Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits: f41d7aba by Moritz Muehlenhoff at 2018-04-09T22:45:08+02:00 mariadb/mysql postponed until next micro releases libraw, add wordpress to dsa-needed guacamole, nmap, cfitsio no-dsa jquery, pjproject ignored for jessie - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: ===================================== data/CVE/list ===================================== --- a/data/CVE/list +++ b/data/CVE/list @@ -161,8 +161,12 @@ CVE-2018-9840 CVE-2018-9839 RESERVED CVE-2018-1000166 [Unsafe use of sprintf() can allow a remote unauthenticated attacker to execute arbitrary code] + - cfitsio 3.430-1 (low; bug #892458) + [stretch] - cfitsio <no-dsa> (Minor issue) + [jessie] - cfitsio <no-dsa> (Minor issue) - cfitsio 3.430-1 (bug #892458) NOTE: https://github.com/astropy/astropy/pull/7274 + NOTE: Mitigated to a crash due to hardened build flags CVE-2018-1000164 [Improper neutralization of CRLF Sequences http/wsgi.py:process_headers() can allow an attacker to cause a server to return arbitrary HTTP headers] - gunicorn 19.5.0-1 NOTE: https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5 @@ -170,6 +174,8 @@ CVE-2018-1000164 [Improper neutralization of CRLF Sequences http/wsgi.py:process NOTE: https://github.com/benoitc/gunicorn/commit/5263a4ef2a63c62216680876f3813959839608ff CVE-2018-1000161 [directory traversal in the way the non-default http-fetch script sanitized URLs] - nmap 7.70+dfsg1-1 + [stretch] - nmap <no-dsa> (Minor issue) + [jessie] - nmap <no-dsa> (Minor issue) CVE-2018-1000157 REJECTED CVE-2018-9838 (The caml_ba_deserialize function in byterun/bigarray.c in the standard ...) @@ -5977,12 +5983,16 @@ CVE-2017-18200 (The f2fs implementation in the Linux kernel before 4.14 mishandl - linux <not-affected> (Vulnerable code not present) CVE-2018-1000099 (Teluu PJSIP version 2.7.1 and earlier contains a Access of ...) - pjproject 2.7.2~dfsg-1 + [jessie] - pjproject <ignored> (Minor issue) NOTE: http://downloads.asterisk.org/pub/security/AST-2018-003.html NOTE: https://trac.pjsip.org/repos/ticket/2092 + NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN) CVE-2018-1000098 (Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow ...) - pjproject 2.7.2~dfsg-1 + [jessie] - pjproject <ignored> (Minor issue) NOTE: http://downloads.asterisk.org/pub/security/AST-2018-002.html NOTE: https://trac.pjsip.org/repos/ticket/2093 + NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN) CVE-2018-1000101 (Mingw-w64 version 5.0.3 and earlier contains an Improper Null ...) - mingw-w64 <unfixed> (low) [stretch] - mingw-w64 <no-dsa> (Minor issue) @@ -10994,16 +11004,22 @@ CVE-2018-5803 [Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp CVE-2018-5802 [Out-of-bounds read in kodak_radc_load_raw function internal/dcraw_common.cpp] RESERVED - libraw 0.18.7-1 + [stretch] - libraw <no-dsa> (Minor issue) + [jessie] - libraw <no-dsa> (Minor issue) NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt NOTE: https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4 CVE-2018-5801 [NULL pointer dereference in LibRaw::unpack function src/libraw_cxx.cpp] RESERVED - libraw 0.18.7-1 + [stretch] - libraw <no-dsa> (Minor issue) + [jessie] - libraw <no-dsa> (Minor issue) NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt NOTE: https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4 CVE-2018-5800 [Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function in internal/dcraw_common.cpp] RESERVED - libraw 0.18.7-1 + [stretch] - libraw <no-dsa> (Minor issue) + [jessie] - libraw <no-dsa> (Minor issue) NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt NOTE: https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4 CVE-2018-1000006 (GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10 and earlier, ...) @@ -11100,6 +11116,7 @@ CVE-2016-10707 (jQuery 3.0.0-rc.1 is vulnerable