[Git][security-tracker-team/security-tracker][master] buster triage
Moritz Muehlenhoff
jmm at debian.org
Mon Oct 12 18:46:34 BST 2020
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
116f39de by Moritz Muehlenhoff at 2020-10-12T19:45:22+02:00
buster triage
reviewed the status of some old issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1769,6 +1769,7 @@ CVE-2020-26116 (http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.
- python3.9 3.9.0~b5-1
- python3.8 3.8.5-1
- python3.7 <removed>
+ [buster] - python3.7 <no-dsa> (Minor issue)
- python3.5 <removed>
NOTE: https://bugs.python.org/issue39603
NOTE: https://python-security.readthedocs.io/vuln/http-header-injection-method.html
@@ -2606,6 +2607,7 @@ CVE-2020-25740
CVE-2020-25739 (An issue was discovered in the gon gem before gon-6.4.0 for Ruby. Mult ...)
{DLA-2380-1}
- ruby-gon <unfixed> (bug #970938)
+ [buster] - ruby-gon <no-dsa> (Minor issue)
NOTE: https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7
CVE-2020-25738
RESERVED
@@ -2825,6 +2827,7 @@ CVE-2020-25638
CVE-2020-25637 (A double free memory issue was found to occur in the libvirt API, in v ...)
{DLA-2395-1}
- libvirt <unfixed> (bug #971555)
+ [buster] - libvirt <no-dsa> (Minor issue)
NOTE: Introduced by: https://libvirt.org/git/?p=libvirt.git;a=commit;h=0977b8aa071de550e1a013d35e2c72615e65d520 (v1.2.14-rc1)
NOTE: Fixed by: https://libvirt.org/git/?p=libvirt.git;a=commit;h=955029bd0ad7ef96000f529ac38204a8f4a96401 (v6.8.0)
NOTE: Fixed by: https://libvirt.org/git/?p=libvirt.git;a=commit;h=50864dcda191eb35732dbd80fb6ca251a6bba923 (v6.8.0)
@@ -22336,11 +22339,13 @@ CVE-2020-16122
RESERVED
{DLA-2399-1}
- packagekit <unfixed>
+ [buster] - packagekit <no-dsa> (Minor issue)
NOTE: https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1882098
CVE-2020-16121
RESERVED
{DLA-2399-1}
- packagekit <unfixed>
+ [buster] - packagekit <no-dsa> (Minor issue)
NOTE: https://bugs.launchpad.net/ubuntu/+source/packagekit/+bug/1888887
CVE-2020-16120
RESERVED
@@ -46935,6 +46940,7 @@ CVE-2020-7070 (In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x
{DLA-2397-1}
- php7.4 7.4.11-1
- php7.3 <removed>
+ [buster] - php7.3 <postponed> (Minor issue, likely to introduce tegressions, wait for one more 7.3 upstream release)
- php7.0 <removed>
NOTE: Fixed in PHP 7.4.11, 7.3.23, 7.2.34
NOTE: PHP Bug: https://bugs.php.net/79699
@@ -46942,8 +46948,7 @@ CVE-2020-7070 (In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x
CVE-2020-7069 (In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below ...)
- php7.4 7.4.11-1
- php7.3 <removed>
- - php7.0 <removed>
- [stretch] - php7.0 <not-affected> (Affected code not present)
+ - php7.0 <not-affected> (Affected code not present)
NOTE: Fixed in PHP 7.4.11, 7.3.23, 7.2.34
NOTE: PHP Bug: https://bugs.php.net/79601
NOTE: https://git.php.net/?p=php-src.git;a=commit;h=0216630ea2815a5789a24279a1211ac398d4de79
@@ -51686,12 +51691,14 @@ CVE-2020-5218 (Affected versions of Sylius give attackers the ability to switch
NOT-FOR-US: Sylius
CVE-2020-5217 (In Secure Headers (RubyGem secure_headers), a directive injection vuln ...)
- ruby-secure-headers 6.3.1-1 (bug #949999)
+ [buster] - ruby-secure-headers <no-dsa> (Minor issue)
NOTE: https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c
NOTE: https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3
NOTE: https://github.com/twitter/secure_headers/issues/418
NOTE: https://github.com/twitter/secure_headers/pull/421
CVE-2020-5216 (In Secure Headers (RubyGem secure_headers), a directive injection vuln ...)
- ruby-secure-headers 6.3.1-1 (bug #949998)
+ [buster] - ruby-secure-headers <no-dsa> (Minor issue)
NOTE: https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg
NOTE: https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0
CVE-2020-5215 (In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Pytho ...)
@@ -129333,8 +129340,9 @@ CVE-2018-16849 (A flaw was found in openstack-mistral. By manipulating the SSH p
[stretch] - mistral 3.0.0-4+deb9u1
NOTE: https://bugs.launchpad.net/mistral/+bug/1783708
CVE-2018-16848 (A Denial of Service (DoS) condition is possible in OpenStack Mistral i ...)
- - mistral <undetermined>
+ - mistral 10.0.0~rc1-2
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1645332
+ NOTE: https://bugs.launchpad.net/mistral/%2Bbug/1785657
CVE-2018-16847 (An OOB heap buffer r/w access issue was found in the NVM Express Contr ...)
- qemu 1:3.1+dfsg-1 (bug #912655)
[stretch] - qemu <not-affected> (support for Controller Memory Buffers added later)
@@ -139479,7 +139487,6 @@ CVE-2018-12888
CVE-2018-12887
RESERVED
CVE-2018-12886 (stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in fu ...)
- - gcc-snapshot <unfixed>
- gcc-8 <unfixed>
[buster] - gcc-8 <ignored> (Too intrusive to backport)
- gcc-7 <unfixed>
@@ -150745,9 +150752,7 @@ CVE-2018-8833 (Heap-based buffer overflow vulnerabilities in Advantech WebAccess
CVE-2018-8832 (enhavo 0.4.0 has XSS via a user-group that contains executable JavaScr ...)
NOT-FOR-US: enhavo
CVE-2018-8831 (A Persistent XSS vulnerability exists in Kodi (formerly XBMC) through ...)
- - kodi <unfixed> (low)
- [buster] - kodi <ignored> (Minor issue)
- [stretch] - kodi <ignored> (Minor issue)
+ - kodi <not-affected> (Chorus not included in Kodi as shipped in Debian)
- xbmc <removed>
[jessie] - xbmc <no-dsa> (Minor issue)
[wheezy] - xbmc <no-dsa> (Minor issue)
@@ -154067,9 +154072,8 @@ CVE-2018-7579 (\application\admin\controller\update_urls.class.php in YzmCMS 3.6
CVE-2018-7578
RESERVED
CVE-2018-7577 (Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Go ...)
- - snappy <undetermined>
+ - tensorflow <itp> (bug #804612)
NOTE: https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-005.md
- NOTE: There are no useful details, could just as well be a misuse of snappy by Tensorflow
CVE-2018-7576 (Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Deref ...)
- tensorflow <itp> (bug #804612)
CVE-2018-7575 (Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow v ...)
@@ -202334,8 +202338,7 @@ CVE-2017-8762 (GeniXCMS 1.0.2 has XSS triggered by an authenticated user who sub
NOT-FOR-US: GenixCMS
CVE-2017-8761 [Swift tempurl middleware reveals signatures in the logfiles]
RESERVED
- - swift <unfixed>
- [buster] - swift <no-dsa> (Minor issue)
+ - swift 2.17.0-2
[stretch] - swift <no-dsa> (Minor issue)
[jessie] - swift <end-of-life> (Not supported in Jessie LTS)
NOTE: https://bugs.launchpad.net/swift/+bug/1685798
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/116f39deb878e8f3e0f104a828b01af22df712c3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/116f39deb878e8f3e0f104a828b01af22df712c3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201012/8d8ef714/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list