summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Wise <pabs@debian.org>2019-09-18 12:26:18 +0800
committerPaul Wise <pabs@debian.org>2019-09-18 12:26:18 +0800
commitb37757a5658d6f141d207fea480539abf366924e (patch)
tree2e72163addd1684f49371027eb3f39707c38f3a4
parentfb2116d784b52215fde0952dff9b46f838dc542e (diff)
Switch all bugzilla.novell.com URLs to bugzilla.suse.com
The novell.com address is historical and deprecated. Requested-by: Alexandros Toptsoglou <atoptsoglou@suse.com> Requested-in: <a3bc5c9f-d52d-a79d-e1da-6a6484cee9ea@suse.com>
-rwxr-xr-xbin/tracker_service.py2
-rw-r--r--data/CVE/list132
2 files changed, 67 insertions, 67 deletions
diff --git a/bin/tracker_service.py b/bin/tracker_service.py
index 6484415387..9f45dab8a8 100755
--- a/bin/tracker_service.py
+++ b/bin/tracker_service.py
@@ -1545,7 +1545,7 @@ Debian bug number.'''),
def url_gentoo_bug(self, url, name):
return url.absolute("https://bugs.gentoo.org/show_bug.cgi", id=name)
def url_suse_bug(self, url, name):
- return url.absolute("https://bugzilla.novell.com/show_bug.cgi",
+ return url.absolute("https://bugzilla.suse.com/show_bug.cgi",
id=name)
def url_suse_cve(self, url, name):
return url.absolute("https://www.suse.com/security/cve/%s/" % name)
diff --git a/data/CVE/list b/data/CVE/list
index e19f3379cd..8bf78e5b3b 100644
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -12503,7 +12503,7 @@ CVE-2019-12360 (A stack-based buffer over-read exists in FoFiTrueType::dumpStrin
NOTE: https://gitlab.freedesktop.org/poppler/poppler/commit/cdb7ad95f7c8fbf63ade040d8a07ec96467042fc (poppler-0.32.0)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/commit/bf4aae25a244b1033a2479b9a8f633224f7d5de5 (poppler-0.32.0)
NOTE: https://bugs.freedesktop.org/show_bug.cgi?id=85243
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1136620
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1136620
CVE-2019-12359
RESERVED
CVE-2019-12358
@@ -25983,7 +25983,7 @@ CVE-2019-7637 (SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0
NOTE: https://bugzilla.libsdl.org/show_bug.cgi?id=4497
NOTE: https://hg.libsdl.org/SDL/rev/9b0e5c555c0f
NOTE: https://hg.libsdl.org/SDL/rev/32075e9e2135
- NOTE: Patch causes regressions for some applications/games: https://bugzilla.novell.com/show_bug.cgi?id=1124825
+ NOTE: Patch causes regressions for some applications/games: https://bugzilla.suse.com/show_bug.cgi?id=1124825
CVE-2019-7636 (SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 ha ...)
{DLA-1714-1 DLA-1713-1}
- libsdl1.2 1.2.15+dfsg2-5 (bug #924609)
@@ -35028,7 +35028,7 @@ CVE-2019-3886 (An incorrect permissions check was discovered in libvirt 4.8.0 an
[jessie] - libvirt <not-affected> (Vulnerable code not present)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1694880
NOTE: https://www.redhat.com/archives/libvir-list/2019-April/msg00339.html
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1131595#c3
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1131595#c3
NOTE: Introduced in: https://libvirt.org/git/?p=libvirt.git;a=commit;h=25736a4c7ed50c101b4f87935f350f1a39a89f6e (v4.8.0-rc1)
NOTE: Fixed by: https://libvirt.org/git/?p=libvirt.git;a=commit;h=2a07c990bd9143d7a0fe8d1b6b7c763c52185240
NOTE: Fixed by: https://libvirt.org/git/?p=libvirt.git;a=commit;h=ae076bb40e0e150aef41361b64001138d04d6c60
@@ -46999,7 +46999,7 @@ CVE-2018-19296 (PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an
CVE-2018-19295 (Sylabs Singularity 2.4 to 2.6 allows local users to conduct Improper I ...)
- singularity-container 2.6.1-1
NOTE: https://www.openwall.com/lists/oss-security/2018/12/12/2
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1111411
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1111411
CVE-2018-19294
RESERVED
CVE-2018-19293
@@ -47574,7 +47574,7 @@ CVE-2018-19216 (Netwide Assembler (NASM) before 2.13.02 has a use-after-free in
[jessie] - nasm <ignored> (Minor issue)
NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392425
NOTE: Fix: https://repo.or.cz/nasm.git/commitdiff/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1115758#c7
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1115758#c7
CVE-2018-19215 (Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in ...)
