Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0b5d0c1b by Salvatore Bonaccorso at 2018-11-10T09:07:45Z
Sync proposed update list with updates really included in point release

Verified against dak log itself, exception in version added is the
clamav version for the first upload round as the fix was already in the
earlier version uploaded and thus known in the archive.

- - - - -


2 changed files:

- data/CVE/list
- data/next-point-update.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1321,7 +1321,7 @@ CVE-2018-18576
 CVE-2018-18585 (chmd_read_headers in mspack/chmd.c in libmspack before 
0.8alpha accepts ...)
        {DLA-1555-1}
        - libmspack 0.8-1 (bug #911637)
-       [stretch] - libmspack <no-dsa> (Minor issue)
+       [stretch] - libmspack 0.5-1+deb9u3
        NOTE: 
https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f
        NOTE: https://www.openwall.com/lists/oss-security/2018/10/22/1
 CVE-2018-18586 (** DISPUTED ** chmextract.c in the chmextract sample program, 
as ...)
@@ -1337,7 +1337,7 @@ CVE-2018-18584 (In mspack/cab.h in libmspack before 
0.8alpha and cabextract befo
        - cabextract 1.4-5
        NOTE: Starting with 1.4-5 cabextract uses the mspack system library
        - libmspack 0.8-1 (bug #911640)
-       [stretch] - libmspack <no-dsa> (Minor issue)
+       [stretch] - libmspack 0.5-1+deb9u3
        NOTE: 
https://github.com/kyz/libmspack/commit/40ef1b4093d77ad3a5cfcee1f5cb6108b3a3bcc2
        NOTE: https://www.openwall.com/lists/oss-security/2018/10/22/1
 CVE-2018-18575
@@ -6444,11 +6444,11 @@ CVE-2018-16514
        RESERVED
 CVE-2018-17088 (The ProcessGpsInfo function of the gpsinfo.c file of jhead 
3.00 may ...)
        - jhead 1:3.00-8 (bug #907925)
-       [stretch] - jhead <no-dsa> (Minor issue)
+       [stretch] - jhead 1:3.00-4+deb9u1
        [jessie] - jhead <no-dsa> (Minor issue)
 CVE-2018-16554 (The ProcessGpsInfo function of the gpsinfo.c file of jhead 
3.00 may ...)
        - jhead 1:3.00-8 (bug #908176)
-       [stretch] - jhead <no-dsa> (Minor issue)
+       [stretch] - jhead 1:3.00-4+deb9u1
        [jessie] - jhead <no-dsa> (Minor issue)
 CVE-2018-16515 (Matrix Synapse before 0.33.3.1 allows remote attackers to 
spoof events ...)
        - matrix-synapse 0.33.3.1-1 (bug #908044)
@@ -6654,61 +6654,61 @@ CVE-2018-16428 (In GNOME GLib 2.56.1, 
g_markup_parse_context_end_parse() in gmar
        NOTE: https://gitlab.gnome.org/GNOME/glib/issues/1364
 CVE-2018-16427 (Various out of bounds reads when handling responses in OpenSC 
before ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16426 (Endless recursion when handling responses from an IAS-ECC card 
in ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16425 (A double free when handling responses from an HSM Card in ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16424 (A double free when handling responses in read_file in 
tools/egk-tool.c ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16423 (A double free when handling responses from a smartcard in ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16422 (A single byte buffer overflow when handling responses from an 
esteid ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16421 (Several buffer overflows when handling responses from a CAC 
Card in ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16420 (Several buffer overflows when handling responses from an ePass 
2003 ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16419 (Several buffer overflows when handling responses from a 
Cryptoflex card ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16418 (A buffer overflow when handling string concatenation in 
util_acl_to_str ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
@@ -6794,19 +6794,19 @@ CVE-2018-16394
        RESERVED
 CVE-2018-16393 (Several buffer overflows when handling responses from a 
Gemsafe V1 ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16392 (Several buffer overflows when handling responses from a TCOS 
Card in ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
 CVE-2018-16391 (Several buffer overflows when handling responses from a Muscle 
Card in ...)
