Navigation: Suites / Filters / Types / Fields / Sort / Format / Search / Results

Bugs search

Useful queries for testing (buster)

Suites[1]

Filters

off / include / exclude
  • tagged patch
  • tagged pending
  • tagged security
  • tagged wontfix
  • tagged moreinfo
  • tagged upstream
  • tagged unreproducible
  • tagged help
  • tagged d-i
  • forwarded upstream
  • claimed bugs
  • fixed in deferred/delayed
  • packages not in main
  • packages not in jessie
  • packages not in stretch
  • packages not in buster
  • packages in base system
  • packages in standard installation
  • orphaned packages
  • merged bugs
  • marked as done
  • outdated binaries in jessie
  • outdated binaries in stretch
  • outdated binaries in buster
  • outdated binaries in sid
  • different versions in buster and sid
  • newer in Ubuntu than in sid
  • RT tag for jessie: ignore
  • RT tag for jessie: will-remove
  • RT tag for jessie: can-defer
  • RT tag for jessie: is-blocker
  • RT tag for jessie: no-auto-remove
  • RT tag for stretch: ignore
  • RT tag for stretch: will-remove
  • RT tag for stretch: can-defer
  • RT tag for stretch: is-blocker
  • RT tag for stretch: no-auto-remove
  • RT tag for buster: ignore
  • RT tag for buster: will-remove
  • RT tag for buster: can-defer
  • RT tag for buster: is-blocker
  • RT tag for buster: no-auto-remove
  • RT unblock hint
  • key packages
  • pseudo packages
  • packages marked for autoremoval
  • closed in packages in new
  • newer than days
  • modified in the last days

Bugs or packages selection


  ignore:
  ignore:
  ignore:
 
 

