[Git][security-tracker-team/security-tracker][master] Update upstream references for CVE-2018-12886

Salvatore Bonaccorso carnil at debian.org
Sun Dec 27 15:38:32 GMT 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
66c1aed3 by Salvatore Bonaccorso at 2020-12-27T16:38:20+01:00
Update upstream references for CVE-2018-12886

Add upstream bugreport and refrence the upstream commit in the git
repository (after moved from SVN).

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -155995,7 +155995,8 @@ CVE-2018-12886 (stack_protect_prologue in cfgexpand.c and stack_protect_epilogue
 	[jessie] - gcc-4.9 <ignored> (Too intrusive to backport)
 	- gcc-4.8 <removed>
 	[jessie] - gcc-4.8 <ignored> (Too intrusive to backport)
-	NOTE: https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
+	NOTE: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85434
+	NOTE: https://gcc.gnu.org/git/?p=gcc.git&a=commit;h=89d7557202d25a393666ac4c0f7dbdab31e452a2
 CVE-2018-12885 (The randMod() function of the smart contract implementation for MyCryp ...)
 	NOT-FOR-US: MyCryptoChamp
 CVE-2018-12884 (In Octopus Deploy 3.0 onwards (before 2018.6.7), an authenticated user ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66c1aed3d775561eae3a28f3b8e80787189484aa

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66c1aed3d775561eae3a28f3b8e80787189484aa
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201227/3d1f3d1d/attachment.html>


More information about the debian-security-tracker-commits mailing list