[Git][security-tracker-team/security-tracker][master] Add CVE-2022-2380/linux

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
586f7837 by Salvatore Bonaccorso at 2022-07-12T06:27:47+02:00
Add CVE-2022-2380/linux

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -12,8 +12,12 @@ CVE-2022-2382
RESERVED
 CVE-2022-2381
RESERVED
-CVE-2022-2380
+CVE-2022-2380 [video: fbdev: sm712fb: Fix crash in smtcfb_read()]
RESERVED
+   - linux 5.17.3-1
+   [bullseye] - linux 5.10.113-1
+   [buster] - linux 4.19.249-1
+   NOTE: 
https://git.kernel.org/linus/bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 (5.18-rc1)
 CVE-2022-2379
RESERVED
 CVE-2022-2378



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/586f78371ad2c9a8df652f990beaa844f70e3fa5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/586f78371ad2c9a8df652f990beaa844f70e3fa5
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] 5 commits: Revert "Bulk added EOL for 2 CVEs for node-url-parse in buster LTS."

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1edba366 by Salvatore Bonaccorso at 2022-07-12T06:10:29+02:00
Revert Bulk added EOL for 2 CVEs for node-url-parse in buster LTS.

This reverts commit 583663396fc9650aeee8268259c04673b3cde231.

- - - - -
c70eefb3 by Salvatore Bonaccorso at 2022-07-12T06:10:52+02:00
Revert Bulk added EOL for 2 CVEs for node-tar in buster LTS.

This reverts commit d3c2727d4120469e229327b285b475cabdfc619d.

- - - - -
5b70ee07 by Salvatore Bonaccorso at 2022-07-12T06:11:06+02:00
Revert Bulk added EOL for 3 CVEs for libspring-java in buster LTS.

This reverts commit a577308df34fa56f61220044ad76fe3aa887b04c.

- - - - -
89996661 by Salvatore Bonaccorso at 2022-07-12T06:11:16+02:00
Revert Bulk added almost 70 EOL entries for gpac in LTS buster.

This reverts commit 141f38d2a48de8ce04352dc8dfb2eea9443da94a.

- - - - -
ecce68b3 by Salvatore Bonaccorso at 2022-07-12T06:11:27+02:00
Revert Bulk added EOL entries for ckeditor3 for LTS buster.

This reverts commit b4c0adda8191921274a1a82fa993f5ae5b9ebf1c.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -12052,7 +12052,6 @@ CVE-2022-1796 (Use After Free in GitHub repository 
vim/vim prior to 8.2.4979. ..
NOTE: Crash in CLI tool, no security impact
 CVE-2022-1795 (Use After Free in GitHub repository gpac/gpac prior to 
v2.1.0-DEV. ...)
- gpac 
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc
NOTE: 
https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514
@@ -12111,7 +12110,6 @@ CVE-2022-1776 (The Popups, Welcome Bar, Optins and Lead 
Generation Plugin WordPr
NOT-FOR-US: WordPress plugin
 CVE-2022-30976 (GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed 
gf_utf8_wcsl ...)
- gpac 
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2179
NOTE: 
https://github.com/gpac/gpac/commit/915e2cba715f36b7cc29e2117831ca143d78
@@ -16303,7 +16301,6 @@ CVE-2022-29593
RESERVED
 CVE-2022-1441 (MP4Box is a component of GPAC-2.0.0, which is a widely-used 
third-part ...)
- gpac 
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2175
NOTE: 
https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb
@@ -19172,7 +19169,6 @@ CVE-2022-1223 (Improper Access Control in GitHub 
repository phpipam/phpipam prio
- phpipam  (bug #731713)
 CVE-2022-1222 (Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV. ...)
- gpac 
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://huntr.dev/bounties/f8cb85b8-7ff3-47f1-a9a6-7080eb371a3d
NOTE: 
https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1
@@ -23039,7 +23035,6 @@ CVE-2022-1036 (Able to create an account with long 
password leads to memory corr
NOT-FOR-US: microweber
 CVE-2022-1035 (Segmentation Fault caused by MP4Box -lsr in GitHub repository 
gpac/gpa ...)
- gpac 
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://huntr.dev/bounties/851942a4-1d64-4553-8fdc-9fccd167864b
NOTE: 
https://github.com/gpac/gpac/commit/3718d583c6ade191dc7979c64f48c001ca6f0243
@@ -23610,25 +23605,21 @@ CVE-2022-27149
REJECTED
 CVE-2022-27148 (GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable 
to Integ ...)
- gpac 2.0.0+dfsg1-2
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2067
NOTE: 
https://github.com/gpac/gpac/commit/0cd19f4db70615d707e0e6202933c2ea0c1d36df 
(v2.0.0)
 CVE-2022-27147 (GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a 
use-after-free v ...)
- gpac 2.0.0+dfsg1-2
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2109
NOTE: 
https://github.com/gpac/gpac/commit/9723dd0955894f2cb7be13b94cf7a47f2754b893 
(v2.0.0)
 CVE-2022-27146 (GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a 
heap-buffer-overflow vu ...)
- gpac 2.0.0+dfsg1-2
-   [buster] - gpac  (No longer supported in LTS buster)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2120
NOTE: 

[Git][security-tracker-team/security-tracker][master] Revert "Bulk added EOL for 12 CVEs for nodejs in buster LTS."

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
70e33276 by Salvatore Bonaccorso at 2022-07-12T06:09:25+02:00
Revert Bulk added EOL for 12 CVEs for nodejs in buster LTS.

This reverts commit 22d9f630a6c2f2a80db5b748c40aea24d931cac3.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8600,7 +8600,6 @@ CVE-2022-32216
 CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line 
Transfer-Encoding]
RESERVED
- nodejs 
-   [buster] - nodejs  (No longer supported in LTS buster)
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-incorrect-parsing-of-multi-line-transfer-encoding-medium-cve-2022-32215
NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
@@ -8608,7 +8607,6 @@ CVE-2022-32215 [HTTP Request Smuggling - Incorrect 
Parsing of Multi-line Transfe
 CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
RESERVED
- nodejs 
-   [buster] - nodejs  (No longer supported in LTS buster)
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-improper-delimiting-of-header-fields-medium-cve-2022-32214
NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
@@ -8616,7 +8614,6 @@ CVE-2022-32214 [HTTP Request Smuggling - Improper 
Delimiting of Header Fields]
 CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
RESERVED
- nodejs 
-   [buster] - nodejs  (No longer supported in LTS buster)
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
@@ -8624,7 +8621,6 @@ CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing 
of Transfer-Encoding]
 CVE-2022-32212
RESERVED
- nodejs 
-   [buster] - nodejs  (No longer supported in LTS buster)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-ip-addresses-high-cve-2022-32212
NOTE: 
https://github.com/nodejs/node/commit/48c5aa5cab718d04473fa2761d532657c84b8131 
(v14.x)
NOTE: 
https://github.com/nodejs/node/commit/1aa5036c31ac2a9b2a2528af454675ad412f1464 
(main)
@@ -44969,7 +44965,6 @@ CVE-2021-44535
 CVE-2022-21824 (Due to the formatting logic of the "console.table()" function 
it was n ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
-   [buster] - nodejs  (No longer supported in LTS buster)
[stretch] - nodejs  (Nodejs in stretch not covered by 
security support)
NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824
NOTE: 
https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e 
(v12.x)
@@ -44978,21 +44973,18 @@ CVE-2021-44534
 CVE-2021-44533 (Node.js  12.22.9,  14.18.3,  16.13.2, and  
17.3.1 did  ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
-   [buster] - nodejs  (No longer supported in LTS buster)
[stretch] - nodejs  (Nodejs in stretch not covered by 
security support)
NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#incorrect-handling-of-certificate-subject-and-issuer-fields-medium-cve-2021-44533
NOTE: 
https://github.com/nodejs/node/commit/8c2db2c86baff110a1d905ed1e0dd4e1c4fd2dd1 
(v12.x)
 CVE-2021-44532 (Node.js  12.22.9,  14.18.3,  16.13.2, and  
17.3.1 conv ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
-   [buster] - nodejs  (No longer supported in LTS buster)
[stretch] - nodejs  (Nodejs in stretch not covered by 
security support)
NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#certificate-verification-bypass-via-string-injection-medium-cve-2021-44532
NOTE: 
https://github.com/nodejs/node/commit/19873abfb24dce75042efe76dc5633052677 
(v12.x)
 CVE-2021-44531 (Accepting arbitrary Subject Alternative Name (SAN) types, 
unless a PKI ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
-   [buster] - nodejs  (No longer supported in LTS buster)
[stretch] - nodejs  (Nodejs in stretch not covered by 
security support)
NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#improper-handling-of-uri-subject-alternative-names-medium-cve-2021-44531
NOTE: 

[Git][security-tracker-team/security-tracker][master] Add upstream tag information for CVE-2022-25255

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e60e02a5 by Salvatore Bonaccorso at 2022-07-12T06:07:09+02:00
Add upstream tag information for CVE-2022-25255

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -28757,7 +28757,7 @@ CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 
5.15.9 and 6.x before 6.2.4 on
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/393113
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/394914
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/396020
-   NOTE: 
https://github.com/qt/qtbase/commit/ab6915f0efb12cfe48d1f126f4a828212f853ce5 
(6.2)
+   NOTE: 
https://github.com/qt/qtbase/commit/ab6915f0efb12cfe48d1f126f4a828212f853ce5 
(v6.2.4)
NOTE: https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
NOTE: https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
NOTE: https://www.qt.io/blog/security-advisory-qprocess



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e60e02a591932cf5e91860eeaff93baec7bd451a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e60e02a591932cf5e91860eeaff93baec7bd451a
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] lts: reclaim rust toolchain

2022-07-11 Thread Emilio Pozuelo Monfort (@pochu)


Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
119d1dfc by Emilio Pozuelo Monfort at 2022-07-12T00:36:27+02:00
lts: reclaim rust toolchain

- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -18,6 +18,7 @@ curl
 --
 linux (Ben Hutchings)
 --
-rustc
+rustc (Emilio)
   NOTE: 20220614: backporting toolchain (rust, llvm...) for Firefox 102 ESR 
(pochu)
+  NOTE: 20220712: bullseye backports done, wip on buster updates (pochu)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/119d1dfc7c6fbecc8b0ae26ca49be38672395364

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/119d1dfc7c6fbecc8b0ae26ca49be38672395364
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] 2 commits: Added curl to dla-needed since it is in DSA needed and at least one...

2022-07-11 Thread Ola Lundqvist (@opal)


Ola Lundqvist pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
35e96a7a by Ola Lundqvist at 2022-07-12T00:10:36+02:00
Added curl to dla-needed since it is in DSA needed and at least one 
vulnerability applies to buster as well.

- - - - -
587dc5e1 by Ola Lundqvist at 2022-07-12T00:18:32+02:00
Concluded that CVE-2022-24793 is not vulnerable in buster since the vulnerable 
code does not exist. The file is not even present.

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=
data/CVE/list
=
@@ -30153,6 +30153,7 @@ CVE-2022-24794 (Express OpenID Connect is an Express JS 
middleware implementing
 CVE-2022-24793 (PJSIP is a free and open source multimedia communication 
library writt ...)
{DLA-3036-1}
- asterisk 
+   [buster] - asterisk  (Vulnerable code not present)
[stretch] - asterisk  (Vulnerable code not present)
- pjproject 
- ring 


=
data/dla-needed.txt
=
@@ -12,6 +12,9 @@ 
https://wiki.debian.org/LTS/Development#Triage_new_security_issues
 To make it easier to see the entire history of an update, please append notes
 rather than remove/replace existing ones.
 
+--
+curl
+  NOTE: 20220712: Have not checked whether all CVEs are appliable or not (ola) 
 --
 linux (Ben Hutchings)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/22d9f630a6c2f2a80db5b748c40aea24d931cac3...587dc5e1d376b0b6c98ed4c616d69b4becef69ba

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/22d9f630a6c2f2a80db5b748c40aea24d931cac3...587dc5e1d376b0b6c98ed4c616d69b4becef69ba
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] 8 commits: Wrote a script to bulk add EOL entries for LTS buster.

2022-07-11 Thread Ola Lundqvist (@opal)


Ola Lundqvist pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
55001d9c by Ola Lundqvist at 2022-07-11T23:23:41+02:00
Wrote a script to bulk add EOL entries for LTS buster.

- - - - -
b4c0adda by Ola Lundqvist at 2022-07-11T23:23:43+02:00
Bulk added EOL entries for ckeditor3 for LTS buster.

- - - - -
141f38d2 by Ola Lundqvist at 2022-07-11T23:23:44+02:00
Bulk added almost 70 EOL entries for gpac in LTS buster.

- - - - -
a577308d by Ola Lundqvist at 2022-07-11T23:23:45+02:00
Bulk added EOL for 3 CVEs for libspring-java in buster LTS.

- - - - -
d3c2727d by Ola Lundqvist at 2022-07-11T23:23:46+02:00
Bulk added EOL for 2 CVEs for node-tar in buster LTS.

- - - - -
58366339 by Ola Lundqvist at 2022-07-11T23:23:48+02:00
Bulk added EOL for 2 CVEs for node-url-parse in buster LTS.

- - - - -
021ec750 by Ola Lundqvist at 2022-07-11T23:23:48+02:00
One correction to the eol bulk add script. Also simplified the output to make 
it less verbose.

- - - - -
22d9f630 by Ola Lundqvist at 2022-07-11T23:23:49+02:00
Bulk added EOL for 12 CVEs for nodejs in buster LTS.

- - - - -


2 changed files:

- + bin/lts-auto-eol
- data/CVE/list


Changes:

=
bin/lts-auto-eol
=
@@ -0,0 +1,68 @@
+#!/usr/bin/perl
+use File::Copy;
+my $pkg = $ARGV[0];
+shift @ARGV;
+while (my $cve = shift @ARGV) {
+($pkg, $cve);
+}
+exit;
+
+sub addEol {
+my ($pkg, $cve) = @_;
+#print "Searching for $cve\n";
+# Mode
+#  d - default
+#  c - cve found
+#  p - pkg found
+#  e - eol printed, just continue to end of file as we are done
+my $mode = "d";
+open IF, "data/CVE/list";
+open OF, ">data/CVE/list.x";
+while (my $line = ) {
+   if ($mode eq "e") {
+   print OF $line;
+   next;
+   }
+   if ($mode eq "d") {
+   if ($line =~ /$cve\s/) {
+#  print "  CVE $cve found\n";
+   $mode = "c";
+   print OF $line;
+   next;
+   }
+   }
+   if ($mode eq "c") {
+   if ($line =~ /^\s+- $pkg\s/) {
+   $mode = "p";
+#  print "  Package $pkg found\n";
+   print OF $line;
+   next;
+   }
+   }
+   if ($mode eq "p") {
+   if ($line =~ /^\s+\[buster\] - $pkg\s/) {
+   $mode = "e";
+   print "Existing LTS line found, skipping: $line";
+   print OF $line;
+   next;
+   }
+   if ($line =~ /^\s+\[bullseye\] - $pkg\s/ ||
+   $line =~ /^\s+\[bookworm\] - $pkg\s/ ||
+   $line =~ /^\s+\[trixie\] - $pkg\s/) {
+   # skipping through other distribution info
+   print OF $line;
+   next;
+   }
+   # End of package entry add EOL
+   print "EOL $cve for $pkg added.\n";
+   print OF "\t[buster] - $pkg  (No longer supported in 
LTS buster)\n";
+   print OF $line;
+   $mode = "e";
+   next;
+   }
+   print OF $line;
+}
+close IF;
+close OF;
+move ("data/CVE/list.x", "data/CVE/list");
+}


=
data/CVE/list
=
@@ -8600,6 +8600,7 @@ CVE-2022-32216
 CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line 
Transfer-Encoding]
RESERVED
- nodejs 
+   [buster] - nodejs  (No longer supported in LTS buster)
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-incorrect-parsing-of-multi-line-transfer-encoding-medium-cve-2022-32215
NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
@@ -8607,6 +8608,7 @@ CVE-2022-32215 [HTTP Request Smuggling - Incorrect 
Parsing of Multi-line Transfe
 CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
RESERVED
- nodejs 
+   [buster] - nodejs  (No longer supported in LTS buster)
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-improper-delimiting-of-header-fields-medium-cve-2022-32214
NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
@@ -8614,6 +8616,7 @@ CVE-2022-32214 [HTTP Request Smuggling - Improper 
Delimiting of Header Fields]
 CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
RESERVED
- nodejs 
+   [buster] - nodejs  (No longer supported in LTS buster)
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
@@ 

[Git][security-tracker-team/security-tracker][master] libmatio, nouveau non issues

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
391fef27 by Moritz Muehlenhoff at 2022-07-11T23:21:42+02:00
libmatio, nouveau non issues
mark old opencv report as NFU for Android, Android never really gave any 
information
  its most probably bogus anyway

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -182990,12 +182990,9 @@ CVE-2019-20020 (A stack-based buffer over-read was 
discovered in ReadNextStructF
[jessie] - libmatio  (Minor issue)
NOTE: https://github.com/tbeu/matio/issues/128
 CVE-2019-20019 (An attempted excessive memory allocation was discovered in 
Mat_VarRead ...)
-   - libmatio 
-   [bullseye] - libmatio  (Minor issue)
-   [buster] - libmatio  (Minor issue)
-   [stretch] - libmatio  (Minor issue)
-   [jessie] - libmatio  (Minor issue)
+   - libmatio  (unimportant)
NOTE: https://github.com/tbeu/matio/issues/130
+   NOTE: Negligible security impact
 CVE-2019-20018 (A stack-based buffer over-read was discovered in ReadNextCell 
in mat5. ...)
[experimental] - libmatio 1.5.18-1
- libmatio 1.5.19-2
@@ -221434,7 +221431,6 @@ CVE-2019-10104 (In several JetBrains IntelliJ IDEA 
Ultimate versions, an Applica
- intellij-idea  (bug #747616)
 CVE-2019-10103 (JetBrains IntelliJ IDEA projects created using the Kotlin (JS 
Client/J ...)
- intellij-idea  (bug #747616)
-   - intellij-community-idea 
 CVE-2019-10101 (JetBrains Kotlin versions before 1.3.30 were resolving 
artifacts using ...)
- kotlin  (Fixed before initial upload to Debian)
 CVE-2019-10100 (In JetBrains YouTrack Confluence plugin versions before 
1.8.1.3, it wa ...)
@@ -224494,8 +224490,7 @@ CVE-2019-9425 (In Bluetooth, there is a possible out 
of bounds read due to a mis
 CVE-2019-9424 (In the Screen Lock, there is a possible information disclosure 
due to  ...)
NOT-FOR-US: Android
 CVE-2019-9423 (In opencv calls that use libpng, there is a possible out of 
bounds wri ...)
-   - opencv 
-   NOTE: Currently no further information available
+   NOT-FOR-US: Android
 CVE-2019-9422 (In Bluetooth, there is a possible out of bounds read due to a 
missing  ...)
NOT-FOR-US: Android
 CVE-2019-9421 (In libandroidfw, there is a possible OOB read due to an integer 
overfl ...)
@@ -292900,12 +292895,9 @@ CVE-2018-3981 (An exploitable out-of-bounds write 
exists in the TIFF-parsing fun
 CVE-2018-3980 (An exploitable out-of-bounds write exists in the TIFF-parsing 
function ...)
NOT-FOR-US: Canvas Draw
 CVE-2018-3979 (A remote denial-of-service vulnerability exists in the way the 
Nouveau ...)
-   - xserver-xorg-video-nouveau  (low)
-   [bullseye] - xserver-xorg-video-nouveau  (Minor issue)
-   [buster] - xserver-xorg-video-nouveau  (Minor issue)
-   [stretch] - xserver-xorg-video-nouveau  (Minor issue)
-   [jessie] - xserver-xorg-video-nouveau  (Minor issue)
+   - xserver-xorg-video-nouveau  (unimportant)
NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0647
+   NOTE: Nouveau is a reverse-engineered, best effort driver, negligible 
security impact
 CVE-2018-3978 (An exploitable out-of-bounds write vulnerability exists in the 
Word Do ...)
NOT-FOR-US: Atlantis Word Processor
 CVE-2018-3977 (An exploitable code execution vulnerability exists in the XCF 
image re ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/391fef271d0897389daf517a4c516f2536db6077

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/391fef271d0897389daf517a4c516f2536db6077
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] semi-automatic unclaim after 2 weeks of inactivity

2022-07-11 Thread Anton Gladky (@gladk)


Anton Gladky pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0411d591 by Anton Gladky at 2022-07-11T22:26:43+02:00
semi-automatic unclaim after 2 weeks of inactivity

Signed-off-by: Anton Gladky gl...@debian.org

- - - - -


1 changed file:

- data/dla-needed.txt


Changes:

=
data/dla-needed.txt
=
@@ -15,6 +15,6 @@ rather than remove/replace existing ones.
 --
 linux (Ben Hutchings)
 --
-rustc (Emilio)
+rustc
   NOTE: 20220614: backporting toolchain (rust, llvm...) for Firefox 102 ESR 
(pochu)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0411d59117de14ebd4f1603317e8a63b303ef598

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0411d59117de14ebd4f1603317e8a63b303ef598
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Remove noes from CVE-2021-46815 (REJECTED, duplicate of CVE-2021-46789)

