Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8f80dc20 by Salvatore Bonaccorso at 2019-02-11T15:43:44Z
Add CVE-2019-770{0,1,2,3,4}/binaryen

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -35,15 +35,20 @@ CVE-2019-7706
 CVE-2019-7705
        RESERVED
 CVE-2019-7704 (wasm::WasmBinaryBuilder::readUserSection in wasm-binary.cpp in 
Binaryen ...)
-       TODO: check
+       - binaryen 64-1
+       NOTE: https://github.com/WebAssembly/binaryen/issues/1866
 CVE-2019-7703 (In Binaryen 1.38.22, there is a use-after-free problem in ...)
-       TODO: check
+       - binaryen 64-1
+       NOTE: https://github.com/WebAssembly/binaryen/issues/1865
 CVE-2019-7702 (A NULL pointer dereference was discovered in ...)
-       TODO: check
+       - binaryen 64-1
+       NOTE: https://github.com/WebAssembly/binaryen/issues/1867
 CVE-2019-7701 (A heap-based buffer over-read was discovered in ...)
-       TODO: check
+       - binaryen 64-1
+       NOTE: https://github.com/WebAssembly/binaryen/issues/1863
 CVE-2019-7700 (A heap-based buffer over-read was discovered in ...)
-       TODO: check
+       - binaryen 64-1
+       NOTE: https://github.com/WebAssembly/binaryen/issues/1864
 CVE-2019-7699 (A heap-based buffer over-read occurs in 
AP4_BitStream::WriteBytes in ...)
        TODO: check
 CVE-2019-7698 (An issue was discovered in ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/8f80dc20bb08f3a2dedabab72c4f9227ab515ba9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/8f80dc20bb08f3a2dedabab72c4f9227ab515ba9
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to