[Git][security-tracker-team/security-tracker][master] libmatio fixed in experimental
Moritz Muehlenhoff
jmm at debian.org
Fri Sep 25 11:56:14 BST 2020
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0479c89c by Moritz Muehlenhoff at 2020-09-25T12:55:42+02:00
libmatio fixed in experimental
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -53073,6 +53073,7 @@ CVE-2019-20021 (A heap-based buffer over-read was discovered in canUnpack in p_m
NOTE: https://github.com/upx/upx/issues/315
NOTE: https://github.com/upx/upx/commit/819c33fee2b2c33b96bef27a13cb20f2589819aa
CVE-2019-20020 (A stack-based buffer over-read was discovered in ReadNextStructField i ...)
+ [experimental] - libmatio 1.5.18-1
- libmatio <unfixed>
[buster] - libmatio <no-dsa> (Minor issue)
[stretch] - libmatio <no-dsa> (Minor issue)
@@ -53085,12 +53086,14 @@ CVE-2019-20019 (An attempted excessive memory allocation was discovered in Mat_V
[jessie] - libmatio <no-dsa> (Minor issue)
NOTE: https://github.com/tbeu/matio/issues/130
CVE-2019-20018 (A stack-based buffer over-read was discovered in ReadNextCell in mat5. ...)
+ [experimental] - libmatio 1.5.18-1
- libmatio <unfixed>
[buster] - libmatio <no-dsa> (Minor issue)
[stretch] - libmatio <no-dsa> (Minor issue)
[jessie] - libmatio <no-dsa> (Minor issue)
NOTE: https://github.com/tbeu/matio/issues/129
CVE-2019-20017 (A stack-based buffer over-read was discovered in Mat_VarReadNextInfo5 ...)
+ [experimental] - libmatio 1.5.18-1
- libmatio <unfixed>
[buster] - libmatio <no-dsa> (Minor issue)
[stretch] - libmatio <no-dsa> (Minor issue)
@@ -102445,11 +102448,9 @@ CVE-2017-18357 (Shopware before 5.3.4 has a PHP Object Instantiation issue via t
CVE-2017-18356 (In the Automattic WooCommerce plugin before 3.2.4 for WordPress, an at ...)
NOT-FOR-US: Automattic WooCommerce plugin for WordPress
CVE-2019-6293 (An issue was discovered in the function mark_beginning_as_normal in nf ...)
- - flex <unfixed> (low; bug #919428)
- [buster] - flex <no-dsa> (Minor issue)
- [stretch] - flex <no-dsa> (Minor issue)
- [jessie] - flex <no-dsa> (Minor issue)
+ - flex <unfixed> (unimportant; bug #919428)
NOTE: https://github.com/westes/flex/issues/414
+ NOTE: Negligible security impact
CVE-2019-6292 (An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYam ...)
- yaml-cpp 0.6.3-1 (low; bug #919430)
[buster] - yaml-cpp <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0479c89c45c66a18008277c960e42c7d05c42f23
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0479c89c45c66a18008277c960e42c7d05c42f23
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200925/af721738/attachment.html>
More information about the debian-security-tracker-commits
mailing list