[Git][security-tracker-team/security-tracker][master] Update gnucobol/open-cobol bug links to new path.
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue May 11 10:03:02 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ab750bf0 by Salvatore Bonaccorso at 2021-05-11T11:02:27+02:00
Update gnucobol/open-cobol bug links to new path.
Thanks: Petter Reinholdtsen <pere at hungry.com>
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -118212,7 +118212,7 @@ CVE-2019-16396 (GnuCOBOL 2.2 has a use-after-free in the end_scope_of_program_na
- open-cobol <removed>
[stretch] - open-cobol <ignored> (Minor issue)
[jessie] - open-cobol <no-dsa> (Minor issue)
- NOTE: https://sourceforge.net/p/open-cobol/bugs/587/
+ NOTE: https://sourceforge.net/p/gnucobol/bugs/587/
NOTE: Fixed by: https://sourceforge.net/p/open-cobol/code/3347/
CVE-2019-16395 (GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() functi ...)
- gnucobol 4.0~early~20200606-1 (low; bug #940949)
@@ -118220,7 +118220,7 @@ CVE-2019-16395 (GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name()
- open-cobol <removed>
[stretch] - open-cobol <ignored> (Minor issue)
[jessie] - open-cobol <no-dsa> (Minor issue)
- NOTE: https://sourceforge.net/p/open-cobol/bugs/586/
+ NOTE: https://sourceforge.net/p/gnucobol/bugs/586/
NOTE: Fixed by: https://sourceforge.net/p/open-cobol/code/3346/
CVE-2019-16390
RESERVED
@@ -124260,7 +124260,7 @@ CVE-2019-14541 (GnuCOBOL 2.2 has a stack-based buffer overflow in cb_encode_prog
- open-cobol <removed>
[stretch] - open-cobol <ignored> (Minor issue)
[jessie] - open-cobol <no-dsa> (Minor issue)
- NOTE: https://sourceforge.net/p/open-cobol/bugs/584/
+ NOTE: https://sourceforge.net/p/gnucobol/bugs/584/
CVE-2019-14540 (A Polymorphic Typing issue was discovered in FasterXML jackson-databin ...)
{DSA-4542-1 DLA-1943-1}
- jackson-databind 2.10.0-1 (bug #940498)
@@ -124314,7 +124314,7 @@ CVE-2019-14528 (GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in
- open-cobol <removed>
[stretch] - open-cobol <ignored> (Minor issue)
[jessie] - open-cobol <no-dsa> (Minor issue)
- NOTE: https://sourceforge.net/p/open-cobol/bugs/583/
+ NOTE: https://sourceforge.net/p/gnucobol/bugs/583/
CVE-2019-14527 (An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices befor ...)
NOT-FOR-US: NETGEAR
CVE-2019-14526 (An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices befor ...)
@@ -124461,7 +124461,7 @@ CVE-2019-14486 (GnuCOBOL 2.2 has a buffer overflow in cb_evaluate_expr in cobc/f
- open-cobol <removed>
[stretch] - open-cobol <ignored> (Minor issue)
[jessie] - open-cobol <no-dsa> (Minor issue)
- NOTE: https://sourceforge.net/p/open-cobol/bugs/582/
+ NOTE: https://sourceforge.net/p/gnucobol/bugs/582/
CVE-2019-14485
RESERVED
CVE-2019-14484
@@ -124502,7 +124502,7 @@ CVE-2019-14468 (GnuCOBOL 2.2 has a buffer overflow in cb_push_op in cobc/field.c
- open-cobol <removed>
[stretch] - open-cobol <ignored> (Minor issue)
[jessie] - open-cobol <no-dsa> (Minor issue)
- NOTE: https://sourceforge.net/p/open-cobol/bugs/581/
+ NOTE: https://sourceforge.net/p/gnucobol/bugs/581/
CVE-2019-14467 (The Social Photo Gallery plugin 1.0 for WordPress allows Remote Code E ...)
NOT-FOR-US: Social Photo Gallery plugin for WordPress
CVE-2019-14466 (The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab750bf03e177a6c85e498e3e7e98d9a358229e4
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab750bf03e177a6c85e498e3e7e98d9a358229e4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210511/b796db3c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list