Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
f41d7aba by Moritz Muehlenhoff at 2018-04-09T22:45:08+02:00
mariadb/mysql postponed until next micro releases
libraw, add wordpress to dsa-needed
guacamole, nmap, cfitsio no-dsa
jquery, pjproject ignored for jessie
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -161,8 +161,12 @@ CVE-2018-9840
CVE-2018-9839
RESERVED
CVE-2018-1000166 [Unsafe use of sprintf() can allow a remote unauthenticated
attacker to execute arbitrary code]
+ - cfitsio 3.430-1 (low; bug #892458)
+ [stretch] - cfitsio <no-dsa> (Minor issue)
+ [jessie] - cfitsio <no-dsa> (Minor issue)
- cfitsio 3.430-1 (bug #892458)
NOTE: https://github.com/astropy/astropy/pull/7274
+ NOTE: Mitigated to a crash due to hardened build flags
CVE-2018-1000164 [Improper neutralization of CRLF Sequences
http/wsgi.py:process_headers() can allow an attacker to cause a server to
return arbitrary HTTP headers]
- gunicorn 19.5.0-1
NOTE:
https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5
@@ -170,6 +174,8 @@ CVE-2018-1000164 [Improper neutralization of CRLF Sequences
http/wsgi.py:process
NOTE:
https://github.com/benoitc/gunicorn/commit/5263a4ef2a63c62216680876f3813959839608ff
CVE-2018-1000161 [directory traversal in the way the non-default http-fetch
script sanitized URLs]
- nmap 7.70+dfsg1-1
+ [stretch] - nmap <no-dsa> (Minor issue)
+ [jessie] - nmap <no-dsa> (Minor issue)
CVE-2018-1000157
REJECTED
CVE-2018-9838 (The caml_ba_deserialize function in byterun/bigarray.c in the
standard ...)
@@ -5977,12 +5983,16 @@ CVE-2017-18200 (The f2fs implementation in the Linux
kernel before 4.14 mishandl
- linux <not-affected> (Vulnerable code not present)
CVE-2018-1000099 (Teluu PJSIP version 2.7.1 and earlier contains a Access of
...)
- pjproject 2.7.2~dfsg-1
+ [jessie] - pjproject <ignored> (Minor issue)
NOTE: http://downloads.asterisk.org/pub/security/AST-2018-003.html
NOTE: https://trac.pjsip.org/repos/ticket/2092
+ NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE,
STUN and TURN)
CVE-2018-1000098 (Teluu PJSIP version 2.7.1 and earlier contains a Integer
Overflow ...)
- pjproject 2.7.2~dfsg-1
+ [jessie] - pjproject <ignored> (Minor issue)
NOTE: http://downloads.asterisk.org/pub/security/AST-2018-002.html
NOTE: https://trac.pjsip.org/repos/ticket/2093
+ NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE,
STUN and TURN)
CVE-2018-1000101 (Mingw-w64 version 5.0.3 and earlier contains an Improper
Null ...)
- mingw-w64 <unfixed> (low)
[stretch] - mingw-w64 <no-dsa> (Minor issue)
@@ -10994,16 +11004,22 @@ CVE-2018-5803 [Missing length check of payload in
net/sctp/sm_make_chunk.c:_sctp
CVE-2018-5802 [Out-of-bounds read in kodak_radc_load_raw function
internal/dcraw_common.cpp]
RESERVED
- libraw 0.18.7-1
+ [stretch] - libraw <no-dsa> (Minor issue)
+ [jessie] - libraw <no-dsa> (Minor issue)
NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt
NOTE:
https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
CVE-2018-5801 [NULL pointer dereference in LibRaw::unpack function
src/libraw_cxx.cpp]
RESERVED
- libraw 0.18.7-1
+ [stretch] - libraw <no-dsa> (Minor issue)
+ [jessie] - libraw <no-dsa> (Minor issue)
NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt
NOTE:
https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
CVE-2018-5800 [Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw
function in internal/dcraw_common.cpp]
RESERVED
- libraw 0.18.7-1
+ [stretch] - libraw <no-dsa> (Minor issue)
+ [jessie] - libraw <no-dsa> (Minor issue)
NOTE: https://packetstormsecurity.com/files/146172/secunia-libraw.txt
NOTE:
https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
CVE-2018-1000006 (GitHub Electron versions 1.8.2-beta.3 and earlier, 1.7.10
and earlier, ...)
@@ -11100,6 +11116,7 @@ CVE-2016-10707 (jQuery 3.0.0-rc.1 is vulnerable to
Denial of Service (DoS) due t
NOTE: Only 3.0.0-rc1 affected:
https://github.com/jquery/jquery/issues/3133#issuecomment-358978489
CVE-2015-9251 (jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS)
attacks ...)