to Denial of Service (DoS) due t NOTE: Only 3.0.0-rc1 affected: https://github.com/jquery/jquery/issues/3133#issuecomment-358978489 CVE-2015-9251 (jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks ...) - jquery 3.1.1-1 + [jessie] - jquery <ignored> (Too intrusive to backport) [wheezy] - jquery <ignored> (Too invasive to fix) NOTE: https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc NOTE: https://github.com/jquery/jquery/issues/2432 @@ -11108,6 +11125,7 @@ CVE-2015-9251 (jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) a NOTE: only 3.0 was fixed upstream, because fix considered too invasive: https://github.com/jquery/jquery/issues/2432#issuecomment-290983196 CVE-2012-6708 (jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) ...) - jquery 1.11.3+dfsg-1 + [jessie] - jquery <ignored> (Too intrusive to backport) [wheezy] - jquery <ignored> (Too invasive to fix) NOTE: https://bugs.jquery.com/ticket/11290 NOTE: https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d @@ -19050,9 +19068,12 @@ CVE-2018-2767 [Use of SSL/TLS not enforced in client library (Return of BACKRONY RESERVED - mariadb-10.2 <unfixed> - mariadb-10.1 <unfixed> + [stretch] - mariadb-10.1 <postponed> (Wait for next upstream security/bugfix release) - mariadb-10.0 <removed> + [jessie] - mariadb-10.0 <postponed> (Wait for next upstream security/bugfix release) - mysql-5.7 <unfixed> - mysql-5.5 <removed> + [jessie] - mysql-5.5 <postponed> (Wait for next upstream security/bugfix release) NOTE: http://www.openwall.com/lists/oss-security/2018/04/08/2 NOTE: Result from an incomplete fix for CVE-2015-3152 and related CVE for NOTE: Oracle products. @@ -27172,8 +27193,10 @@ CVE-2017-16876 (Cross-site scripting (XSS) vulnerability in the _keyify function NOTE: https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98 CVE-2017-16875 (An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in ...) - pjproject 2.7.1~dfsg-1 + [jessie] - pjproject <ignored> (Minor issue) NOTE: https://trac.pjsip.org/repos/ticket/2055 NOTE: https://trac.pjsip.org/repos/changeset/5680 + NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN) CVE-2017-16874 RESERVED CVE-2017-16873 (It is possible to exploit an unsanitized PATH in the suid binary that ...) @@ -27218,8 +27241,10 @@ CVE-2017-1000161 REJECTED CVE-2017-16872 (An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in ...) - pjproject 2.7.1~dfsg-1 + [jessie] - pjproject <ignored> (Minor issue) NOTE: https://trac.pjsip.org/repos/ticket/2056 NOTE: https://trac.pjsip.org/repos/changeset/5682 + NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE, STUN and TURN) CVE-2017-16871 (** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for WordPress ...) NOT-FOR-US: UpdraftPlus plugin for WordPress CVE-2017-16870 (** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for WordPress ...) @@ -69569,6 +69594,8 @@ CVE-2017-3159 (Apache Camel's camel-snakeyaml component is vulnerable to Java ob NOT-FOR-US: Apache Camel CVE-2017-3158 (A race condition in Guacamole's terminal emulator in versions 0.9.5 ...) - guacamole-client <unfixed> (bug #891798) + [stretch] - guacamole-client <no-dsa> (Minor issue) + [jessie] - guacamole-client <no-dsa> (Minor issue) - guacamole <removed> [wheezy] - guacamole <not-affected> (Version not vulnerable) CVE-2017-3157 (By exploiting the way Apache OpenOffice before 4.1.4 renders embedded ...) ===================================== data/dsa-needed.txt ===================================== --- a/data/dsa-needed.txt +++ b/data/dsa-needed.txt @@ -92,6 +92,8 @@ undertow -- vlc (jmm) -- +wordpress +-- xen/oldstable -- zendframework/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f41d7abab40575c86e93f696900add70648b5fc5 --- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f41d7abab40575c86e93f696900add70648b5fc5 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits