Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8ede57e0 by Salvatore Bonaccorso at 2019-10-06T17:21:43Z
libpcap issues fixed in unstable via new upstream version (1.9.1)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5493,32 +5493,32 @@ CVE-2019-15166 (lmp_print_data_link_subobjs() in 
print-lmp.c in tcpdump before 4
        - tcpdump <unfixed> (bug #941698)
        NOTE: 
https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
 CVE-2019-15165 (sf-pcapng.c in libpcap before 1.9.1 does not properly validate 
the PHB ...)
-       - libpcap <unfixed> (bug #941697)
+       - libpcap 1.9.1-1 (bug #941697)
        NOTE: 
https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
        NOTE: 
https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
 CVE-2019-15164 (rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a 
URL may  ...)
-       - libpcap <unfixed> (unimportant)
+       - libpcap 1.9.1-1 (unimportant)
        [buster] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [stretch] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [jessie] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        NOTE: 
https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a
        NOTE: rpcapd not build in Debian.
 CVE-2019-15163 (rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to 
cause a de ...)
-       - libpcap <unfixed> (unimportant)
+       - libpcap 1.9.1-1 (unimportant)
        [buster] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [stretch] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [jessie] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        NOTE: 
https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31
        NOTE: rpcapd not build in Debian.
 CVE-2019-15162 (rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows 
platforms provi ...)
-       - libpcap <unfixed> (unimportant)
+       - libpcap 1.9.1-1 (unimportant)
        [buster] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [stretch] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [jessie] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        NOTE: 
https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
        NOTE: rpcapd not build in Debian.
 CVE-2019-15161 (rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain 
length valu ...)
-       - libpcap <unfixed> (unimportant)
+       - libpcap 1.9.1-1 (unimportant)
        [buster] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [stretch] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [jessie] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
@@ -57684,7 +57684,7 @@ CVE-2018-16303 (PDF-XChange Editor through 7.0.326.1 
allows remote attackers to
 CVE-2018-16302 (MediaComm Zip-n-Go before 4.95 has a Buffer Overflow via a 
crafted fil ...)
        NOT-FOR-US: MediaComm Zip-n-Go
 CVE-2018-16301 (libpcap before 1.9.1, as used in tcpdump before 4.9.3, has a 
buffer ov ...)
-       - libpcap <unfixed> (bug #941697; unimportant)
+       - libpcap 1.9.1-1 (bug #941697; unimportant)
        [buster] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [stretch] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)
        [jessie] - libpcap <not-affected> (Vulnerable code introduced in 1.9.0)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/8ede57e0a52ad2421106357a8687a48549692dc1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/8ede57e0a52ad2421106357a8687a48549692dc1
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to