Markus Koschany pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
733f0da5 by Markus Koschany at 2019-01-03T15:12:42Z
CVE-2018-19139,jasper: Issue is not yet fixed.

The memory leak did not seem to exist because ASAN was still enabled.

- - - - -


2 changed files:

- data/CVE/list
- data/DLA/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -11162,8 +11162,8 @@ CVE-2018-19144
 CVE-2018-19140
        RESERVED
 CVE-2018-19139 (An issue has been found in JasPer 2.0.14. There is a memory 
leak in ...)
-       {DLA-1628-1}
        - jasper <removed> (low)
+       [jessie] - jasper <postponed> (can be fixed later)
        NOTE: https://github.com/mdadams/jasper/issues/188
 CVE-2018-19138 (WSTMart 2.0.7 has CSRF via the index.php/admin/staffs/add.html 
URI. ...)
        NOT-FOR-US: WSTMart


=====================================
data/DLA/list
=====================================
@@ -1,5 +1,5 @@
 [02 Jan 2019] DLA-1628-1 jasper - security update
-       {CVE-2018-18873 CVE-2018-19139 CVE-2018-19539 CVE-2018-19540 
CVE-2018-19541 CVE-2018-19542 CVE-2018-20570 CVE-2018-20584 CVE-2018-20622}
+       {CVE-2018-18873 CVE-2018-19539 CVE-2018-19540 CVE-2018-19541 
CVE-2018-19542 CVE-2018-20570 CVE-2018-20584 CVE-2018-20622}
        [jessie] - jasper 1.900.1-debian1-2.4+deb8u5
 [02 Jan 2019] DLA-1627-1 qtbase-opensource-src - security update
        {CVE-2018-15518 CVE-2018-19870 CVE-2018-19873}



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/733f0da5b80b268a1546e07d5d4d44a261c2cff3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/733f0da5b80b268a1546e07d5d4d44a261c2cff3
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to