[Git][security-tracker-team/security-tracker][master] libmatio fixed in experimental

Moritz Muehlenhoff jmm at debian.org
Fri Sep 25 11:56:14 BST 2020



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0479c89c by Moritz Muehlenhoff at 2020-09-25T12:55:42+02:00
libmatio fixed in experimental

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -53073,6 +53073,7 @@ CVE-2019-20021 (A heap-based buffer over-read was discovered in canUnpack in p_m
 	NOTE: https://github.com/upx/upx/issues/315
 	NOTE: https://github.com/upx/upx/commit/819c33fee2b2c33b96bef27a13cb20f2589819aa
 CVE-2019-20020 (A stack-based buffer over-read was discovered in ReadNextStructField i ...)
+	[experimental] - libmatio 1.5.18-1
 	- libmatio <unfixed>
 	[buster] - libmatio <no-dsa> (Minor issue)
 	[stretch] - libmatio <no-dsa> (Minor issue)
@@ -53085,12 +53086,14 @@ CVE-2019-20019 (An attempted excessive memory allocation was discovered in Mat_V
 	[jessie] - libmatio <no-dsa> (Minor issue)
 	NOTE: https://github.com/tbeu/matio/issues/130
 CVE-2019-20018 (A stack-based buffer over-read was discovered in ReadNextCell in mat5. ...)
+	[experimental] - libmatio 1.5.18-1
 	- libmatio <unfixed>
 	[buster] - libmatio <no-dsa> (Minor issue)
 	[stretch] - libmatio <no-dsa> (Minor issue)
 	[jessie] - libmatio <no-dsa> (Minor issue)
 	NOTE: https://github.com/tbeu/matio/issues/129
 CVE-2019-20017 (A stack-based buffer over-read was discovered in Mat_VarReadNextInfo5  ...)
+	[experimental] - libmatio 1.5.18-1
 	- libmatio <unfixed>
 	[buster] - libmatio <no-dsa> (Minor issue)
 	[stretch] - libmatio <no-dsa> (Minor issue)
@@ -102445,11 +102448,9 @@ CVE-2017-18357 (Shopware before 5.3.4 has a PHP Object Instantiation issue via t
 CVE-2017-18356 (In the Automattic WooCommerce plugin before 3.2.4 for WordPress, an at ...)
 	NOT-FOR-US: Automattic WooCommerce plugin for WordPress
 CVE-2019-6293 (An issue was discovered in the function mark_beginning_as_normal in nf ...)
-	- flex <unfixed> (low; bug #919428)
-	[buster] - flex <no-dsa> (Minor issue)
-	[stretch] - flex <no-dsa> (Minor issue)
-	[jessie] - flex <no-dsa> (Minor issue)
+	- flex <unfixed> (unimportant; bug #919428)
 	NOTE: https://github.com/westes/flex/issues/414
+	NOTE: Negligible security impact
 CVE-2019-6292 (An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYam ...)
 	- yaml-cpp 0.6.3-1 (low; bug #919430)
 	[buster] - yaml-cpp <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0479c89c45c66a18008277c960e42c7d05c42f23

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0479c89c45c66a18008277c960e42c7d05c42f23
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200925/af721738/attachment.html>


More information about the debian-security-tracker-commits mailing list