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f8994f8b by Salvatore Bonaccorso at 2022-07-11T22:23:04+02:00
Remove noes from CVE-2021-46815 (REJECTED, duplicate of CVE-2021-46789)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -9889,7 +9889,6 @@ CVE-2022-1900 (The Copify plugin for WordPress is 
vulnerable to Cross-Site Reque
NOT-FOR-US: Copify plugin for WordPress
 CVE-2021-46815
REJECTED
-   NOT-FOR-US: Huawei
 CVE-2021-46814 (The video framework has an out-of-bounds memory read/write 
vulnerabili ...)
NOT-FOR-US: Huawei
 CVE-2021-46813 (Vulnerability of residual files not being deleted after an 
update in t ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f8994f8b5f5311e2b92b0a4252beeb54fa039160

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f8994f8b5f5311e2b92b0a4252beeb54fa039160
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-2366/mattermost-server

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a850955a by Salvatore Bonaccorso at 2022-07-11T22:18:17+02:00
Add CVE-2022-2366/mattermost-server

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -470,7 +470,7 @@ CVE-2022-35414 (softmmu/physmem.c in QEMU through 7.0.0 can 
perform an uninitial
NOTE: 
https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c
NOTE: https://sick.codes/sick-2022-113
 CVE-2022-2366 (Incorrect default configuration for trusted IP header in 
Mattermost ve ...)
-   TODO: check
+   - mattermost-server  (bug #823556)
 CVE-2022-2365 (Cross-site Scripting (XSS) - Stored in GitHub repository 
zadam/trilium ...)
TODO: check
 CVE-2022-2364



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a850955ace177b74f0da010113f6851b61bed835

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a850955ace177b74f0da010113f6851b61bed835
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process some more NFUs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f2fa0826 by Salvatore Bonaccorso at 2022-07-11T22:17:49+02:00
Process some more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -37,7 +37,7 @@ CVE-2022-2370
 CVE-2022-2369
RESERVED
 CVE-2022-2368 (Business Logic Errors in GitHub repository 
microweber/microweber prior ...)
-   TODO: check
+   NOT-FOR-US: microweber
 CVE-2022-2367
RESERVED
 CVE-2022-35626
@@ -1606,7 +1606,7 @@ CVE-2022-2304 (Stack-based Buffer Overflow in GitHub 
repository vim/vim prior to
 CVE-2022-2303
RESERVED
 CVE-2022-2302 (Multiple Lenze products of the cabinet series skip the password 
verifi ...)
-   TODO: check
+   NOT-FOR-US: Lenze
 CVE-2022-2301 (Buffer Over-read in GitHub repository hpjansson/chafa prior to 
1.10.3. ...)
- chafa 1.10.3-1 (unimportant)
NOTE: https://huntr.dev/bounties/f6b9114b-671d-4948-b946-ffe5c9aeb816/
@@ -2150,23 +2150,23 @@ CVE-2022-34747
 CVE-2022-34746
RESERVED
 CVE-2022-34743 (The AT commands of the USB port have an out-of-bounds read 
vulnerabili ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34742 (The system module has a read/write vulnerability. Successful 
exploitat ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34741 (The NFC module has a buffer overflow vulnerability. Successful 
exploit ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34740 (The NFC module has a buffer overflow vulnerability. Successful 
exploit ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34739 (The fingerprint module has a vulnerability of overflow in 
arithmetic a ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34738 (The SystemUI module has a vulnerability in permission control. 
If this ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34737 (The application security module has a vulnerability in 
permission assi ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34736 (The frame scheduling module has a null pointer dereference 
vulnerabili ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-34735 (The frame scheduling module has a null pointer dereference 
vulnerabili ...)
-   TODO: check
+   NOT-FOR-US: Huawei
 CVE-2022-2245
RESERVED
 CVE-2022-2244 (An improper authorization vulnerability in GitLab EE/CE 
affecting all  ...)
@@ -4564,7 +4564,7 @@ CVE-2022-33913 (In Mahara 21.04 before 21.04.6, 21.10 
before 21.10.4, and 22.04.
 CVE-2022-33912 (A permission issue affects users that deployed the shipped 
version of  ...)
NOT-FOR-US: Check MK as packaged by upstream
 CVE-2022-33911 (An issue was discovered in Couchbase Server 7.x before 7.0.4. 
Field na ...)
-   TODO: check
+   NOT-FOR-US: Couchbase Server
 CVE-2022-33910 (An XSS vulnerability in MantisBT before 2.25.5 allows remote 
attackers ...)
- mantis 
 CVE-2022-33909
@@ -5046,63 +5046,63 @@ CVE-2022-33715
 CVE-2022-33714
RESERVED
 CVE-2022-33713 (Implicit Intent hijacking vulnerability in Samsung Cloud prior 
to vers ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33712 (Intent redirection vulnerability using implict intent in 
Camera prior  ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33711 (Improper validation of integrity check vulnerability in 
Samsung USB Dr ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33710 (Improper input validation vulnerability in 
BillingPackageInsraller in  ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33709 (Improper input validation vulnerability in 
ApexPackageInstaller in Gal ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33708 (Improper input validation vulnerability in 
AppsPackageInstaller in Gal ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33707 (Improper identifier creation logic in Find My Mobile prior to 
version  ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33706 (Improper access control vulnerability in Samsung Gallery prior 
to vers ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33705 (Information exposure in Calendar prior to version 
12.3.05.1 allows ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33704 (Improper validation vulnerability in ucmRetParcelable of 
KnoxSDK prior ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33703 (Improper validation vulnerability in CACertificateInfo prior 
to SMR Ju ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33702 (Improper authorization vulnerability in Knoxguard prior to SMR 
Jul-202 ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 CVE-2022-33701 (Improper access control vulnerability in 
KnoxCustomManagerService prio ...)
-   TODO: check
+   NOT-FOR-US: Samsung
 

[Git][security-tracker-team/security-tracker][master] Process some NFUs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5b4376c8 by Salvatore Bonaccorso at 2022-07-11T22:14:34+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -4404,7 +4404,7 @@ CVE-2022-29921
 CVE-2022-26084
RESERVED
 CVE-2022-2123 (The WP Opt-in WordPress plugin through 1.4.1 is vulnerable to 
CSRF whi ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-2122
RESERVED
 CVE-2022-2121 (OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer 
derefer ...)
@@ -4924,15 +4924,15 @@ CVE-2022-2095
 CVE-2022-2094
RESERVED
 CVE-2022-2093 (The WP Duplicate Page WordPress plugin before 1.3 does not 
sanitize an ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-2092 (The WooCommerce PDF Invoices  Packing Slips WordPress 
plugin befo ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-2091 (The Cache Images WordPress plugin before 3.2.1 does not 
implement nonc ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-2090
RESERVED
 CVE-2022-2089 (The Bold Page Builder WordPress plugin before 4.3.3 does not 
sanitise  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-33758
RESERVED
 CVE-2022-33757
@@ -6732,7 +6732,7 @@ CVE-2022-2052
 CVE-2022-2051
RESERVED
 CVE-2022-2050 (The WP-Paginate WordPress plugin before 2.1.9 does not escape 
one of i ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-32957
RESERVED
 CVE-2022-32956
@@ -8887,9 +8887,9 @@ CVE-2022-1959
 CVE-2022-1958 (A vulnerability classified as critical has been found in 
FileCloud. Af ...)
NOT-FOR-US: FileCloud
 CVE-2022-1957 (The Comment License WordPress plugin before 1.4.0 does not have 
CSRF c ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-1956 (The Shortcut Macros WordPress plugin through 1.3 does not have 
authori ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-1955 (Session 1.13.0 allows an attacker with physical access to the 
victim's ...)
NOT-FOR-US: oxen-io/session-android
 CVE-2022-1954 (A Regular Expression Denial of Service vulnerability in GitLab 
CE/EE a ...)
@@ -8897,9 +8897,9 @@ CVE-2022-1954 (A Regular Expression Denial of Service 
vulnerability in GitLab CE
 CVE-2022-1953 (The Product Configurator for WooCommerce WordPress plugin 
before 1.2.3 ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-1952 (The Free Booking Plugin for Hotels, Restaurant and Car Rental 
WordPres ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-1951 (The core plugin for kitestudio WordPress plugin before 2.3.1 
does not  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-1950
RESERVED
 CVE-2022-1949 (An access control bypass vulnerability found in 389-ds-base. 
That mish ...)
@@ -9653,9 +9653,9 @@ CVE-2022-1940 (A Stored Cross-Site Scripting 
vulnerability in Jira integration i
 CVE-2022-1939 (The Allow svg files WordPress plugin before 1.1 does not 
properly vali ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-1938 (The Awin Data Feed WordPress plugin through 1.6 does not 
sanitise and  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-1937 (The Awin Data Feed WordPress plugin through 1.6 does not 
sanitise and  ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022- [Sanitizing and other XSS protections]
- spip 4.1.2+dfsg-1
[bullseye] - spip 3.2.11-3+deb11u4
@@ -9831,7 +9831,7 @@ CVE-2022-1912
 CVE-2022-1911
RESERVED
 CVE-2022-1910 (The Shortcodes and extra features for Phlox WordPress plugin 
before 2. ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2022-1909 (Cross-site Scripting (XSS) - Stored in GitHub repository 
causefx/organ ...)
NOT-FOR-US: organizr
 CVE-2022-1908 (Buffer Over-read in GitHub repository bfabiszewski/libmobi 
prior to 0. ...)
@@ -10027,7 +10027,7 @@ CVE-2022-1896 (The underConstruction WordPress plugin 
before 1.21 does not sanit
 CVE-2022-1895 (The underConstruction WordPress plugin before 1.20 does not 
have CSRF  ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-1894 (The Popup Builder WordPress plugin before 4.1.11 does not 
escape and s ...)
-   TODO: check
+   NOT-FOR-US: WordPress plugin
 CVE-2021-4232 (A vulnerability classified as problematic has been found in Zoo 
Manage ...)
NOT-FOR-US: Zoo Management System
 CVE-2022-31733
@@ -12174,7 +12174,7 @@ CVE-2022-1759 (The RB Internal Links WordPress plugin 
through 2.0.16 does not ha
 CVE-2022-1758 (The Genki Pre-Publish Reminder WordPress plugin through 1.4.1 
does not ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-1757 (The Pagebar WordPress plugin through 2.65 does not have CSRF 
check in  ...)
- 

