[Git][security-tracker-team/security-tracker][master] Replace dropbear repository reference with working URL
Salvatore Bonaccorso
carnil at debian.org
Thu Dec 31 20:11:11 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8c7893e4 by Salvatore Bonaccorso at 2020-12-31T21:10:57+01:00
Replace dropbear repository reference with working URL
Apparently repository moved from https://secure.ucc.asn.au/hg/dropbear
to https://hg.ucc.asn.au/dropbear and so replace previous references.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -149732,7 +149732,7 @@ CVE-2018-15599 (The recv_msg_userauth_request function in svr-auth.c in Dropbear
- dropbear 2018.76-4 (bug #906890)
[stretch] - dropbear 2016.74-5+deb9u1
NOTE: http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/5d2d1021ca00
CVE-2018-15598 (Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the ...)
NOT-FOR-US: Traefik
CVE-2018-15597
@@ -218445,12 +218445,12 @@ CVE-2017-9080 (PlaySMS 1.4 allows remote code execution because PHP code in the
CVE-2017-9079 (Dropbear before 2017.75 might allow local users to read certain files ...)
{DSA-3859-1 DLA-948-1}
- dropbear 2016.74-5 (bug #862970)
- NOTE: Patch: https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123
+ NOTE: Patch: https://hg.ucc.asn.au/dropbear/rev/0d889b068123
CVE-2017-9078 (The server in Dropbear before 2017.75 might allow post-authentication ...)
{DSA-3859-1}
- dropbear 2016.74-5 (bug #862970)
[wheezy] - dropbear <not-affected> (Vulnerable code not present)
- NOTE: Patch: https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c
+ NOTE: Patch: https://hg.ucc.asn.au/dropbear/rev/c8114a48837c
CVE-2017-9077 (The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux ...)
{DSA-3886-1 DLA-993-1}
- linux 4.9.30-1
@@ -238493,7 +238493,7 @@ CVE-2017-2660
REJECTED
CVE-2017-2659 (It was found that dropbear before version 2013.59 with GSSAPI leaks wh ...)
- dropbear 2013.60-1
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/d7784616409a#l1.86
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/d7784616409a#l1.86
CVE-2017-2658 (It was discovered that the Dashbuilder login page as used in Red Hat J ...)
NOT-FOR-US: JBoss BPMS
CVE-2017-2657
@@ -251377,24 +251377,24 @@ CVE-2016-7410 (The _dwarf_read_loc_section function in dwarf_loc.c in libdwarf 2
NOTE: Introduced by (as confirmed by upstream): https://sourceforge.net/p/libdwarf/code/ci/b446e23dc21704ccd3b76d8945aaf39e4aca8c27
CVE-2016-7409 (The dbclient and server in Dropbear SSH before 2016.74, when compiled ...)
- dropbear 2016.74-1 (unimportant)
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/6a14b1f6dc04
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/6a14b1f6dc04
NOTE: Not an issue for the the Debian binary package since we do not
NOTE: compile with DEBUG_TRACE.
CVE-2016-7408 (The dbclient in Dropbear SSH before 2016.74 allows remote attackers to ...)
- dropbear 2016.74-1
[jessie] - dropbear 2014.65-1+deb8u1
[wheezy] - dropbear <not-affected> (Vulnerable code not present)
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/eed9376a4ad6
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/eed9376a4ad6
CVE-2016-7407 (The dropbearconvert command in Dropbear SSH before 2016.74 allows atta ...)
{DLA-634-1}
- dropbear 2016.74-1
[jessie] - dropbear 2014.65-1+deb8u1
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/34e6127ef02e
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/34e6127ef02e
CVE-2016-7406 (Format string vulnerability in Dropbear SSH before 2016.74 allows remo ...)
{DLA-634-1}
- dropbear 2016.74-1
[jessie] - dropbear 2014.65-1+deb8u1
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/b66a483f3dcb
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/b66a483f3dcb
CVE-2016-7404 (OpenStack Magnum passes OpenStack credentials into the Heat templates ...)
- magnum 3.1.1-5 (bug #863547)
NOTE: https://git.openstack.org/cgit/openstack/magnum/commit/?id=0bb0d6486d6771ee21bbf897a091b1aa59e01b22
@@ -333465,7 +333465,7 @@ CVE-2013-4421 (The buf_decompress function in packet.c in Dropbear SSH Server be
- dropbear 2012.55-1.4 (low; bug #726019)
[squeeze] - dropbear <no-dsa> (Minor issue)
[wheezy] - dropbear <no-dsa> (Minor issue)
- NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/0bf76f54de6f
+ NOTE: https://hg.ucc.asn.au/dropbear/rev/0bf76f54de6f
CVE-2013-4420 (Multiple directory traversal vulnerabilities in the (1) tar_extract_gl ...)
{DSA-2863-1}
- libtar 1.2.20-2 (bug #731860)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c7893e4c0836d81a7ad78df1b8f72fa3a865739
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c7893e4c0836d81a7ad78df1b8f72fa3a865739
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201231/1ae06652/attachment.html>
More information about the debian-security-tracker-commits
mailing list