Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e25b2d74 by Moritz Muehlenhoff at 2019-07-12T14:31:36Z
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -39637,21 +39637,21 @@ CVE-2019-0055
 CVE-2019-0054
        RESERVED
 CVE-2019-0053 (Insufficient validation of environment variables in the telnet 
client  ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2019-0052 (The srxpfe process may crash on SRX Series services gateways 
when the  ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2019-0051
        RESERVED
 CVE-2019-0050
        RESERVED
 CVE-2019-0049 (On Junos devices with the BGP graceful restart helper mode 
enabled or  ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2019-0048 (On EX4300 Series switches with TCAM optimization enabled, 
incoming mul ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2019-0047
        RESERVED
 CVE-2019-0046 (A vulnerability in the pfe-chassisd Chassis Manager (CMLC) 
daemon of J ...)
-       TODO: check
+       NOT-FOR-US: Juniper
 CVE-2019-0045
        RESERVED
 CVE-2019-0044 (Receipt of a specific packet on the out-of-band management 
interface f ...)
@@ -40090,7 +40090,7 @@ CVE-2018-18097 (Improper directory permissions in Intel 
Solid State Drive Toolbo
 CVE-2018-18096 (Improper memory handling in Intel QuickAssist Technology for 
Linux (al ...)
        NOT-FOR-US: Intel QuickAssist Technology for Linux
 CVE-2018-18095 (Improper authentication in firmware for Intel(R) SSD DC S4500 
Series a ...)
-       TODO: check
+       NOT-FOR-US: Intel
 CVE-2018-18094 (Improper directory permissions in installer for Intel(R) Media 
SDK bef ...)
        NOT-FOR-US: Intel
 CVE-2018-18093 (Improper file permissions in the installer for Intel VTune 
Amplifier 2 ...)
@@ -42334,7 +42334,7 @@ CVE-2018-17197 (A carefully crafted or corrupt sqlite 
file can cause an infinite
        [jessie] - tika <not-affected> (Only affects 1.8 to 1.19.1)
        NOTE: https://www.openwall.com/lists/oss-security/2018/12/22/2
 CVE-2018-17196 (In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is 
possible to ...)
-       TODO: check
+       - kafka <itp> (bug #786460)
 CVE-2018-17195 (The template upload API endpoint accepted requests from 
different doma ...)
        NOT-FOR-US: Apache NiFi
 CVE-2018-17194 (When a client request to a cluster node was replicated to 
other nodes  ...)
@@ -84516,7 +84516,7 @@ CVE-2018-1970 (IBM Security Identity Manager 7.0.1 is 
vulnerable to a XML Extern
 CVE-2018-1969 (IBM Security Identity Manager 6.0.0 allows the attacker to 
upload or t ...)
        NOT-FOR-US: IBM
 CVE-2018-1968 (IBM Security Identity Manager 7.0.1 discloses sensitive 
information to ...)
-       TODO: check
+       NOT-FOR-US: IBM
 CVE-2018-1967 (IBM Security Identity Manager 6.0.0 is vulnerable to cross-site 
script ...)
        NOT-FOR-US: IBM
 CVE-2018-1966
@@ -212596,7 +212596,7 @@ CVE-2014-3802 (msdia.dll in Microsoft Debug Interface 
Access (DIA) SDK, as distr
 CVE-2014-3799
        REJECTED
 CVE-2014-3798 (The Windows Guest Tools in Citrix XenServer 6.2 SP1 and earlier 
allows ...)
-       TODO: check
+       NOT-FOR-US: Citrix XenServer
 CVE-2014-3797 (Cross-site scripting (XSS) vulnerability in VMware vCenter 
Server Appl ...)
        NOT-FOR-US: VMware vSphere
 CVE-2014-3796 (VMware NSX 6.0 before 6.0.6, and vCloud Networking and Security 
(vCNS) ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/e25b2d741703c1d6b51030d641714501691b5fd9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/e25b2d741703c1d6b51030d641714501691b5fd9
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to