[Git][security-tracker-team/security-tracker][master] Update upstream references for CVE-2018-12886
Salvatore Bonaccorso
carnil at debian.org
Sun Dec 27 15:38:32 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
66c1aed3 by Salvatore Bonaccorso at 2020-12-27T16:38:20+01:00
Update upstream references for CVE-2018-12886
Add upstream bugreport and refrence the upstream commit in the git
repository (after moved from SVN).
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -155995,7 +155995,8 @@ CVE-2018-12886 (stack_protect_prologue in cfgexpand.c and stack_protect_epilogue
[jessie] - gcc-4.9 <ignored> (Too intrusive to backport)
- gcc-4.8 <removed>
[jessie] - gcc-4.8 <ignored> (Too intrusive to backport)
- NOTE: https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
+ NOTE: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85434
+ NOTE: https://gcc.gnu.org/git/?p=gcc.git&a=commit;h=89d7557202d25a393666ac4c0f7dbdab31e452a2
CVE-2018-12885 (The randMod() function of the smart contract implementation for MyCryp ...)
NOT-FOR-US: MyCryptoChamp
CVE-2018-12884 (In Octopus Deploy 3.0 onwards (before 2018.6.7), an authenticated user ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66c1aed3d775561eae3a28f3b8e80787189484aa
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66c1aed3d775561eae3a28f3b8e80787189484aa
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201227/3d1f3d1d/attachment.html>
More information about the debian-security-tracker-commits
mailing list