Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e9449d6b by Salvatore Bonaccorso at 2019-01-01T08:44:38Z
Add CVE-2018-20540/liblas

- - - - -
15d0d2b3 by Salvatore Bonaccorso at 2019-01-01T08:44:53Z
Add CVE-2018-20539/liblas

- - - - -
8461f004 by Salvatore Bonaccorso at 2019-01-01T08:45:10Z
Add CVE-2018-20537/liblas

- - - - -
6d93d8d6 by Salvatore Bonaccorso at 2019-01-01T08:45:24Z
Add CVE-2018-20536/liblas

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -437,15 +437,23 @@ CVE-2018-20541 (There is a heap-based buffer overflow in 
libxsmm_sparse_csc_read
        NOTE: 
https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d
        NOTE: https://github.com/hfp/libxsmm/issues/287
 CVE-2018-20540 (There is memory leak at liblas::Open (liblas/liblas.hpp) in 
libLAS ...)
-       TODO: check
+       - liblas <unfixed>
+       [stretch] - liblas <no-dsa> (Minor issue)
+       NOTE: https://github.com/libLAS/libLAS/issues/158
 CVE-2018-20539 (There is a Segmentation fault triggered by illegal address 
access at ...)
-       TODO: check
+       - liblas <unfixed>
+       [stretch] - liblas <no-dsa> (Minor issue)
+       NOTE: https://github.com/libLAS/libLAS/issues/159
 CVE-2018-20538 (There is a use-after-free at asm/preproc.c (function 
pp_getline) in ...)
        TODO: check
 CVE-2018-20537 (There is a NULL pointer dereference at ...)
-       TODO: check
+       - liblas <unfixed>
+       [stretch] - liblas <no-dsa> (Minor issue)
+       NOTE: https://github.com/libLAS/libLAS/issues/160
 CVE-2018-20536 (There is a heap-based buffer over-read at ...)
-       TODO: check
+       - liblas <unfixed>
+       [stretch] - liblas <no-dsa> (Minor issue)
+       NOTE: https://github.com/libLAS/libLAS/issues/161
 CVE-2018-20535 (There is a use-after-free at asm/preproc.c (function 
pp_getline) in ...)
        TODO: check
 CVE-2018-20534 (There is an illegal address access at src/pool.h (function ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/compare/39009d299fa83579594087b1f3e7697fbdf81860...6d93d8d607a98195ec9f3b98a47eed2cae89775c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/compare/39009d299fa83579594087b1f3e7697fbdf81860...6d93d8d607a98195ec9f3b98a47eed2cae89775c
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to