- nasm 2.14-1 (unimportant)
NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392525
@@ -51030,7 +51030,7 @@ CVE-2018-17954
RESERVED
CVE-2018-17953 (A incorrect variable in a SUSE specific patch for pam_access rule matc ...)
- pam <not-affected> (Issue introduced by SUSE specific patch)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1115640
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1115640
NOTE: Issue introduced by SUSE specific patch (pam-hostnames-in-access_conf.patch)
NOTE: https://build.opensuse.org/package/view_file/Linux-PAM/pam/pam-hostnames-in-access_conf.patch
NOTE: And fixed with (use-correct-IP-address.patch)
@@ -54548,7 +54548,7 @@ CVE-2018-16589
RESERVED
CVE-2018-16588 (Privilege escalation can occur in the SUSE useradd.c code in useradd, ...)
- shadow <not-affected> (SuSE-specific patch)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1106914
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1106914
NOTE: The SUSE specific patch was a first iteration of https://github.com/shadow-maint/shadow/pull/2
CVE-2018-16587 (In Open Ticket Request System (OTRS) 4.0.x before 4.0.32, 5.0.x before ...)
{DSA-4317-1 DLA-1521-1}
@@ -59550,12 +59550,12 @@ CVE-2018-14622 (A null-pointer dereference vulnerability was found in libtirpc b
- libtirpc 0.2.5-1.3 (bug #907608)
[stretch] - libtirpc 0.2.5-1.2+deb9u1
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1620293
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=968175
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=968175
NOTE: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0
CVE-2018-14621 (An infinite loop vulnerability was found in libtirpc before version 1. ...)
- libtirpc <not-affected> (Vulnerable code not in a released version)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1620290
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=968175
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=968175
NOTE: Introduced by: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=b2c9430f46c4ac848957fb8adaac176a3f6ac03f (0.3.3-rc3)
NOTE: Fixed by: http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=fce98161d9815ea016855d9f00274276452c2c4b
CVE-2018-14620 (The OpenStack RabbitMQ container image insecurely retrieves the rabbit ...)
@@ -71616,7 +71616,7 @@ CVE-2018-10195 [rzsz: sz can leak data to receiving side]
[stretch] - lrzsz <no-dsa> (Minor issue)
[jessie] - lrzsz <no-dsa> (Minor issue)
[wheezy] - lrzsz <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1090051
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1090051
NOTE: Fedora patch: https://src.fedoraproject.org/cgit/rpms/lrzsz.git/tree/lrzsz-0.12.20.patch
CVE-2018-10194 (The set_text_distance function in devices/vector/gdevpdts.c in the pdf ...)
{DLA-1363-1}
@@ -72563,7 +72563,7 @@ CVE-2018-1000161 (nmap version 6.49BETA6 through 7.60, up to and including SVN r
NOTE: Fixed by: https://github.com/nmap/nmap/commit/88631b50676c38824e01d30819f46258a8497b0a
NOTE: Fixed by: https://github.com/nmap/nmap/commit/80e1977308e51b1b7aa038a38f8837a7e90b3849
NOTE: Introduced in https://github.com/nmap/nmap/commit/88381c2e685297a4fafe7182a06877b27da34e1e
- NOTE: Script added in 6.49BETA6 (cf. https://bugzilla.novell.com/show_bug.cgi?id=1088608#c1)
+ NOTE: Script added in 6.49BETA6 (cf. https://bugzilla.suse.com/show_bug.cgi?id=1088608#c1)
CVE-2018-1000159 (tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd08 ...)
- tlslite-ng 0.7.4-1 (low; bug #895728)
[stretch] - tlslite-ng 0.6.0-1+deb9u1
@@ -73571,7 +73571,7 @@ CVE-2018-9385 (In driver_override_store of bus.c, there is a possible out of bou
- linux 4.16.12-1
[stretch] - linux 4.9.107-1
[jessie] - linux <not-affected> (Vulnerable code not present)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1100491
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1100491
NOTE: Related, but not the same as CVE-2018-9415
CVE-2018-9384
RESERVED
@@ -81637,7 +81637,7 @@ CVE-2018-1000035 (A heap-based buffer overflow exists in Info-Zip UnZip version
[jessie] - unzip <no-dsa> (Harmless crash, builds with fortified source)
[wheezy] - unzip <no-dsa> (Harmless crash, builds with fortified source)
NOTE: https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- NOTE: Patch used in openSUSE:Factory/unzip: https://bugzilla.novell.com/attachment.cgi?id=759406
+ NOTE: Patch used in openSUSE:Factory/unzip: https://bugzilla.suse.com/attachment.cgi?id=759406
CVE-2018-1000034 (An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that al ...)
- unzip <not-affected> (Only affects 6.1c22)
NOTE: https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
@@ -89740,7 +89740,7 @@ CVE-2017-17973 (** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after
NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2769
NOTE: Details on the issue are not confirmed by the reporter after several attempts
NOTE: and this does like a non-issue. More reprodicibly reports are from SUSE in
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1074318#c5 claiming this might be
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1074318#c5 claiming this might be
NOTE: a duplicate of CVE-2017-9935. Unless the reporter provides more details on
NOTE: upstream report go and consider this as non-issue.
CVE-2017-1000447
@@ -108340,7 +108340,7 @@ CVE-2017-14804 (The build package before 20171128 did not check directory names
- obs-build 20180302-1 (bug #887306)
[stretch] - obs-build 20160921-1+deb9u1
[jessie] - obs-build <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1069904
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1069904
CVE-2017-14803 (In NetIQ Access Manager 4.3 and 4.4, a bug exists in Identity Server w ...)
NOT-FOR-US: NetIQ Access Manager
CVE-2017-14802 (Novell Access Manager Admin Console and IDP servers before 4.3.3 have ...)
@@ -110717,7 +110717,7 @@ CVE-2017-14033 (The decode method in the OpenSSL::ASN1 module in Ruby before 2.2
- ruby2.1 <removed>
- ruby1.9.1 <removed>
- ruby1.8 <not-affected> (vunlerable code not present)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1058757
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1058757
NOTE: https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/
NOTE: https://github.com/ruby/openssl/commit/1648afef33c1d97fb203c82291b8a61269e85d3b
CVE-2017-14031 (An Improper Access Control issue was discovered in Trihedral VTScada 1 ...)
@@ -120194,7 +120194,7 @@ CVE-2016-10396 (The racoon daemon in IPsec-Tools 0.8.2 contains a remotely explo
[jessie] - ipsec-tools <no-dsa> (Will be fixed via point release)
NOTE: NetBSD applied patch: http://cvsweb.netbsd.org/bsdweb.cgi/src/crypto/dist/ipsec-tools/src/racoon/isakmp_frag.c.diff?r1=1.5&r2=1.5.36.1
NOTE: NetBSD Problem report: https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682
- NOTE: Patch disputed, cf. https://bugzilla.novell.com/show_bug.cgi?id=1047443#c1
+ NOTE: Patch disputed, cf. https://bugzilla.suse.com/show_bug.cgi?id=1047443#c1
NOTE: Updated patch: https://anonscm.debian.org/cgit/pkg-ipsec-tools/pkg-ipsec-tools.git/plain/debian/patches/CVE-2016-10396.patch?id=62ac12648a4eb7c5ba5dba0f81998d1acf310d8b
CVE-2017-10929 (The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 al ...)
{DLA-1016-1}
@@ -123655,7 +123655,7 @@ CVE-2017-9670 (An uninitialized stack variable vulnerability in load_tic_series(
[jessie] - gnuplot5 <not-affected> (Vulnerable code introduced later)
NOTE: https://sourceforge.net/p/gnuplot/bugs/1933/
NOTE: The specific CVE is for the uninitialized stack variable fixed via set.c
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1044638#c5
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1044638#c5
NOTE: Fixed by: https://github.com/gnuplot/gnuplot/commit/4e39b1d7b274c7d4a69cbaba85ff321264f4457e
NOTE: Introduced by: https://github.com/gnuplot/gnuplot/commit/cd4b777389379598740fc02decff772b0e7bcbd6
NOTE: Crash in a CLI tool, no security impact
@@ -124973,7 +124973,7 @@ CVE-2017-9274 (A shell command injection in the obs-service-source_validator bef
[stretch] - osc <no-dsa> (Minor issue)
[jessie] - osc <no-dsa> (Minor issue)
[wheezy] - osc <no-dsa> (Minor issue)
- NOTE: Details in https://bugzilla.novell.com/show_bug.cgi?id=938556
+ NOTE: Details in https://bugzilla.suse.com/show_bug.cgi?id=938556
NOTE: SUSE adressed the issue not only in the obs-service-source_validator
NOTE: and adding a validation in 0.162.0 when using OBS 2.9, cf.:
NOTE: https://github.com/openSUSE/osc/commit/f0325eb0b58c266eb0905ccf827dc7eb864378a1
@@ -129198,7 +129198,7 @@ CVE-2017-7860 (Google gRPC before 2017-02-22 has an out-of-bounds write caused b
- grpc 1.2.5-1+nmu0 (bug #860316)
CVE-2017-7859 (FFmpeg before 2017-03-05 has an out-of-bounds write caused by a heap-b ...)
- ffmpeg <not-affected> (Only affected master, not present in a release)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=1034183
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1034183
NOTE: https://github.com/FFmpeg/FFmpeg/commit/70ebc05bce51215cd0857194d6cabf1e4d1440fb
CVE-2017-7858 (FreeType 2 before 2017-03-07 has an out-of-bounds write related to the ...)
- freetype <not-affected> (Vulnerable code introduced in 2.6.4)
@@ -160866,7 +160866,7 @@ CVE-2016-6662 (Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x thro
NOTE: yet to which CVE; those will unlikely made public before the next Oracle CPU.
NOTE: https://marc.info/?l=oss-security&m=147367658314062&w=2
NOTE: http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=998309
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=998309
NOTE: Fixed in upstream Oracle MySQL 5.5.52, 5.6.33 and 5.7.15
NOTE: MariaDB: https://jira.mariadb.org/browse/MDEV-10465
NOTE: Fixed in upstream MariaDB 5.5.51, 10.0.27, 10.1.17
@@ -171129,7 +171129,7 @@ CVE-2016-3689 (The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu
[jessie] - linux 3.16.36-1
[wheezy] - linux <not-affected> (Vulnerable code not present)
NOTE: Upstream fix: https://git.kernel.org/linus/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff (v4.6-rc1)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=971628
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=971628
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1320060
CVE-2016-3682
REJECTED
@@ -175345,7 +175345,7 @@ CVE-2016-2324 (Integer overflow in Git before 2.7.4 allows remote attackers to e
- git 1:2.8.0~rc3-1 (bug #818318)
NOTE: Removal of path_name: https://github.com/git/git/commit/9831e92bfa833ee9c0ce464bbc2f941ae6c2698d (v2.8.0-rc0)
NOTE: http://www.openwall.com/lists/oss-security/2016/03/16/2
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=971328#c4
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=971328#c4
- cgit <not-affected> (path_name function from embedded git is not called)
CVE-2016-2323
RESERVED
@@ -186131,7 +186131,7 @@ CVE-2015-7575 (Mozilla Network Security Services (NSS) before 3.20.2, as used in
[squeeze] - nss <not-affected> (only affects nss post 2012-07-26)
[wheezy] - nss <not-affected> (TLS 1.2 not supported in 3.14, only 3.15.1 and above)
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2015-150/
- NOTE: Patch in SuSE Bugzilla: https://bugzilla.novell.com/attachment.cgi?id=660286
+ NOTE: Patch in SuSE Bugzilla: https://bugzilla.suse.com/attachment.cgi?id=660286
NOTE: NSS upstream fix is actually in 3.20.2: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
NOTE: NSS patch: https://hg.mozilla.org/projects/nss/raw-rev/891676aa0d85
- openssl 1.0.1f-1
@@ -186223,8 +186223,8 @@ CVE-2015-7554 (The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows
[jessie] - tiff 4.0.3-12.3+deb8u4
- tiff3 <removed>
NOTE: http://www.openwall.com/lists/oss-security/2015/12/26/7
- NOTE: SUSE seem to have a fix (disputed): https://bugzilla.novell.com/show_bug.cgi?id=960341
- NOTE: Reproducer file here: https://bugzilla.novell.com/attachment.cgi?id=665389
+ NOTE: SUSE seem to have a fix (disputed): https://bugzilla.suse.com/show_bug.cgi?id=960341
+ NOTE: Reproducer file here: https://bugzilla.suse.com/attachment.cgi?id=665389
NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2564
NOTE: partially fixed by http://bugzilla.maptools.org/show_bug.cgi?id=2564#c2
NOTE: --
@@ -196087,7 +196087,7 @@ CVE-2014-9720
{DLA-475-1 DLA-279-1}
- python-tornado 3.2.2-1
NOTE: https://github.com/tornadoweb/tornado/commit/1c36307463b1e8affae100bf9386948e6c1b2308
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=930362
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=930362
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1222816
CVE-2014-9719
RESERVED
@@ -197667,7 +197667,7 @@ CVE-2015-3418 (The ProcPutImage function in dix/dispatch.c in X.Org Server (aka
- xorg-server 2:1.16.4-1 (bug #774308)
[wheezy] - xorg-server 2:1.12.4-6+deb7u6
NOTE: http://cgit.freedesktop.org/xorg/xserver/commit/?id=dc777c346d5d452a53b13b917c45f6a1bad2f20b
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=928520 (not public yet)
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=928520 (not public yet)
CVE-2015-3417 (Use-after-free vulnerability in the ff_h264_free_tables function in li ...)
{DSA-3288-1}
- ffmpeg 7:2.6.1-1
@@ -206113,7 +206113,7 @@ CVE-2015-0900 (Cross-site scripting (XSS) vulnerability in schedule.cgi in Nishi
CVE-2015-0899 (The MultiPageValidator implementation in Apache Struts 1 1.1 through 1 ...)
{DSA-3536-1 DLA-292-1}
- libstruts1.2-java <removed>
- NOTE: Patch in SuSE Bugzilla: https://bugzilla.novell.com/attachment.cgi?id=629559
+ NOTE: Patch in SuSE Bugzilla: https://bugzilla.suse.com/attachment.cgi?id=629559
NOTE: Patch appplies cleanly to the Wheezy and Squeeze versions
CVE-2015-0898 (futomi CGI Cafe MP Form Mail CGI eCommerce before 2.0.12 on Windows al ...)
NOT-FOR-US: futomi CGI Cafe MP Form Mail CGI eCommerce
@@ -206544,11 +206544,11 @@ CVE-2015-0778 (osc before 0.151.0 allows remote attackers to execute arbitrary c
- osc 0.149.0-2 (low; bug #780410)
[wheezy] - osc 0.134.1-2+deb7u1
[squeeze] - osc <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=901643
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=901643
CVE-2015-0777 (drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3 ...)
- linux <not-affected> (Addon Xen usbback patch not present)
- linux-2.6 <not-affected> (Addon Xen usbback patch not present)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=917830
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=917830
CVE-2015-0776 (telnetd in Cisco IOS XR 5.0.1 on Network Convergence System 6000 devic ...)
NOT-FOR-US: Cisco IOS
CVE-2015-0775 (The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Ne ...)
@@ -217285,7 +217285,7 @@ CVE-2014-6270 (Off-by-one error in the snmpHandleUdp function in snmp_core.cc in
- squid3 3.4.8-1 (low; bug #761002)
[wheezy] - squid3 <no-dsa> (Minor issue)
[squeeze] - squid3 <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=895773
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=895773
NOTE: Upstream commits: http://bazaar.launchpad.net/~squid/squid/trunk/revision/13574
NOTE: http://bazaar.launchpad.net/~squid/squid/trunk/revision/13582
NOTE: http://www.squid-cache.org/Advisories/SQUID-2014_3.txt
@@ -217296,7 +217296,7 @@ CVE-2014-7142 (The pinger in Squid 3.x before 3.4.8 allows remote attackers to o
- squid3 3.4.8-1 (bug #760999)
[squeeze] - squid3 <no-dsa> (Minor issue)
[wheezy] - squid3 <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=891268
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=891268
NOTE: http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
CVE-2014-7141 (The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain ...)
- squid 4.1-1
@@ -217305,7 +217305,7 @@ CVE-2014-7141 (The pinger in Squid 3.x before 3.4.8 allows remote attackers to o
- squid3 3.4.8-1 (bug #760999)
[squeeze] - squid3 <no-dsa> (Minor issue)
[wheezy] - squid3 <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=891268
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=891268
NOTE: http://www.squid-cache.org/Advisories/SQUID-2014_4.txt
CVE-2014-6268 (The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest u ...)
- xen 4.4.1-3
@@ -220146,7 +220146,7 @@ CVE-2014-5044 (Multiple integer overflows in libgfortran might allow remote atta
CVE-2014-5033 (KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-B ...)
{DSA-3004-1 DLA-76-1}
- kde4libs 4:4.13.3-2 (bug #755814)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=864716
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=864716
NOTE: http://quickgit.kde.org/?p=kdelibs.git&a=commit&h=e4e7b53b71e2659adaf52691d4accc3594203b23
CVE-2014-5032 (GLPI before 0.84.7 does not properly restrict access to cost informati ...)
- glpi <removed> (unimportant)
@@ -221165,7 +221165,7 @@ CVE-2014-4611 (Integer overflow in the LZ4 algorithm implementation, as used in
[wheezy] - linux <not-affected> (LZ4 support introduced in 3.11)
- linux-2.6 <not-affected> (LZ4 support introduced in 3.11)
NOTE: possible fix in https://lkml.org/lkml/2014/7/4/288
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=883949#c12
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=883949#c12
- lz4 0.0~r119-1
NOTE: Not exploitable for lz* compressed kernel images: http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html
NOTE: for lz4: https://code.google.com/p/lz4/issues/detail?id=52 and https://code.google.com/p/lz4/source/detail?r=118
@@ -222475,11 +222475,11 @@ CVE-2014-4040 (snap in powerpc-utils 1.2.20 produces an archive with fstab and y
NOTE: 1.3.1-2 upload removed /usr/sbin/snap from the installed binary package
CVE-2014-4039 (ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does no ...)
- ppc64-diag 2.7.1-5
- NOTE: SuSE Patch: https://bugzilla.novell.com/attachment.cgi?id=599147
+ NOTE: SuSE Patch: https://bugzilla.suse.com/attachment.cgi?id=599147
CVE-2014-4038 (ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a ...)
- ppc64-diag 2.7.1-5
NOTE: Issue partially fixed in 2.7.1-1, but not all parts fixed
- NOTE: SuSE Patch: https://bugzilla.novell.com/attachment.cgi?id=599147
+ NOTE: SuSE Patch: https://bugzilla.suse.com/attachment.cgi?id=599147
CVE-2014-4037 (Cross-site scripting (XSS) vulnerability in editor/dialog/fck_spellerp ...)
- fckeditor <removed> (low; bug #752873)
[wheezy] - fckeditor <no-dsa> (Minor issue)
@@ -224029,7 +224029,7 @@ CVE-2014-3535 (include/linux/netdevice.h in the Linux kernel before 2.6.36 incor
- linux <not-affected> (RHEL-specific, incomplete backport)
- linux-2.6 <not-affected> (RHEL-specific, incomplete backport)
NOTE: Fix: https://git.kernel.org/linus/256df2f3879efdb2e9808bdb1b54b16fbb11fa38
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=896015#c8
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=896015#c8
CVE-2014-3534 (arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s39 ...)
{DSA-2992-1}
- linux 3.14.13-2 (bug #728705)
@@ -230954,7 +230954,7 @@ CVE-2014-1203 (The get_login_ip_config_file function in Eyou Mail System before
CVE-2014-0979 (The start_authentication function in lightdm-gtk-greeter.c in LightDM ...)
- lightdm-gtk-greeter 1.6.1-5 (bug #734472)
NOTE: https://bugs.launchpad.net/lightdm-gtk-greeter/+bug/1266449
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=857303
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=857303
[wheezy] - lightdm-gtk-greeter <not-affected> (in Wheezy, lightdm restarts when the greeter crashes, so there's no DoS)
CVE-2014-0978 (Stack-based buffer overflow in the yyerror function in lib/cgraph/scan ...)
{DSA-2843-1}
@@ -235905,7 +235905,7 @@ CVE-2013-6427 (upgrade.py in the hp-upgrade service in HP Linux Imaging and Prin
{DSA-2829-1}
- hplip 3.13.11-2 (bug #731480)
[squeeze] - hplip <not-affected> (Vulnerable code not present)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=853405
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=853405
CVE-2013-6426 (The cloudformation-compatible API in OpenStack Orchestration API (Heat ...)
- heat 2013.2.1-1 (bug #732033)
NOTE: https://launchpad.net/bugs/1256049
@@ -236015,7 +236015,7 @@ CVE-2013-6403 (The admin page in ownCloud before 5.0.13 allows remote attackers
CVE-2013-6402 (base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 ...)
{DSA-2829-1}
- hplip 3.13.11-2.1 (bug #725876)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=852368
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=852368
CVE-2013-6401 (Jansson, possibly 2.4 and earlier, does not restrict the ability to tr ...)
- jansson 2.6-1 (bug #738647)
[wheezy] - jansson <no-dsa> (Minor issue)
@@ -241981,7 +241981,7 @@ CVE-2013-4160 (Little CMS (lcms2) before 2.5, as used in OpenJDK 7 and possibly
- lcms2 2.2+git20110628-2.3 (bug #714529)
[wheezy] - lcms2 2.2+git20110628-2.2+deb7u1
NOTE: https://github.com/mm2/Little-CMS/commit/91c2db7f2559be504211b283bc3a2c631d6f06d9
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=826097#c9
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=826097#c9
CVE-2013-4159 (ctdb before 2.3 in OpenSUSE 12.3 and 13.1 does not create temporary fi ...)
- ctdb 2.5.1+debian0-1 (bug #749840)
[wheezy] - ctdb <no-dsa> (Minor issue)
@@ -250527,7 +250527,7 @@ CVE-2013-1091 (Stack-based buffer overflow in Novell iPrint Client before 5.90 a
NOT-FOR-US: Novell iPrint Client
CVE-2013-1090 (The SUSE horde5 package before 5.0.2-2.4.1 sets incorrect ownership fo ...)