        - opensc 0.19.0~rc1-1 (low; bug #909444)
-       [stretch] - opensc <no-dsa> (Minor issue)
+       [stretch] - opensc 0.16.0-3+deb9u1
        [jessie] - opensc <no-dsa> (Minor issue)
        NOTE: 
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
        NOTE: https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
@@ -8552,10 +8552,10 @@ CVE-2018-15689
        RESERVED
 CVE-2018-15688 (A buffer overflow vulnerability in the dhcp6 client of systemd 
allows ...)
        - network-manager 1.14.4-2
-       [stretch] - network-manager <no-dsa> (Minor issue; internal dhcp 
implementation not used by default)
+       [stretch] - network-manager 1.6.2-3+deb9u2
        [jessie] - network-manager <not-affected> (vulnerable code not present)
        - systemd 239-11 (bug #912008)
-       [stretch] - systemd <postponed> (Minor issue; not enabled by default in 
Debian, will be fixed via point release)
+       [stretch] - systemd 232-25+deb9u6
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1639067
        NOTE: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1795921
        NOTE: 
https://github.com/systemd/systemd/commit/49653743f69658aeeebdb14faf1ab158f1f2cb20
@@ -8761,7 +8761,7 @@ CVE-2018-15600
 CVE-2018-15599 (The recv_msg_userauth_request function in svr-auth.c in 
Dropbear ...)
        {DLA-1476-1}
        - dropbear 2018.76-4 (bug #906890)
-       [stretch] - dropbear <no-dsa> (Minor issue)
+       [stretch] - dropbear 2016.74-5+deb9u1
        NOTE: 
http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2018q3/002108.html
        NOTE: https://secure.ucc.asn.au/hg/dropbear/rev/5d2d1021ca00
 CVE-2018-15598 (Containous Traefik 1.6.x before 1.6.6, when --api is used, 
exposes the ...)
@@ -8778,7 +8778,7 @@ CVE-2018-1000224 (Godot Engine version All versions prior 
to 2.1.5, all 3.0 vers
        NOT-FOR-US: Godot
 CVE-2018-1000222 (Libgd version 2.2.5 contains a Double Free Vulnerability 
vulnerability ...)
        - libgd2 2.2.5-4.1 (low; bug #906886)
-       [stretch] - libgd2 <no-dsa> (Minor issue, will be fixed via point 
release)
+       [stretch] - libgd2 2.2.4-2+deb9u3
        [jessie] - libgd2 <postponed> (Minor issue)
        NOTE: https://github.com/libgd/libgd/issues/447
        NOTE: 
https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
@@ -8890,7 +8890,7 @@ CVE-2018-1000633 (The Open Microscopy Environment 
OMERO.web version prior to 5.4
 CVE-2018-1000632 (dom4j version prior to version 2.1.1 contains a CWE-91: XML 
Injection ...)
        {DLA-1517-1}
        - dom4j 2.1.1-1 (low)
-       [stretch] - dom4j <no-dsa> (Minor issue, will be fixed via spu)
+       [stretch] - dom4j 1.6.1+dfsg.3-2+deb9u1
        NOTE: 
https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387
        NOTE: https://github.com/dom4j/dom4j/issues/48
 CVE-2003-1605 (curl 7.x before 7.10.7 sends CONNECT proxy credentials to the 
remote ...)
@@ -9321,7 +9321,7 @@ CVE-2018-15379 (A vulnerability in which the HTTP web 
server for Cisco Prime ...
 CVE-2018-15378 (A vulnerability in ClamAV versions prior to 0.100.2 could 
allow an ...)
        {DLA-1553-1}
        - clamav 0.100.2+dfsg-1 (bug #910430)
-       [stretch] - clamav <no-dsa> (clamav is updated via -updates)
+       [stretch] - clamav 0.100.2+dfsg-0+deb9u1
        NOTE: 
https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html
        NOTE: http://lists.clamav.net/pipermail/clamav-announce/2018/000033.html
 CVE-2018-15377 (A vulnerability in the Cisco Network Plug and Play agent, also 
...)
