Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a4e77cd7 by Salvatore Bonaccorso at 2018-07-13T22:05:00+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -39152,43 +39152,43 @@ CVE-2018-0044
 CVE-2018-0043
        RESERVED
 CVE-2018-0042 (Juniper Networks CSO versions prior to 4.0.0 may log passwords 
in log ...)
-       TODO: check
+       NOT-FOR-US: Juniper Networks CSO
 CVE-2018-0041 (Juniper Networks Contrail Service Orchestration releases prior 
to ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0040 (Juniper Networks Contrail Service Orchestrator versions prior 
to 4.0.0 ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0039 (Juniper Networks Contrail Service Orchestration releases prior 
to ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0038 (Juniper Networks Contrail Service Orchestration releases prior 
to ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0037 (Junos OS routing protocol daemon (RPD) process may crash and 
restart ...)
-       TODO: check
+       NOT-FOR-US: Junos OS
 CVE-2018-0036
        RESERVED
 CVE-2018-0035 (QFX5200 and QFX10002 devices that have been shipped with Junos 
OS ...)
-       TODO: check
+       NOT-FOR-US: Junos OS
 CVE-2018-0034 (A Denial of Service vulnerability exists in the Juniper 
Networks Junos ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0033
        RESERVED
 CVE-2018-0032 (The receipt of a crafted BGP UPDATE can lead to a routing 
process ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0031 (Receipt of specially crafted UDP/IP packets over MPLS may be 
able to ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0030 (Receipt of a specific MPLS packet may cause MPC7/8/9, PTX-FPC3 
...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0029 (While experiencing a broadcast storm, placing the fxp0 
interface into ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0028
        RESERVED
 CVE-2018-0027 (Receipt of a crafted or malformed RSVP PATH message may cause 
the ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0026 (After Junos OS device reboot or upgrade, the stateless firewall 
filter ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0025 (When an SRX Series device is configured to use HTTP/HTTPS 
pass-through ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0024 (An Improper Privilege Management vulnerability in a shell 
session of ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2018-0023 (JSNAPy is an open source python version of Junos Snapshot ...)
        NOT-FOR-US: JSNAPy
 CVE-2018-0022 (A Junos device with VPLS routing-instances configured on one or 
more ...)
@@ -41675,7 +41675,7 @@ CVE-2016-10604 (dalek-browser-chrome is Google Chrome 
bindings for DalekJS. ...)
 CVE-2016-10603 (air-sdk is a NPM wrapper for the Adobe AIR SDK. air-sdk 
downloads ...)
        TODO: check
 CVE-2016-10602 (haxe is a cross-platform toolkit haxe downloads zipped 
resources over ...)
-       TODO: check
+       NOT-FOR-US: Haxe node module, different from src:haxe
 CVE-2016-10601 (webdrvr is a npm wrapper for Selenium Webdriver including 
Chromedriver ...)
        TODO: check
 CVE-2016-10600 (webrtc-native uses WebRTC from chromium project. webrtc-native 
...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/a4e77cd787a271198ad5bcdd9edd411a919f0957

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/a4e77cd787a271198ad5bcdd9edd411a919f0957
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to