[Git][security-tracker-team/security-tracker][master] various bugs

Moritz Muehlenhoff jmm at debian.org
Thu Oct 29 18:52:41 GMT 2020



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
91e443d5 by Moritz Mühlenhoff at 2020-10-29T19:52:21+01:00
various bugs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -698,13 +698,13 @@ CVE-2020-27743 (libtac in pam_tacplus through 1.5.1 lacks a check for a failure
 	- libpam-tacplus <unfixed> (bug #973250)
 	NOTE: https://github.com/kravietz/pam_tacplus/pull/163
 CVE-2020-27742 (An Insecure Direct Object Reference vulnerability in Citadel WebCit th ...)
-	- webcit <unfixed>
+	- webcit <unfixed> (bug #973385)
 CVE-2020-27741 (Multiple cross-site scripting (XSS) vulnerabilities in Citadel WebCit  ...)
-	- webcit <unfixed>
+	- webcit <unfixed> (bug #973385)
 CVE-2020-27740 (Citadel WebCit through 926 allows unauthenticated remote attackers to  ...)
-	- webcit <unfixed>
+	- webcit <unfixed> (bug #973385)
 CVE-2020-27739 (A Weak Session Management vulnerability in Citadel WebCit through 926  ...)
-	- webcit <unfixed>
+	- webcit <unfixed> (bug #973385)
 CVE-2020-27738
 	RESERVED
 CVE-2020-27737
@@ -20855,10 +20855,10 @@ CVE-2020-18187
 CVE-2020-18186
 	RESERVED
 CVE-2020-18185 (class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrar ...)
-	- pluxml <unfixed>
+	- pluxml <unfixed> (bug #973382)
 	NOTE: https://github.com/pluxml/PluXml/issues/321
 CVE-2020-18184 (In PluxXml V5.7,the theme edit function /PluXml/core/admin/parametres_ ...)
-	- pluxml <unfixed>
+	- pluxml <unfixed> (bug #973382)
 	NOTE: https://github.com/pluxml/PluXml/issues/320
 CVE-2020-18183
 	RESERVED
@@ -52570,19 +52570,19 @@ CVE-2020-6110 (An exploitable partial path traversal vulnerability exists in the
 CVE-2020-6109 (An exploitable path traversal vulnerability exists in the Zoom client, ...)
 	NOT-FOR-US: Zoom
 CVE-2020-6108 (An exploitable code execution vulnerability exists in the fsck_chk_orp ...)
-	- f2fs-tools <unfixed>
+	- f2fs-tools <unfixed> (bug #973380)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050
 CVE-2020-6107 (An exploitable information disclosure vulnerability exists in the dev_ ...)
-	- f2fs-tools <unfixed>
+	- f2fs-tools <unfixed> (bug #973380)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049
 CVE-2020-6106 (An exploitable information disclosure vulnerability exists in the init ...)
-	- f2fs-tools <unfixed>
+	- f2fs-tools <unfixed> (bug #973380)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048
 CVE-2020-6105 (An exploitable code execution vulnerability exists in the multiple dev ...)
-	- f2fs-tools <unfixed>
+	- f2fs-tools <unfixed> (bug #973380)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047
 CVE-2020-6104 (An exploitable information disclosure vulnerability exists in the get_ ...)
-	- f2fs-tools <unfixed>
+	- f2fs-tools <unfixed> (bug #973380)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046
 CVE-2020-6103 (An exploitable code execution vulnerability exists in the Shader funct ...)
 	NOT-FOR-US: AMD Radeon DirectX 11 Driver atidxx64.dll
@@ -54101,7 +54101,7 @@ CVE-2020-5423
 CVE-2020-5422 (BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA pas ...)
 	NOT-FOR-US: BOSH System Metrics Server
 CVE-2020-5421 (In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5. ...)
-	- libspring-java <unfixed>
+	- libspring-java <unfixed> (bug #973381)
 	[buster] - libspring-java <no-dsa> (Minor issue)
 	[stretch] - libspring-java <no-dsa> (Minor issue)
 	NOTE: https://tanzu.vmware.com/security/cve-2020-5421
@@ -93816,7 +93816,7 @@ CVE-2019-11029 (Mirasys VMS before V7.6.1 and 8.x before V8.3.2 mishandles the D
 CVE-2019-11028 (GAT-Ship Web Module before 1.40 suffers from a vulnerability allowing  ...)
 	NOT-FOR-US: GAT-Ship Web Module
 CVE-2015-9284 (The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...)
-	- ruby-omniauth <unfixed>
+	- ruby-omniauth <unfixed> (bug #973384)
 	[buster] - ruby-omniauth <no-dsa> (Minor issue)
 	[stretch] - ruby-omniauth <no-dsa> (Minor issue)
 	[jessie] - ruby-omniauth <no-dsa> (Fix is in additional gem and needs CSRF protection in apps)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91e443d5b9629243e306928b6bd820e17e9e1bde

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91e443d5b9629243e306928b6bd820e17e9e1bde
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201029/e53f09b6/attachment.html>


More information about the debian-security-tracker-commits mailing list