[Git][security-tracker-team/security-tracker][master] automatic update

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
15d4bf7e by security tracker role at 2022-07-11T20:10:24+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,45 @@
+CVE-2022-35628
+   RESERVED
+CVE-2022-35627
+   RESERVED
+CVE-2022-2385
+   RESERVED
+CVE-2022-2384
+   RESERVED
+CVE-2022-2383
+   RESERVED
+CVE-2022-2382
+   RESERVED
+CVE-2022-2381
+   RESERVED
+CVE-2022-2380
+   RESERVED
+CVE-2022-2379
+   RESERVED
+CVE-2022-2378
+   RESERVED
+CVE-2022-2377
+   RESERVED
+CVE-2022-2376
+   RESERVED
+CVE-2022-2375
+   RESERVED
+CVE-2022-2374
+   RESERVED
+CVE-2022-2373
+   RESERVED
+CVE-2022-2372
+   RESERVED
+CVE-2022-2371
+   RESERVED
+CVE-2022-2370
+   RESERVED
+CVE-2022-2369
+   RESERVED
+CVE-2022-2368 (Business Logic Errors in GitHub repository 
microweber/microweber prior ...)
+   TODO: check
+CVE-2022-2367
+   RESERVED
 CVE-2022-35626
RESERVED
 CVE-2022-35625
@@ -427,8 +469,8 @@ CVE-2022-35414 (softmmu/physmem.c in QEMU through 7.0.0 can 
perform an uninitial
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1065
NOTE: 
https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c
NOTE: https://sick.codes/sick-2022-113
-CVE-2022-2366
-   RESERVED
+CVE-2022-2366 (Incorrect default configuration for trusted IP header in 
Mattermost ve ...)
+   TODO: check
 CVE-2022-2365 (Cross-site Scripting (XSS) - Stored in GitHub repository 
zadam/trilium ...)
TODO: check
 CVE-2022-2364
@@ -1563,8 +1605,8 @@ CVE-2022-2304 (Stack-based Buffer Overflow in GitHub 
repository vim/vim prior to
NOTE: 
https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939 
(v9.0.0035)
 CVE-2022-2303
RESERVED
-CVE-2022-2302
-   RESERVED
+CVE-2022-2302 (Multiple Lenze products of the cabinet series skip the password 
verifi ...)
+   TODO: check
 CVE-2022-2301 (Buffer Over-read in GitHub repository hpjansson/chafa prior to 
1.10.3. ...)
- chafa 1.10.3-1 (unimportant)
NOTE: https://huntr.dev/bounties/f6b9114b-671d-4948-b946-ffe5c9aeb816/
@@ -1581,16 +1623,19 @@ CVE-2022-2297
RESERVED
 CVE-2022-2296
RESERVED
+   {DSA-5180-1}
- chromium 103.0.5060.114-1
[buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-2295
RESERVED
+   {DSA-5180-1}
- chromium 103.0.5060.114-1
[buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-2294
RESERVED
+   {DSA-5180-1}
- chromium 103.0.5060.114-1
[buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
@@ -2104,24 +2149,24 @@ CVE-2022-34747
RESERVED
 CVE-2022-34746
RESERVED
-CVE-2022-34743
-   RESERVED
-CVE-2022-34742
-   RESERVED
-CVE-2022-34741
-   RESERVED
-CVE-2022-34740
-   RESERVED
-CVE-2022-34739
-   RESERVED
-CVE-2022-34738
-   RESERVED
-CVE-2022-34737
-   RESERVED
-CVE-2022-34736
-   RESERVED
-CVE-2022-34735
-   RESERVED
+CVE-2022-34743 (The AT commands of the USB port have an out-of-bounds read 
vulnerabili ...)
+   TODO: check
+CVE-2022-34742 (The system module has a read/write vulnerability. Successful 
exploitat ...)
+   TODO: check
+CVE-2022-34741 (The NFC module has a buffer overflow vulnerability. Successful 
exploit ...)
+   TODO: check
+CVE-2022-34740 (The NFC module has a buffer overflow vulnerability. Successful 
exploit ...)
+   TODO: check
+CVE-2022-34739 (The fingerprint module has a vulnerability of overflow in 
arithmetic a ...)
+   TODO: check
+CVE-2022-34738 (The SystemUI module has a vulnerability in permission control. 
If this ...)
+   TODO: check
+CVE-2022-34737 (The application security module has a vulnerability in 
permission assi ...)
+   TODO: check
+CVE-2022-34736 (The frame scheduling module has a null pointer dereference 
vulnerabili ...)
+   TODO: check
+CVE-2022-34735 (The frame scheduling module has a null pointer dereference 
vulnerabili ...)
+   TODO: check
 CVE-2022-2245
RESERVED
 CVE-2022-2244 (An improper authorization vulnerability in GitLab EE/CE 
affecting all  ...)
@@ -4358,8 +4403,8 @@ CVE-2022-29921
RESERVED
 CVE-2022-26084
RESERVED
-CVE-2022-2123
-   RESERVED
+CVE-2022-2123 (The WP Opt-in WordPress plugin through 1.4.1 is vulnerable to 
CSRF whi ...)
+   TODO: check
 CVE-2022-2122
RESERVED
 CVE-2022-2121 (OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer 
derefer ...)
@@ -4518,8 +4563,8 @@ CVE-2022-33913 (In Mahara 21.04 before 21.04.6, 21.10 
before 21.10.4, and 22.04.
- mahara 
 CVE-2022-33912 (A permission issue affects users that deployed 

[Git][security-tracker-team/security-tracker][master] qtbase-opensource-src-gles, qt6-base fixed in sid

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6ff94ec6 by Moritz Muehlenhoff at 2022-07-11T21:48:21+02:00
qtbase-opensource-src-gles, qt6-base fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -28686,17 +28686,18 @@ CVE-2022-25257
 CVE-2022-25256 (SAS Web Report Studio 4.4 allows XSS. 
/SASWebReportStudio/logonAndRend ...)
NOT-FOR-US: SAS Web Report Studio
 CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 
on Linux ...)
-   - qt6-base 
+   - qt6-base 6.2.4+dfsg-4
- qtbase-opensource-src 5.15.2+dfsg-15
[bullseye] - qtbase-opensource-src  (Minor issue)
[buster] - qtbase-opensource-src  (Breaks existing behaviour 
and upstream also skipped from 5.12 branch)
[stretch] - qtbase-opensource-src  (Vulnerable code 
introduced later)
-   - qtbase-opensource-src-gles 
+   - qtbase-opensource-src-gles 5.15.4+dfsg-2
[bullseye] - qtbase-opensource-src-gles  (Minor issue)
[buster] - qtbase-opensource-src-gles  (Breaks existing 
behaviour and upstream also skipped from 5.12 branch)
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/393113
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/394914
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/396020
+   NOTE: 
https://github.com/qt/qtbase/commit/ab6915f0efb12cfe48d1f126f4a828212f853ce5 
(6.2)
NOTE: https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
NOTE: https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
NOTE: https://www.qt.io/blog/security-advisory-qprocess



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6ff94ec650cddcc5a624d1f534e2083031222574

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6ff94ec650cddcc5a624d1f534e2083031222574
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bugnums

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
deac0a55 by Moritz Muehlenhoff at 2022-07-11T21:42:19+02:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -26529,7 +26529,7 @@ CVE-2022-0761
 CVE-2022-0760 (The Simple Link Directory WordPress plugin before 7.7.2 does 
not valid ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-0759 (A flaw was found in all versions of kubeclient up to (but not 
includin ...)
-   - ruby-kubeclient 
+   - ruby-kubeclient  (bug #1014780)
[bullseye] - ruby-kubeclient  (Minor issue)
[buster] - ruby-kubeclient  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2058404
@@ -26843,7 +26843,7 @@ CVE-2022-25846
 CVE-2022-25845 (The package com.alibaba:fastjson before 1.2.83 are vulnerable 
to Deser ...)
NOT-FOR-US: com.alibaba:fastjson
 CVE-2022-25844 (The package angular after 1.7.0 are vulnerable to Regular 
Expression D ...)
-   - angular.js 
+   - angular.js  (bug #1014779)
[stretch] - angular.js  (Nodejs in stretch not covered by 
security support)
NOTE: https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735
 CVE-2022-25843
@@ -78398,7 +78398,7 @@ CVE-2021-32753 (EdgeX Foundry is an open source project 
for building a common op
 CVE-2021-32752 (Ether Logs is a package that allows one to check one's logs in 
the Cra ...)
NOT-FOR-US: Ether Logs
 CVE-2021-32751 (Gradle is a build tool with a focus on build automation. In 
versions p ...)
-   - gradle 
+   - gradle  (bug #1014778)
[bullseye] - gradle  (Minor issue)
[buster] - gradle  (Minor issue)
[stretch] - gradle  (Minor issue)
@@ -79579,7 +79579,7 @@ CVE-2021-32296
 CVE-2021-32295
RESERVED
 CVE-2021-32294 (An issue was discovered in libgig through 20200507. A 
heap-buffer-over ...)
-   - libgig 
+   - libgig  (bug #1014777)
[bullseye] - libgig  (Minor issue)
[buster] - libgig  (Minor issue)
[stretch] - libgig  (Minor issue, revisit when/if fixed 
upstream)
@@ -100968,7 +100968,7 @@ CVE-2021-23922 (An issue was discovered in 
Devolutions Remote Desktop Manager be
 CVE-2021-23921 (An issue was discovered in Devolutions Server before 2020.3. 
There is  ...)
NOT-FOR-US: Devolutions Server
 CVE-2020-36191 (JupyterHub 1.1.0 allows CSRF in the admin panel via a request 
that lac ...)
-   - jupyterhub 
+   - jupyterhub  (bug #1014774)
NOTE: https://github.com/jupyterhub/jupyterhub/issues/3304
 CVE-2020-36190 (RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 
allows  ...)
NOT-FOR-US: RailsAdmin
@@ -118799,7 +118799,7 @@ CVE-2020-28590 (An out-of-bounds read vulnerability 
exists in the Obj File Trian
NOTE: https://github.com/slic3r/Slic3r/issues/5074
NOTE: Crash in enduser application, no security impact
 CVE-2020-28589 (An improper array index validation vulnerability exists in the 
LoadObj ...)
-   - tinyobjloader 
+   - tinyobjloader  (bug #1014776)
NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212
 CVE-2020-28588 (An information disclosure vulnerability exists in the 
/proc/pid/syscal ...)
- linux 5.9.15-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/deac0a55ef18280add910102379bbfbbe068531b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/deac0a55ef18280add910102379bbfbbe068531b
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] 3 commits: Process some NFUs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b0118c06 by Salvatore Bonaccorso at 2022-07-11T21:37:32+02:00
Process some NFUs

- - - - -
c729c039 by Salvatore Bonaccorso at 2022-07-11T21:37:33+02:00
Add CVE-2022-33980/commons-configuration2

- - - - -
f71e4e3b by Salvatore Bonaccorso at 2022-07-11T21:37:35+02:00
Add CVE-2022-32061/snipe-it

