[Git][security-tracker-team/security-tracker][master] NFUs

Moritz Muehlenhoff jmm at debian.org
Fri Feb 28 16:22:50 GMT 2020



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ccbe3819 by Moritz Muehlenhoff at 2020-02-28T17:22:27+01:00
NFUs
update fixed proftpd version due to followup patch

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -21,11 +21,11 @@ CVE-2020-9436
 CVE-2020-9435
 	RESERVED
 CVE-2020-9434 (openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 cert ...)
-	TODO: check
+	NOT-FOR-US: lua-openssl (different from lua-luaossl)
 CVE-2020-9433 (openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certi ...)
-	TODO: check
+	NOT-FOR-US: lua-openssl (different from lua-luaossl)
 CVE-2020-9432 (openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certif ...)
-	TODO: check
+	NOT-FOR-US: lua-openssl (different from lua-luaossl)
 CVE-2020-9427
 	RESERVED
 CVE-2020-9426
@@ -426,7 +426,7 @@ CVE-2020-9274 (An issue was discovered in Pure-FTPd 1.0.49. An uninitialized poi
 	NOTE: unsafe strcmp() instead of strncmp() in the vulnerable functions
 CVE-2020-9273 (In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interru ...)
 	{DSA-4635-1 DLA-2115-1}
-	- proftpd-dfsg 1.3.6c-1 (bug #951800)
+	- proftpd-dfsg 1.3.6c-2 (bug #951800)
 	NOTE: https://github.com/proftpd/proftpd/issues/903
 	NOTE: https://github.com/proftpd/proftpd/commit/d388f7904d4c9a6d0ea54237b8b54a57c19d8d49 (master)
 	NOTE: https://github.com/proftpd/proftpd/commit/f8047a1ed0e0eb15193f555c4cbbb281e705c5c3 (master)
@@ -9055,11 +9055,11 @@ CVE-2020-5404
 CVE-2020-5403
 	RESERVED
 CVE-2020-5402 (In Cloud Foundry UAA, versions prior to 74.14.0, a CSRF vulnerability  ...)
-	TODO: check
+	NOT-FOR-US: Cloud Foundry
 CVE-2020-5401 (Cloud Foundry Routing Release, versions prior to 0.197.0, contains GoR ...)
-	TODO: check
+	NOT-FOR-US: Cloud Foundry
 CVE-2020-5400 (Cloud Foundry Cloud Controller (CAPI), versions prior to 1.91.0, logs  ...)
-	TODO: check
+	NOT-FOR-US: Cloud Foundry
 CVE-2020-5399 (Cloud Foundry CredHub, versions prior to 2.5.10, connects to a MySQL d ...)
 	NOT-FOR-US: Cloud Foundry CredHub
 CVE-2020-5398 (In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x pri ...)
@@ -48457,25 +48457,25 @@ CVE-2019-10801
 CVE-2019-10800
 	RESERVED
 CVE-2019-10799 (compile-sass prior to 1.0.5 allows execution of arbritary commands. Th ...)
-	TODO: check
+	NOT-FOR-US: Node module compile-sass
 CVE-2019-10798 (rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects r ...)
-	TODO: check
+	NOT-FOR-US: Node module rdf-graph-array
 CVE-2019-10797 (Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Respo ...)
-	TODO: check
+	NOT-FOR-US: WSO2
 CVE-2019-10796 (rpi through 0.0.3 allows execution of arbritary commands. The variable ...)
-	TODO: check
+	NOT-FOR-US: Node module rpi
 CVE-2019-10795 (undefsafe before 2.0.3 is vulnerable to Prototype Pollution. The 'a' f ...)
 	NOT-FOR-US: undefsafe
 CVE-2019-10794 (All versions of component-flatten are vulnerable to Prototype Pollutio ...)
-	TODO: check
+	NOT-FOR-US: Node module component-flatten
 CVE-2019-10793 (dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set  ...)
-	TODO: check
+	NOT-FOR-US: Node module dot-object
 CVE-2019-10792 (bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler ...)
-	TODO: check
+	NOT-FOR-US: Node module bodymen
 CVE-2019-10791 (promise-probe before 0.10.0 allows remote attackers to perform a comma ...)
-	TODO: check
+	NOT-FOR-US: Node module promise-probe
 CVE-2019-10790 (taffy through 2.6.2 allows attackers to forge adding additional proper ...)
-	TODO: check
+	NOT-FOR-US: Node module taffy
 CVE-2019-10789 (All versions of curling.js are vulnerable to Command Injection via the ...)
 	NOT-FOR-US: curling.js
 CVE-2019-10788 (im-metadata through 3.0.1 allows remote attackers to execute arbitrary ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ccbe381946949cf3aaf8bc6680d1b00222ad2097

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ccbe381946949cf3aaf8bc6680d1b00222ad2097
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200228/9ac30d91/attachment.html>


More information about the debian-security-tracker-commits mailing list