- php-horde <not-affected> (SuSE specific packaging flaw)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=811369
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=811369
CVE-2013-1089
RESERVED
CVE-2013-1088 (Cross-site request forgery (CSRF) vulnerability in Novell iManager 2.7 ...)
@@ -253146,7 +253146,7 @@ CVE-2013-0263 (Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.
{DSA-2783-1}
- ruby-rack 1.4.1-2.1 (bug #700226)
- librack-ruby <removed> (bug #700226)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=802794
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=802794
NOTE: Patches in git, commits 0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07 and 9a81b961457805f6d1a5c275d053068440421e11
CVE-2013-0262 (rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before ...)
- ruby-rack 1.4.1-2.1 (bug #700173)
@@ -254202,7 +254202,7 @@ CVE-2012-6098 (grade/edit/outcome/edit_form.php in Moodle 1.9.x through 1.9.19,
CVE-2012-6097 (File descriptor leak in cronie 1.4.8, when running in certain environm ...)
[experimental] - cronie <unfixed> (low; bug #697811)
NOTE: Only present in experimental
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=786096
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=786096
CVE-2012-6096 (Multiple stack-based buffer overflows in the get_history function in h ...)
{DSA-2653-1 DSA-2616-1}
- icinga 1.7.1-5 (bug #697931)
@@ -255880,7 +255880,7 @@ CVE-2012-5581 (Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2
CVE-2012-5580 (Format string vulnerability in the print_proxies function in bin/proxy ...)
- libproxy 0.3.1-4 (low)
[squeeze] - libproxy <no-dsa> (Minor issue)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=791086
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=791086
NOTE: https://code.google.com/p/libproxy/source/detail?r=475
CVE-2012-5579
REJECTED
@@ -261423,7 +261423,7 @@ CVE-2012-3524 (libdbus 1.5.x and earlier, when used in setuid or other privilege
[squeeze] - glib2.0 <not-affected> (Vulnerable code not present)
NOTE: fixed in 2.34.0-1 from experimental
NOTE: http://www.openwall.com/lists/oss-security/2012/09/12/6
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=697105
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=697105
NOTE: http://stealth.openwall.net/null/dzug.c
CVE-2012-3523 (The STARTTLS implementation in nnrpd in INN before 2.5.3 does not prop ...)
- inn <not-affected> (STARTTLS was introduced in 2.3, see bug #685581)
@@ -261562,7 +261562,7 @@ CVE-2012-3481 (Integer overflow in the ReadImage function in plug-ins/common/fil
- gimp 2.8.2-1 (bug #685397)
[squeeze] - gimp 2.6.10-1+squeeze4
NOTE: http://www.openwall.com/lists/oss-security/2012/08/20/8
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=776572
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=776572
CVE-2012-3480 (Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, ...)
{DLA-165-1}
- eglibc 2.13-36 (bug #684889)
@@ -261899,11 +261899,11 @@ CVE-2012-3383 (The map_meta_cap function in wp-includes/capabilities.php in Word
CVE-2012-3382 (Cross-site scripting (XSS) vulnerability in the ProcessRequest functio ...)
{DSA-2512-1}
- mono 2.10.8.1-5 (bug #681095)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=769799
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=769799
NOTE: https://github.com/mono/mono/commit/d16d4623edb210635bec3ca3786481b82cde25a2
CVE-2012-3381 (sfcb in sblim-sfcb places a zero-length directory name in the LD_LIBRA ...)
NOT-FOR-US: sblim-sfcb
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=770234
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=770234
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=838160
NOTE: http://www.openwall.com/lists/oss-security/2012/07/06/7
NOTE: http://www.openwall.com/lists/oss-security/2012/07/06/8
@@ -263154,7 +263154,7 @@ CVE-2012-2846 (Google Chrome before 21.0.1180.57 on Linux does not properly isol
CVE-2012-2845 (Integer overflow in the jpeg_data_load_data function in jpeg-data.c in ...)
- exif 0.6.20-2 (low; bug #681465)
[squeeze] - exif <no-dsa> (Minor crasher)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2844 (The PDF functionality in Google Chrome before 20.0.1132.57 does not pr ...)