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2441,7 +2441,7 @@ CVE-2022-30692
 CVE-2022-29514
RESERVED
 CVE-2022-27168 (Cross-site scripting vulnerability in LiteCart versions prior 
to 2.4.2 ...)
-   TODO: check
+   NOT-FOR-US: LiteCart
 CVE-2022-2214 (A vulnerability was found in SourceCodester Library Management 
System  ...)
NOT-FOR-US: SourceCodester Library Management System
 CVE-2022-2213 (A vulnerability was found in SourceCodester Library Management 
System  ...)
@@ -4191,7 +4191,8 @@ CVE-2022-33981 (drivers/block/floppy.c in the Linux 
kernel before 5.17.6 is vuln
NOTE: https://www.openwall.com/lists/oss-security/2022/04/28/1
NOTE: 
https://git.kernel.org/linus/233087ca063686964a53c829d547c7571e3f67bf (5.18-rc5)
 CVE-2022-33980 (Apache Commons Configuration performs variable interpolation, 
allowing ...)
-   TODO: check
+   - commons-configuration2 
+   NOTE: https://www.openwall.com/lists/oss-security/2022/07/06/5
 CVE-2022-2129 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 
...)
- vim 
[stretch] - vim  (Minor issue)
@@ -7472,7 +7473,7 @@ CVE-2022-32569
 CVE-2022-32568
RESERVED
 CVE-2022-32567 (The Appfire Jira Misc Custom Fields (JMCF) app 2.4.6 for 
Atlassian Jir ...)
-   TODO: check
+   NOT-FOR-US: Appfire Jira Misc Custom Fields (JMCF) app
 CVE-2022-32566
RESERVED
 CVE-2022-32565 (An issue was discovered in Couchbase Server before 7.0.4. The 
Backup S ...)
@@ -7926,7 +7927,7 @@ CVE-2022-32443
 CVE-2022-32442 (u5cms version 8.3.5 is vulnerable to Cross Site Scripting 
(XSS). When  ...)
NOT-FOR-US: u5cms
 CVE-2022-32441 (A memory corruption in Hex Rays Ida Pro v6.6 allows attackers 
to cause ...)
-   TODO: check
+   NOT-FOR-US: Hex Rays Ida Pro
 CVE-2022-32440
RESERVED
 CVE-2022-32439
@@ -8218,7 +8219,7 @@ CVE-2022-32297
 CVE-2022-32295 (On Ampere Altra and AltraMax devices before SRP 1.09, the the 
Altra re ...)
NOT-FOR-US: Ampere devices
 CVE-2022-32294 (Zimbra Collaboration Open Source 8.8.15 does not encrypt the 
initial-l ...)
-   TODO: check
+   NOT-FOR-US: Zimbra
 CVE-2022-32293
RESERVED
 CVE-2022-32292
@@ -8491,13 +8492,13 @@ CVE-2022-1986 (OS Command Injection in GitHub 
repository gogs/gogs prior to 0.12
 CVE-2022-32234
RESERVED
 CVE-2022-30943 (Browsing restriction bypass vulnerability in Bulletin of 
Cybozu Garoon ...)
-   TODO: check
+   NOT-FOR-US: Cybozu
 CVE-2022-30602 (Operation restriction bypass in multiple applications of 
Cybozu Garoon ...)
-   TODO: check
+   NOT-FOR-US: Cybozu
 CVE-2022-29926
RESERVED
 CVE-2022-29512 (Exposure of sensitive information to an unauthorized actor 
issue in mu ...)
-   TODO: check
+   NOT-FOR-US: Cybozu
 CVE-2022-1985 (The Download Manager Plugin for WordPress is vulnerable to 
reflected C ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-1984
@@ -9043,7 +9044,7 @@ CVE-2022-32063
 CVE-2022-32062
RESERVED
 CVE-2022-32061 (An arbitrary file upload vulnerability in the Select User 
function und ...)
-   TODO: check
+   - snipe-it  (bug #1005172)
 CVE-2022-32060 (An arbitrary file upload vulnerability in the Update Branding 
Settings ...)
- snipe-it  (bug #1005172)
 CVE-2022-32059



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/6b3e374505c297f9ac83178fa1db2d60f833d287...f71e4e3bd346cb01a2be751d9c51fa5290be7023

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/6b3e374505c297f9ac83178fa1db2d60f833d287...f71e4e3bd346cb01a2be751d9c51fa5290be7023
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] NFU

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6b3e3745 by Moritz Muehlenhoff at 2022-07-11T21:31:19+02:00
NFU

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -49248,9 +49248,7 @@ CVE-2021-43505 (Multiple Cross Site Scripting (XSS) 
vulnerabilities exist in Sso
 CVE-2021-43504
RESERVED
 CVE-2021-43503 (A Remote Code Execution (RCE) vulnerability exists in h 
laravel 5.8.38 ...)
-   - php-laravel-framework 
-   NOTE: 
https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892
-   TODO: check, unclear status of report to upstream
+   NOTE: Disputed Laravel issue
 CVE-2021-43502
RESERVED
 CVE-2021-43501
@@ -126259,10 +126257,8 @@ CVE-2020-26557 (Mesh Provisioning in the Bluetooth 
Mesh profile 1.0 and 1.0.1 ma
NOTE: 
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/predicatable-authvalue/
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1960009
 CVE-2020-26556 (Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 
may perm ...)
-   - bluez 
-   [bullseye] - bluez  (Minor issue)
-   [buster] - bluez  (Minor issue)
-   [stretch] - bluez  (Mesh support introduced later)
+   NOT-FOR-US: Bluetooth
+   NOTE: There's no indication that any Bluetooth software in Debian is 
affected
NOTE: https://kb.cert.org/vuls/id/799380
NOTE: 
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/malleable/
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1960012



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b3e374505c297f9ac83178fa1db2d60f833d287

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b3e374505c297f9ac83178fa1db2d60f833d287
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add mat2 to dsa-needed list

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6a668131 by Salvatore Bonaccorso at 2022-07-11T21:25:30+02:00
Add mat2 to dsa-needed list

- - - - -


1 changed file:

- data/dsa-needed.txt


Changes:

=
data/dsa-needed.txt
=
@@ -34,6 +34,9 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.
 --
+mat2
+  Maintainer is going to prepare updates
+--
 ndpi/oldstable
 --
 netatalk



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6a6681314ebb9750c5678d4c990f71c5a30e95d2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6a6681314ebb9750c5678d4c990f71c5a30e95d2
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] glances fixed in sid

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
03b0e854 by Moritz Muehlenhoff at 2022-07-11T21:20:39+02:00
glances fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -102136,7 +102136,7 @@ CVE-2021-23420 (This affects the package 
codeception/codeception from 4.0.0 and
 CVE-2021-23419 (This affects the package open-graph before 0.2.6. The function 
parse c ...)
NOT-FOR-US: Node open-graph
 CVE-2021-23418 (The package glances before 3.2.1 are vulnerable to XML 
External Entity ...)
-   - glances 
+   - glances 3.2.3.1+dfsg-1
[bullseye] - glances  (Minor issue)
[buster] - glances  (Minor issue)
[stretch] - glances  (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/03b0e85499a9da490d844bf35f86aaeb54f5c9b0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/03b0e85499a9da490d844bf35f86aaeb54f5c9b0
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] python-reportlab fixed in sid

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bca79971 by Moritz Muehlenhoff at 2022-07-11T21:19:27+02:00
python-reportlab fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -119313,13 +119313,12 @@ CVE-2020-28465
 CVE-2020-28464 (This affects the package djv before 2.1.4. By controlling the 
schema f ...)
NOT-FOR-US: Node djv
 CVE-2020-28463 (All versions of package reportlab are vulnerable to 
Server-side Reques ...)
-   - python-reportlab 
-   [bullseye] - python-reportlab  (Minor issue)
+   - python-reportlab 3.5.55-1
[buster] - python-reportlab  (Minor issue)
[stretch] - python-reportlab  (Can be fixed in next DLA)
NOTE: https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145
NOTE: Starting in 3.5.55 trustedSchemes and trustedHosts rl_config 
variables are introduced
-   NOTE: which can be used to mitigate the issue.
+   NOTE: which can be used to mitigate the issue, treating this as the 
fixed version
 CVE-2020-28462
RESERVED
 CVE-2020-28461



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bca79971c11cedd40e6f22da2bc3c594389b8dbf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bca79971c11cedd40e6f22da2bc3c594389b8dbf
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] gnome-shell n/a

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6ce6a58c by Moritz Muehlenhoff at 2022-07-11T21:10:21+02:00
gnome-shell n/a

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -111099,9 +111099,8 @@ CVE-2021-20316
NOTE: https://www.samba.org/samba/security/CVE-2021-20316.html
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14842
 CVE-2021-20315 (A locking protection bypass flaw was found in some versions of 
gnome-s ...)
-   - gnome-shell 
+   - gnome-shell  (Red Hat-specific backport error to CentOS 
8 Streams)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2006285
-   TODO: check, possibly Red Hat specific as issue introduced of 
backporting features to CentOS 8 Streams
 CVE-2021-20314 (Stack buffer overflow in libspf2 versions below 1.2.11 when 
processing ...)
{DSA-4955-1 DLA-2739-1}
- libspf2 1.2.10-7.1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6ce6a58c415d25d1708386b6c525fb5f7abc7825

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6ce6a58c415d25d1708386b6c525fb5f7abc7825
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] two Intel NFUs, there's no actionable information indicating this affects any...

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
083c5cf4 by Moritz Muehlenhoff at 2022-07-11T21:08:58+02:00
two Intel NFUs, theres no actionable information indicating this affects 
any firmware shipped in Debian

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -77390,9 +77390,7 @@ CVE-2021-33157
 CVE-2021-33156
RESERVED
 CVE-2021-33155 (Improper input validation in firmware for some Intel(R) 
Wireless Bluet ...)
-   - firmware-nonfree 
-   NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html
-   TODO: check in which firmware versions fixed
+   NOT-FOR-US: Intel
 CVE-2021-33154
RESERVED
 CVE-2021-33153
@@ -77424,9 +77422,7 @@ CVE-2021-33141
 CVE-2021-33140
RESERVED
 CVE-2021-33139 (Improper conditions check in firmware for some Intel(R) 
Wireless Bluet ...)
-   - firmware-nonfree 
-   NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00604.html
-   TODO: check in which firmware versions fixed
+   NOT-FOR-US: Intel
 CVE-2021-33138
RESERVED
 CVE-2021-33137 (Out-of-bounds write in the Intel(R) Kernelflinger project may 
allow an ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/083c5cf49d4e0f03639f37e449826e2c8d118caa

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/083c5cf49d4e0f03639f37e449826e2c8d118caa
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-35414/qemu

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ed5f50e8 by Salvatore Bonaccorso at 2022-07-11T20:57:43+02:00
Add CVE-2022-35414/qemu

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -423,7 +423,10 @@ CVE-2022-35416 (H3C SSL VPN through 2022-07-10 allows 
wnm/login/login.json svpnl
 CVE-2022-35415
RESERVED
 CVE-2022-35414 (softmmu/physmem.c in QEMU through 7.0.0 can perform an 
uninitialized r ...)
-   TODO: check
+   - qemu 
+   NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1065
+   NOTE: 
https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c
+   NOTE: https://sick.codes/sick-2022-113
 CVE-2022-2366
RESERVED
 CVE-2022-2365 (Cross-site Scripting (XSS) - Stored in GitHub repository 
zadam/trilium ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed5f50e8f6f4fe004cafe6f951159c2ff36b86fd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed5f50e8f6f4fe004cafe6f951159c2ff36b86fd
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Process one NFU

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9ea8b066 by Salvatore Bonaccorso at 2022-07-11T20:53:12+02:00
Process one NFU

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -419,7 +419,7 @@ CVE-2022-35418
 CVE-2022-35417
RESERVED
 CVE-2022-35416 (H3C SSL VPN through 2022-07-10 allows wnm/login/login.json 
svpnlang co ...)
-   TODO: check
+   NOT-FOR-US: H3C SSL VPN
 CVE-2022-35415
RESERVED
 CVE-2022-35414 (softmmu/physmem.c in QEMU through 7.0.0 can perform an 
uninitialized r ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ea8b0660db33fa1819d9219ddaa5b2aa912e326

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ea8b0660db33fa1819d9219ddaa5b2aa912e326
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Track fixed version for CVE-2022-29217/pyjwt via unstable

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8133f0cb by Salvatore Bonaccorso at 2022-07-11T20:51:16+02:00
Track fixed version for CVE-2022-29217/pyjwt via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -17369,7 +17369,7 @@ CVE-2022-29219 (Lodestar is a TypeScript implementation 
of the Ethereum Consensu
 CVE-2022-29218 (RubyGems is a package registry used to supply software for the 
Ruby la ...)
NOT-FOR-US: rubygems/rubygems.org
 CVE-2022-29217 (PyJWT is a Python implementation of RFC 7519. PyJWT supports 
multiple  ...)
-   - pyjwt  (bug #1011747)
+   - pyjwt 2.4.0-1 (bug #1011747)
[bullseye] - pyjwt  (Vulnerable code not present)
[buster] - pyjwt  (Vulnerable code not present)
[stretch] - pyjwt  (Vulnerable code not present)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8133f0cbee3aaf8516925d999834d9e706825212

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8133f0cbee3aaf8516925d999834d9e706825212
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bugnums

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1780cc4c by Moritz Muehlenhoff at 2022-07-11T20:39:36+02:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -30237,7 +30237,7 @@ CVE-2022-24760 (Parse Server is an open source http web 
server backend. In versi
 CVE-2022-24759 (`@chainsafe/libp2p-noise` contains TypeScript implementation 
of noise  ...)
NOT-FOR-US: chainsafe/libp2p-noise
 CVE-2022-24758 (The Jupyter notebook is a web-based notebook environment for 
interacti ...)
-   - jupyter-notebook 
+   - jupyter-notebook  (bug #1014771)
[bullseye] - jupyter-notebook  (Minor issue)
[buster] - jupyter-notebook  (Minor issue)
NOTE: 
https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55
@@ -33212,7 +33212,7 @@ CVE-2021-4214
NOTE: Crash in CLI package, not shipped in binary packages
 CVE-2021-4213
RESERVED
-   - jss 
+   - jss  (bug #1014770)
[bullseye] - jss  (Minor issue)
[buster] - jss  (Minor issue)
[stretch] - jss  (revisit when/if fix is complete)
@@ -67765,14 +67765,14 @@ CVE-2021-37139
 CVE-2021-37138
RESERVED
 CVE-2021-37137 (The Snappy frame decoder function doesn't restrict the chunk 
length wh ...)
-   - netty 
+   - netty  (bug #1014769)
[bullseye] - netty  (Minor issue)
[buster] - netty  (Minor issue)
[stretch] - netty  (Minor issue)
NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363
NOTE: Fixed by: 
https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f 
(netty-4.1.68.Final)
 CVE-2021-37136 (The Bzip2 decompression decoder function doesn't allow setting 
size re ...)
-   - netty 
+   - netty  (bug #1014769)
[bullseye] - netty  (Minor issue)
[buster] - netty  (Minor issue)
[stretch] - netty  (Minor issue)
@@ -93278,7 +93278,7 @@ CVE-2021-27027 (An Out-Of-Bounds Read Vulnerability in 
Autodesk FBX Review versi
 CVE-2021-27026 (A flaw was divered in Puppet Enterprise and other Puppet 
products wher ...)
NOT-FOR-US: Puppet Enterprise
 CVE-2021-27025 (A flaw was discovered in Puppet Agent where the agent may 
silently ign ...)
-   - puppet 
+   - puppet  (bug #1014772)
[bullseye] - puppet  (Minor issue, too intrusive to backport)
[buster] - puppet  (Minor issue, too intrusive to backport)
[stretch] - puppet  (Minor issue, too intrusive to backport)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1780cc4c8cdff45f3736b49b901620c67515f4ae

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1780cc4c8cdff45f3736b49b901620c67515f4ae
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] two mxml non issues

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6b37e26e by Moritz Muehlenhoff at 2022-07-11T20:28:04+02:00
two mxml non issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -46520,6 +46520,7 @@ CVE-2021-3979 [ceph: Ceph volume does not honour 
osd_dmcrypt_key_size]
[buster] - ceph  (Minor issue)
[stretch] - ceph  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/11/5
+   NOTE: 
https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656
 CVE-2021-44034
RESERVED
 CVE-2021-44033 (In Ionic Identity Vault before 5.0.5, the protection mechanism 
for inv ...)
@@ -51876,13 +51877,9 @@ CVE-2021-42862
 CVE-2021-42861
RESERVED
 CVE-2021-42860 (** DISPUTED ** A stack buffer overflow exists in Mini-XML 
v3.2. When i ...)
-   - mxml 
-   NOTE: https://github.com/michaelrsweet/mxml/issues/286
-   TODO: check, unclear details from reporter and upstream cannot 
reproduce on current master
+   NOTE: Disputed mxml issue
 CVE-2021-42859 (** DISPUTED ** A memory leak issue was discovered in Mini-XML 
v3.2 tha ...)
-   - mxml 
-   NOTE: https://github.com/michaelrsweet/mxml/issues/286
-   TODO: check, unclear details from reporter and upstream cannot 
reproduce on current master
+   NOTE: Disputed mxml issue
 CVE-2021-42858
RESERVED
 CVE-2021-42857 (It was discovered that the SteelCentral AppInternals Dynamic 
Sampling  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b37e26e3a1574924e022e2f41a154445b0d253c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b37e26e3a1574924e022e2f41a154445b0d253c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bugnums

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0865458b by Moritz Muehlenhoff at 2022-07-11T20:23:13+02:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -933,7 +933,7 @@ CVE-2022-2311
 CVE-2022-2310
RESERVED
 CVE-2022-2309 (NULL Pointer Dereference allows attackers to cause a denial of 
service ...)
-   - lxml 
+   - lxml  (bug #1014766)
[bullseye] - lxml  (Minor issue)
[buster] - lxml  (Minor issue)
NOTE: https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba/
@@ -2762,7 +2762,7 @@ CVE-2022-2211 [Buffer overflow in get_keys leads to Dos]
- libguestfs 1:1.46.2-1
[bullseye] - libguestfs  (Minor issue)
[buster] - libguestfs  (Minor issue)
-   - guestfs-tools 
+   - guestfs-tools  (bug #1014764)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2100862
NOTE: In 1:1.46.2-1 of src:libguestfs the tools were split out to 
src:guestfs-tools, marking that as fixed version
NOTE: 
https://listman.redhat.com/archives/libguestfs/2022-June/029274.html
@@ -31958,7 +31958,7 @@ CVE-2022-0432 (Prototype Pollution in GitHub repository 
mastodon/mastodon prior
 CVE-2022-0431 (The Insights from Google PageSpeed WordPress plugin before 
4.0.4 does  ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-0430 (Exposure of Sensitive Information to an Unauthorized Actor in 
GitHub r ...)
-   - httpie 
+   - httpie  (bug #1014765)
[bullseye] - httpie  (Minor issue)
[buster] - httpie  (Minor issue)
[stretch] - httpie  (Minor issue)
@@ -60301,7 +60301,7 @@ CVE-2021-3739 (A NULL pointer dereference flaw was 
found in the btrfs_rm_device
NOTE: https://www.openwall.com/lists/oss-security/2021/08/25/3
 CVE-2021-3735 [ahci: deadlock issue leads to denial of service]
RESERVED
-   - qemu 
+   - qemu  (bug #1014767)
[bullseye] - qemu  (Minor issue)
[buster] - qemu  (Minor issue)
[stretch] - qemu  (Fix along with a future DLA)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0865458b5413b5d3ab00bb418841adf9b4e35a8d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0865458b5413b5d3ab00bb418841adf9b4e35a8d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] slic3r non issues

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b0fb7d5b by Moritz Muehlenhoff at 2022-07-11T20:05:34+02:00
slic3r non issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -40212,13 +40212,15 @@ CVE-2021-45849
 CVE-2021-45848 (Denial of service (DoS) vulnerability in Nicotine+ 3.0.3 and 
later all ...)
- nicotine-plus  (bug #966000)
 CVE-2021-45847 (Several missing input validations in the 3MF parser component 
of Slic3 ...)
-   - slic3r 
+   - slic3r  (unimportant)
NOTE: https://github.com/slic3r/Slic3r/issues/5118
NOTE: https://github.com/slic3r/Slic3r/issues/5119
NOTE: https://github.com/slic3r/Slic3r/issues/5120
+   NOTE: Crash in GUI tool, no security impact
 CVE-2021-45846 (A flaw in the AMF parser of Slic3r libslic3r 1.3.0 allows an 
attacker  ...)
-   - slic3r 
+   - slic3r  (unimportant)
NOTE: https://github.com/slic3r/Slic3r/issues/5117
+   NOTE: Crash in GUI tool, no security impact
 CVE-2021-45845 (The Path Sanity Check script of FreeCAD 0.19 is vulnerable to 
OS comma ...)
- freecad 0.19.4+dfsg1-1
[stretch] - freecad  (Vulnerable code introduced in 0.17)
@@ -43482,13 +43484,13 @@ CVE-2021-44964 (Use after free in garbage collector 
and finalizer of lgc.c in Lu
 CVE-2021-44963
RESERVED
 CVE-2021-44962 (An out-of-bounds read vulnerability exists in the 
GCode::extrude() fun ...)
-   - slic3r 
+   - slic3r  (unimportant)
NOTE: https://hackmd.io/KSI1bwGfSyO7T8UCf0HeTw
-   TODO: check upstream fix
+   NOTE: Crash in GUI tool, no security impact
 CVE-2021-44961 (A memory leakage flaw exists in the class PerimeterGenerator 
of Slic3r ...)
-   - slic3r 
+   - slic3r  (unimportant)
NOTE: https://hackmd.io/nDT_UKLyRQendxDwil9A4w
-   TODO: check upstream commit
+   NOTE: memory overusage in GUI tool, no security impact
 CVE-2021-44960 (In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot 
function in the ...)
- svgpp  (bug #1014599)
[bullseye] - svgpp  (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0fb7d5be622ad4f8f8fea62f72d8d7c1c5eb467

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0fb7d5be622ad4f8f8fea62f72d8d7c1c5eb467
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] gdal fixed in sid

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0a3f1079 by Moritz Muehlenhoff at 2022-07-11T19:55:11+02:00
gdal fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -39650,7 +39650,7 @@ CVE-2021-45944 (Ghostscript GhostPDL 9.50 through 
9.53.3 has a use-after-free in
 CVE-2021-45943 (GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in 
PCIDSK::C ...)
{DLA-2877-1}
[experimental] - gdal 3.4.1~rc1+dfsg-1~exp1
-   - gdal 
+   - gdal 3.4.1+dfsg-1
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41993
NOTE: https://github.com/OSGeo/gdal/pull/4944
NOTE: 
https://github.com/OSGeo/gdal/commit/93913a849dc1d217a40dbf9d6e6a3a23c42b61a6 
(master)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a3f1079447b8d7f99443649bca3545e2a216d38

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a3f1079447b8d7f99443649bca3545e2a216d38
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] libbpf fixed in sid

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
caf8187f by Moritz Muehlenhoff at 2022-07-11T19:54:35+02:00
libbpf fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -39666,15 +39666,23 @@ CVE-2021-45942 (OpenEXR 3.1.x before 3.1.4 has a 
heap-based buffer overflow in I
NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1209
NOTE: 
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
 CVE-2021-45941 (libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 
bytes) in _ ...)
-   - libbpf 
+   - libbpf 0.7.0-2
+   [bullseye] - libbpf  (No actionable information, revisit 
when/if more details available)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957
NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml
-   TODO: check details on fixing commit upstream, furthermore intorducing 
commit is only when oss-fuzz started
+   NOTE: Fixed in 0.7.0 upstream per identified range of commits
+   NOTE: It's unclear if 0.3 is affected, the introducing commit presented 
by oss-fuzz is misleading
+   NOTE: since that refers to the first version when oss-fuzz started to 
test libbpf. If anyone confirms
+   NOTE: via bisecting that 0.3.0 is affected, this can be revisited
 CVE-2021-45940 (libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 
bytes) in _ ...)
-   - libbpf 
+   - libbpf 0.7.0-2
+   [bullseye] - libbpf  (No actionable information, revisit 
when/if more details available)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868
NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1562.yaml
-   TODO: check details on fixing commit upstream, furthermore intorducing 
commit is only when oss-fuzz started
+   NOTE: Fixed in 0.7.0 upstream per identified range of commits
+   NOTE: It's unclear if 0.3 is affected, the introducing commit presented 
by oss-fuzz is misleading
+   NOTE: since that refers to the first version when oss-fuzz started to 
test libbpf. If anyone confirms
+   NOTE: via bisecting that 0.3.0 is affected, this can be revisited
 CVE-2021-45939 (wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in 
MqttClient_De ...)
NOT-FOR-US: uWebSockets
 CVE-2021-45938 (wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in 
MqttClient_De ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/caf8187f8a7db3d457c1caf4785be7ae0d8bf908

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/caf8187f8a7db3d457c1caf4785be7ae0d8bf908
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] chromium DSA

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
38525ad2 by Moritz Mühlenhoff at 2022-07-11T19:40:52+02:00
chromium DSA

- - - - -


2 changed files:

- data/DSA/list
- data/dsa-needed.txt


Changes:

=
data/DSA/list
=
@@ -1,3 +1,6 @@
+[11 Jul 2022] DSA-5180-1 chromium - security update
+   {CVE-2022-2294 CVE-2022-2295 CVE-2022-2296}
+   [bullseye] - chromium 103.0.5060.114-1~deb11u1
 [08 Jul 2022] DSA-5179-1 php7.4 - security update
{CVE-2022-31625 CVE-2022-31626}
[bullseye] - php7.4 7.4.30-1+deb11u1


=
data/dsa-needed.txt
=
@@ -14,8 +14,6 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 asterisk
 --
-chromium (jmm)
---
 curl (apo)
 --
 epiphany-browser



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/38525ad2d9b89584197040ea159aa8caffaeb68f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/38525ad2d9b89584197040ea159aa8caffaeb68f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
95af1295 by Moritz Muehlenhoff at 2022-07-11T14:31:35+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -698,9 +698,10 @@ CVE-2022-33939
 CVE-2022-2346
RESERVED
 CVE-2022-2345 (Use After Free in GitHub repository vim/vim prior to 9.0.0046. 
...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
NOTE: 
https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea 
(v9.0.0047)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2344 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0.0 ...)
- vim  (unimportant)
NOTE: https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
@@ -17369,6 +17370,8 @@ CVE-2022-29218 (RubyGems is a package registry used to 
supply software for the R
NOT-FOR-US: rubygems/rubygems.org
 CVE-2022-29217 (PyJWT is a Python implementation of RFC 7519. PyJWT supports 
multiple  ...)
- pyjwt  (bug #1011747)
+   [bullseye] - pyjwt  (Vulnerable code not present)
+   [buster] - pyjwt  (Vulnerable code not present)
[stretch] - pyjwt  (Vulnerable code not present)
NOTE: 
https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24
NOTE: 
https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc
 (2.4.0)
@@ -51853,6 +51856,7 @@ CVE-2021-42864
RESERVED
 CVE-2021-42863 (A buffer overflow in 
ecma_builtin_typedarray_prototype_filter() in Jer ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4793
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4794
@@ -89411,6 +89415,8 @@ CVE-2021-3448 (A flaw was found in dnsmasq in versions 
before 2.85. When configu
NOTE: 
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
 CVE-2021-3447 (A flaw was found in several ansible modules, where parameters 
containi ...)
- ansible  (bug #1014721)
+   [bullseye] - ansible  (Minor issue)
+   [buster] - ansible  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1939349
 CVE-2021-3446 (A flaw was found in libtpms in versions before 0.8.2. The 
commonly use ...)
- libtpms 0.8.2-1 (bug #986799)
@@ -223002,6 +223008,8 @@ CVE-2019-9837 (Doorkeeper::OpenidConnect (aka the 
OpenID Connect extension for D
NOTE: 
https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66
 CVE-2019-9836 (Secure Encrypted Virtualization (SEV) on Advanced Micro Devices 
(AMD)  ...)
- amd64-microcode 3.20220411.1 (bug #970395)
+   [bullseye] - amd64-microcode  (Minor issue)
+   [buster] - amd64-microcode  (Minor issue)
NOTE: https://seclists.org/fulldisclosure/2019/Jun/46
 CVE-2019-9835 (The receiver (aka bridge) component of Fujitsu Wireless 
Keyboard Set L ...)
NOT-FOR-US: Fujitsu Wireless Keyboard Set LX901 GK900 devices



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95af129517bafdc93b341e034302398063884e67

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95af129517bafdc93b341e034302398063884e67
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] two xen issues only for src:linux

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ff972746 by Moritz Muehlenhoff at 2022-07-11T14:01:07+02:00
two xen issues only for src:linux

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -4913,15 +4913,9 @@ CVE-2022-33745
RESERVED
 CVE-2022-33744 (Arm guests can cause Dom0 DoS via PV devices When mapping 
pages of gue ...)
- linux 
-   - xen 
-   [buster] - xen  (DSA 4677-1)
-   [stretch] - xen  (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-406.html
 CVE-2022-33743 (network backend may cause Linux netfront to use freed SKBs 
While addin ...)
- linux 
-   - xen 
-   [buster] - xen  (DSA 4677-1)
-   [stretch] - xen  (DSA 4602-1)
NOTE: https://xenbits.xen.org/xsa/advisory-405.html
 CVE-2022-33742 (Linux disk/nic frontends data leaks T[his CNA information 
record relat ...)
- linux 



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff9727469d89e076257b2edf706b3bd610a85912

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ff9727469d89e076257b2edf706b3bd610a85912
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] nodejs updates

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3a10a9dc by Moritz Muehlenhoff at 2022-07-11T13:58:18+02:00
nodejs updates

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -8538,9 +8538,9 @@ CVE-2022-32223
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dll-hijacking-on-windows-high-cve-2022-32223
 CVE-2022-3
RESERVED
-   - nodejs 
+   - nodejs  (Specific to Node 18 and nodejs-distributed 
binaries)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#attempt-to-read-openssl-cnf-from-home-iojs-build-upon-startup-medium-cve-2022-3
-   TODO: check if there affects Debian builds
+   NOTE: 
https://github.com/nodejs/node/commit/a5fc2deb43f85dc2195a1fe1683b9c2e7443b001
 CVE-2022-32221
RESERVED
 CVE-2022-32220
@@ -8558,20 +8558,28 @@ CVE-2022-32215 [HTTP Request Smuggling - Incorrect 
Parsing of Multi-line Transfe
- nodejs 
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-incorrect-parsing-of-multi-line-transfer-encoding-medium-cve-2022-32215
+   NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
+   NOTE: 
https://github.com/nodejs/node/commit/d9b71f4c241fa31cc2a48331a4fc28c15937875a 
(main)
 CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
RESERVED
- nodejs 
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-improper-delimiting-of-header-fields-medium-cve-2022-32214
+   NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
+   NOTE: 
https://github.com/nodejs/node/commit/d9b71f4c241fa31cc2a48331a4fc28c15937875a 
(main)
 CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
RESERVED
- nodejs 
- llhttp  (bug #977716)
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
+   NOTE: 
https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd 
(v14.x)
+   NOTE: 
https://github.com/nodejs/node/commit/d9b71f4c241fa31cc2a48331a4fc28c15937875a 
(main)
 CVE-2022-32212
RESERVED
- nodejs 
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-ip-addresses-high-cve-2022-32212
+   NOTE: 
https://github.com/nodejs/node/commit/48c5aa5cab718d04473fa2761d532657c84b8131 
(v14.x)
+   NOTE: 
https://github.com/nodejs/node/commit/1aa5036c31ac2a9b2a2528af454675ad412f1464 
(main)
 CVE-2022-32211
RESERVED
 CVE-2022-32210


=
data/dsa-needed.txt
=
@@ -41,6 +41,8 @@ ndpi/oldstable
 netatalk
   open regression with MacOS, tentative patch not yet merged upstream
 --
+nodejs/stable
+--
 nodejs/oldstable
   one of the upstream fixes doesn't address the security issue 
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3a10a9dc7672ca8ea108dfd7258fa8b4938a1eba

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3a10a9dc7672ca8ea108dfd7258fa8b4938a1eba
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] libsdl2 fixed in sid

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ceb3b319 by Moritz Muehlenhoff at 2022-07-11T13:33:35+02:00
libsdl2 fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -76074,7 +76074,7 @@ CVE-2021-33659 (SAP 3D Visual Enterprise Viewer, 
version - 9, allows a user to o
 CVE-2021-33658 (atune before 0.3-0.8 log in as a local user and run the curl 
command t ...)
NOT-FOR-US: A-Tune OS tuning engine
 CVE-2021-33657 (There is a heap overflow problem in video/SDL_pixels.c in SDL 
(Simple  ...)
-   - libsdl1.2  (bug #1014577)
+   - libsdl1.2 1.2.15+dfsg2-7 (bug #1014577)
[bullseye] - libsdl1.2  (Minor issue)
[buster] - libsdl1.2  (Minor issue)
[stretch] - libsdl1.2  (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ceb3b31904c76bf0625e84fede297affafce0528

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ceb3b31904c76bf0625e84fede297affafce0528
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-32222 and mark it undetermined with a TODO

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5942bb5c by Salvatore Bonaccorso at 2022-07-11T11:13:22+02:00
Add CVE-2022-3 and mark it undetermined with a TODO

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8538,6 +8538,9 @@ CVE-2022-32223
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dll-hijacking-on-windows-high-cve-2022-32223
 CVE-2022-3
RESERVED
+   - nodejs 
+   NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#attempt-to-read-openssl-cnf-from-home-iojs-build-upon-startup-medium-cve-2022-3
+   TODO: check if there affects Debian builds
 CVE-2022-32221
RESERVED
 CVE-2022-32220



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5942bb5c4e7078cd7d01a0d678620e94e6ee8459

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5942bb5c4e7078cd7d01a0d678620e94e6ee8459
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-32223/nodejs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8cd053f1 by Salvatore Bonaccorso at 2022-07-11T11:11:42+02:00
Add CVE-2022-32223/nodejs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8534,6 +8534,8 @@ CVE-2022-32224
RESERVED
 CVE-2022-32223
RESERVED
+   - nodejs  (Only affects Windows)
+   NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dll-hijacking-on-windows-high-cve-2022-32223
 CVE-2022-3
RESERVED
 CVE-2022-32221



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8cd053f1b27ef8c8a3cfedceda86a14cd7c6fc01

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8cd053f1b27ef8c8a3cfedceda86a14cd7c6fc01
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-32212/nodejs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c9720fc0 by Salvatore Bonaccorso at 2022-07-11T11:09:57+02:00
Add CVE-2022-32212/nodejs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8565,6 +8565,8 @@ CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing 
of Transfer-Encoding]
NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
 CVE-2022-32212
RESERVED
+   - nodejs 
+   NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-ip-addresses-high-cve-2022-32212
 CVE-2022-32211
RESERVED
 CVE-2022-32210



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c9720fc036fc466c7e46a756a060ac8fc76886d7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c9720fc036fc466c7e46a756a060ac8fc76886d7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-32215/nodejs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cfacd2c8 by Salvatore Bonaccorso at 2022-07-11T11:08:21+02:00
Add CVE-2022-32215/nodejs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8548,8 +8548,11 @@ CVE-2022-32217
RESERVED
 CVE-2022-32216
RESERVED
-CVE-2022-32215
+CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line 
Transfer-Encoding]
RESERVED
+   - nodejs 
+   - llhttp  (bug #977716)
+   NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-incorrect-parsing-of-multi-line-transfer-encoding-medium-cve-2022-32215
 CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
RESERVED
- nodejs 



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfacd2c84a29b9891b59288d2ce62350b21d0fef

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfacd2c84a29b9891b59288d2ce62350b21d0fef
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] Add CVE-2022-32214/nodejs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
13ac10c7 by Salvatore Bonaccorso at 2022-07-11T10:10:58+02:00
Add CVE-2022-32214/nodejs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8550,8 +8550,11 @@ CVE-2022-32216
RESERVED
 CVE-2022-32215
RESERVED
-CVE-2022-32214
+CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
RESERVED
+   - nodejs 
+   - llhttp  (bug #977716)
+   NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-improper-delimiting-of-header-fields-medium-cve-2022-32214
 CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
RESERVED
- nodejs 



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/13ac10c7dd2cc045bf5977cb0cff1011c1921ba9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/13ac10c7dd2cc045bf5977cb0cff1011c1921ba9
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] automatic update

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f77f5a2e by security tracker role at 2022-07-11T08:10:15+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,433 @@
+CVE-2022-35626
+   RESERVED
+CVE-2022-35625
+   RESERVED
+CVE-2022-35624
+   RESERVED
+CVE-2022-35623
+   RESERVED
+CVE-2022-35622
+   RESERVED
+CVE-2022-35621
+   RESERVED
+CVE-2022-35620
+   RESERVED
+CVE-2022-35619
+   RESERVED
+CVE-2022-35618
+   RESERVED
+CVE-2022-35617
+   RESERVED
+CVE-2022-35616
+   RESERVED
+CVE-2022-35615
+   RESERVED
+CVE-2022-35614
+   RESERVED
+CVE-2022-35613
+   RESERVED
+CVE-2022-35612
+   RESERVED
+CVE-2022-35611
+   RESERVED
+CVE-2022-35610
+   RESERVED
+CVE-2022-35609
+   RESERVED
+CVE-2022-35608
+   RESERVED
+CVE-2022-35607
+   RESERVED
+CVE-2022-35606
+   RESERVED
+CVE-2022-35605
+   RESERVED
+CVE-2022-35604
+   RESERVED
+CVE-2022-35603
+   RESERVED
+CVE-2022-35602
+   RESERVED
+CVE-2022-35601
+   RESERVED
+CVE-2022-35600
+   RESERVED
+CVE-2022-35599
+   RESERVED
+CVE-2022-35598
+   RESERVED
+CVE-2022-35597
+   RESERVED
+CVE-2022-35596
+   RESERVED
+CVE-2022-35595
+   RESERVED
+CVE-2022-35594
+   RESERVED
+CVE-2022-35593
+   RESERVED
+CVE-2022-35592
+   RESERVED
+CVE-2022-35591
+   RESERVED
+CVE-2022-35590
+   RESERVED
+CVE-2022-35589
+   RESERVED
+CVE-2022-35588
+   RESERVED
+CVE-2022-35587
+   RESERVED
+CVE-2022-35586
+   RESERVED
+CVE-2022-35585
+   RESERVED
+CVE-2022-35584
+   RESERVED
+CVE-2022-35583
+   RESERVED
+CVE-2022-35582
+   RESERVED
+CVE-2022-35581
+   RESERVED
+CVE-2022-35580
+   RESERVED
+CVE-2022-35579
+   RESERVED
+CVE-2022-35578
+   RESERVED
+CVE-2022-35577
+   RESERVED
+CVE-2022-35576
+   RESERVED
+CVE-2022-35575
+   RESERVED
+CVE-2022-35574
+   RESERVED
+CVE-2022-35573
+   RESERVED
+CVE-2022-35572
+   RESERVED
+CVE-2022-35571
+   RESERVED
+CVE-2022-35570
+   RESERVED
+CVE-2022-35569
+   RESERVED
+CVE-2022-35568
+   RESERVED
+CVE-2022-35567
+   RESERVED
+CVE-2022-35566
+   RESERVED
+CVE-2022-35565
+   RESERVED
+CVE-2022-35564
+   RESERVED
+CVE-2022-35563
+   RESERVED
+CVE-2022-35562
+   RESERVED
+CVE-2022-35561
+   RESERVED
+CVE-2022-35560
+   RESERVED
+CVE-2022-35559
+   RESERVED
+CVE-2022-35558
+   RESERVED
+CVE-2022-35557
+   RESERVED
+CVE-2022-35556
+   RESERVED
+CVE-2022-3
+   RESERVED
+CVE-2022-35554
+   RESERVED
+CVE-2022-35553
+   RESERVED
+CVE-2022-35552
+   RESERVED
+CVE-2022-35551
+   RESERVED
+CVE-2022-35550
+   RESERVED
+CVE-2022-35549
+   RESERVED
+CVE-2022-35548
+   RESERVED
+CVE-2022-35547
+   RESERVED
+CVE-2022-35546
+   RESERVED
+CVE-2022-35545
+   RESERVED
+CVE-2022-35544
+   RESERVED
+CVE-2022-35543
+   RESERVED
+CVE-2022-35542
+   RESERVED
+CVE-2022-35541
+   RESERVED
+CVE-2022-35540
+   RESERVED
+CVE-2022-35539
+   RESERVED
+CVE-2022-35538
+   RESERVED
+CVE-2022-35537
+   RESERVED
+CVE-2022-35536
+   RESERVED
+CVE-2022-35535
+   RESERVED
+CVE-2022-35534
+   RESERVED
+CVE-2022-35533
+   RESERVED
+CVE-2022-35532
+   RESERVED
+CVE-2022-35531
+   RESERVED
+CVE-2022-35530
+   RESERVED
+CVE-2022-35529
+   RESERVED
+CVE-2022-35528
+   RESERVED
+CVE-2022-35527
+   RESERVED
+CVE-2022-35526
+   RESERVED
+CVE-2022-35525
+   RESERVED
+CVE-2022-35524
+   RESERVED
+CVE-2022-35523
+   RESERVED
+CVE-2022-35522
+   RESERVED
+CVE-2022-35521
+   RESERVED
+CVE-2022-35520
+   RESERVED
+CVE-2022-35519
+   RESERVED
+CVE-2022-35518
+   RESERVED
+CVE-2022-35517
+   RESERVED
+CVE-2022-35516
+   RESERVED
+CVE-2022-35515
+   RESERVED
+CVE-2022-35514
+   RESERVED
+CVE-2022-35513
+   RESERVED
+CVE-2022-35512
+   RESERVED
+CVE-2022-35511
+   RESERVED
+CVE-2022-35510
+   RESERVED
+CVE-2022-35509
+   RESERVED
+CVE-2022-35508
+   RESERVED
+CVE-2022-35507
+   RESERVED
+CVE-2022-35506
+   RESERVED
+CVE-2022-35505
+   RESERVED
+CVE-2022-35504
+   RESERVED
+CVE-2022-35503
+   RESERVED
+CVE-2022-35502
+   RESERVED
+CVE-2022-35501
+   RESERVED
+CVE-2022-35500
+   RESERVED
+CVE-2022-35499
+   RESERVED
+CVE-2022-35498
+   RESERVED
+CVE-2022-35497
+   RESERVED
+CVE-2022-35496
+   RESERVED
+CVE-2022-35495
+   RESERVED
+CVE-2022-35494
+   RESERVED
+CVE-2022-35493
+   RESERVED
+CVE-2022-35492
+   RESERVED
+CVE-2022-35491
+   RESERVED
+CVE-2022-35490
+   RESERVED
+CVE-2022-35489
+   RESERVED
+CVE-2022-35488
+   RESERVED
+CVE-2022-35487
+   RESERVED
+CVE-2022-35486
+   

[Git][security-tracker-team/security-tracker][master] Add CVE-2022-32213/nodejs

2022-07-11 Thread Salvatore Bonaccorso (@carnil)


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1c40daa0 by Salvatore Bonaccorso at 2022-07-11T10:09:41+02:00
Add CVE-2022-32213/nodejs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8122,8 +8122,11 @@ CVE-2022-32215
RESERVED
 CVE-2022-32214
RESERVED
-CVE-2022-32213
+CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
RESERVED
+   - nodejs 
+   - llhttp  (bug #977716)
+   NOTE: 
https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
 CVE-2022-32212
RESERVED
 CVE-2022-32211



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1c40daa0ef412f820c9ccd0323adb86a83e3ec18

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1c40daa0ef412f820c9ccd0323adb86a83e3ec18
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits