[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2023-06-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
67a2c04a by Moritz Muehlenhoff at 2023-06-11T15:12:02+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -936,6 +936,8 @@ CVE-2023-32310 (DataEase is an open source data 
visualization and analysis tool.
NOT-FOR-US: DataEase
 CVE-2023-32181 (A Buffer Copy without Checking Size of Input ('Classic Buffer 
Overflow ...)
- libeconf 
+   [bookworm] - libeconf  (Minor issue)
+   [bullseye] - libeconf  (Minor issue)
NOTE: https://github.com/openSUSE/libeconf/issues/178
NOTE: 
https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19
 (v0.5.2)
 CVE-2015-10109 (A vulnerability was found in Video Playlist and Gallery Plugin 
up to 1 ...)
@@ -8720,6 +8722,7 @@ CVE-2023-1907
RESERVED
 CVE-2023-1906 (A heap-based buffer overflow issue was discovered in 
ImageMagick's Imp ...)
- imagemagick  (bug #1034373)
+   [bookworm] - imagemagick  (Minor issue)
[bullseye] - imagemagick  (Minor issue)
[buster] - imagemagick  (Minor issue)
NOTE: 
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247
@@ -29750,6 +29753,8 @@ CVE-2023-22665 (There is insufficient checking of user 
queries in Apache Jena ve
NOTE: https://lists.apache.org/thread/s0dmpsxcwqs57l4qfs415klkgmhdxq7s
 CVE-2023-22652 (A Buffer Copy without Checking Size of Input ('Classic Buffer 
Overflow ...)
- libeconf 
+   [bookworm] - libeconf  (Minor issue)
+   [bullseye] - libeconf  (Minor issue)
NOTE: https://github.com/openSUSE/libeconf/issues/177
NOTE: 
https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19
 (v0.5.2)
 CVE-2023-22651 (Improper Privilege Management vulnerability in SUSE Rancher 
allows Pri ...)


=
data/dsa-needed.txt
=
@@ -35,6 +35,10 @@ openjdk-17 (jmm)
 --
 owslib/oldstable (aron)
 --
+php7.4/oldstable (jmm)
+--
+php8.2/stable (jmm)
+--
 php-cas/oldstable
 --
 php-horde-mime-viewer/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a2c04a691b655c0adf440e6af8e840417215cd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a2c04a691b655c0adf440e6af8e840417215cd
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-31 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
60de9787 by Moritz Muehlenhoff at 2022-07-31T23:08:48+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8491,6 +8491,7 @@ CVE-2022-33746
RESERVED
 CVE-2022-33745 (insufficient TLB flush for x86 PV guests in shadow mode For 
migration  ...)
- xen 
+   [bullseye] - xen  (Minor issue, include in next security 
round)
[buster] - xen  (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-408.html
NOTE: All versions of Xen with the XSA-401 fixes applied are vulnerable
@@ -30472,6 +30473,7 @@ CVE-2022-25859
RESERVED
 CVE-2022-25858 (The package terser before 4.8.1, from 5.0.0 and before 5.14.2 
are vuln ...)
- node-terser 4.8.1-1
+   [bullseye] - node-terser  (Minor issue)
NOTE: https://snyk.io/vuln/SNYK-JS-TERSER-2806366
NOTE: 
https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b
 (v5.14.2)
NOTE: 
https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012
 (v4.8.1)
@@ -42808,6 +42810,8 @@ CVE-2022-0085 (Server-Side Request Forgery (SSRF) in 
GitHub repository dompdf/do
 CVE-2022-0084
RESERVED
- jboss-xnio  (bug #1013280)
+   [bullseye] - jboss-xnio  (Minor issue)
+   [buster] - jboss-xnio  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2064226
 CVE-2021-46129
RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/60de9787728bcc3187f4a415516ec02954813c0b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/60de9787728bcc3187f4a415516ec02954813c0b
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-29 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a139145a by Moritz Muehlenhoff at 2022-07-30T00:13:58+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -15058,6 +15058,8 @@ CVE-2022-31161 (Roxy-WI is a Web interface for managing 
HAProxy, Nginx and Keepa
NOT-FOR-US: Roxy-WI
 CVE-2022-31160 (jQuery UI is a curated set of user interface interactions, 
effects, wi ...)
- jqueryui 1.13.2+dfsg-1 (bug #1015982)
+   [bullseye] - jqueryui  (Minor issue)
+   [buster] - jqueryui  (Minor issue)
NOTE: 
https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
NOTE: 
https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
 CVE-2022-31159 (The AWS SDK for Java enables Java developers to work with 
Amazon Web S ...)
@@ -31087,6 +31089,8 @@ CVE-2022-21209 (The affected product is vulnerable to 
an out-of-bounds read whil
 CVE-2022-0730 (Under certain ldap conditions, Cacti authentication can be 
bypassed wi ...)
{DLA-2965-1}
- cacti 1.2.20+ds1-1 (bug #1008693)
+   [bullseye] - cacti  (Minor issue)
+   [buster] - cacti  (Minor issue)
NOTE: https://github.com/Cacti/cacti/issues/4562
NOTE: 
https://github.com/Cacti/cacti/commit/1386bdbf7f845a32e24ac9415f3ebb7932e77fe7 
(1.2.x)
NOTE: 
https://github.com/Cacti/cacti/commit/8694bf28edad723585915a97b95fbf5b1816a02b 
(1.2.x)


=
data/dsa-needed.txt
=
@@ -30,6 +30,8 @@ kopanocore/oldstable
 --
 librecad
 --
+libtirpc
+--
 libpgjava (apo)
   NOTE: 20220711: libscram-java is missing in bullseye-security. I am currently
   NOTE: 20220711: waiting for #1014409 being resolved.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a139145aba34b85245fb20b1000f3ce8f98dfea1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a139145aba34b85245fb20b1000f3ce8f98dfea1
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-18 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
715d948a by Moritz Muehlenhoff at 2022-07-18T14:14:04+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -23082,6 +23082,8 @@ CVE-2022-26423
RESERVED
 CVE-2022-1071 (User after free in mrb_vm_exec in GitHub repository mruby/mruby 
prior  ...)
- mruby  (bug #1014968)
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
NOTE: https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3
NOTE: 
https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f
 CVE-2022-1070
@@ -57857,9 +57859,13 @@ CVE-2021-41684
RESERVED
 CVE-2021-41683 (There is a stack-overflow at ecma-helpers.c:326 in 
ecma_get_lex_env_ty ...)
- iotjs  (bug #1015219)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4745
 CVE-2021-41682 (There is a heap-use-after-free at ecma-helpers-string.c:1940 
in ecma_c ...)
- iotjs  (bug #1015219)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4747
NOTE: 
https://github.com/jerryscript-project/jerryscript/commit/3ad76f932c8d2e3b9ba2d95e64848698ec7d7290
 CVE-2021-41681


=
data/dsa-needed.txt
=
@@ -20,6 +20,8 @@ epiphany-browser
 --
 freecad (aron)
 --
+jetty
+--
 kicad (jmm)
 --
 kopanocore/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/715d948a18ada3fc31c43519dfc953392fcbedf4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/715d948a18ada3fc31c43519dfc953392fcbedf4
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-11 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
95af1295 by Moritz Muehlenhoff at 2022-07-11T14:31:35+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -698,9 +698,10 @@ CVE-2022-33939
 CVE-2022-2346
RESERVED
 CVE-2022-2345 (Use After Free in GitHub repository vim/vim prior to 9.0.0046. 
...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
NOTE: 
https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea 
(v9.0.0047)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2344 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0.0 ...)
- vim  (unimportant)
NOTE: https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
@@ -17369,6 +17370,8 @@ CVE-2022-29218 (RubyGems is a package registry used to 
supply software for the R
NOT-FOR-US: rubygems/rubygems.org
 CVE-2022-29217 (PyJWT is a Python implementation of RFC 7519. PyJWT supports 
multiple  ...)
- pyjwt  (bug #1011747)
+   [bullseye] - pyjwt  (Vulnerable code not present)
+   [buster] - pyjwt  (Vulnerable code not present)
[stretch] - pyjwt  (Vulnerable code not present)
NOTE: 
https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24
NOTE: 
https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc
 (2.4.0)
@@ -51853,6 +51856,7 @@ CVE-2021-42864
RESERVED
 CVE-2021-42863 (A buffer overflow in 
ecma_builtin_typedarray_prototype_filter() in Jer ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4793
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4794
@@ -89411,6 +89415,8 @@ CVE-2021-3448 (A flaw was found in dnsmasq in versions 
before 2.85. When configu
NOTE: 
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=74d4fcd756a85bc1823232ea74334f7ccfb9d5d2
 CVE-2021-3447 (A flaw was found in several ansible modules, where parameters 
containi ...)
- ansible  (bug #1014721)
+   [bullseye] - ansible  (Minor issue)
+   [buster] - ansible  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1939349
 CVE-2021-3446 (A flaw was found in libtpms in versions before 0.8.2. The 
commonly use ...)
- libtpms 0.8.2-1 (bug #986799)
@@ -223002,6 +223008,8 @@ CVE-2019-9837 (Doorkeeper::OpenidConnect (aka the 
OpenID Connect extension for D
NOTE: 
https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66
 CVE-2019-9836 (Secure Encrypted Virtualization (SEV) on Advanced Micro Devices 
(AMD)  ...)
- amd64-microcode 3.20220411.1 (bug #970395)
+   [bullseye] - amd64-microcode  (Minor issue)
+   [buster] - amd64-microcode  (Minor issue)
NOTE: https://seclists.org/fulldisclosure/2019/Jun/46
 CVE-2019-9835 (The receiver (aka bridge) component of Fujitsu Wireless 
Keyboard Set L ...)
NOT-FOR-US: Fujitsu Wireless Keyboard Set LX901 GK900 devices



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95af129517bafdc93b341e034302398063884e67

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95af129517bafdc93b341e034302398063884e67
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a3e800df by Moritz Muehlenhoff at 2022-07-09T00:03:00+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -19228,10 +19228,11 @@ CVE-2022-28354
 CVE-2022-28353
RESERVED
 CVE-2022-1210 (A vulnerability classified as problematic was found in LibTIFF 
4.3.0.  ...)
-   - tiff 
+   - tiff  (unimportant)
[bullseye] - tiff  (Minor issue)
[buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/402
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-46782 (The Pricing Table by Supsystic WordPress plugin before 1.9.5 
does not  ...)
NOT-FOR-US: WordPress plugin
 CVE-2021-46781 (The Coming Soon by Supsystic WordPress plugin before 1.7.6 
does not sa ...)
@@ -22735,11 +22736,9 @@ CVE-2022-0989 (An unprivileged user could use the 
functionality of the NS WooCom
 CVE-2022-0988 (Delta Electronics DIAEnergie (Version 1.7.5 and prior) is 
vulnerable t ...)
NOT-FOR-US: Delta Electronics
 CVE-2022-0987 (A flaw was found in PackageKit in the way some of the methods 
exposed  ...)
-   - packagekit 
-   [bullseye] - packagekit  (Minor issue)
-   [buster] - packagekit  (Minor issue)
-   [stretch] - packagekit  (Minor issue)
+   - packagekit  (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2064315
+   NOTE: Negligible security impact
 CVE-2022-0986 (Reflected Cross-site Scripting (XSS) Vulnerability in GitHub 
repositor ...)
NOT-FOR-US: Hestia Control Panel
 CVE-2022-0985 (Insufficient capability checks could allow users with the 
moodle/site: ...)
@@ -39230,13 +39229,11 @@ CVE-2021-45928 (libjxl b02d6b9, as used in libvips 
8.11 through 8.11.2 and other
NOTE: Introduced by: https://github.com/libjxl/libjxl/pull/205 (v0.6)
NOTE: Fixed by: 
https://github.com/libjxl/libjxl/commit/1c05e110d69b457696366fb4e762057b6855349b
 (v0.6)
 CVE-2021-45927 (MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer 
overflow (at 0 ...)
-   - mdbtools 
+   NOTE: Apparently an ozz-fuzz false positive
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36187
-   TODO: check, possibly fixed in 0.9.3, but unclear fixing commit, 
related to 9b6b52cc8c5838cffeee9388c04890fe1eb73b52?
 CVE-2021-45926 (MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer 
overflow (at 0 ...)
-   - mdbtools 
+   NOTE: Apparently an ozz-fuzz false positive
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35972
-   TODO: check, possibly fixed in 0.9.3, but unclear fixing commit, 
related to 9b6b52cc8c5838cffeee9388c04890fe1eb73b52?
 CVE-2021-4196
RESERVED
 CVE-2021-4195
@@ -267533,11 +267530,13 @@ CVE-2018-12689 (phpLDAPadmin 1.2.2 allows LDAP 
injection via a crafted server_id
NOTE: Non-security issue as demostrated in 
https://bugs.debian.org/902186
NOTE: and disputed as security issue. Should be properly rejected by 
MITRE.
 CVE-2018-12688 (tinyexr 0.9.5 has a segmentation fault in the wav2Decode 
function. ...)
-   - tinyexr 
+   - tinyexr 
+   [bullseye] - tinyexr  (Minor issue)
NOTE: https://github.com/syoyo/tinyexr/issues/83
 CVE-2018-12687 (tinyexr 0.9.5 has an assertion failure in DecodePixelData in 
tinyexr.h ...)
-   - tinyexr 
+   - tinyexr  (unimportant)
NOTE: https://github.com/syoyo/tinyexr/issues/84
+   NOTE: Negligible security impact
 CVE-2018-12686
RESERVED
 CVE-2018-12685