- jquery 3.1.1-1
+ [jessie] - jquery <ignored> (Too intrusive to backport)
[wheezy] - jquery <ignored> (Too invasive to fix)
NOTE:
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
NOTE: https://github.com/jquery/jquery/issues/2432
@@ -11108,6 +11125,7 @@ CVE-2015-9251 (jQuery before 3.0.0 is vulnerable to
Cross-site Scripting (XSS) a
NOTE: only 3.0 was fixed upstream, because fix considered too invasive:
https://github.com/jquery/jquery/issues/2432#issuecomment-290983196
CVE-2012-6708 (jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS)
...)
- jquery 1.11.3+dfsg-1
+ [jessie] - jquery <ignored> (Too intrusive to backport)
[wheezy] - jquery <ignored> (Too invasive to fix)
NOTE: https://bugs.jquery.com/ticket/11290
NOTE:
https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
@@ -19050,9 +19068,12 @@ CVE-2018-2767 [Use of SSL/TLS not enforced in client
library (Return of BACKRONY
RESERVED
- mariadb-10.2 <unfixed>
- mariadb-10.1 <unfixed>
+ [stretch] - mariadb-10.1 <postponed> (Wait for next upstream
security/bugfix release)
- mariadb-10.0 <removed>
+ [jessie] - mariadb-10.0 <postponed> (Wait for next upstream
security/bugfix release)
- mysql-5.7 <unfixed>
- mysql-5.5 <removed>
+ [jessie] - mysql-5.5 <postponed> (Wait for next upstream
security/bugfix release)
NOTE: http://www.openwall.com/lists/oss-security/2018/04/08/2
NOTE: Result from an incomplete fix for CVE-2015-3152 and related CVE
for
NOTE: Oracle products.
@@ -27172,8 +27193,10 @@ CVE-2017-16876 (Cross-site scripting (XSS)
vulnerability in the _keyify function
NOTE:
https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98
CVE-2017-16875 (An issue was discovered in Teluu pjproject (pjlib and
pjlib-util) in ...)
- pjproject 2.7.1~dfsg-1
+ [jessie] - pjproject <ignored> (Minor issue)
NOTE: https://trac.pjsip.org/repos/ticket/2055
NOTE: https://trac.pjsip.org/repos/changeset/5680
+ NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE,
STUN and TURN)
CVE-2017-16874
RESERVED
CVE-2017-16873 (It is possible to exploit an unsanitized PATH in the suid
binary that ...)
@@ -27218,8 +27241,10 @@ CVE-2017-1000161
REJECTED
CVE-2017-16872 (An issue was discovered in Teluu pjproject (pjlib and
pjlib-util) in ...)
- pjproject 2.7.1~dfsg-1
+ [jessie] - pjproject <ignored> (Minor issue)
NOTE: https://trac.pjsip.org/repos/ticket/2056
NOTE: https://trac.pjsip.org/repos/changeset/5682
+ NOTE: In jessie Asterisk doesn't use pjproject for SIP (only for ICE,
STUN and TURN)
CVE-2017-16871 (** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for
WordPress ...)
NOT-FOR-US: UpdraftPlus plugin for WordPress
CVE-2017-16870 (** DISPUTED ** The UpdraftPlus plugin through 1.13.12 for
WordPress ...)
@@ -69569,6 +69594,8 @@ CVE-2017-3159 (Apache Camel's camel-snakeyaml component
is vulnerable to Java ob
NOT-FOR-US: Apache Camel
CVE-2017-3158 (A race condition in Guacamole's terminal emulator in versions
0.9.5 ...)
- guacamole-client <unfixed> (bug #891798)
+ [stretch] - guacamole-client <no-dsa> (Minor issue)
+ [jessie] - guacamole-client <no-dsa> (Minor issue)
- guacamole <removed>
[wheezy] - guacamole <not-affected> (Version not vulnerable)
CVE-2017-3157 (By exploiting the way Apache OpenOffice before 4.1.4 renders
embedded ...)
=====================================
data/dsa-needed.txt
=====================================
--- a/data/dsa-needed.txt
+++ b/data/dsa-needed.txt
@@ -92,6 +92,8 @@ undertow
--
vlc (jmm)
--
+wordpress
+--
xen/oldstable
--
zendframework/oldstable
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/commit/f41d7abab40575c86e93f696900add70648b5fc5
---
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/commit/f41d7abab40575c86e93f696900add70648b5fc5
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
Secure-testing-commits mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits