[Git][security-tracker-team/security-tracker][master] Revaluate state for CVE-2019-13456/freeradius
Salvatore Bonaccorso
carnil at debian.org
Wed Mar 18 14:09:51 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
96e6f728 by Salvatore Bonaccorso at 2020-03-18T15:07:00+01:00
Revaluate state for CVE-2019-13456/freeradius
I cannot say for sure where we got first the respective commits related
to CVE-2019-11234 and CVE-2019-11235 but as well the description[1] and
the relevant reference to the Red Hat bugzilla[2] shows that this is
related to the commit[3].
[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13456
[2] https://bugzilla.redhat.com/show_bug.cgi?id=1737663
[3] https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
Contact with MITRE regarding CVE-2019-13456 and CVE-2019-20510 if they
are considered on purpose different CVEs.
Thanks: Thorsten Alteholz for pointing out this inconsistency.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -43878,14 +43878,11 @@ CVE-2019-13457 (An issue was discovered in Open Ticket Request System (OTRS) 7.0
- otrs2 <not-affected> (Only affects 7.x series)
NOTE: https://otrs.com/release-notes/otrs-security-advisory-2019-11/
CVE-2019-13456 (In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd h ...)
- - freeradius 3.0.17+dfsg-1.1
- [stretch] - freeradius <no-dsa> (Minor issue; plugin not enabled by default)
- [jessie] - freeradius <not-affected> (Vulnerable code added later)
+ - freeradius 3.0.20+dfsg-1
+ [jessie] - freeradius <not-affected> (Vulnerable code introduced later in version 3.0.0)
+ NOTE: https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa (release_3_0_20)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1737663
NOTE: https://wpa3.mathyvanhoef.com/#new
- NOTE: https://github.com/FreeRADIUS/freeradius-server/commit/a99746c93b8b3ae3be367af0e46f0d6a9626f566 (master)
- NOTE: https://github.com/FreeRADIUS/freeradius-server/commit/85497b5ff37ccb656895b826b88585898c209586 (3.0.x)
- NOTE: Issue seems to be treated as different issue than CVE-2019-11234 and CVE-2019-11235
CVE-2019-13455 (In Xymon through 4.3.28, a stack-based buffer overflow vulnerability e ...)
{DLA-1898-1}
- xymon 4.3.29-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96e6f728c485284b319e7b48e270227b61110940
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96e6f728c485284b319e7b48e270227b61110940
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200318/def712e9/attachment.html>
More information about the debian-security-tracker-commits
mailing list