@@ -10251,7 +10251,7 @@ CVE-2018-14939 (The get_app_path function in 
desktop/unx/source/start.c in Libre
 CVE-2018-1000637 (zutils version prior to version 1.8-pre2 contains a Buffer 
Overflow ...)
        {DLA-1505-1}
        - zutils 1.7-3 (bug #902936; bug #904819)
-       [stretch] - zutils <no-dsa> (Minor issue)
+       [stretch] - zutils 1.5-5+deb9u1
        NOTE: http://www.openwall.com/lists/oss-security/2018/08/05/1
        NOTE: 
https://lists.nongnu.org/archive/html/zutils-bug/2018-08/msg00000.html
        NOTE: Fixed by: upstream/0001-zcat-buffer-overrun.patch (in 1.7-3)
@@ -10631,7 +10631,7 @@ CVE-2018-14778
 CVE-2015-9262 (_XcursorThemeInherits in library.c in libXcursor before 1.1.15 
allows ...)
        {DLA-1469-1}
        - libxcursor 1:1.1.15-1 (low; bug #906012)
-       [stretch] - libxcursor <no-dsa> (Minor issue)
+       [stretch] - libxcursor 1:1.1.14-1+deb9u2
        NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=90857
        NOTE: 
https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05
 CVE-2018-14777 (An issue was discovered in DataLife Engine (DLE) through 13.0. 
An ...)
@@ -11155,7 +11155,7 @@ CVE-2018-14622 (A null-pointer dereference 
vulnerability was found in libtirpc b
        {DLA-1487-1}
        [experimental] - libtirpc 1.0.2-0.1
        - libtirpc 0.2.5-1.3 (bug #907608)
-       [stretch] - libtirpc <no-dsa> (Minor issue)
+       [stretch] - libtirpc 0.2.5-1.2+deb9u1
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1620293
        NOTE: https://bugzilla.novell.com/show_bug.cgi?id=968175
        NOTE: 
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0
@@ -11222,19 +11222,19 @@ CVE-2018-14607 (Thomson Reuters UltraTax CS 2017 on 
Windows, in a client/server
 CVE-2018-14600 (An issue was discovered in libX11 through 1.6.5. The function 
...)
        {DLA-1482-1}
        - libx11 2:1.6.6-1 (low)
-       [stretch] - libx11 <no-dsa> (Minor issue)
+       [stretch] - libx11 2:1.6.4-3+deb9u1
        [wheezy] - libx11 <no-dsa> (Minor issue)
        NOTE: 
https://gitlab.freedesktop.org/xorg/lib/libx11/commit/dbf72805fd9d7b1846fe9a11b46f3994bfc27fea
 CVE-2018-14599 (An issue was discovered in libX11 through 1.6.5. The function 
...)
        {DLA-1482-1}
        - libx11 2:1.6.6-1 (low)
-       [stretch] - libx11 <no-dsa> (Minor issue)
+       [stretch] - libx11 2:1.6.4-3+deb9u1
        [wheezy] - libx11 <no-dsa> (Minor issue)
        NOTE: 
https://gitlab.freedesktop.org/xorg/lib/libx11/commit/b469da1430cdcee06e31c6251b83aede072a1ff0
 CVE-2018-14598 (An issue was discovered in XListExtensions in ListExt.c in 
libX11 ...)
        {DLA-1482-1}
        - libx11 2:1.6.6-1 (low)
-       [stretch] - libx11 <no-dsa> (Minor issue)
+       [stretch] - libx11 2:1.6.4-3+deb9u1
        [wheezy] - libx11 <no-dsa> (Minor issue)
        NOTE: 
https://gitlab.freedesktop.org/xorg/lib/libx11/commit/e83722768fd5c467ef61fa159e8c6278770b45c2
 CVE-2018-14606 (An issue was discovered in GitLab Community and Enterprise 
Edition ...)
@@ -11509,7 +11509,7 @@ CVE-2018-14527 (Feedback.asp in Xiao5uCompany 1.7 has 
XSS because the XSS protec
 CVE-2018-14526 (An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 
2.0 ...)
        {DLA-1462-1}
        - wpa 2:2.6-18 (bug #905739)
-       [stretch] - wpa <no-dsa> (Minor issue)
+       [stretch] - wpa 2:2.4-1+deb9u2
        NOTE: 
https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
        NOTE: 
https://w1.fi/security/2018-1/0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
        NOTE: 
https://w1.fi/security/2018-1/rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
@@ -11578,7 +11578,7 @@ CVE-2018-14500 (joyplus-cms 1.6.0 has XSS via the ...)
 CVE-2018-1999023 (The Battle for Wesnoth Project version 1.7.0 through 1.14.3 
contains a ...)
        - wesnoth-1.14 1:1.14.4-1
        - wesnoth-1.12 <removed>
-       [stretch] - wesnoth-1.12 <no-dsa> (Minor issue)
+       [stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1
        - wesnoth-1.10 <removed>
        [jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in 
Jessie)
        NOTE: http://www.openwall.com/lists/oss-security/2018/07/20/1
@@ -11712,7 +11712,7 @@ CVE-2018-14448 (Codec::parse in track.cpp in Untrunc 
through 2018-06-07 has a NU
 CVE-2018-14447 (trim_whitespace in lexer.l in libConfuse v3.2.1 has an 
out-of-bounds ...)
        {DLA-1470-1}
        - confuse 3.2.1+dfsg-5 (bug #904159)
-       [stretch] - confuse <no-dsa> (Minor issue)
+       [stretch] - confuse 3.0+dfsg-2+deb9u1
        NOTE: https://github.com/martinh/libconfuse/issues/109
 CVE-2018-14446 (MP4Integer32Property::Read in atom_avcC.cpp in MP4v2 2.1.0 
allows ...)
        - mp4v2 <unfixed> (bug #904896)
@@ -12062,7 +12062,7 @@ CVE-2018-14349 (An issue was discovered in Mutt before 
1.10.1 and NeoMutt before
 CVE-2018-14348 (libcgroup up to and including 0.41 creates /var/log/cgred with 
mode ...)
        {DLA-1472-1}
        - libcgroup 0.41-8.1 (low; bug #906308)
-       [stretch] - libcgroup <no-dsa> (Minor issue)
+       [stretch] - libcgroup 0.41-8+deb9u1
        NOTE: 
https://sourceforge.net/p/libcg/libcg/ci/0d88b73d189ea3440ccaab00418d6469f76fa590/
        NOTE: cgred not enabled by default, shipped example config logs to 
syslog by default
 CVE-2018-14347 (GNU Libextractor before 1.7 contains an infinite loop 
vulnerability in ...)
@@ -13362,7 +13362,7 @@ CVE-2018-13798
 CVE-2018-13796 (An issue was discovered in GNU Mailman before 2.1.28. A 
crafted URL ...)
        {DLA-1442-1}
        - mailman 1:2.1.27-1.1 (bug #903674)
-       [stretch] - mailman <no-dsa> (Minor issue)
+       [stretch] - mailman 1:2.1.23-1+deb9u4
        NOTE: Fixed in 2.1.28; Regression fix in 2.1.29
        NOTE: 
https://mail.python.org/pipermail/mailman-users/2018-July/083536.html
        NOTE: https://bugs.launchpad.net/mailman/+bug/1780874
@@ -18532,11 +18532,11 @@ CVE-2018-11782
        RESERVED
 CVE-2018-11781 (Apache SpamAssassin 3.4.2 fixes a local user code injection in 
the ...)
        - spamassassin 3.4.2-1 (bug #908971)
-       [stretch] - spamassassin <postponed> (Minor issue; can be fixed via 
point release)
+       [stretch] - spamassassin 3.4.2-1~deb9u1
        NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
 CVE-2018-11780 (A potential Remote Code Execution bug exists with the PDFInfo 
plugin ...)
        - spamassassin 3.4.2-1 (bug #908970)
-       [stretch] - spamassassin <postponed> (Minor issue; can be fixed via 
point release)
+       [stretch] - spamassassin 3.4.2-1~deb9u1
        NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
 CVE-2018-11779
        RESERVED
@@ -18583,7 +18583,7 @@ CVE-2018-11764
        RESERVED
 CVE-2018-11763 (In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, 
large ...)
        - apache2 2.4.35-1 (bug #909591)
-       [stretch] - apache2 <no-dsa> (Minor issue, will be fixed via point 
release)
+       [stretch] - apache2 2.4.25-3+deb9u6
        [jessie] - apache2 <not-affected> (Vulnerable code not present)
        NOTE: HTTP/2 support introduced in 2.4.17
        NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-11763
@@ -21279,7 +21279,7 @@ CVE-2018-10846 (A cache-based side channel in GnuTLS 
implementation that leads t
 CVE-2018-10845 (It was found that the GnuTLS implementation of HMAC-SHA-384 
was ...)
        {DLA-1560-1}
        - gnutls28 3.5.19-1
-       [stretch] - gnutls28 <no-dsa> (Will be fixed via pu)
+       [stretch] - gnutls28 3.5.8-5+deb9u4
        - gnutls26 <removed>
        NOTE: https://gitlab.com/gnutls/gnutls/issues/455
        NOTE: 
https://gitlab.com/gnutls/gnutls/commit/cc14ec5ece856cb083d64e6a5a8657323da661cb
 (master)
@@ -21289,7 +21289,7 @@ CVE-2018-10845 (It was found that the GnuTLS 
implementation of HMAC-SHA-384 was
 CVE-2018-10844 (It was found that the GnuTLS implementation of HMAC-SHA-256 
was ...)
        {DLA-1560-1}
        - gnutls28 3.5.19-1
-       [stretch] - gnutls28 <no-dsa> (Will be fixed via pu)
+       [stretch] - gnutls28 3.5.8-5+deb9u4
        - gnutls26 <removed>
        NOTE: https://gitlab.com/gnutls/gnutls/issues/456
        NOTE: 
https://gitlab.com/gnutls/gnutls/commit/29ffa2a1fa4cc396c5d1563a3e5cdca0174de28b
 (master)
@@ -23461,7 +23461,7 @@ CVE-2018-10018 (The GDASPAMLib.AntiSpam ActiveX control 
ASK\GDASpam.dll in G DAT
        NOT-FOR-US: GDASPAMLib.AntiSpam ActiveX control
 CVE-2018-10017 (soundlib/Snd_fx.cpp in OpenMPT before 1.27.07.00 and 
libopenmpt before ...)
        - libopenmpt 0.3.8-1 (bug #895406)
-       [stretch] - libopenmpt <no-dsa> (Minor issue)
+       [stretch] - libopenmpt 0.2.7386~beta20.3-3+deb9u3
        NOTE: 
https://github.com/OpenMPT/openmpt/commit/492022c7297ede682161d9c0ec2de15526424e76
 CVE-2018-10016 (Netwide Assembler (NASM) 2.14rc0 has a division-by-zero 
vulnerability ...)
        - nasm <unfixed> (bug #895408)
@@ -28368,12 +28368,12 @@ CVE-2018-8021 (Versions of Superset prior to 0.23 
used an unsafe load method fro
 CVE-2018-8020 (Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a 
flaw ...)
        {DLA-1475-1}
        - tomcat-native 1.2.17-1
-       [stretch] - tomcat-native <no-dsa> (Minor issue)
+       [stretch] - tomcat-native 1.2.12-2+deb9u2
        NOTE: https://svn.apache.org/r1832863
 CVE-2018-8019 (When using an OCSP responder Apache Tomcat Native 1.2.0 to 
1.2.16 and ...)
        {DLA-1475-1}
        - tomcat-native 1.2.17-1
-       [stretch] - tomcat-native <no-dsa> (Minor issue)
+       [stretch] - tomcat-native 1.2.12-2+deb9u2
        NOTE: https://svn.apache.org/r1832832
 CVE-2018-8018 (In Apache Ignite before 2.4.8 and 2.5.x before 2.5.3, the 
serialization  ...)
        NOT-FOR-US: Apache Ignite
@@ -36021,7 +36021,7 @@ CVE-2018-5711 (gd_gif_in.c in the GD Graphics Library 
(aka libgd), as used in PH
        NOTE: PHP Bug: https://bugs.php.net/bug.php?id=75571
        NOTE: https://hhvm.com/blog/2018/05/04/hhvm-3.25.3.html
        - libgd2 2.2.5-4.1 (bug #887485)
-       [stretch] - libgd2 <no-dsa> (Minor issue, will be fixed via point 
release)
+       [stretch] - libgd2 2.2.4-2+deb9u3
        [jessie] - libgd2 <postponed> (Minor issue, can be fixed along in a 
future update)
        NOTE: https://github.com/libgd/libgd/issues/420
        NOTE: 
https://github.com/libgd/libgd/commit/a11f47475e6443b7f32d21f2271f28f417e2ac04
@@ -48274,7 +48274,7 @@ CVE-2018-1334 (In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 
2.2.1, and 2.3.0, when u
        NOT-FOR-US: Apache Spark
 CVE-2018-1333 (By specially crafting HTTP/2 requests, workers would be 
allocated 60 ...)
        - apache2 2.4.34-1 (bug #904106)
-       [stretch] - apache2 <no-dsa> (Minor issue)
+       [stretch] - apache2 2.4.25-3+deb9u6
        [jessie] - apache2 <not-affected> (Vulnerable code not present)
        NOTE: Affects 2.4.18-2.4.33
        NOTE: HTTP/2 support introduced in 2.4.17
@@ -51927,12 +51927,12 @@ CVE-2018-0362 (A vulnerability in BIOS authentication 
management of Cisco 5000 S
 CVE-2018-0361 (ClamAV before 0.100.1 lacks a PDF object length check, 
resulting in an ...)
        {DLA-1461-1}
        - clamav 0.100.1+dfsg-1
-       [stretch] - clamav <no-dsa> (clamav is updated via -updates)
+        [stretch] - clamav 0.100.1+dfsg-0+deb9u1
        NOTE: 
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
 CVE-2018-0360 (ClamAV before 0.100.1 has an HWP integer overflow with a 
resultant ...)
        {DLA-1461-1}
        - clamav 0.100.1+dfsg-1
-       [stretch] - clamav <no-dsa> (clamav is updated via -updates)
+       [stretch] - clamav 0.100.1+dfsg-0+deb9u1
        NOTE: 
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
 CVE-2018-0359 (A vulnerability in the session identification management 
functionality ...)
        NOT-FOR-US: Cisco
@@ -56726,7 +56726,7 @@ CVE-2017-15706 (As part of the fix for bug 61201, the 
documentation for Apache T
        NOTE: 
https://lists.apache.org/thread.html/e1ef853fc0079cdb55befbd2dac042934e49288b476d5f6a649e5da2@%3Cannounce.tomcat.apache.org%3E
 CVE-2017-15705 (A denial of service vulnerability was identified that exists 
in Apache ...)
        - spamassassin 3.4.2-1 (bug #908969)
-       [stretch] - spamassassin <postponed> (Minor issue; can be fixed via 
point release)
+       [stretch] - spamassassin 3.4.2-1~deb9u1
        NOTE: https://www.openwall.com/lists/oss-security/2018/09/16/1
 CVE-2017-15704
        REJECTED
@@ -58533,7 +58533,7 @@ CVE-2017-15106
 CVE-2017-15105 (A flaw was found in the way unbound before 1.6.8 validated ...)
