[Git][security-tracker-team/security-tracker][master] buster/stretch triage
Moritz Muehlenhoff
jmm at debian.org
Fri Jan 17 10:30:06 GMT 2020
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d55a0584 by Moritz Muehlenhoff at 2020-01-17T11:29:46+01:00
buster/stretch triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -22093,10 +22093,9 @@ CVE-2019-17402 (Exiv2 0.27.2 allows attackers to trigger a crash in Exiv2::getUL
NOTE: https://github.com/Exiv2/exiv2/commit/50e9dd964a439da357798344ed1dd86edcadf0ec (0.27-branch)
NOTE: Follow-up: https://github.com/Exiv2/exiv2/issues/1026
CVE-2019-17401 (** DISPUTED ** libyal liblnk 20191006 has a heap-based buffer over-rea ...)
- - liblnk <unfixed> (low)
- [buster] - liblnk <no-dsa> (Minor issue)
- [stretch] - liblnk <no-dsa> (Minor issue)
+ - liblnk <unfixed> (unimportant)
NOTE: https://github.com/libyal/liblnk/issues/40
+ NOTE: Negligible/questionable security impact
CVE-2019-17400 (The unoconv package before 0.9 mishandles untrusted pathnames, leading ...)
- unoconv 0.7-2 (low; bug #943561)
[buster] - unoconv <no-dsa> (Minor issue)
@@ -22167,12 +22166,10 @@ CVE-2019-17373 (Certain NETGEAR devices allow unauthenticated access to critical
CVE-2019-17372 (Certain NETGEAR devices allow remote attackers to disable all authenti ...)
NOT-FOR-US: NETGEAR
CVE-2019-17371 (libpng 1.6.37 has memory leaks in png_malloc_warn and png_create_info_ ...)
- - libpng1.6 <unfixed> (low)
- [buster] - libpng1.6 <no-dsa> (Minor issue)
- [stretch] - libpng1.6 <no-dsa> (Minor issue)
- - libpng <removed>
- [jessie] - libpng <no-dsa> (Minor issue)
+ - gif2png <removed> (unimportant)
NOTE: https://github.com/glennrp/libpng/issues/307
+ NOTE: Initially filed for libpng, but the bug is actually in gif2png
+ NOTE: Memory leak in CLI tool, no security impact
CVE-2019-17370 (OTCMS v3.85 allows arbitrary PHP Code Execution because admin/sysCheck ...)
NOT-FOR-US: OTCMS
CVE-2019-17369 (OTCMS v3.85 has CSRF in the admin/member_deal.php Admin Panel page, le ...)
@@ -22386,20 +22383,16 @@ CVE-2019-17266 (libsoup from versions 2.65.1 until 2.68.1 have a heap-based buff
CVE-2019-17265
RESERVED
CVE-2019-17264 (** DISPUTED ** In libyal liblnk before 20191006, liblnk_location_infor ...)
- - liblnk <unfixed> (low)
- [buster] - liblnk <no-dsa> (Minor issue)
- [stretch] - liblnk <no-dsa> (Minor issue)
+ - liblnk <unfixed> (unimportant)
NOTE: https://github.com/libyal/liblnk/issues/38
NOTE: https://github.com/libyal/liblnk/commit/c4d04de2c76f62129677c90a616d049be9c52482
+ NOTE: Negligible/questionable security impact
CVE-2019-17263 (** DISPUTED ** In libyal libfwsi before 20191006, libfwsi_extension_bl ...)
- - liblnk <unfixed> (low)
- [buster] - liblnk <no-dsa> (Minor issue)
- [stretch] - liblnk <no-dsa> (Minor issue)
- - libfwsi <unfixed> (low)
- [buster] - libfwsi <no-dsa> (Minor issue)
- [stretch] - libfwsi <no-dsa> (Minor issue)
+ - liblnk <unfixed> (unimportant)
+ - libfwsi <unfixed> (unimportant)
NOTE: https://github.com/libyal/libfwsi/issues/13
NOTE: https://github.com/libyal/libfwsi/commit/54afa5c71d6c795a555dbcb1e160fea393b98fb3
+ NOTE: Negligible/questionable security impact
CVE-2019-17262 (XnView Classic 2.49.1 allows a User Mode Write AV starting at Xwsq+0x0 ...)
NOT-FOR-US: XnView
CVE-2019-17261 (XnView Classic 2.49.1 allows a User Mode Write AV starting at Xwsq+0x0 ...)
@@ -37511,8 +37504,8 @@ CVE-2019-12496 (An issue was discovered in Hybrid Group Gobot before 1.13.0. The
NOT-FOR-US: Hybrid Group Gobot
CVE-2019-12495 (An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. ...)
- tcc <unfixed> (bug #929872)
- [buster] - tcc <no-dsa> (Minor issue)
- [stretch] - tcc <no-dsa> (Minor issue)
+ [buster] - tcc <ignored> (Minor issue)
+ [stretch] - tcc <ignored> (Minor issue)
[jessie] - tcc <no-dsa> (Minor issue)
NOTE: https://lists.nongnu.org/archive/html/tinycc-devel/2019-05/msg00044.html
NOTE: https://repo.or.cz/tinycc.git/commit/d04ce7772c2bc2781ab2502e0b1f1964488814b5
@@ -46232,8 +46225,8 @@ CVE-2019-9755 (An integer underflow issue exists in ntfs-3g 2017.3.23. A local a
NOTE: https://sourceforge.net/p/ntfs-3g/ntfs-3g/ci/85c1634a26faa572d3c558d4cf8aaaca5202d4e9/
CVE-2019-9754 (An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. ...)
- tcc <unfixed> (low; bug #925127)
- [buster] - tcc <no-dsa> (Minor issue)
- [stretch] - tcc <no-dsa> (Minor issue)
+ [buster] - tcc <ignored> (Minor issue)
+ [stretch] - tcc <ignored> (Minor issue)
[jessie] - tcc <no-dsa> (Minor issue)
NOTE: https://lists.nongnu.org/archive/html/tinycc-devel/2019-03/msg00038.html
CVE-2019-9753 (An issue was discovered in Open Ticket Request System (OTRS) 7.x befor ...)
@@ -101412,8 +101405,8 @@ CVE-2018-8832 (enhavo 0.4.0 has XSS via a user-group that contains executable Ja
NOT-FOR-US: enhavo
CVE-2018-8831 (A Persistent XSS vulnerability exists in Kodi (formerly XBMC) through ...)
- kodi <unfixed> (low)
- [buster] - kodi <no-dsa> (Minor issue)
- [stretch] - kodi <no-dsa> (Minor issue)
+ [buster] - kodi <ignored> (Minor issue)
+ [stretch] - kodi <ignored> (Minor issue)
- xbmc <removed>
[jessie] - xbmc <no-dsa> (Minor issue)
[wheezy] - xbmc <no-dsa> (Minor issue)
@@ -239167,8 +239160,8 @@ CVE-2014-XXXX [rsync collision attack]
CVE-2014-8242 (librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, w ...)
[experimental] - librsync 1.0.0-1~exp1
- librsync 2.0.2-1 (low; bug #776246)
- [buster] - librsync <no-dsa> (Minor issue, too instrusive to backport)
- [stretch] - librsync <no-dsa> (Minor issue, too instrusive to backport)
+ [buster] - librsync <ignored> (Minor issue, too instrusive to backport)
+ [stretch] - librsync <ignored> (Minor issue, too instrusive to backport)
[jessie] - librsync <no-dsa> (Minor issue, too instrusive to backport)
[wheezy] - librsync <no-dsa> (Minor issue, too instrusive to backport)
[squeeze] - librsync <no-dsa> (Minor issue, too instrusive to backport)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d55a0584c3d3d13b0da4a1bc0c7278ae67bdfd8d
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/d55a0584c3d3d13b0da4a1bc0c7278ae67bdfd8d
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200117/056e0275/attachment.html>
More information about the debian-security-tracker-commits
mailing list