Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d18a0848 by Moritz Muehlenhoff at 2019-09-13T21:36:17Z
buster/stretch triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1107,7 +1107,10 @@ CVE-2019-15891
        RESERVED
 CVE-2019-15890 (libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in 
ip_reas ...)
        - slirp4netns <unfixed> (bug #939868)
+       [buster] - slirp4netns <no-dsa> (Minor issue)
        - qemu <unfixed> (bug #939869)
+       [buster] - qemu <postponed> (Minor issue, can be fixed along in future 
update)
+       [stretch] - qemu <postponed> (Minor issue, can be fixed along in future 
update)
        - qemu-kvm <removed>
        NOTE: https://www.openwall.com/lists/oss-security/2019/09/06/3
        NOTE: 
https://gitlab.freedesktop.org/slirp/libslirp/commit/c59279437eda91841b9d26079c70b8a540d41204
@@ -3283,6 +3286,8 @@ CVE-2019-15133 (In GIFLIB before 2019-02-16, a malformed 
GIF file triggers a div
        NOTE: https://sourceforge.net/p/giflib/bugs/119/
 CVE-2019-15132 (Zabbix through 4.4.0alpha1 allows User Enumeration. With login 
request ...)
        - zabbix <unfixed> (bug #935027)
+       [buster] - zabbix <no-dsa> (Minor issue)
+       [stretch] - zabbix <no-dsa> (Minor issue)
        [jessie] - zabbix <postponed> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-16532
 CVE-2019-15131
@@ -4704,6 +4709,8 @@ CVE-2019-14665 (Brandy 1.20.1 has a heap-based buffer 
overflow in define_array i
        NOTE: Negligible security impact
 CVE-2019-14664 (In Enigmail below 2.1, an attacker in possession of PGP 
encrypted emai ...)
        - enigmail <unfixed>
+       [buster] - enigmail <ignored> (Minor issue and too intrusive to 
backport)
+       [stretch] - enigmail <ignored> (Minor issue and too intrusive to 
backport)
        [jessie] - enigmail <end-of-life> (see 
https://lists.debian.org/debian-lts-announce/2019/02/msg00002.html)
        NOTE: https://sourceforge.net/p/enigmail/bugs/984/
 CVE-2019-14663 (Brandy 1.20.1 has a stack-based buffer overflow in 
fileio_openin in fi ...)
@@ -16567,6 +16574,8 @@ CVE-2019-10752
        RESERVED
 CVE-2019-10751 (All versions of the HTTPie package prior to version 1.0.3 are 
vulnerab ...)
        - httpie <unfixed> (bug #940058)
+       [buster] - httpie <no-dsa> (Minor issue)
+       [stretch] - httpie <no-dsa> (Minor issue)
        NOTE: https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107
        NOTE: 
https://github.com/jakubroztocil/httpie/commit/df36d6255df5793129b02ac82f1010171bd8a0a8
 CVE-2019-10750 (deeply is vulnerable to Prototype Pollution in versions before 
3.1.0.  ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -18,10 +18,16 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 apache2
   Possible regression: #936034, sf will look into it
 --
+bird/stable
+--
 chromium
 --
+curl (ghedo)
+--
 evince/oldstable
 --
+expat
+--
 freeimage
 --
 glusterfs/oldstable
@@ -43,6 +49,10 @@ nodejs
 nss/oldstable (jmm)
   Roberto proposed an update including fixes for CVE-2018-12404 and 
CVE-2018-18508
 --
+openssl1.0/oldstable
+--
+openssl
+--
 poppler (jmm)
 --
 python2.7 (jmm)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/d18a08481fd170f65dbd17c09ab8ddf3d85fa4bc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/d18a08481fd170f65dbd17c09ab8ddf3d85fa4bc
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to