        {DLA-1264-1}
        - unbound 1.7.1-1 (bug #887733)
-       [stretch] - unbound <no-dsa> (Minor issue, can be fixed via point 
release)
+       [stretch] - unbound 1.6.0-3+deb9u2
        [jessie] - unbound <no-dsa> (Minor issue, can be fixed via point 
release)
        NOTE: https://unbound.net/downloads/CVE-2017-15105.txt
        NOTE: https://unbound.net/downloads/patch_cve_2017_15105.diff
@@ -64302,14 +64302,14 @@ CVE-2017-13082 (Wi-Fi Protected Access (WPA and WPA2) 
that supports IEEE 802.11r
 CVE-2017-13081 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 
802.11w ...)
        {DSA-3999-1 DLA-1150-1}
        - firmware-nonfree 20180825-1
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
        - wpa 2:2.4-1.1
        NOTE: https://w1.fi/security/2017-1/
 CVE-2017-13080 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of 
the ...)
        {DSA-3999-1 DLA-1200-1 DLA-1150-1}
        - firmware-nonfree 20180825-1
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
        - wpa 2:2.4-1.1
        - linux 4.13.13-1
@@ -64320,21 +64320,21 @@ CVE-2017-13080 (Wi-Fi Protected Access (WPA and WPA2) 
allows reinstallation of t
 CVE-2017-13079 (Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 
802.11w ...)
        {DSA-3999-1 DLA-1150-1}
        - firmware-nonfree 20180825-1
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
        - wpa 2:2.4-1.1
        NOTE: https://w1.fi/security/2017-1/
 CVE-2017-13078 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of 
the ...)
        {DSA-3999-1 DLA-1150-1}
        - firmware-nonfree 20180825-1
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
        - wpa 2:2.4-1.1
        NOTE: https://w1.fi/security/2017-1/
 CVE-2017-13077 (Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of 
the ...)
        {DSA-3999-1 DLA-1150-1}
        - firmware-nonfree 20180825-1
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
        - wpa 2:2.4-1.1
        NOTE: https://w1.fi/security/2017-1/
@@ -75588,7 +75588,7 @@ CVE-2017-9418 (SQL injection vulnerability in the 
WP-Testimonials plugin 3.4.1 f
        NOT-FOR-US: WP-Testimonials plugin for WordPress
 CVE-2017-9417 (Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute 
...)
        - firmware-nonfree 20180518-1 (bug #869639)
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
        [wheezy] - firmware-nonfree <no-dsa> (non-free not supported)
        NOTE: 
https://www.blackhat.com/us-17/briefings/schedule/#broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets-7603
@@ -101653,7 +101653,7 @@ CVE-2017-0562 (An elevation of privilege 
vulnerability in the MediaTek touchscre
        NOT-FOR-US: MediaTek driver for Android
 CVE-2017-0561 (A remote code execution vulnerability in the Broadcom Wi-Fi 
firmware ...)
        - firmware-nonfree 20180518-1 (bug #869639)
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 CVE-2017-0560 (An information disclosure vulnerability in the factory reset 
process ...)
        NOT-FOR-US: Android
@@ -132045,7 +132045,7 @@ CVE-2016-0802 (The Broadcom Wi-Fi driver in the 
kernel in Android 4.x before 4.4
        NOT-FOR-US: Android drivers
 CVE-2016-0801 (The Broadcom Wi-Fi driver in the kernel in Android 4.x before 
4.4.4, ...)
        - firmware-nonfree 20180518-1 (bug #869639)
-       [stretch] - firmware-nonfree <no-dsa> (non-free not supported)
+       [stretch] - firmware-nonfree 20161130-4
        [jessie] - firmware-nonfree <no-dsa> (non-free not supported)
 CVE-2016-0800 (The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 
before ...)
        - openssl 1.0.0c-2


=====================================
data/next-point-update.txt
=====================================
@@ -1,115 +1,3 @@
-CVE-2017-15105
-       [stretch] - unbound 1.6.0-3+deb9u2
-CVE-2018-10017
-       [stretch] - libopenmpt 0.2.7386~beta20.3-3+deb9u3
-CVE-2018-0360
-       [stretch] - clamav 0.100.1+dfsg-0+deb9u1
-CVE-2018-0361
-       [stretch] - clamav 0.100.1+dfsg-0+deb9u1
-CVE-2018-14526
-       [stretch] - wpa 2:2.4-1+deb9u2
-CVE-2015-9262
-       [stretch] - libxcursor 1:1.1.14-1+deb9u2
-CVE-2018-14447
-       [stretch] - confuse 3.0+dfsg-2+deb9u1
-CVE-2018-15599
-       [stretch] - dropbear 2016.74-5+deb9u1
-CVE-2018-14348
-       [stretch] - libcgroup 0.41-8+deb9u1
-CVE-2018-14622
-       [stretch] - libtirpc 0.2.5-1.2+deb9u1
-CVE-2018-13796
-       [stretch] - mailman 1:2.1.23-1+deb9u4
-CVE-2018-1000637
-       [stretch] - zutils 1.5-5+deb9u1
-CVE-2018-1000632
-       [stretch] - dom4j 1.6.1+dfsg.3-2+deb9u1
-CVE-2018-8019
-       [stretch] - tomcat-native 1.2.12-2+deb9u2
-CVE-2018-8020
-       [stretch] - tomcat-native 1.2.12-2+deb9u2
-CVE-2018-16391
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16392
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16393
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16418
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16419
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16420
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16421
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16422
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16423
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16424
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16425
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16426
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-16427
-       [stretch] - opensc 0.16.0-3+deb9u1
-CVE-2018-5711
-       [stretch] - libgd2 2.2.4-2+deb9u3
-CVE-2018-1000222
-       [stretch] - libgd2 2.2.4-2+deb9u3
-CVE-2018-10844
-       [stretch] - gnutls28 3.5.8-5+deb9u4
-CVE-2018-10845
-       [stretch] - gnutls28 3.5.8-5+deb9u4
-CVE-2018-14598
-       [stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2018-14599
-       [stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2018-14600
-       [stretch] - libx11 2:1.6.4-3+deb9u1
-CVE-2016-0801
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-0561
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-9417
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13077
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13078
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13079
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13080
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2017-13081
-       [stretch] - firmware-nonfree 20161130-4
-CVE-2018-15378
-       [stretch] - clamav 0.100.2+dfsg-0+deb9u1
-CVE-2018-17088
-       [stretch] - jhead 1:3.00-4+deb9u1
-CVE-2018-16554
-       [stretch] - jhead 1:3.00-4+deb9u1
-CVE-2018-18584
-       [stretch] - libmspack 0.5-1+deb9u3
-CVE-2018-18585
-       [stretch] - libmspack 0.5-1+deb9u3
-CVE-2018-15688
-       [stretch] - systemd 232-25+deb9u6
-CVE-2017-15705
-       [stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-11780
-       [stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-11781
-       [stretch] - spamassassin 3.4.2-1~deb9u1
-CVE-2018-1999023
-       [stretch] - wesnoth-1.12 1:1.12.6-1+deb9u1
-CVE-2018-15688
-       [stretch] - network-manager 1.6.2-3+deb9u2
-CVE-2018-1333
-       [stretch] - apache2 2.4.25-3+deb9u6
-CVE-2018-11763
-       [stretch] - apache2 2.4.25-3+deb9u6
 CVE-2017-12424
        [stretch] - shadow 1:4.4-4.1+deb9u1
 CVE-2015-9261 [busybox: pointer misuse unziping files]



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/0b5d0c1b989f2a36b7a45649c2fdf46bb3726170

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/0b5d0c1b989f2a36b7a45649c2fdf46bb3726170
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to