- chromium-browser <not-affected>
@@ -263167,12 +263167,12 @@ CVE-2012-2842 (Use-after-free vulnerability in Google Chrome before 20.0.1132.57
CVE-2012-2841 (Integer underflow in the exif_entry_get_value function in exif-entry.c ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2840 (Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-en ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2839
RESERVED
@@ -263181,12 +263181,12 @@ CVE-2012-2838
CVE-2012-2837 (The mnote_olympus_entry_get_value function in olympus/mnote-olympus-en ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2836 (The exif_data_load_data function in exif-data.c in the EXIF Tag Parsin ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2835
RESERVED
@@ -263247,17 +263247,17 @@ CVE-2012-2815 (Google Chrome before 20.0.1132.43 allows remote attackers to obta
CVE-2012-2814 (Buffer overflow in the exif_entry_format_value function in exif-entry. ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2813 (The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Ta ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2812 (The exif_entry_get_value function in exif-entry.c in the EXIF Tag Pars ...)
{DSA-2559-1}
- libexif 0.6.20-3 (bug #681454)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=771229
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=771229
NOTE: http://seclists.org/oss-sec/2012/q3/74
CVE-2012-2811
RESERVED
@@ -263665,7 +263665,7 @@ CVE-2012-2670 (manageuser.php in Collabtive before 0.7.6 allows remote authentic
CVE-2012-2669 (The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distri ...)
- linux 3.2.23-1
[squeeze] - linux-2.6 <not-affected> (userspace daemon not yet present)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=761200
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=761200
CVE-2012-2668 (libraries/libldap/tls_m.c in OpenLDAP, possibly 2.4.31 and earlier, wh ...)
- openldap <not-affected> (OpenLDAP in Debian uses GNUTLS instead of Mozilla NSS)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=825875
@@ -265103,7 +265103,7 @@ CVE-2012-2133 (Use-after-free vulnerability in the Linux kernel before 3.3.6, wh
- linux-2.6 3.2.19-1
CVE-2012-2132 (libsoup 2.32.2 and earlier does not validate certificates or clear the ...)
- midori <unfixed> (unimportant; bug #672880)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=758431
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=758431
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=817692
CVE-2012-2131 (Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSS ...)
{DSA-2454-2}
@@ -276067,9 +276067,9 @@ CVE-2011-3173 (Stack-based buffer overflow in the GetDriverSettings function in
NOT-FOR-US: Novell Open Enterprise Server
CVE-2011-3172 (A vulnerability in pam_modules of SUSE SUSE Linux Enterprise allows at ...)
- libpam-unix2 <removed>
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=707645
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=707645
NOTE: Issue was not fixed up to the version removed from unstable.
- NOTE: Proposed update form SUSE: https://bugzilla.novell.com/attachment.cgi?id=441720
+ NOTE: Proposed update form SUSE: https://bugzilla.suse.com/attachment.cgi?id=441720
CVE-2011-3171 (Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly oth ...)
NOT-FOR-US: pure-FTPd add-on
CVE-2011-3170 (The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earl ...)
@@ -285835,7 +285835,7 @@ CVE-2009-5029 (Integer overflow in the __tzfile_read function in glibc before 2.
[squeeze] - eglibc 2.11.3-3
- glibc 2.13-24
NOTE: http://support.novell.com/security/cve/CVE-2009-5029.html
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=735850
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=735850
CVE-2009-5028 (Stack-based buffer overflow in Namazu before 2.0.20 allows remote atta ...)
- namazu2 2.0.20-1.0 (low)
CVE-2009-5027
@@ -320455,7 +320455,7 @@ CVE-2008-3423 (IBM WebSphere Portal 5.1 through 6.1.0.0 allows remote attackers
NOT-FOR-US: IBM WebSphere Portal
CVE-2008-3422 (Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net cla ...)
- mono 1.9.1+dfsg-4 (low; bug #494406)
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=413534
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=413534
NOTE: http://n2.nabble.com/-PATCH--HTML-encode-attributes-that-might-need-encoding-td584193.html
CVE-2004-2760 (sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately c ...)
- openssh 1:3.6p1-1 (unimportant)
@@ -358408,7 +358408,7 @@ CVE-2005-4779 (verifiedexecioctl in verified_exec.c in NetBSD 2.0.2 calls NDINIT
NOT-FOR-US: NetBSD
CVE-2005-4778 (The powersave daemon in SUSE Linux 10.0 before 20051007 has an unspeci ...)
- powersave 0.12.7-1
- NOTE: https://bugzilla.novell.com/show_bug.cgi?id=119628&x=18&y=11&=Find
+ NOTE: https://bugzilla.suse.com/show_bug.cgi?id=119628&x=18&y=11&=Find
CVE-2005-4777 (Tashcom ASPEdit 2.9 stores the administration password (aka the FTP pa ...)
NOT-FOR-US: Tashcom ASPEdit
CVE-2005-4776 (Integer overflow in the FreeBSD compatibility code (freebsd_misc.c) in ...)

© 2014-2024 Faster IT GmbH | imprint | privacy policy