Additional fields

Sort

Format

38 bugs found

bug# tags package title popcon severity modified
#854447 [S|u]   apng2gif apng2gif: CVE-2017-6962: Integer overflow resulting in heap overflow write 92 5 serious 2017-10-01
#854441 [S|u]   apng2gif apng2gif: CVE-2017-6961: Improper sanitization of user input causing huge memory allocations resulting in crash 92 5 serious 2017-10-01
#854367 [S|u]   apng2gif apng2gif: CVE-2017-6960: Integer overflow resulting in heap buffer overflow 92 5 serious 2017-10-01
#859263 [+|S]   bash maintain PIE enabled bash 201119 5 serious 2017-08-05
#834845 [jes-i|+|S|str-i|u]   src:chicken chicken: CVE-2016-6830 CVE-2016-6831 150 6 grave 2017-04-19
#863884 [U|S|u]   chicken CVE-2017-9334 150 6 grave 2017-06-01
#877671 [U|+|S|u]   src:curl curl: CVE-2017-1000254: FTP PWD response parser out of bounds read 181882 5 serious 2017-10-08
#869639 [S|u]   firmware-brcm80211 firmware-brcm80211: BroadPwn vulnerability CVE-2017-9417 33005 7 critical 2017-07-25
#875609 [S]   gnome-shell gnome-shell: Crashes in 3.25 in g_type_check_instance_cast() called by shell_gtk_embed_window_created_cb() 59112 6 grave 2017-09-29
#878840 [+|S|u]   src:icu icu: CVE-2017-14952: Double free in i18n/zonemeta.cpp 99698 6 grave 2017-10-17
#872373 [U|S]   imagemagick CVE-2017-12877 111783 6 grave 2017-08-21
#876488 [+|S|u]   src:imagemagick imagemagick: CVE-2017-14682: Heap buffer overflow in GetNextToken() 111783 6 grave 2017-09-22
#872374 [U|S]   imagemagick CVE-2017-12876 111783 6 grave 2017-08-21
#867725 [S]   src:lame CVE-2017-9869 CVE-2017-9870 CVE-2017-9871 CVE-2017-9872 117081 6 grave 2017-07-08
#877652 [S|u]   src:libgig libgig: CVE-2017-12954 113 6 grave 2017-10-13
#877651 [S|u]   src:libgig libgig: CVE-2017-12951 113 6 grave 2017-10-13
#878264 [+|S|u]   src:libsdl2 libsdl2: CVE-2017-2888: Integer overflow while creating a new RGB surface 34648 6 grave 2017-10-12
#878266 [+|S|u]   src:libsdl2-image libsdl2-image: CVE-2017-2887: Incorrect XCF property handling 4580 6 grave 2017-10-11
#866676 [S|u]   src:libxml-libxml-perl libxml-libxml-perl: CVE-2017-10672: Use-after-free in XML::LibXML::Node::replaceChild 102856 6 grave 2017-08-04
#862373 [C|S]   libyaml-libyaml-perl libyaml-libyaml-perl: Unconditionally instantiates objects from yaml data 25186 6 grave 2017-05-12
#862475 [C|S]   libyaml-syck-perl libyaml-syck-perl: Unconditionally instantiates objects from yaml data 13313 6 grave 2017-07-10
#870815 [S|u]   src:libytnef libytnef: CVE-2017-12141: heap-buffer-overflow 50734 6 grave 2017-08-05
#877379 [+|S|u]   mupdf CVE-2017-14685 / CVE-2017-14686 / CVE-2017-14687 2652 6 grave 2017-10-15
#867988 [S|u]   nasm CVE-2017-11111 CVE-2017-10686 3981 6 grave 2017-09-21
#877660 [U|S|u]   node-tough-cookie CVE-2017-15010 2 6 grave 2017-10-09
#874115 [U|+|S|u]   src:openjpeg2 openjpeg2: CVE-2017-14041: Stack-based buffer over-write in pgxtoimage function in bin/jp2/convert.c 69925 6 grave 2017-10-16
#874431 [U|+|S|u]   src:openjpeg2 openjpeg2: CVE-2017-14152: heap-based buffer overflow in opj_write_bytes_LE 69925 6 grave 2017-10-16
#874430 [U|+|S|u]   src:openjpeg2 openjpeg2: CVE-2017-14151: heap-based buffer overflow in opj_mqc_flush 69925 6 grave 2017-10-16
#851771 [jes-i|S|str-i|u|whe-i]   src:php-gettext php-gettext: CVE-2016-6175 11427 6 grave 2017-04-22
#781813 [S|u]   src:python-restkit python-restkit: CVE-2015-2674: incorrect SSL/TLS certificate validation 74 6 grave 2017-10-03
#862899 [S|u]   rsync rsync: insufficient escaping/quoting of arguments 119990 5 serious 2017-09-25
#878267 [+|S|u]   src:sdl-image1.2 sdl-image1.2: CVE-2017-2887: Incorrect XCF property handling 74096 6 grave 2017-10-11
#866109 [S|u]   src:tiff tiff: CVE-2017-9935: Heap-based buffer overflow in t2p_write_pdf 152134 6 grave 2017-06-27
#874061 [S|u]   src:unrar-free unrar-free: CVE-2017-14121: null pointer dereference 9205 6 grave 2017-10-15
#874059 [+|S|u]   src:unrar-free unrar-free: CVE-2017-14120: directory traversal vulnerability 9205 6 grave 2017-09-07
#874060 [S|u]   src:unrar-free unrar-free: CVE-2017-14122: stack overread vulnerability 9205 6 grave 2017-10-15
#876315 [U|S|u]   src:yadifa CVE-2017-14339 2 6 grave 2017-09-21
#870271 [S]   src:zookeeper zookeeper: insecure permissions of /var/lib/zookeeper 182 6 grave 2017-07-31

Generated in 1.345 seconds.

select id, bugs.package, bugs.source, severity, title, last_modified, affects_stable, affects_testing, affects_unstable, affects_experimental , coalesce(popcon_src.insts, 0) as popcon
from bugs  left join popcon_src on (bugs.source = popcon_src.source) 
where id in (select id from bugs_rt_affects_testing) 
and id in (select id from bugs_tags where tag='security') 
AND (severity >= 'serious')
order by source asc