ntop/nDPI/commit/6a9f5e4f7c3fd5ddab3e6727b071904d76773952 (3.4)
 CVE-2020-15474 (In nDPI through 3.2, there is a stack overflow in extractRDNSequence i ...)
 	- ndpi <unfixed> (bug #972050)
 	[buster] - ndpi <not-affected> (Vulnerable code not present)
 	[stretch] - ndpi <not-affected> (Vulnerable code not present)
-	NOTE: https://github.com/ntop/nDPI/commit/23594f036536468072198a57c59b6e9d63caf6ce
+	NOTE: https://github.com/ntop/nDPI/commit/23594f036536468072198a57c59b6e9d63caf6ce (3.4)
 CVE-2020-15473 (In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-bas ...)
 	- ndpi <unfixed> (bug #972050)
 	[stretch] - ndpi <not-affected> (Vulnerable code introduced later)
-	NOTE: https://github.com/ntop/nDPI/commit/8e7b1ea7a136cc4e4aa9880072ec2d69900a825e
+	NOTE: https://github.com/ntop/nDPI/commit/8e7b1ea7a136cc4e4aa9880072ec2d69900a825e (3.4)
 CVE-2020-15472 (In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based ...)
 	- ndpi <unfixed> (bug #972050)
 	[stretch] - ndpi <not-affected> (Vulnerable code introduced later)
-	NOTE: https://github.com/ntop/nDPI/commit/b7e666e465f138ae48ab81976726e67deed12701
+	NOTE: https://github.com/ntop/nDPI/commit/b7e666e465f138ae48ab81976726e67deed12701 (3.4)
 CVE-2020-15471 (In nDPI through 3.2, the packet parsing code is vulnerable to a heap-b ...)
 	- ndpi <unfixed> (bug #972050)
 	[buster] - ndpi <not-affected> (Vulnerable code not present)
 	[stretch] - ndpi <not-affected> (Vulnerable code not present)
-	NOTE: https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622
+	NOTE: https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622 (3.4)
 CVE-2020-15470 (ffjpeg through 2020-02-24 has a heap-based buffer overflow in jfif_dec ...)
 	NOT-FOR-US: ffjpeg
 CVE-2020-15469 (In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback m ...)
@@ -48535,14 +48535,14 @@ CVE-2020-11940 (In nDPI through 3.2 Stable, an out-of-bounds read in concat_hash
 	[buster] - ndpi <not-affected> (Introduced in 3.0)
 	[stretch] - ndpi <not-affected> (Introduced in 3.0)
 	[jessie] - ndpi <not-affected> (Introduced in 3.0)
-	NOTE: https://github.com/ntop/nDPI/commit/3bbb0cd3296023f6f922c71d21a1c374d2b0a435
+	NOTE: https://github.com/ntop/nDPI/commit/3bbb0cd3296023f6f922c71d21a1c374d2b0a435 (3.4)
 	NOTE: https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi
 CVE-2020-11939 (In nDPI through 3.2 Stable, the SSH protocol dissector has multiple KE ...)
 	- ndpi <unfixed> (bug #972050)
 	[buster] - ndpi <not-affected> (Introduced in 3.0)
 	[stretch] - ndpi <not-affected> (Introduced in 3.0)
 	[jessie] - ndpi <not-affected> (Introduced in 3.0)
-	NOTE: https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202
+	NOTE: https://github.com/ntop/nDPI/commit/7ce478a58b4dd29a8d1e6f4e9df2f778613d9202 (3.4)
 	NOTE: https://securitylab.github.com/advisories/GHSL-2020-051_052-ntop-ndpi
 CVE-2020-11938 (In JetBrains TeamCity 2018.2 through 2019.2.1, a project administrator ...)
 	NOT-FOR-US: JetBrains TeamCity



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da0d6197658475e7f6e661ee6e0891e5fcca9670

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da0d6197658475e7f6e661ee6e0891e5fcca9670
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201219/f8836101/attachment.html>


More information about the debian-security-tracker-commits mailing list