Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
eb598671 by Salvatore Bonaccorso at 2019-03-02T13:56:51Z
Track fixes for r-other-x4r for the mebedded copy of gSOAP

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4166,7 +4166,7 @@ CVE-2019-7659 (Genivia gSOAP 2.7.x and 2.8.x before 
2.8.75 allows attackers to c
        {DLA-1681-1}
        - gsoap 2.8.75-1
        [stretch] - gsoap <no-dsa> (Minor issue)
-       - r-other-x4r <undetermined>
+       - r-other-x4r 1.0.1+git20150806.c6bd9bd-2
        NOTE: 
https://www.genivia.com/advisory.html#Bug_in_gSOAP_versions_2.7.0_to_2.8.74_for_applications_built_with_the_WITH_COOKIES_flag_enabled_
        NOTE: https://lists.debian.org/debian-lts/2019/02/msg00131.html
 CVE-2009-5154 (An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. 
There is a ...)
@@ -100284,6 +100284,7 @@ CVE-2017-9765 (Integer overflow in the soap_get 
function in Genivia gSOAP 2.7.x
        - gsoap 2.8.48-1
        [stretch] - gsoap 2.8.35-4+deb9u1
        [jessie] - gsoap 2.8.17-1+deb8u1
+       - r-other-x4r 1.0.1+git20150806.c6bd9bd-2
        NOTE: 
http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions
        NOTE: 
https://www.genivia.com/changelog.html#Version_2.8.48_upd_(06/21/2017)
        NOTE: SuSE patch: https://bugzilla.suse.com/attachment.cgi?id=733005



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/eb5986711680036f9dd7e80cb7134078d20a6259

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/eb5986711680036f9dd7e80cb7134078d20a6259
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to