Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
984b9e41 by Moritz Muehlenhoff at 2018-05-18T14:22:55+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -291,7 +291,7 @@ CVE-2018-11102 (An issue was discovered in Libav 12.3. A 
read access violation i
        [jessie] - libav <no-dsa> (Minor issue)
        NOTE: https://bugzilla.libav.org/show_bug.cgi?id=1128
 CVE-2018-11101 (Open Whisper Signal (aka Signal-Desktop) through 1.10.1 allows 
XSS via ...)
-       TODO: check
+       NOT-FOR-US: Signal-Desktop
 CVE-2018-11100 (The decompileSETTARGET function in decompile.c in libming 
through 0.4.8 ...)
        - ming <removed>
        NOTE: https://github.com/libming/libming/issues/142
@@ -26965,7 +26965,7 @@ CVE-2018-1278 (Apps Manager included in Pivotal 
Application Service, versions 1.
 CVE-2018-1277 (Cloud Foundry Garden-runC, versions prior to 1.13.0, does not 
...)
        NOT-FOR-US: Cloud Foundry
 CVE-2018-1276 (Windows 2012R2 stemcells, versions prior to 1200.17, contain an 
...)
-       TODO: check
+       NOT-FOR-US: Cloud Foundry
 CVE-2018-1275 (Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 
prior ...)
        - libspring-java <not-affected> (Partial fix for CVE-2018-1270 not 
applied)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1565307



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/984b9e41e9405eecbbbbf27125b868d8eaa61571

---
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/984b9e41e9405eecbbbbf27125b868d8eaa61571
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to