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a3e800df0374c72f3e01148fa91b1935474be74a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a3e800df0374c72f3e01148fa91b1935474be74a
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f808e6c8 by Moritz Muehlenhoff at 2022-07-08T14:27:59+02:00
buster/bullseye triage
cyclonedds/fastdds fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -18819,11 +18819,10 @@ CVE-2022-28508 (An XSS issue was discovered in 
browser_search_plugin.php in Mant
 CVE-2022-28507 (Dragon Path Technologies Bharti Airtel Routers Hardware 
BDT-121 versio ...)
NOT-FOR-US: Dragon Path Technologies Bharti Airtel Routers Hardware 
BDT-121
 CVE-2022-28506 (There is a heap-buffer-overflow in GIFLIB 5.2.1 function 
DumpScreen2RG ...)
-   - giflib 
-   [bullseye] - giflib  (Minor issue)
-   [buster] - giflib  (Minor issue)
-   [stretch] - giflib  (Minor issue)
+   - giflib  (unimportant)
NOTE: https://sourceforge.net/p/giflib/bugs/159/
+   NOTE: https://sourceforge.net/p/giflib/code/merge-requests/11/
+   NOTE: Specific to gif2rgb. Crash in CLI tool, no security impact
 CVE-2022-28505 (Jfinal_cms 5.1.0 is vulnerable to SQL Injection via 
com.jflyfox.system ...)
NOT-FOR-US: Jfinal_cms
 CVE-2022-28504
@@ -58275,11 +58274,9 @@ CVE-2021-40635 (OS4ED openSIS 8.0 is affected by SQL 
injection in ChooseCpSearch
 CVE-2021-40634
RESERVED
 CVE-2021-40633 (A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in 
giflib 5 ...)
-   - giflib 
-   [bullseye] - giflib  (Minor issue)
-   [buster] - giflib  (Minor issue)
-   [stretch] - giflib  (Minor issue)
+   - giflib  (unimportant)
NOTE: https://sourceforge.net/p/giflib/bugs/157/
+   NOTE: Specific to gif2rgb. Crash in CLI tool, no security impact
 CVE-2021-40632
RESERVED
 CVE-2021-40631
@@ -63764,19 +63761,19 @@ CVE-2021-38445 (OCI OpenDDS versions prior to 3.18.1 
do not handle a length para
 CVE-2021-38444
RESERVED
 CVE-2021-38443 (Eclipse CycloneDDS versions prior to 0.8.0 improperly handle 
invalid s ...)
-   - cyclonedds 
+   - cyclonedds 0.8.1-2
+   [bullseye] - cyclonedds  (Minor issue)
NOTE: No mention of CVE upstream
NOTE: https://projects.eclipse.org/projects/iot.cyclonedds
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02
-   TODO: check for upstream commit
 CVE-2021-38442 (FATEK Automation WinProladder versions 3.30 and prior lacks 
proper val ...)
NOT-FOR-US: FATEK Automation
 CVE-2021-38441 (Eclipse CycloneDDS versions prior to 0.8.0 are vulnerable to a 
write-w ...)
-   - cyclonedds 
+   - cyclonedds 0.8.1-2
+   [bullseye] - cyclonedds  (Minor issue)
NOTE: No mention of CVE upstream
NOTE: https://projects.eclipse.org/projects/iot.cyclonedds
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02
-   TODO: check for upstream commit
 CVE-2021-38440 (FATEK Automation WinProladder versions 3.30 and prior is 
vulnerable to ...)
NOT-FOR-US: FATEK Automation
 CVE-2021-38439 (All versions of GurumDDS are vulnerable to heap-based buffer 
overflow, ...)
@@ -63808,10 +63805,11 @@ CVE-2021-38427 (RTI Connext DDS Professional and 
Connext DDS Secure Versions 4.2
 CVE-2021-38426 (FATEK Automation WinProladder versions 3.30 and prior lacks 
proper val ...)
NOT-FOR-US: FATEK Automation
 CVE-2021-38425 (eProsima Fast DDS versions prior to 2.4.0 (#2269) are 
susceptible to e ...)
-   - fastdds 
+   - fastdds 2.6.1+ds-1
[bullseye] - fastdds  (Minor issue)
NOTE: https://github.com/eProsima/Fast-DDS/issues/2267
NOTE: https://github.com/eProsima/Fast-DDS/pull/2269
+   NOTE: 
https://github.com/eProsima/Fast-DDS/commit/01550cfa1b8313c4cb39529960b41f95e4820312
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02
 CVE-2021-38424 (The tag interface of Delta Electronics DIALink versions 
1.2.4.0 and pr ...)
NOT-FOR-US: Delta Electronics DIALink



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f808e6c84e6e3672c539fa964edade80b20ca059

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f808e6c84e6e3672c539fa964edade80b20ca059
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
62406382 by Moritz Muehlenhoff at 2022-07-08T11:23:00+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3854,10 +3854,16 @@ CVE-2022-2122
RESERVED
 CVE-2022-2121 (OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer 
derefer ...)
- dcmtk  (bug #1014044)
+   [bullseye] - dcmtk  (Minor issue)
+   [buster] - dcmtk  (Minor issue)
 CVE-2022-2120 (OFFIS DCMTK's (All versions prior to 3.6.7) service class user 
(SCU) i ...)
- dcmtk  (bug #1014044)
+   [bullseye] - dcmtk  (Minor issue)
+   [buster] - dcmtk  (Minor issue)
 CVE-2022-2119 (OFFIS DCMTK's (All versions prior to 3.6.7) service class 
provider (SC ...)
- dcmtk  (bug #1014044)
+   [bullseye] - dcmtk  (Minor issue)
+   [buster] - dcmtk  (Minor issue)
 CVE-2022-2118
RESERVED
 CVE-2014-125025 (A vulnerability classified as problematic has been found in 
FFmpeg 2.0 ...)
@@ -9669,7 +9675,6 @@ CVE-2022-31627
 CVE-2022-31626 (In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 
8.1.x belo ...)
- php8.1 8.1.7-1 (bug #1014533)
- php7.4 
-   [bullseye] - php7.4  (Minor issue, fix along with next 
security release)
- php7.3 
[buster] - php7.3  (Minor issue, fix along with next 
security release)
- php7.0 
@@ -9679,7 +9684,6 @@ CVE-2022-31626 (In PHP versions 7.4.x below 7.4.30, 8.0.x 
below 8.0.20, and 8.1.
 CVE-2022-31625 (In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 
8.1.x belo ...)
- php8.1 8.1.7-1 (bug #1014533)
- php7.4 
-   [bullseye] - php7.4  (Minor issue, fix along with next 
security release)
- php7.3 
[buster] - php7.3  (Minor issue, fix along with next 
security release)
- php7.0 
@@ -12637,9 +12641,12 @@ CVE-2022- [RUSTSEC-2022-0022]
NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0022.html
 CVE-2022- [RUSTSEC-2022-0021]
- rust-crossbeam-queue 
+   [bullseye] - rust-crossbeam-queue  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0021.html
 CVE-2022- [RUSTSEC-2022-0019]
- rust-crossbeam-channel 
+   [bullseye] - rust-crossbeam-channel  (Minor issue)
+   [buster] - rust-crossbeam-channel  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0019.html
 CVE-2022- [RUSTSEC-2022-0020]
- rust-crossbeam 
@@ -28141,9 +28148,11 @@ CVE-2022-25256 (SAS Web Report Studio 4.4 allows XSS. 
/SASWebReportStudio/logonA
 CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 
on Linux ...)
- qt6-base 
- qtbase-opensource-src 5.15.2+dfsg-15
+   [bullseye] - qtbase-opensource-src  (Minor issue)
[buster] - qtbase-opensource-src  (Breaks existing behaviour 
and upstream also skipped from 5.12 branch)
[stretch] - qtbase-opensource-src  (Vulnerable code 
introduced later)
- qtbase-opensource-src-gles 
+   [bullseye] - qtbase-opensource-src-gles  (Minor issue)
[buster] - qtbase-opensource-src-gles  (Breaks existing 
behaviour and upstream also skipped from 5.12 branch)
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/393113
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/394914
@@ -63332,13 +63341,19 @@ CVE-2021-38579
RESERVED
 CVE-2021-38578 (Existing CommBuffer checks in SmmEntryPoint will not catch 
underflow w ...)
- edk2  (bug #1014468)
+   [bullseye] - edk2  (Minor issue)
+   [buster] - edk2  (Minor issue)
NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=3387 (private)
NOTE: https://edk2.groups.io/g/devel/message/90516
 CVE-2021-38577 (Heap Overflow in BaseBmpSupportLib. ...)
- edk2  (bug #1014468)
+   [bullseye] - edk2  (Minor issue)
+   [buster] - edk2  (Minor issue)
NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=3360 (private)
 CVE-2021-38576 (A BIOS bug in firmware for a particular PC model leaves the 
Platform a ...)
- edk2  (bug #1014468)
+   [bullseye] - edk2  (Minor issue)
+   [buster] - edk2  (Minor issue)
NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=3499 (private)
 CVE-2021-38575 (NetworkPkg/IScsiDxe has remotely exploitable buffer overflows. 
...)
- edk2 2021.08-1
@@ -74941,6 +74956,7 @@ CVE-2021-33881 (On NXP MIFARE Ultralight and NTAG 
cards, an attacker can interru
NOT-FOR-US: NXP
 CVE-2021-33880 (The aaugustin websockets library before 9.1 for Python has an 
Observab ...)
- python-websockets 9.1-1 (bug #989561)
+   [bullseye] - python-websockets  (Minor issue)
[buster] - python-websockets  (Vulnerable code introduced 
in 8.0)
[stretch] - python-websockets  (Vulnerable 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5bf53797 by Moritz Muehlenhoff at 2022-07-06T13:27:41+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -70,6 +70,8 @@ CVE-2022-2310
RESERVED
 CVE-2022-2309 (NULL Pointer Dereference allows attackers to cause a denial of 
service ...)
- lxml 
+   [bullseye] - lxml  (Minor issue)
+   [buster] - lxml  (Minor issue)
NOTE: https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba/
NOTE: 
https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f 
(lxml-4.9.1)
 CVE-2022-2308
@@ -689,6 +691,8 @@ CVE-2022-2305
RESERVED
 CVE-2022-2304 (Stack-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0. ...)
- vim 
+   [bullseye] - vim  (Minor issue)
+   [buster] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a/
NOTE: 
https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939 
(v9.0.0035)
 CVE-2022-2303
@@ -10730,10 +10734,14 @@ CVE-2022-31118
RESERVED
 CVE-2022-31117 (UltraJSON is a fast JSON encoder and decoder written in pure C 
with bi ...)
- ujson 
+   [bullseye] - ujson  (Minor issue)
+   [buster] - ujson  (Minor issue)
NOTE: 
https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff
NOTE: 
https://github.com/ultrajson/ultrajson/commit/9c20de0f77b391093967e25d01fb48671104b15b
 (5.4.0)
 CVE-2022-31116 (UltraJSON is a fast JSON encoder and decoder written in pure C 
with bi ...)
- ujson 
+   [bullseye] - ujson  (Minor issue)
+   [buster] - ujson  (Minor issue)
NOTE: 
https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r
NOTE: 
https://github.com/ultrajson/ultrajson/commit/67ec07183342589d602e0fcf7bb1ff3e19272687
 (5.4.0)
 CVE-2022-31115 (opensearch-ruby is a community-driven, open source fork of 
elasticsear ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bf53797deaef3c37897f131f79b84fcd6728008

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bf53797deaef3c37897f131f79b84fcd6728008
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
87080950 by Moritz Muehlenhoff at 2022-07-05T13:58:25+02:00
buster/bullseye triage
add reference for openssl issue

- - - - -


2 changed files:

- data/CVE/list
- data/embedded-code-copies


Changes:

=
data/CVE/list
=
@@ -898,6 +898,7 @@ CVE-2022-2274 (The OpenSSL 3.0.4 release introduced a 
serious bug in the RSA imp
[buster] - openssl  (Vulnerable code not present)
NOTE: 
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4d8a88c134df634ba610ff8db1eb8478ac5fd345
NOTE: https://github.com/openssl/openssl/issues/18625
+   NOTE: https://www.openssl.org/news/secadv/20220705.txt
 CVE-2022-2273
RESERVED
 CVE-2022-2272
@@ -13816,10 +13817,11 @@ CVE-2022-30047 (Mingsoft MCMS v5.2.7 was discovered 
to contain a SQL injection v
 CVE-2022-30046
RESERVED
 CVE-2022-30045 (An issue was discovered in libezxml.a in ezXML 0.8.6. The 
function ezx ...)
-   - mapcache  (bug #1014389)
+   - mapcache  (unimportant; bug #1014389)
- navit  (bug #1014390)
- scilab  (bug #1014391)
NOTE: https://sourceforge.net/p/ezxml/bugs/29/
+   NOTE: mapcache only uses ezxml to parse config files which are trusted
 CVE-2022-30044
RESERVED
 CVE-2022-30043
@@ -80464,9 +80466,7 @@ CVE-2021-31599 (An issue was discovered in Hitachi 
Vantara Pentaho through 9.1 a
NOT-FOR-US: Hitachi
 CVE-2021-31598 (An issue was discovered in libezxml.a in ezXML 0.8.6. The 
function ezx ...)
{DLA-2705-1}
-   - mapcache  (bug #989363)
-   [bullseye] - mapcache  (Minor issue)
-   [buster] - mapcache  (Minor issue)
+   - mapcache  (unimportant; bug #989363)
[stretch] - mapcache  (Minor issue)
- scilab  (bug #989364)
[bullseye] - scilab  (Minor issue)
@@ -80479,6 +80479,7 @@ CVE-2021-31598 (An issue was discovered in libezxml.a 
in ezXML 0.8.6. The functi
[bullseye] - netcdf-parallel  (Minor issue)
[buster] - netcdf-parallel  (Minor issue)
NOTE: https://sourceforge.net/p/ezxml/bugs/28/
+   NOTE: mapcache only uses ezxml to parse config files which are trusted
 CVE-2021-31597 (The xmlhttprequest-ssl package before 1.6.1 for Node.js 
disables SSL c ...)
- node-xmlhttprequest-ssl 
[buster] - node-xmlhttprequest-ssl  (Minor issue, should 
possibly be removed from stable as well)
@@ -81114,10 +81115,7 @@ CVE-2021-31349 (The usage of an internal HTTP header 
created an authentication b
NOT-FOR-US: Juniper
 CVE-2021-31348 (An issue was discovered in libezxml.a in ezXML 0.8.6. The 
function ezx ...)
{DLA-2705-1}
-   - mapcache  (bug #989363)
-   [bullseye] - mapcache  (Minor issue)
-   [buster] - mapcache  (Minor issue)
-   [stretch] - mapcache  (Minor issue)
+   - mapcache  (unimportant; bug #989363)
- scilab  (bug #989364)
[bullseye] - scilab  (Minor issue)
[buster] - scilab  (Minor issue)
@@ -81129,12 +81127,10 @@ CVE-2021-31348 (An issue was discovered in libezxml.a 
in ezXML 0.8.6. The functi
[bullseye] - netcdf-parallel  (Minor issue)
[buster] - netcdf-parallel  (Minor issue)
NOTE: https://sourceforge.net/p/ezxml/bugs/27/
+   NOTE: mapcache only uses ezxml to parse config files which are trusted
 CVE-2021-31347 (An issue was discovered in libezxml.a in ezXML 0.8.6. The 
function ezx ...)
{DLA-2705-1}
-   - mapcache  (bug #989363)
-   [bullseye] - mapcache  (Minor issue)
-   [buster] - mapcache  (Minor issue)
-   [stretch] - mapcache  (Minor issue)
+   - mapcache  (unimportant; bug #989363)
- scilab  (bug #989364)
[bullseye] - scilab  (Minor issue)
[buster] - scilab  (Minor issue)
@@ -81146,6 +81142,7 @@ CVE-2021-31347 (An issue was discovered in libezxml.a 
in ezXML 0.8.6. The functi
[bullseye] - netcdf-parallel  (Minor issue)
[buster] - netcdf-parallel  (Minor issue)
NOTE: https://sourceforge.net/p/ezxml/bugs/27/
+   NOTE: mapcache only uses ezxml to parse config files which are trusted
 CVE-2021-31346 (A vulnerability has been identified in APOGEE MBC (PPC) 
(BACnet) (All  ...)
NOT-FOR-US: Siemens
 CVE-2021-31345 (A vulnerability has been identified in APOGEE MBC (PPC) 
(BACnet) (All  ...)
@@ -81433,10 +81430,7 @@ CVE-2021-31230
RESERVED
 CVE-2021-31229 (An issue was discovered in libezxml.a in ezXML 0.8.6. The 
function ezx ...)
{DLA-2705-1}
-   - mapcache  (bug #989363)
-   [bullseye] - mapcache  (Minor issue)
-   [buster] - mapcache  (Minor issue)
-   [stretch] - mapcache  (Minor issue)
+   - mapcache  (unimportant; bug #989363)
- scilab  (bug #989364)
[bullseye] - scilab  (Minor issue)
[buster] - scilab  (Minor issue)
@@ -81448,6 +81442,7 @@ CVE-2021-31229 (An 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
67a08c8b by Moritz Muehlenhoff at 2022-07-04T10:28:41+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -27,9 +27,10 @@ CVE-2022-34911 (An issue was discovered in MediaWiki before 
1.35.7, 1.36.x and 1
 CVE-2022-2290 (Cross-site Scripting (XSS) - Reflected in GitHub repository 
zadam/tril ...)
TODO: check
 CVE-2022-2289 (Use After Free in GitHub repository vim/vim prior to 9.0. ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64/
NOTE: 
https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e 
(v9.0.0026)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2288 (Out-of-bounds Write in GitHub repository vim/vim prior to 9.0. 
...)
- vim 
NOTE: https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad/
@@ -28580,12 +28581,16 @@ CVE-2022-24737 (HTTPie is a command-line HTTP client. 
HTTPie has the practical c
 CVE-2022-24736 (Redis is an in-memory database that persists on disk. Prior to 
version ...)
[experimental] - redis 5:7.0.0-1
- redis 5:7.0.1-4
+   [bullseye] - redis  (Minor issue)
+   [buster] - redis  (Minor issue)
[stretch] - redis  (Minor issue, problematic to backport patch 
to embedded Lua engine)
NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984
NOTE: https://github.com/redis/redis/pull/10651
 CVE-2022-24735 (Redis is an in-memory database that persists on disk. By 
exploiting we ...)
[experimental] - redis 5:7.0.0-1
- redis 5:7.0.1-4
+   [bullseye] - redis  (Minor issue)
+   [buster] - redis  (Minor issue)
[stretch] - redis  (Minor issue, problematic to backport patch 
to embedded Lua engine)
NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-647m-2wmq-qmvq
NOTE: https://github.com/redis/redis/pull/10651



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a08c8b7180bd8df0d1998dd1d4000be48645cf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a08c8b7180bd8df0d1998dd1d4000be48645cf
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-07-01 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cfbf4d8b by Moritz Muehlenhoff at 2022-07-01T14:35:53+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -5864,6 +5864,8 @@ CVE-2022-32533
RESERVED
 CVE-2022-32532 (Apache Shiro before 1.9.1, A RegexRequestMatcher can be 
misconfigured  ...)
- shiro 
+   [bullseye] - shiro  (Minor issue)
+   [buster] - shiro  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/06/28/2
 CVE-2022-32531
RESERVED
@@ -11315,6 +11317,8 @@ CVE-2022- [RUSTSEC-2022-0019]
NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0019.html
 CVE-2022- [RUSTSEC-2022-0020]
- rust-crossbeam 
+   [bullseye] - rust-crossbeam  (Minor issue)
+   [buster] - rust-crossbeam  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0020.html
 CVE-2022-30600 (A flaw was found in moodle where logic used to count failed 
login atte ...)
- moodle 
@@ -28322,6 +28326,8 @@ CVE-2022-24759 (`@chainsafe/libp2p-noise` contains 
TypeScript implementation of
NOT-FOR-US: chainsafe/libp2p-noise
 CVE-2022-24758 (The Jupyter notebook is a web-based notebook environment for 
interacti ...)
- jupyter-notebook 
+   [bullseye] - jupyter-notebook  (Minor issue)
+   [buster] - jupyter-notebook  (Minor issue)
NOTE: 
https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55
NOTE: 
https://github.com/jupyter/notebook/commit/c219ce43c1ea25123fa70d264e7735bdf4585b1e
 (6.4.10)
 CVE-2022-24757 (The Jupyter Server provides the backend (i.e. the core 
services, APIs, ...)
@@ -32468,6 +32474,8 @@ CVE-2022-23640 (Excel-Streaming-Reader is an 
easy-to-use implementation of a str
NOT-FOR-US: Excel-Streaming-Reader
 CVE-2022-23639 (crossbeam-utils provides atomics, synchronization primitives, 
scoped t ...)
- rust-crossbeam-utils 0.8.8-1
+   [bullseye] - rust-crossbeam-utils  (Minor issue)
+   [buster] - rust-crossbeam-utils  (Minor issue)
- rust-crossbeam-utils-0.7 
NOTE: 
https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-qc84-gqf4-9926
NOTE: https://github.com/crossbeam-rs/crossbeam/pull/781


=
data/dsa-needed.txt
=
@@ -12,7 +12,7 @@ To pick an issue, simply add your uid behind it.
 If needed, specify the release by adding a slash after the name of the source 
package.
 
 --
-asterisk/oldstable
+asterisk
 --
 blender (jmm)
 --
@@ -34,6 +34,8 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.
 --
+logrotate
+--
 ndpi/oldstable
 --
 netatalk



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfbf4d8b1b0cdc87216552c0e02165d0cdb8a460

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfbf4d8b1b0cdc87216552c0e02165d0cdb8a460
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-30 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
fdb2437a by Moritz Muehlenhoff at 2022-06-30T16:53:55+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -4382,6 +4382,8 @@ CVE-2022-33071
RESERVED
 CVE-2022-33070 (Protobuf-c v1.4.0 was discovered to contain an invalid 
arithmetic shif ...)
- protobuf-c 
+   [bullseye] - protobuf-c  (Minor issue)
+   [buster] - protobuf-c  (Minor issue)
NOTE: https://github.com/protobuf-c/protobuf-c/issues/506
NOTE: https://github.com/protobuf-c/protobuf-c/pull/508
 CVE-2022-33069 (Ethereum Solidity v0.8.14 contains an assertion failure via 
SMTEncoder ...)
@@ -44708,6 +44710,8 @@ CVE-2022-21699 (IPython (Interactive Python) is a 
command shell for interactive
NOTE: 
https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699
 CVE-2022-21698 (client_golang is the instrumentation library for Go 
applications in Pr ...)
- golang-github-prometheus-client-golang 1.11.1-1 (bug #1008008)
+   [bullseye] - golang-github-prometheus-client-golang  (Minor 
issue)
+   [buster] - golang-github-prometheus-client-golang  (Minor issue)
[stretch] - golang-github-prometheus-client-golang  (Minor 
issue, DoS in specific conditions, requires rebuilding reverse-dependencies; 
Limited support in stretch)
NOTE: 
https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p
NOTE: https://github.com/prometheus/client_golang/pull/962
@@ -130529,11 +130533,7 @@ CVE-2020-23906 (FFmpeg N-98388-g76a3ee996b allows 
attackers to cause a denial of
 CVE-2020-23905
RESERVED
 CVE-2020-23904 (** DISPUTED ** A stack buffer overflow in speexenc.c of Speex 
v1.2 all ...)
-   - speex 
-   [bullseye] - speex  (Minor issue)
-   [buster] - speex  (Minor issue)
-   [stretch] - speex  (Minor issue)
-   NOTE: https://github.com/xiph/speex/issues/14
+   NOTE: Disputed speex issue
 CVE-2020-23903 (A Divide by Zero vulnerability in the function static int 
read_samples ...)
- speex 1.2~rc1.2-2
[bullseye] - speex  (Minor issue)


=
data/dsa-needed.txt
=
@@ -14,7 +14,7 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 asterisk/oldstable
 --
-cacti
+blender (jmm)
 --
 curl
 --
@@ -24,6 +24,8 @@ freecad (aron)
 --
 kicad (jmm)
 --
+ldap-account-manager
+--
 librecad
 --
 libpgjava (apo)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fdb2437a55973d996f4af95c0efcd1f2b683e4c0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fdb2437a55973d996f4af95c0efcd1f2b683e4c0
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-30 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6f2e90cf by Moritz Muehlenhoff at 2022-06-30T11:05:05+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,5 +1,7 @@
 CVE-2022-34835 (In Das U-Boot through 2022.07-rc5, an integer signedness error 
and res ...)
- u-boot 
+   [bullseye] - u-boot  (Minor issue)
+   [buster] - u-boot  (Minor issue)
NOTE: https://lists.denx.de/pipermail/u-boot/2022-June/486113.html
NOTE: 
https://source.denx.de/u-boot/u-boot/-/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409
 CVE-2022-34834
@@ -13445,9 +13447,10 @@ CVE-2022-1508
[stretch] - linux  (Vulnerable code not present)
NOTE: 
https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1)
 CVE-2022-1507 (chafa: NULL Pointer Dereference in function 
gif_internal_decode_frame  ...)
-   - chafa 1.10.2-1
+   - chafa 1.10.2-1 (unimportant)
NOTE: https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95/
NOTE: 
https://github.com/hpjansson/chafa/commit/e4b777c7b7c144cd16a0ea96108267b1004fe6c9
 (1.10.2)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1506 (The WP Born Babies WordPress plugin through 1.0 does not 
sanitise and  ...)
NOT-FOR-US: WordPress plugin
 CVE-2022-1505 (The RSVPMaker plugin for WordPress is vulnerable to 
unauthenticated SQ ...)
@@ -56522,6 +56525,7 @@ CVE-2021-40682
RESERVED
 CVE-2021-3779 (A malicious MySQL server can request local file content from a 
client  ...)
- ruby-mysql 
+   [buster] - ruby-mysql  (Minor issue)
 CVE-2021-3778 (vim is vulnerable to Heap-based Buffer Overflow ...)
{DLA-2876-1}
- vim 2:8.2.3455-1 (bug #994498)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2e90cf8293a02afe31a0781fb1822341c3bf5c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2e90cf8293a02afe31a0781fb1822341c3bf5c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-29 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
66c973af by Moritz Muehlenhoff at 2022-06-29T11:46:14+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -39,7 +39,7 @@ CVE-2022-34752
 CVE-2022-34751
RESERVED
 CVE-2022-34750 (An issue was discovered in MediaWiki through 1.38.1. The lemma 
length  ...)
-   TODO: check
+   NOT-FOR-US: MediaWiki extension WikiBase
 CVE-2022-34749
RESERVED
 CVE-2022-34748
@@ -708,9 +708,10 @@ CVE-2022-2211 [Buffer overflow in get_keys leads to Dos]
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2100862
TODO: check, upstream references, mentioned code is actually in 
src:guestfs-tools
 CVE-2022-2210 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. 
...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
NOTE: 
https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa 
(v8.2.5164)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2209
RESERVED
 CVE-2022-2208 (NULL Pointer Dereference in GitHub repository vim/vim prior to 
8.2. ...)
@@ -2144,6 +2145,8 @@ CVE-2021-46823 (python-ldap before 3.4.0 is vulnerable to 
a denial of service wh
NOTE: 
https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm
 CVE-2021-46822 (The PPM reader in libjpeg-turbo through 2.0.90 mishandles use 
of tjLoa ...)
- libjpeg-turbo 1:2.1.1-1
+   [bullseye] - libjpeg-turbo  (Minor issue)
+   [buster] - libjpeg-turbo  (Minor issue)
NOTE: 
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2
 (2.1.0)
 CVE-2017-20081 (A vulnerability, which was classified as critical, was found 
in Hindu  ...)
NOT-FOR-US: Hindu Matrimonial Script
@@ -2521,6 +2524,8 @@ CVE-2022-33880
RESERVED
 CVE-2022-33879 (The initial fixes in CVE-2022-30126 and CVE-2022-30973 for 
regexes in  ...)
- tika 
+   [bullseye] - tika  (Minor issue)
+   [buster] - tika  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/06/27/5
 CVE-2022-33878
RESERVED
@@ -9857,9 +9862,8 @@ CVE-2022-1771 (Uncontrolled Recursion in GitHub 
repository vim/vim prior to 8.2.
 CVE-2019-25061 (The random_password_generator (aka RandomPasswordGenerator) 
gem throug ...)
NOT-FOR-US: bvsatyaram/random_password_generator
 CVE-2022-30973 (We failed to apply the fix for CVE-2022-30126 to the 1.x 
branch in the ...)
-   - tika 
+   - tika  (Affected release which missed the fix was never 
shipped, issue tracked via CVE-2022-30126)
NOTE: http://www.openwall.com/lists/oss-security/2022/05/31/2
-   TODO: check how we want to handle that, because technically this is CVE 
is for the missing fix for CVE-2022-30126 in upstream 1.x patching specific
 CVE-2022-1770 (Improper Privilege Management in GitHub repository 
polonel/trudesk pri ...)
NOT-FOR-US: Trudesk
 CVE-2022-1769 (Buffer Over-read in GitHub repository vim/vim prior to 
8.2.4974. ...)
@@ -12385,6 +12389,8 @@ CVE-2022-1554 (Path Traversal due to `send_file` call 
in GitHub repository clini
NOT-FOR-US: clinical-genomics/scout
 CVE-2022-30126 (In Apache Tika, a regular expression in our StandardsText 
class, used  ...)
- tika 
+   [bullseye] - tika  (Minor issue)
+   [buster] - tika  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/16/3
 CVE-2022-1553 (Leaking password protected articles content due to improper 
access con ...)
NOT-FOR-US: Publify
@@ -16373,6 +16379,8 @@ CVE-2022-28738 (A double free was found in the Regexp 
compiler in Ruby 3.x befor
 CVE-2022-28737
RESERVED
- shim 
+   [bullseye] - shim  (Fix via point update)
+   [buster] - shim  (Fix via point update)
NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/5
NOTE: 
https://github.com/rhboot/shim/commit/e99bdbb827a50cde019393d3ca1e89397db221a7 
(15.6)
NOTE: 
https://github.com/rhboot/shim/commit/159151b6649008793d6204a34d7b9c41221fb4b0 
(15.6)
@@ -26604,6 +26612,8 @@ CVE-2022-25175 (Jenkins Pipeline: Multibranch Plugin 
706.vd43c65dec013 and earli
NOT-FOR-US: Jenkins Pipeline: Multibranch Plugin
 CVE-2022-25169 (The BPG parser in versions of Apache Tika before 1.28.2 and 
2.4.0 may  ...)
- tika 
+   [bullseye] - tika  (Minor issue)
+   [buster] - tika  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/16/4
 CVE-2022-25168
RESERVED
@@ -28105,6 +28115,8 @@ CVE-2022-24713 (regex is an implementation of regular 
expressions for the Rust l
- firefox-esr 91.8.0esr-1
- thunderbird 1:91.8.0-1
- 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8cb36f6f by Moritz Muehlenhoff at 2022-06-24T17:57:09+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -297,17 +297,15 @@ CVE-2022-2185
 CVE-2022-2184
RESERVED
 CVE-2022-2183 (Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. 
...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-3cc98975
NOTE: 
https://github.com/vim/vim/commit/8eba2bd291b347e3008aa9e565652d51ad638cfa 
(v8.2.5151)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2182 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
NOTE: 
https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e 
(v8.2.5150)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2181
RESERVED
 CVE-2021-46824 (Cross Site Scripting (XSS) vulnerability in sourcecodester 
School File ...)
@@ -449,11 +447,10 @@ CVE-2022-2177
 CVE-2022-2176
RESERVED
 CVE-2022-2175 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
NOTE: 
https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e 
(v8.2.5148)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2174 (Cross-site Scripting (XSS) - Reflected in GitHub repository 
microweber ...)
NOT-FOR-US: microweber
 CVE-2022-2173
@@ -3302,8 +3299,9 @@ CVE-2022-33068 (An integer overflow in the component 
hb-ot-shape-fallback.cc of
NOTE: https://github.com/harfbuzz/harfbuzz/issues/3557
NOTE: 
https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593
 CVE-2022-33067 (Lrzip v0.651 was discovered to contain multiple invalid 
arithmetic shi ...)
-   - lrzip 
+   - lrzip  (unimportant)
NOTE: https://github.com/ckolivas/lrzip/issues/224
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-33066
RESERVED
 CVE-2022-33065
@@ -20265,6 +20263,8 @@ CVE-2022-0948 (The Order Listener for WooCommerce 
WordPress plugin before 3.2.2
NOT-FOR-US: WordPress plugin
 CVE-2022- [wordpress 5.9.2]
- wordpress 5.9.2+dfsg1-1 (bug #1007145)
+   [bullseye] - wordpress  (Minor issues, fix along in next 
round of updates)
+   [buster] - wordpress  (Minor issues, fix along in next round 
of updates)
[stretch] - wordpress 4.7.23+dfsg-0+deb9u1
NOTE: 
https://wordpress.org/news/2022/03/wordpress-5-9-2-security-maintenance-release/
 CVE-2022-27165 (CSZ CMS 1.2.2 is vulnerable to SQL Injection via 
cszcms_admin_Plugin_m ...)
@@ -24288,7 +24288,8 @@ CVE-2022-0727 (Improper Access Control in GitHub 
repository chocobozzz/peertube
 CVE-2022-0726 (Improper Authorization in GitHub repository chocobozzz/peertube 
prior  ...)
- peertube  (bug #950821)
 CVE-2022-0725 (A flaw was found in KeePass. The vulnerability occurs due to 
logging t ...)
-   - keepass2  (bug #1008022)
+   NOTE: Non-issue, broken report against keepass2, couldn't be reproduced 
with
+   NOTE: Debian, Fedora and by upstream, see bug #1008022
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2052696
NOTE: 
https://sourceforge.net/p/keepass/discussion/329220/thread/da7546b7e1/
NOTE: 
https://sourceforge.net/p/keepass/discussion/329220/thread/33d6afdc/


=
data/dsa-needed.txt
=
@@ -22,9 +22,7 @@ epiphany-browser
 --
 freecad (aron)
 --
-grub2
---
-kicad
+kicad (jmm)
 --
 librecad
 --
@@ -63,7 +61,5 @@ unzip
   unclear information, initial report indicates writable memory corruption, but
   some identified patch is just for a NULL deref, needs more clarification
 --
-wordpress
---
 xen (jmm)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8cb36f6fce2a63c65cb29133360fbfb11c465c87

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8cb36f6fce2a63c65cb29133360fbfb11c465c87
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d8ea7258 by Moritz Muehlenhoff at 2022-06-22T17:39:10+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -10537,9 +10537,13 @@ CVE-2022-1588
REJECTED
 CVE-2022-1587 (An out-of-bounds read vulnerability was discovered in the PCRE2 
librar ...)
- pcre2 10.40-1 (bug #1011954)
+   [bullseye] - pcre2  (Minor issue)
+   [buster] - pcre2  (Minor issue)
NOTE: 
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
 (pcre2-10.40)
 CVE-2022-1586 (An out-of-bounds read vulnerability was discovered in the PCRE2 
librar ...)
- pcre2 10.40-1 (bug #1011954)
+   [bullseye] - pcre2  (Minor issue)
+   [buster] - pcre2  (Minor issue)
NOTE: 
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a
 (pcre2-10.40)
NOTE: 
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
 (pcre2-10.40)
 CVE-2022-1585
@@ -12409,11 +12413,9 @@ CVE-2022-29624 (An arbitrary file upload vulnerability 
in the Add File function
 CVE-2022-29623 (An arbitrary file upload vulnerability in the file upload 
module of Co ...)
NOT-FOR-US: expressjs/connect-multiparty
 CVE-2022-29622 (An arbitrary file upload vulnerability in formidable v3.1.4 
allows att ...)
-   - node-formidable  (bug #1011341)
-   [stretch] - node-formidable  (No longer supported in LTS)
-   NOTE: https://www.youtube.com/watch?v=C6QPKooxhAo
-   NOTE: https://github.com/vyas0189/CougarCS-Backend/issues/57
-   NOTE: unclear if reported upstream
+   - node-formidable  (unimportant; bug #1011341)
+   NOTE: https://github.com/node-formidable/formidable/issues/856
+   NOTE: 
https://medium.com/@zsolt.imre/cve-2022-29622-in-vulnerability-analysis-5cf783c3721
 CVE-2022-29621
RESERVED
 CVE-2022-29620 (** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain 
cleartext  ...)


=
data/dsa-needed.txt
=
@@ -45,6 +45,8 @@ netatalk
 --
 nodejs (jmm)
 --
+php-horde-mime-viewer
+--
 php-horde-turba
 --
 puma/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8ea72580431ad11ebedf8fed518f493c1332f1f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8ea72580431ad11ebedf8fed518f493c1332f1f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-21 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
31661ef1 by Moritz Muehlenhoff at 2022-06-21T15:45:53+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -461,6 +461,8 @@ CVE-2022-2124 (Buffer Over-read in GitHub repository 
vim/vim prior to 8.2. ...)
NOTE: 
https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f 
(v8.2.5120)
 CVE-2021-46823 (python-ldap before 3.4.0 is vulnerable to a denial of service 
when lda ...)
- python-ldap 3.4.0-1
+   [bullseye] - python-ldap  (Minor issue)
+   [buster] - python-ldap  (Minor issue)
NOTE: 
https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm
 CVE-2021-46822 (The PPM reader in libjpeg-turbo through 2.0.90 mishandles use 
of tjLoa ...)
- libjpeg-turbo 1:2.1.1-1
@@ -12346,7 +12348,7 @@ CVE-2021-46784
- squid 5.6-1
- squid3 
NOTE: 
https://github.com/squid-cache/squid/security/advisories/GHSA-f5cp-6rh3-284w
-   NOTE: Squid 4: 
http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch
+   NOTE: 
https://github.com/squid-cache/squid/commit/780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b
 (v4)
NOTE: Squid 5: 
http://www.squid-cache.org/Versions/v5/changesets/SQUID-2021_7.patch
 CVE-2022-29559
RESERVED
@@ -17504,6 +17506,8 @@ CVE-2022-27812
RESERVED
 CVE-2022-27811 (GNOME OCRFeeder before 0.8.4 allows OS command injection via 
shell met ...)
- ocrfeeder  (bug #1008320)
+   [bullseye] - ocrfeeder  (Minor issue)
+   [buster] - ocrfeeder  (Minor issue)
NOTE: https://gitlab.gnome.org/GNOME/ocrfeeder/-/merge_requests/13
NOTE: 
https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/9209bce8afaf6fde19cdac7f5eaea1b744c3e79e
 (0.8.5)
NOTE: 
https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/afea0e722f1d14eaf14bf0e5ebb444d3271ff1ef
 (0.8.5)
@@ -25796,6 +25800,8 @@ CVE-2022-24860 (Databasir is a team-oriented relational 
database model document
 CVE-2022-24859 (PyPDF2 is an open source python PDF library capable of 
splitting, merg ...)
{DLA-3039-1}
- pypdf2 1.27.9-1 (bug #1009879)
+   [bullseye] - pypdf2  (Minor issue)
+   [buster] - pypdf2  (Minor issue)
NOTE: 
https://github.com/py-pdf/PyPDF2/security/advisories/GHSA-xcjx-m2pj-8g79
NOTE: https://github.com/py-pdf/PyPDF2/issues/329
NOTE: https://github.com/py-pdf/PyPDF2/pull/740
@@ -47744,6 +47750,8 @@ CVE-2021-42837 (An issue was discovered in Talend Data 
Catalog before 7.3-202109
NOT-FOR-US: Talend Data Catalog
 CVE-2021-42836 (GJSON before 1.9.3 allows a ReDoS (regular expression denial 
of servic ...)
- golang-github-tidwall-gjson  (bug #1000225)
+   [bullseye] - golang-github-tidwall-gjson  (Minor issue)
+   [buster] - golang-github-tidwall-gjson  (Minor issue)
NOTE: 
https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944
NOTE: 
https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96
NOTE: https://github.com/tidwall/gjson/issues/236
@@ -50514,6 +50522,8 @@ CVE-2021-42249
RESERVED
 CVE-2021-42248 (GJSON = 1.9.2 allows attackers to cause a redos via 
crafted JSON i ...)
- golang-github-tidwall-gjson  (bug #1011616)
+   [bullseye] - golang-github-tidwall-gjson  (Minor issue)
+   [buster] - golang-github-tidwall-gjson  (Minor issue)
NOTE: https://github.com/tidwall/gjson/issues/237
NOTE: 
https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96
 (v1.9.3)
 CVE-2021-42247
@@ -104016,6 +104026,8 @@ CVE-2021-21417 (fluidsynth is a software synthesizer 
based on the SoundFont 2 sp
NOTE: 
https://github.com/FluidSynth/fluidsynth/security/advisories/GHSA-6fcq-pxhc-jxc9
 CVE-2021-21416 (django-registration is a user registration package for Django. 
The dja ...)
- python-django-registration  (bug #987366)
+   [bullseye] - python-django-registration  (Minor issue)
+   [buster] - python-django-registration  (Minor issue)
[stretch] - python-django-registration  (Minor issue)
NOTE: 
https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh
NOTE: 
https://github.com/ubernostrum/django-registration/commit/8206af081e239598cfd15d165d4d8ab9849ee23c
@@ -106991,6 +107003,7 @@ CVE-2021-20292 (There is a flaw reported in the Linux 
kernel in versions before
 CVE-2021-20291 (A deadlock vulnerability was found in 
'github.com/containers/storage'  ...)
[experimental] - golang-github-containers-storage 1.29.0+ds1-1
- golang-github-containers-storage 1.34.1+ds1-1 (bug #988942)
+   [bullseye] - golang-github-containers-storage  (Minor issue)
NOTE: 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7d2c0910 by Moritz Muehlenhoff at 2022-06-17T17:16:22+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -2032,9 +2032,10 @@ CVE-2022-32767
 CVE-2022-32979
RESERVED
 CVE-2022-32978 (There is an assertion failure in 
SingleComponentLSScan::ParseMCU in si ...)
-   - libjpeg 
+   - libjpeg  (unimportant)
NOTE: https://github.com/thorfdbg/libjpeg/issues/75
NOTE: 
https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-32977
RESERVED
 CVE-2022-32976
@@ -2476,11 +2477,10 @@ CVE-2022-2044
 CVE-2022-2043
RESERVED
 CVE-2022-2042 (Use After Free in GitHub repository vim/vim prior to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba
NOTE: 
https://github.com/vim/vim/commit/2813f38e021c6e6581c0c88fcf107e41788bc835 
(v8.2.5072)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-2041
RESERVED
 CVE-2022-2040
@@ -2974,6 +2974,8 @@ CVE-2022-32548
RESERVED
 CVE-2022-32547 (In ImageMagick, there is load of misaligned address for type 
'double', ...)
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091813
NOTE: https://github.com/ImageMagick/ImageMagick/issues/5033
NOTE: https://github.com/ImageMagick/ImageMagick/pull/5034
@@ -2981,6 +2983,8 @@ CVE-2022-32547 (In ImageMagick, there is load of 
misaligned address for type 'do
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b
 (6.9.12-45)
 CVE-2022-32546 (A vulnerability was found in ImageMagick, causing an outside 
the range ...)
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091812
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4985
NOTE: https://github.com/ImageMagick/ImageMagick/pull/4986
@@ -2988,6 +2992,8 @@ CVE-2022-32546 (A vulnerability was found in ImageMagick, 
causing an outside the
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943
 (6.9.12-44)
 CVE-2022-32545 (A vulnerability was found in ImageMagick, causing an outside 
the range ...)
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091811
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4962
NOTE: https://github.com/ImageMagick/ImageMagick/pull/4963
@@ -6449,6 +6455,8 @@ CVE-2022-31292
RESERVED
 CVE-2022-31291 (An issue in dlt_config_file_parser.c of dlt-daemon v2.18.8 
allows atta ...)
- dlt-daemon 
+   [bullseye] - dlt-daemon  (Minor issue)
+   [buster] - dlt-daemon  (Minor issue)
NOTE: https://github.com/COVESA/dlt-daemon/pull/376
NOTE: 
https://github.com/COVESA/dlt-daemon/commit/6a3bd901d825c7206797e36ea98e10a218f5aad2
 CVE-2022-31290
@@ -19998,6 +20006,8 @@ CVE-2022-26636
RESERVED
 CVE-2022-26635 (PHP-Memcached v2.2.0 and below contains an improper NULL 
termination w ...)
- php-memcached  (bug #1009328)
+   [bullseye] - php-memcached  (Minor issue)
+   [buster] - php-memcached  (Minor issue)
[stretch] - php-memcached  (Minor issue)
NOTE: https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/
 CVE-2022-26634 (HMA VPN v5.3.5913.0 contains an unquoted service path which 
allows att ...)
@@ -20314,6 +20324,8 @@ CVE-2022-26492
 CVE-2022-26491 (An issue was discovered in Pidgin before 2.14.9. A remote 
attacker who ...)
{DLA-3043-1}
- pidgin 2.14.9-1
+   [bullseye] - pidgin  (Minor issue)
+   [buster] - pidgin  (Minor issue)
NOTE: https://pidgin.im/about/security/advisories/cve-2022-26491/
NOTE: https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc
 CVE-2022-26489
@@ -25435,6 +25447,8 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended version 
of the C reference implem
- python-cmarkgfm 0.7.0-1 (bug #1006758)
- ruby-commonmarker  (bug #1006759)
- r-cran-commonmark 1.8.0-1 (bug #1006760)
+   [bullseye] - r-cran-commonmark  (Minor issue)
+   [buster] - r-cran-commonmark  (Minor issue)
NOTE: 
https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x
NOTE: 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
41600bc3 by Moritz Muehlenhoff at 2022-06-16T20:05:44+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1105,6 +1105,8 @@ CVE-2022-0
 CVE-2022-2085
RESERVED
- ghostscript 9.56.0~dfsg-1
+   [bullseye] - ghostscript  (Minor issue)
+   [buster] - ghostscript  (Minor issue)
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=704945
NOTE: Fixed by: 
https://git.ghostscript.com/?p=ghostpdl.git;h=ae1061d948d88667bdf51d47d918c4684d0f67df
 (ghostpdl-9.56.0rc1)
 CVE-2022-2084



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41600bc3f6886a52bff815f9c28483b4088cbb8b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41600bc3f6886a52bff815f9c28483b4088cbb8b
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cb1b4183 by Moritz Muehlenhoff at 2022-06-09T08:57:46+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -4918,8 +4918,10 @@ CVE-2022-30793
RESERVED
 CVE-2022-30790 (Das U-Boot 2022.01 has a Buffer Overflow, a different issue 
than CVE-2 ...)
- u-boot 
+   [bullseye] - u-boot  (Minor issue)
+   [buster] - u-boot  (Minor issue)
NOTE: 
https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
-   TODO: check details
+   NOTE: 
https://source.denx.de/u-boot/u-boot/-/commit/b85d130ea0cac152c21ec38ac9417b31d41b5552
 CVE-2022-30789 (A crafted NTFS image can cause a heap-based buffer overflow in 
ntfs_ch ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
@@ -5012,6 +5014,7 @@ CVE-2022-30767 (nfs_lookup_reply in net/nfs.c in Das 
U-Boot through 2022.04 (and
NOTE: https://lists.denx.de/pipermail/u-boot/2022-May/483952.html
NOTE: 
https://securitylab.github.com/research/uboot-rce-nfs-vulnerability/
NOTE: Issue exists because of an incorrect fix for CVE-2019-14196.
+   NOTE: Patch: 
https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80
 CVE-2022-30766
RESERVED
 CVE-2022-30765 (Calibre-Web before 0.6.18 allows user table SQL Injection. ...)
@@ -5506,8 +5509,10 @@ CVE-2022-30553
RESERVED
 CVE-2022-30552 (Das U-Boot 2022.01 has a Buffer Overflow. ...)
- u-boot 
+   [bullseye] - u-boot  (Minor issue)
+   [buster] - u-boot  (Minor issue)
NOTE: 
https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
-   TODO: check details
+   NOTE: Patch: 
https://source.denx.de/u-boot/u-boot/-/commit/b85d130ea0cac152c21ec38ac9417b31d41b5552
 CVE-2022-30551 (OPC UA Legacy Java Stack 2022-04-01 allows a remote attacker 
to cause  ...)
TODO: check
 CVE-2022-30550



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb1b4183f73c5599b0bc16b02ad2dcd71aa5f941

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb1b4183f73c5599b0bc16b02ad2dcd71aa5f941
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2a083cab by Moritz Muehlenhoff at 2022-06-08T12:54:37+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -44562,28 +44562,34 @@ CVE-2021-42533 (Adobe Bridge version 11.1.1 (and 
earlier) is affected by a doubl
NOT-FOR-US: Adobe
 CVE-2021-42532 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a 
stack-b ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
NOTE: https://gitlab.freedesktop.org/libopenraw/exempi/-/releases
-   TODO: check for fixing commit
 CVE-2021-42531 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a 
stack-b ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
-   TODO: check for fixing commit
 CVE-2021-42530 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a 
stack-b ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
-   TODO: check for fixing commit
 CVE-2021-42529 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a 
stack-b ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
NOTE: 
https://github.com/adobe/XMP-Toolkit-SDK/compare/v2021.07...v2021.08
-   TODO: check for fixing commit
 CVE-2021-42528 (XMP Toolkit 2021.07 (and earlier) is affected by a Null 
pointer derefe ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html
NOTE: 
https://github.com/adobe/XMP-Toolkit-SDK/commit/16e53564ae6c2689387479c04770f492075d5b7b
 (v2021.08)
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=adobe-sdk=16e53564ae6c2689387479c04770f492075d5b7b
 (2.6.0)
@@ -50377,10 +50383,11 @@ CVE-2021-40733 (Adobe Animate version 21.0.9 (and 
earlier) is affected by a memo
NOT-FOR-US: Adobe
 CVE-2021-40732 (XMP Toolkit version 2020.1 (and earlier) is affected by a null 
pointer ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
NOTE: https://gitlab.freedesktop.org/libopenraw/exempi/-/releases
-   TODO: check for fixing commit
 CVE-2021-40731 (Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 
21.007.200 ...)
NOT-FOR-US: Adobe
 CVE-2021-40730 (Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 
21.007.200 ...)
@@ -50413,10 +50420,11 @@ CVE-2021-40717
RESERVED
 CVE-2021-40716 (XMP Toolkit SDK versions 2021.07 (and earlier) are affected by 
an out- ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
NOTE: https://gitlab.freedesktop.org/libopenraw/exempi/-/releases
-   TODO: check for fixing commit
 CVE-2021-40715 (Adobe Premiere Pro version 15.4 (and earlier) is affected by a 
memory  ...)
NOT-FOR-US: Adobe
 CVE-2021-40714 (Adobe Experience Manager version 6.5.9.0 (and earlier) is 
affected by  ...)
@@ -52603,10 +52611,11 @@ CVE-2021-39848
RESERVED
 CVE-2021-39847 (XMP Toolkit SDK version 2020.1 (and earlier) is affected by a 
stack-ba ...)
- exempi 2.6.0-1
+   [bullseye] - exempi  (Minor issue)
+   [buster] - exempi  (Minor issue)
NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html
NOTE: 
https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48
NOTE: 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-07 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3adefba4 by Moritz Muehlenhoff at 2022-06-07T13:12:07+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -5478,6 +5478,8 @@ CVE-2022-1651
NOTE: 
https://git.kernel.org/linus/ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b (5.18-rc1)
 CVE-2022-1650 (Exposure of Sensitive Information to an Unauthorized Actor in 
GitHub r ...)
- node-eventsource 2.0.2+~1.1.8-1
+   [bullseye] - node-eventsource  (Minor issue)
+   [buster] - node-eventsource  (Minor issue)
[stretch] - node-eventsource  (not covered by security 
support)
NOTE: https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/
NOTE: 
https://github.com/eventsource/eventsource/commit/10ee0c4881a6ba2fe65ec18ed195ac35889583c4
 (v2.0.2)
@@ -6792,11 +6794,9 @@ CVE-2022-30067 (GIMP 2.10.30 and 2.99.10 are vulnerable 
to Buffer Overflow. Thro
 CVE-2022-30066
RESERVED
 CVE-2022-30065 (A use-after-free in Busybox 1.35-x's awk applet leads to 
denial of ser ...)
-   - busybox 
-   [bullseye] - busybox  (Minor issue)
-   [buster] - busybox  (Minor issue)
-   [stretch] - busybox  (Minor issue, requires passing 
arbitrary awk program, no identified patch)
+   - busybox  (unimportant)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=14781
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-30064
RESERVED
 CVE-2022-30063 (ftcms =2.1 was discovered to be vulnerable to code 
execution attac ...)
@@ -7350,6 +7350,8 @@ CVE-2022-1516 (A NULL pointer dereference flaw was found 
in the Linux kernel
NOTE: CONFIG_X25 is not set in Debian
 CVE-2022-1515 (A memory leak was discovered in matio 1.5.21 and earlier in 
Mat_VarRea ...)
- libmatio 1.5.22-1
+   [bullseye] - libmatio  (Minor issue)
+   [buster] - libmatio  (Minor issue)
NOTE: https://github.com/tbeu/matio/issues/186
NOTE: Fixed by: 
https://github.com/tbeu/matio/commit/b53b62b756920f4c1509f4ee06427f66c3b5c9c4 
(v1.5.22)
 CVE-2022-1514 (Stored XSS via upload plugin functionality in zip format in 
GitHub rep ...)
@@ -7722,16 +7724,18 @@ CVE-2022-29801 (A vulnerability has been identified in 
Teamcenter V12.4 (All ver
NOT-FOR-US: Siemens
 CVE-2022-29800
RESERVED
-   - networkd-dispatcher  (bug #1010303)
+   - networkd-dispatcher  (unimportant; bug #1010303)
NOTE: 
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
NOTE: 
https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/074ff68f08d64a963a13e3cfc4fb3e3fb9006dfe
NOTE: 
https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/2e226ee027bdc8022f0e10470318f89f25dc6133
+   NOTE: No security impact in Debian, see #1010303
 CVE-2022-29799
RESERVED
-   - networkd-dispatcher  (bug #1010303)
+   - networkd-dispatcher  (unimportant; bug #1010303)
NOTE: 
https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
NOTE: 
https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/074ff68f08d64a963a13e3cfc4fb3e3fb9006dfe
NOTE: 
https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/2e226ee027bdc8022f0e10470318f89f25dc6133
+   NOTE: No security impact in Debian, see #1010303
 CVE-2022-29798
RESERVED
 CVE-2022-29797
@@ -11578,14 +11582,17 @@ CVE-2022-28368 (Dompdf 1.2.1 allows remote code 
execution via a .php file in the
NOTE: 
https://github.com/dompdf/dompdf/commit/0e0261b7bce372b3a05b712a023f6f742a22d57e
 (v0.8.0)
 CVE-2022-28367 (OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling 
on STYLE ...)
- libowasp-antisamy-java  (bug #1010154)
+   [bullseye] - libowasp-antisamy-java  (Minor issue)
+   [buster] - libowasp-antisamy-java  (Minor issue)
NOTE: 
https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae
 (v1.6.6)
NOTE: Make sure to fix the issue completely and include the commit 
otherwise opening CVE-2022-29577
NOTE: 
https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0
 (v1.6.7)
 CVE-2022-28366 (Certain Neko-related HTML parsers allow a denial of service 
via crafte ...)
- libowasp-antisamy-java  (bug #1010154)
+   [bullseye] - libowasp-antisamy-java  (Minor issue)
+   [buster] - libowasp-antisamy-java  (Minor issue)
NOTE: https://github.com/nahsra/antisamy/releases/tag/v1.6.6
NOTE: https://github.com/nahsra/antisamy/issues/174
-   TODO: check upstream for commits
 CVE-2022-28365 (Reprise License Manager 14.2 is affected by an Information 
Disclosure  ...)
NOT-FOR-US: Reprise License Manager
 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9835c586 by Moritz Mühlenhoff at 2022-06-04T19:48:50+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -6572,6 +6572,8 @@ CVE-2022-1538
RESERVED
 CVE-2022-1537 (file.copy operations in GruntJS are vulnerable to a TOCTOU race 
condit ...)
- grunt 1.5.3-1
+   [bullseye] - grunt  (Minor issue)
+   [buster] - grunt  (Minor issue)
NOTE: https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d/
NOTE: 
https://github.com/gruntjs/grunt/commit/58016ffac5ed9338b63ecc2a63710f5027362bae
 (v1.5.3)
 CVE-2022-1536 (A vulnerability has been found in automad up to 1.10.9 and 
classified  ...)
@@ -31512,6 +31514,8 @@ CVE-2021-45768
RESERVED
 CVE-2021-45767 (GPAC 1.1.0 was discovered to contain an invalid memory address 
derefer ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1982
NOTE: 
https://github.com/gpac/gpac/commit/830548acd030467e857f4cf0b79af8ebf1e04dde 
(v2.0.0)
@@ -31521,16 +31525,22 @@ CVE-2021-45765
RESERVED
 CVE-2021-45764 (GPAC v1.1.0 was discovered to contain an invalid memory 
address derefe ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1971
NOTE: 
https://github.com/gpac/gpac/commit/e54df17892bee983d09d9437e44e6a1528fb46cb 
(v2.0.0)
 CVE-2021-45763 (GPAC v1.1.0 was discovered to contain an invalid call in the 
function  ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1974
NOTE: 
https://github.com/gpac/gpac/commit/d2f74e49f2cb8d687c0dc38f66b99e3c5c7d7fec 
(v2.0.0)
 CVE-2021-45762 (GPAC v1.1.0 was discovered to contain an invalid memory 
address derefe ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1978
NOTE: 
https://github.com/gpac/gpac/commit/6d647f6e458c9b727eae1a8077d27fa433ced788 
(v2.0.0)
@@ -31538,6 +31548,8 @@ CVE-2021-45761 (ROPium v3.1 was discovered to contain 
an invalid memory address
NOT-FOR-US: ROPium
 CVE-2021-45760 (GPAC v1.1.0 was discovered to contain an invalid memory 
address derefe ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1966
NOTE: 
https://github.com/gpac/gpac/commit/5041fcbaa904a89d280561905a163171b3828cea 
(v2.0.0)
@@ -33150,6 +33162,8 @@ CVE-2021-45298
RESERVED
 CVE-2021-45297 (An infinite loop vulnerability exists in Gpac 1.0.1 in 
gf_get_bit_size ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1973
NOTE: 
https://github.com/gpac/gpac/commit/fb13af36286b9d898e332e8762a286eb83bd1770 
(v2.0.0)
@@ -43575,18 +43589,24 @@ CVE-2021-42615
RESERVED
 CVE-2021-42614 (A use after free in info_width_internal in bk_info.c in 
Halibut 1.2 al ...)
- halibut 1.3-1
+   [bullseye] - halibut  (Minor issue)
+   [buster] - halibut  (Minor issue)
NOTE: 
https://carteryagemann.com/halibut-case-study.html#poc-halibut-info-uaf
NOTE: Inventing an errorstate to pass to all err_* functions and use it 
to track fatal errors:
NOTE: 
https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=5c3db60a2911efb18bdc823264b74d8045c407b9
 (1.3)
NOTE: 
https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=edaf724febe2f9c890ef1cfdf24a78d5c1da2b32
 (1.3)
 CVE-2021-42613 (A double free in cleanup_index in index.c in Halibut 1.2 
allows an att ...)
- halibut 1.3-1
+   [bullseye] - halibut  (Minor issue)
+   [buster] - halibut  (Minor issue)
NOTE: 
https://carteryagemann.com/halibut-case-study.html#poc-halibut-winhelp-df
NOTE: Inventing an errorstate to pass to all err_* functions and use it 
to track fatal errors:
NOTE: 
https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=5c3db60a2911efb18bdc823264b74d8045c407b9
 (1.3)
NOTE: 
https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=edaf724febe2f9c890ef1cfdf24a78d5c1da2b32
 (1.3)
 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6bd5cc0b by Moritz Muehlenhoff at 2022-06-03T12:24:37+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -4377,7 +4377,9 @@ CVE-2022-30629
- golang-1.18 1.18.3-1
- golang-1.17 
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
+   [buster] - golang-1.11  (Minor issue)
- golang-1.8 
- golang-1.7 
NOTE: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg
@@ -8544,6 +8546,8 @@ CVE-2022-29243 (Nextcloud Server is the file server 
software for Nextcloud, a se
- nextcloud-server  (bug #941708)
 CVE-2022-29242 (GOST engine is a reference implementation of the Russian GOST 
crypto a ...)
- libengine-gost-openssl1.1 
+   [bullseye] - libengine-gost-openssl1.1  (Minor issue)
+   [buster] - libengine-gost-openssl1.1  (Minor issue)
NOTE: 
https://github.com/gost-engine/engine/security/advisories/GHSA-2rmw-8wpg-vgw5
NOTE: 
https://github.com/gost-engine/engine/commit/7df766124f87768b43b9e8947c5a01e17545772c
 (v3.0.1)
NOTE: 
https://github.com/gost-engine/engine/commit/b2b4d629f100eaee9f5942a106b1ccefe85b8808
 (v3.0.1)
@@ -10088,6 +10092,8 @@ CVE-2022-1254 (A URL redirection vulnerability in 
Skyhigh SWG in main releases 1
NOT-FOR-US: Skyhigh SWG
 CVE-2022-1253 (Heap-based Buffer Overflow in GitHub repository 
strukturag/libde265 pr ...)
- libde265 
+   [bullseye] - libde265  (Minor issue)
+   [buster] - libde265  (Minor issue)
[stretch] - libde265  (Minor issue)
NOTE: https://huntr.dev/bounties/1-other-strukturag/libde265/
NOTE: 
https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8
@@ -43284,24 +43290,24 @@ CVE-2021-42706 (This vulnerability could allow an 
attacker to disclose informati
 CVE-2021-42705 (PLC Editor Versions 1.3.8 and prior is vulnerable to a 
stack-based buf ...)
NOT-FOR-US: PLC Editor
 CVE-2021-42704 (Inkscape version 0.91 is vulnerable to an out-of-bounds write, 
which m ...)
-   - inkscape 1.0-1
+   - inkscape 1.0-1 (unimportant)
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating 
possible patches)
-   TODO: Unclear if this is really fixed in 1.0+
+   NOTE: oob read/crash in GUI tool, no security impact
 CVE-2021-42703 (This vulnerability could allow an attacker to send malicious 
Javascrip ...)
NOT-FOR-US: Advantech
 CVE-2021-42702 (Inkscape version 0.91 can access an uninitialized pointer, 
which may a ...)
-   - inkscape 1.0-1
+   - inkscape 1.0-1 (unimportant)
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating 
possible patches)
-   TODO: Unclear if this is really fixed in 1.0+
+   NOTE: oob read/crash in GUI tool, no security impact
 CVE-2021-42701 (An attacker could prepare a specially crafted project file 
that, if op ...)
NOT-FOR-US: AzeoTech
 CVE-2021-42700 (Inkscape 0.91 is vulnerable to an out-of-bounds read, which 
may allow  ...)
-   - inkscape 1.0-1
+   - inkscape 1.0-1 (unimportant)
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating 
possible patches)
-   TODO: Unclear if this is really fixed in 1.0+
+   NOTE: oob read/crash in GUI tool, no security impact
 CVE-2021-42699 (The affected product is vulnerable to cookie information being 
transmi ...)
NOT-FOR-US: AzeoTech
 CVE-2021-42698 (Project files are stored memory objects in the form of binary 
serializ ...)
@@ -62728,6 +62734,8 @@ CVE-2021-35453
RESERVED
 CVE-2021-35452 (An Incorrect Access Control vulnerability exists in libde265 
v1.0.8 du ...)
- libde265 
+   [bullseye] - libde265  (Minor issue)
+   [buster] - libde265  (Minor issue)
[stretch] - libde265  (Minor issue, revisit when fixed 
upstream)
NOTE: https://github.com/strukturag/libde265/issues/298
 CVE-2021-35451 (In Teradici PCoIP Management Console-Enterprise 20.07.0, an 
unauthenti ...)


=
data/dsa-needed.txt
=
@@ -22,6 +22,8 @@ epiphany-browser
 --
 freecad (aron)
 --
+kicad
+--
 libpgjava (apo)
 --
 linux (carnil)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6bd5cc0ba63af33abf50981d733988468b0430ca

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6bd5cc0ba63af33abf50981d733988468b0430ca
You're receiving this email 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-06-01 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
92e43a19 by Moritz Muehlenhoff at 2022-06-01T20:30:00+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -10,6 +10,8 @@ CVE-2022-32201 (In libjpeg 1.63, there is a NULL pointer 
dereference in Componen
NOTE: Crash in CLI tool, no security impact
 CVE-2022-32200 (libdwarf 0.4.0 has a heap-based buffer over-read in 
_dwarf_check_strin ...)
- dwarfutils 
+   [bullseye] - dwarfutils  (Minor issue)
+   [buster] - dwarfutils  (Minor issue)
NOTE: Fixed by: 
https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069
NOTE: https://github.com/davea42/libdwarf-code/issues/116
NOTE: https://www.prevanders.net/dwarfbug.html#DW202205-001
@@ -50031,20 +50033,22 @@ CVE-2021-40403 (An information disclosure 
vulnerability exists in the pick-and-p
NOTE: https://github.com/gerbv/gerbv/issues/82
NOTE: Fixed by: 
https://github.com/gerbv/gerbv/commit/c32c6f9c0b5d3b0ecc33de21d8532de6c2df5878 
(v2.9.1-rc.1)
 CVE-2021-40402 (An out-of-bounds read vulnerability exists in the RS-274X 
aperture mac ...)
-   - gerbv 
+   - gerbv  (unimportant)
NOTE: https://github.com/gerbv/gerbv/issues/80
NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416
+   NOTE: Crash in GUI tool, no security impact
 CVE-2021-40401 (A use-after-free vulnerability exists in the RS-274X aperture 
definiti ...)
- gerbv 
NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415
NOTE: Fixed by: 
https://github.com/gerbv/gerbv/commit/68ee18945bcf68ff964c42f12af79c5c0e2f4069 
(v2.9.0-rc.1)
NOTE: https://github.com/gerbv/gerbv/issues/81
 CVE-2021-40400 (An out-of-bounds read vulnerability exists in the RS-274X 
aperture mac ...)
-   - gerbv 
+   - gerbv  (unimportant)
NOTE: https://github.com/gerbv/gerbv/issues/79
NOTE: https://github.com/gerbv/gerbv/pull/124
NOTE: Fixed by: 
https://github.com/gerbv/gerbv/commit/caa6560d5d683f827c672fd5e380f89a8ef632b6
NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413
+   NOTE: Crash in GUI tool, no security impact
 CVE-2021-40399 (An exploitable use-after-free vulnerability exists in WPS 
Spreadsheets ...)
NOT-FOR-US: WPS Office
 CVE-2021-40398 (An out-of-bounds write vulnerability exists in the 
parse_raster_data f ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92e43a19c4806603684092f0394aaffe05b14c92

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92e43a19c4806603684092f0394aaffe05b14c92
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-30 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7c3bb261 by Moritz Muehlenhoff at 2022-05-30T21:03:10+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -456,9 +456,13 @@ CVE-2022-31652
RESERVED
 CVE-2022-31651 (In SoX 14.4.2, there is an assertion failure in rate_init in 
rate.c in ...)
- sox 
+   [bullseye] - sox  (Minor issue)
+   [buster] - sox  (Minor issue)
NOTE: https://sourceforge.net/p/sox/bugs/360/
 CVE-2022-31650 (In SoX 14.4.2, there is a floating-point exception in 
lsx_aiffstartwri ...)
- sox 
+   [bullseye] - sox  (Minor issue)
+   [buster] - sox  (Minor issue)
NOTE: https://sourceforge.net/p/sox/bugs/360/
 CVE-2022-31649
RESERVED
@@ -58344,6 +58348,8 @@ CVE-2021-36716 (A ReDoS (regular expression denial of 
service) flaw was found in
NOT-FOR-US: Node is-email
 CVE-2021-3643 (A flaw was found in sox 14.4.1. The lsx_adpcm_init function 
within lib ...)
- sox  (bug #1010374)
+   [bullseye] - sox  (Minor issue)
+   [buster] - sox  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1980626
NOTE: Triggered by same reproducer as for CVE-2021-23210
NOTE: https://sourceforge.net/p/sox/bugs/351/
@@ -65115,6 +65121,8 @@ CVE-2021-33841 (SGE-PLC1000 device, in its 0.9.2b 
firmware version, does not han
 CVE-2021-23210 [divide by zero in voc.c]
RESERVED
- sox  (bug #1010374)
+   [bullseye] - sox  (Minor issue)
+   [buster] - sox  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1975670
NOTE: https://sourceforge.net/p/sox/bugs/351/
 CVE-2021-23172



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c3bb2610282e2e6880db746a40d44a2a47aa86e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c3bb2610282e2e6880db746a40d44a2a47aa86e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-30 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
239f0af2 by Moritz Muehlenhoff at 2022-05-30T20:13:07+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -9041,6 +9041,8 @@ CVE-2022-1216 (The Advanced Image Sitemap WordPress 
plugin through 1.2 does not
 CVE-2022-1215
RESERVED
- libinput 1.20.1-1
+   [bullseye] - libinput  (Minor issue)
+   [buster] - libinput  (Minor issue)
[stretch] - libinput  (Vulnerable code introduced later)
NOTE: https://www.openwall.com/lists/oss-security/2022/04/20/2
NOTE: 
https://gitlab.freedesktop.org/libinput/libinput/-/commit/2a8b8fde90d63d48ce09ddae44142674bbca1c28


=
data/dsa-needed.txt
=
@@ -36,6 +36,8 @@ nodejs (jmm)
 --
 puma/oldstable
 --
+python-bottle (jmm)
+--
 rpki-client/stable
   new 7.6 release required libretls, which isn't in Bullseye
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/239f0af2be152614ac84f50b9a843dfbe1abae83

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/239f0af2be152614ac84f50b9a843dfbe1abae83
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-30 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5d6d0eff by Moritz Muehlenhoff at 2022-05-30T18:44:40+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -30,11 +30,10 @@ CVE-2022-1929
 CVE-2022-1928 (Cross-site Scripting (XSS) - Stored in GitHub repository 
go-gitea/gite ...)
- gitea 
 CVE-2022-1927 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
NOTE: 
https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 
(v8.2.5037)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1926
RESERVED
 CVE-2022-31793
@@ -19670,12 +19669,16 @@ CVE-2022-24884 (ecdsautils is a tiny collection of 
programs used for ECDSA (keyg
NOTE: 
https://github.com/freifunk-gluon/ecdsautils/commit/1d4b091abdf15ad7b2312535b5b95ad70f6dbd08
 (v0.4.1)
 CVE-2022-24883 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP). ...)
- freerdp2 2.7.0+dfsg1-1
+   [bullseye] - freerdp2  (Minor issue)
+   [buster] - freerdp2  (Minor issue)
- freerdp 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf
NOTE: Fixed by: 
https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc
NOTE: Fixed by (backport): 
https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144
 CVE-2022-24882 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP). ...)
- freerdp2 2.7.0+dfsg1-1
+   [bullseye] - freerdp2  (Minor issue)
+   [buster] - freerdp2  (Minor issue)
- freerdp 
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh
NOTE: https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95
@@ -95178,6 +95181,8 @@ CVE-2021-21898 (A code execution vulnerability exists 
in the dwgCompressor::deco
NOTE: 
https://github.com/LibreCAD/libdxfrw/commit/ba3fa95648bef948e008dfbdd31a4d21badd71f0
 CVE-2021-21897 (A code execution vulnerability exists in the 
DL_Dxf::handleLWPolylineD ...)
- cloudcompare  (bug #1010347)
+   [bullseye] - cloudcompare  (Minor issue)
+   [buster] - cloudcompare  (Minor issue)
- dxflib 3.26.4-1
[bullseye] - dxflib  (Minor issue)
[buster] - dxflib  (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d6d0eff00ebc259a6317ecc29020dc2a760ac5d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d6d0eff00ebc259a6317ecc29020dc2a760ac5d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-27 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0ffdcddf by Moritz Muehlenhoff at 2022-05-27T19:22:07+02:00
buster/bullseye triage
add one more patch needed for pcre issue

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2317,12 +2317,13 @@ CVE-2022-25932
RESERVED
 CVE-2022-1736
RESERVED
-   - gnome-remote-desktop 42.1.1-2
+   - gnome-remote-desktop 42.1.1-2 (unimportant)
NOTE: 
https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1973028/comments/3
NOTE: The CVE is assigned based on the Ubuntu policy strongly 
discouraging open ports by
NOTE: default (https://wiki.ubuntu.com/Security/Features#ports) and the 
fact that the user
NOTE: service was enabled by default (and not automatically enabled 
anymore since 42.1.1-2)
-   TODO: check, if we want to threat this as unimportant severity issue
+   NOTE: Not treated as a security issue in Debian, whether to start the 
daemon or not is ultimately
+   NOTE: up to the local admin
 CVE-2022-1735 (Classic Buffer Overflow in GitHub repository vim/vim prior to 
8.2.4969 ...)
- vim  (unimportant)
NOTE: https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
@@ -4047,6 +4048,8 @@ CVE-2022-30285
RESERVED
 CVE-2022-30284 (In the python-libnmap package through 0.7.2 for Python, remote 
command ...)
- python-libnmap 
+   [bullseye] - python-libnmap  (Minor issue)
+   [buster] - python-libnmap  (Minor issue)
NOTE: https://www.swascan.com/security-advisory-libnmap-2/
 CVE-2022-30283
RESERVED
@@ -4104,6 +4107,7 @@ CVE-2022-1587 (An out-of-bounds read vulnerability was 
discovered in the PCRE2 l
 CVE-2022-1586 (An out-of-bounds read vulnerability was discovered in the PCRE2 
librar ...)
- pcre2 10.40-1
NOTE: 
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a
 (pcre2-10.40)
+   NOTE: 
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
 CVE-2022-1585
RESERVED
 CVE-2022-30259
@@ -7995,6 +7999,8 @@ CVE-2022-28920 (Tieba-Cloud-Sign v4.9 was discovered to 
contain a cross-site scr
NOT-FOR-US: Baidu Tieba
 CVE-2022-28919 (HTMLCreator release_stable_2020-07-29 was discovered to 
contain a cros ...)
- dokuwiki  (bug #1011056)
+   [bullseye] - dokuwiki  (Minor issue)
+   [buster] - dokuwiki  (Minor issue)
NOTE: https://github.com/splitbrain/dokuwiki/issues/3651
NOTE: 
https://github.com/splitbrain/dokuwiki/commit/d3233986baa7dfe44490b805ae2e4296fad59401
 CVE-2022-28918 (GreenCMS v2.3.0603 was discovered to contain an arbitrary file 
deletio ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ffdcddf525cecac62c1e2e1b5d1d8cdf35b741f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ffdcddf525cecac62c1e2e1b5d1d8cdf35b741f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
84d2c879 by Moritz Muehlenhoff at 2022-05-27T00:41:10+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -293,11 +293,10 @@ CVE-2022-31619
 CVE-2022-1887
RESERVED
 CVE-2022-1886 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a
NOTE: 
https://github.com/vim/vim/commit/2a585c85013be22f59f184d49612074fd9b115d7 
(v8.2.5016)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1885
RESERVED
 CVE-2022-1884
@@ -13610,6 +13609,8 @@ CVE-2022-26968
RESERVED
 CVE-2022-26967 (GPAC 2.0 allows a heap-based buffer overflow in 
gf_base64_encode. It c ...)
- gpac  (bug #1007224)
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2138
NOTE: 
https://github.com/gpac/gpac/commit/ea1eca00fd92fa17f0e25ac25652622924a9a6a0
@@ -25452,6 +25453,8 @@ CVE-2022-0218 (The WP HTML Mail WordPress plugin is 
vulnerable to unauthorized a
 CVE-2022-0216
RESERVED
- qemu 
+   [bullseye] - qemu  (Minor issue)
+   [buster] - qemu  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2036953
NOTE: https://starlabs.sg/advisories/22-0216
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/972
@@ -159323,6 +159326,8 @@ CVE-2020-8860 (This vulnerability allows remote 
attackers to execute arbitrary c
 CVE-2020-8859 (This vulnerability allows remote attackers to create a 
denial-of-servi ...)
{DLA-3014-1}
- elog 
+   [bullseye] - elog  (Minor issue)
+   [buster] - elog  (Minor issue)
NOTE: https://elog.psi.ch/elogs/Forum/69114
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-20-252/
NOTE: 
https://bitbucket.org/ritt/elog/commits/033e292301fa569738b20768b8d1f1d7d0bc1ca7



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d2c8799b55ec27c1facad007ec940b85875c73

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d2c8799b55ec27c1facad007ec940b85875c73
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
470058db by Moritz Muehlenhoff at 2022-05-24T17:21:08+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,3 +1,4 @@
+
 CVE-2022-31598
RESERVED
 CVE-2022-31597
@@ -7052,17 +7053,20 @@ CVE-2022-29025
 CVE-2022-29024
RESERVED
 CVE-2022-29023 (A buffer overflow in the razermouse driver of OpenRazer v3.3.0 
and bel ...)
-   - openrazer 3.3.0+dfsg-1
+   - openrazer 3.3.0+dfsg-1 (unimportant)
NOTE: https://github.com/openrazer/openrazer/pull/1790
NOTE: 
https://github.com/openrazer/openrazer/commit/7e8a04feb378a679f1bcdcae079a5100cc45663b
 (v3.3.0)
+   NOTE: Negligible security impact
 CVE-2022-29022 (A buffer overflow in the razeraccessory driver of OpenRazer 
v3.3.0 and ...)
-   - openrazer 3.3.0+dfsg-1
+   - openrazer 3.3.0+dfsg-1 (unimportant)
NOTE: https://github.com/openrazer/openrazer/pull/1790
NOTE: 
https://github.com/openrazer/openrazer/commit/7e8a04feb378a679f1bcdcae079a5100cc45663b
 (v3.3.0)
+   NOTE: Negligible security impact
 CVE-2022-29021 (A buffer overflow in the razerkbd driver of OpenRazer v3.3.0 
and below ...)
-   - openrazer 3.3.0+dfsg-1
+   - openrazer 3.3.0+dfsg-1 (unimportant)
NOTE: https://github.com/openrazer/openrazer/pull/1790
NOTE: 
https://github.com/openrazer/openrazer/commit/7e8a04feb378a679f1bcdcae079a5100cc45663b
 (v3.3.0)
+   NOTE: Negligible security impact
 CVE-2022-29020 (ForestBlog through 2022-02-16 allows admin/profile/save 
userAvatar XSS ...)
NOT-FOR-US: ForestBlog
 CVE-2022-29019
@@ -33471,6 +33475,7 @@ CVE-2021-44550 (An Incorrect Access Control 
vulnerability exists in CoreNLP 4.3.
NOT-FOR-US: CoreNLP
 CVE-2021-4070 (Off-by-one Error in GitHub repository v2fly/v2ray-core prior to 
4.44.0 ...)
- golang-v2ray-core 4.34.0-7 (bug #1010377)
+   [bullseye] - golang-v2ray-core  (Minor issue)
NOTE: https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877/
NOTE: 
https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c
 CVE-2021-44549 (Apache Sling Commons Messaging Mail provides a simple layer on 
top of  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/470058db03eceb200dbae9656629813a5590daf3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/470058db03eceb200dbae9656629813a5590daf3
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6cbe8306 by Moritz Muehlenhoff at 2022-05-24T13:59:17+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1405,11 +1405,13 @@ CVE-2022-30976 (GPAC 2.0.0 misuses a certain Unicode 
utf8_wcslen (renamed gf_utf
NOTE: 
https://github.com/gpac/gpac/commit/915e2cba715f36b7cc29e2117831ca143d78
 CVE-2022-30975 (In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has 
a NULL p ...)
- mujs 
+   [bullseye] - mujs  (Minor issue)
NOTE: https://github.com/ccxvii/mujs/issues/161
NOTE: 
https://github.com/ccxvii/mujs/commit/910acc807c3c057e1c0726160808f3a9f37b40ec
NOTE: 
https://github.com/ccxvii/mujs/commit/f5b3c703e18725e380b83427004632e744f85a6f
 CVE-2022-30974 (compile in regexp.c in Artifex MuJS through 1.2.0 results in 
stack con ...)
- mujs 
+   [bullseye] - mujs  (Minor issue)
NOTE: https://github.com/ccxvii/mujs/issues/162
NOTE: 
https://github.com/ccxvii/mujs/commit/160ae29578054dc09fd91e5401ef040d52797e61
NOTE: 
https://github.com/ccxvii/mujs/commit/799b62bf065b006e2bcb1c80044eab2b10412ecf
@@ -3958,6 +3960,8 @@ CVE-2022-30066
RESERVED
 CVE-2022-30065 (A use-after-free in Busybox 1.35-x's awk applet leads to 
denial of ser ...)
- busybox 
+   [bullseye] - busybox  (Minor issue)
+   [buster] - busybox  (Minor issue)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=14781
 CVE-2022-30064
RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6cbe83067caa3084d439fc753d990fd48c5dfee0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6cbe83067caa3084d439fc753d990fd48c5dfee0
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
209bdb15 by Moritz Muehlenhoff at 2022-05-23T09:39:23+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -626,10 +626,10 @@ CVE-2022-30977
 CVE-2022-29496
RESERVED
 CVE-2022-1796 (Use After Free in GitHub repository vim/vim prior to 8.2.4979. 
...)
-   - vim 
-   [stretch] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e
NOTE: 
https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5 
(v8.2.4979)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1795 (Use After Free in GitHub repository gpac/gpac prior to 
v2.1.0-DEV. ...)
- gpac 
[stretch] - gpac  (No longer supported in LTS)
@@ -657,6 +657,8 @@ CVE-2022-1786
RESERVED
 CVE-2022-1785 (Out-of-bounds Write in GitHub repository vim/vim prior to 
8.2.4977. ...)
- vim 
+   [bullseye] - vim  (Minor issue)
+   [buster] - vim  (Minor issue)
[stretch] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
NOTE: 
https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839 
(v8.2.4977)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/209bdb150e515717c4bc003ff75a5638aa46aae3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/209bdb150e515717c4bc003ff75a5638aa46aae3
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-19 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a0920974 by Moritz Muehlenhoff at 2022-05-19T14:31:54+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -539,9 +539,10 @@ CVE-2022-1773
 CVE-2022-1772
RESERVED
 CVE-2022-1771 (Stack-based Buffer Overflow in GitHub repository vim/vim prior 
to 8.2. ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
NOTE: 
https://github.com/vim/vim/commit/51f0bfb88a3554ca2dde777d78a59880d1ee37a8 
(v8.2.4975)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2019-25061 (The random_password_generator (aka RandomPasswordGenerator) 
gem throug ...)
NOT-FOR-US: bvsatyaram/random_password_generator
 CVE-2022-30973
@@ -3061,10 +3062,11 @@ CVE-2022-30069
 CVE-2022-30068
RESERVED
 CVE-2022-30067 (GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. 
Through a  ...)
-   - gimp 
+   - gimp  (unimportant)
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/8120
NOTE: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/4f99f1fcfd892ead19831b5adcd38a99d71214b6
 (master)
NOTE: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/8cd6d05232795ac31076013db1c6be3dc67e8e09
 (gimp-2-10)
+   NOTE: Crash in GUI application, no security impact
 CVE-2022-30066
RESERVED
 CVE-2022-30065 (A use-after-free in Busybox 1.35-x's awk applet leads to 
denial of ser ...)
@@ -32764,99 +32766,118 @@ CVE-2021-44511
RESERVED
 CVE-2021-44510 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44509 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44508 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44507 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44506 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44505 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44504 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm 
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
NOTE: 
http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html
NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828
-   TODO: check upstream to find out which changes affect which CVE
 CVE-2021-44503 (An issue was discovered in FIS GT.M through V7.0-000 (related 
to the Y ...)
- fis-gtm  (bug #1009900)
+   [bullseye] - fis-gtm  (Minor issue)
+   [buster] - fis-gtm  (Minor issue)
  

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
295a2b57 by Moritz Muehlenhoff at 2022-05-17T23:04:43+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3,11 +3,10 @@ CVE-2022-30973
 CVE-2022-1770
RESERVED
 CVE-2022-1769 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c
NOTE: 
https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4 
(v8.2.4974)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1768
RESERVED
 CVE-2022-1767
@@ -259,22 +258,20 @@ CVE-2022-1736
NOTE: service was enabled by default (and not automatically enabled 
anymore since 42.1.1-2)
TODO: check, if we want to threat this as unimportant severity issue
 CVE-2022-1735 (Classic Buffer Overflow in GitHub repository vim/vim prior to 
8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
NOTE: 
https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97 
(v8.2.4969)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1734
RESERVED
- linux  (unimportant)
NOTE: 
https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6)
NOTE: Support for Marvell NFC devices (CONFIG_NFC_MRVL) not enabled
 CVE-2022-1733 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 8.2. ...)
-   - vim 
-   [bullseye] - vim  (Minor issue)
-   [buster] - vim  (Minor issue)
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
NOTE: 
https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813 
(v8.2.4968)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1732
RESERVED
 CVE-2022-1731 (Metasonic Doc WebClient 7.0.14.0 / 7.0.12.0 / 7.0.3.0 is 
vulnerable to ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a2b578e2764252ec6ebb57912dd7b326ea9c8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a2b578e2764252ec6ebb57912dd7b326ea9c8
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-13 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
da3ade15 by Moritz Muehlenhoff at 2022-05-13T14:03:31+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -958,10 +958,14 @@ CVE-2022-26041
RESERVED
 CVE-2022-1623 (LibTIFF master branch has an out-of-bounds read in LZWDecode in 
libtif ...)
- tiff 
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/410
 CVE-2022-1622 (LibTIFF master branch has an out-of-bounds read in LZWDecode in 
libtif ...)
- tiff 
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/410
 CVE-2022-1621 (Heap buffer overflow in vim_strncpy find_word in GitHub 
repository vim ...)


=
data/dsa-needed.txt
=
@@ -56,7 +56,10 @@ trafficserver (jmm)
   wait until status for CVE-2021-38161 is clarified (upstream patch got 
reverted)
 --
 unzip
-  no details public yet
+  unclear information, initial report indicates writable memory corruption, but
+  some identified patch is just for a NULL deref, needs more clarification
+--
+waitress (jmm)
 --
 wordpress
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da3ade15d88acdb6d41bcf13653cf34c13ccbfe6

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da3ade15d88acdb6d41bcf13653cf34c13ccbfe6
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-12 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a4066781 by Moritz Muehlenhoff at 2022-05-12T16:58:57+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1670,9 +1670,13 @@ CVE-2022-29979
RESERVED
 CVE-2022-29978 (There is a floating point exception error in 
sixel_encoder_do_resize,  ...)
- libsixel 
+   [bullseye] - libsixel  (Minor issue)
+   [buster] - libsixel  (Minor issue)
NOTE: https://github.com/saitoha/libsixel/issues/166
 CVE-2022-29977 (There is an assertion failure error in stbi__jpeg_huff_decode, 
stb_ima ...)
- libsixel 
+   [bullseye] - libsixel  (Minor issue)
+   [buster] - libsixel  (Minor issue)
NOTE: https://github.com/saitoha/libsixel/issues/165
 CVE-2022-29976 (An Authenticated Reflected Cross-site scripting at BCC 
Parameter was d ...)
NOT-FOR-US: MDaemon



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4066781e30a5cd18d2551d9626da63c031f7834

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4066781e30a5cd18d2551d9626da63c031f7834
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-10 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b43eafdd by Moritz Muehlenhoff at 2022-05-10T10:21:10+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -456,6 +456,8 @@ CVE-2022-30334 (Brave before 1.34, when a Private Window 
with Tor Connectivity i
TODO: check
 CVE-2022-30333 (RARLAB UnRAR before 6.12 on Linux and UNIX allows directory 
traversal  ...)
- unrar-nonfree 
+   [bullseye] - unrar-nonfree  (Non-free not supported)
+   [buster] - unrar-nonfree  (Non-free not supported)
TODO: check details, 6.1.1 -> 6.1.2 upstream changes does not seem 
related
 CVE-2022-30332
RESERVED
@@ -86658,6 +86660,8 @@ CVE-2021-23793
RESERVED
 CVE-2021-23792 (The package com.twelvemonkeys.imageio:imageio-metadata before 
3.7.1 ar ...)
- libtwelvemonkeys-java 3.8.0-1
+   [bullseye] - libtwelvemonkeys-java  (Minor issue)
+   [buster] - libtwelvemonkeys-java  (Minor issue)
NOTE: https://snyk.io/vuln/SNYK-JAVA-COMTWELVEMONKEYSIMAGEIO-2316763
NOTE: 
https://github.com/haraldk/TwelveMonkeys/commit/da4efe98bf09e1cce91b7633cb251958a200fc80
 (twelvemonkeys-3.8.0)
 CVE-2021-23791


=
data/dsa-needed.txt
=
@@ -16,6 +16,8 @@ asterisk/oldstable
 --
 cacti
 --
+cifs-utils
+--
 condor/oldstable (apo)
 --
 ecdsautils (jmm)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b43eafdd52df278263e5e4eb5068ef1979594dd4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b43eafdd52df278263e5e4eb5068ef1979594dd4
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7ea55732 by Moritz Muehlenhoff at 2022-05-09T22:35:56+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8404,6 +8404,8 @@ CVE-2022-27471
RESERVED
 CVE-2022-27470 (SDL_ttf v2.0.18 and below was discovered to contain an 
arbitrary memor ...)
- libsdl2-ttf 2.0.18+dfsg-3 (bug #1010671)
+   [bullseye] - libsdl2-ttf  (Minor issue)
+   [buster] - libsdl2-ttf  (Minor issue)
NOTE: 
https://github.com/libsdl-org/SDL_ttf/commit/db1b41ab8bde6723c24b866e466cad78c2fa0448
NOTE: https://github.com/libsdl-org/SDL_ttf/issues/187
 CVE-2022-27469 (Monstaftp v2.10.3 was discovered to allow attackers to execute 
Server- ...)
@@ -40283,6 +40285,7 @@ CVE-2021-42219 (Go-Ethereum v1.10.9 was discovered to 
contain an issue which all
- golang-github-go-ethereum  (bug #890541)
 CVE-2021-42218 (OMPL v1.5.2 contains a memory leak in VFRRT.cpp ...)
- ompl 
+   [bullseye] - ompl  (Minor issue)
NOTE: https://github.com/ompl/ompl/issues/839
NOTE: 
https://github.com/ompl/ompl/commit/abb4fadcb4e4fe4c9cf41e5e7706143a66948eb7
 CVE-2021-42217
@@ -40951,6 +40954,8 @@ CVE-2021-41960
RESERVED
 CVE-2021-41959 (JerryScript Git version 14ff5bf does not sufficiently track 
and releas ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4781
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4166
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4787
@@ -49749,11 +49754,11 @@ CVE-2021-38427 (RTI Connext DDS Professional and 
Connext DDS Secure Versions 4.2
 CVE-2021-38426 (FATEK Automation WinProladder versions 3.30 and prior lacks 
proper val ...)
NOT-FOR-US: FATEK Automation
 CVE-2021-38425 (eProsima Fast DDS versions prior to 2.4.0 (#2269) are 
susceptible to e ...)
-   - fastdds 
+   - fastdds 
+   [bullseye] - fastdds  (Minor issue)
NOTE: https://github.com/eProsima/Fast-DDS/issues/2267
NOTE: https://github.com/eProsima/Fast-DDS/pull/2269
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02
-   TODO: check completeness
 CVE-2021-38424 (The tag interface of Delta Electronics DIALink versions 
1.2.4.0 and pr ...)
NOT-FOR-US: Delta Electronics DIALink
 CVE-2021-38423 (All versions of GurumDDS improperly calculate the size to be 
used when ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ea557328d4a2adbbe84e1356afcf0dc1b240585

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ea557328d4a2adbbe84e1356afcf0dc1b240585
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f4a64b16 by Moritz Muehlenhoff at 2022-05-09T16:13:48+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -379,9 +379,10 @@ CVE-2018-25033 (ADMesh through 0.98.4 has a heap-based 
buffer over-read in stl_u
NOTE: https://github.com/admesh/admesh/issues/28
NOTE: 
https://github.com/admesh/admesh/commit/e84d8353f1347e1f26f0a95770d92ba14e6ede38
 CVE-2022-1620 (NULL Pointer Dereference in function vim_regexec_string at 
regexp.c:27 ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
NOTE: 
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f 
(v8.2.4901)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-1619 (Heap-based Buffer Overflow in function cmdline_erase_chars in 
GitHub r ...)
- vim 
NOTE: https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
@@ -5525,6 +5526,8 @@ CVE-2022-28464 (Apifox through 2.1.6 is vulnerable to 
Cross Site Scripting (XSS)
NOT-FOR-US: Apifox
 CVE-2022-28463 (ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. ...)
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: 
https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4988
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f4a64b1602558566682c1a6d9255a26088d5d924

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f4a64b1602558566682c1a6d9255a26088d5d924
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-05-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0a9201d8 by Moritz Muehlenhoff at 2022-05-06T13:06:18+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -36,6 +36,8 @@ CVE-2022-1589
RESERVED
 CVE-2022-30292 (thread_call in sqbaselib.cpp in SQUIRREL 3.2 lacks a certain 
sq_reserv ...)
- squirrel3 
+   [bullseye] - squirrel3  (Minor issue)
+   [buster] - squirrel3  (Minor issue)
NOTE: 
https://github.com/albertodemichelis/squirrel/commit/a6413aa690e0bdfef648c68693349a7b878fe60d
 CVE-2022-30291
RESERVED
@@ -808,6 +810,8 @@ CVE-2022-29974
RESERVED
 CVE-2022-29973 (relan exFAT 1.3.0 allows local users to obtain sensitive 
information ( ...)
- fuse-exfat 
+   [bullseye] - fuse-exfat  (Minor issue)
+   [buster] - fuse-exfat  (Minor issue)
NOTE: https://github.com/relan/exfat/issues/185
 CVE-2022-29972
RESERVED
@@ -2697,10 +2701,14 @@ CVE-2022-29341
RESERVED
 CVE-2022-29340 (GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer 
Dereference vul ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: 
https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0
NOTE: https://github.com/gpac/gpac/issues/2163
 CVE-2022-29339 (In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() 
in utils ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: 
https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f
NOTE: https://github.com/gpac/gpac/issues/2165
 CVE-2022-29338
@@ -6371,6 +6379,8 @@ CVE-2022-28067 (An incorrect access control issue in 
Sandboxie Classic v5.55.13
NOT-FOR-US: Sandboxie Classic
 CVE-2022-28066 (Libarchive v3.6.0 was discovered to contain a read memory 
access vulne ...)
- libarchive 
+   [bullseye] - libarchive  (Minor issue)
+   [buster] - libarchive  (Minor issue)
NOTE: https://github.com/libarchive/libarchive/issues/1672
NOTE: 
https://github.com/libarchive/libarchive/commit/cfaa28168a07ea4a53276b63068f94fce37d6aff
 (v3.6.1)
 CVE-2022-28065
@@ -8225,6 +8235,8 @@ CVE-2022-27338
RESERVED
 CVE-2022-27337 (A logic error in the Hints::Hints function of Poppler v22.03.0 
allows  ...)
- poppler 
+   [bullseye] - poppler  (Minor issue)
+   [buster] - poppler  (Minor issue)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230
NOTE: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/81044c64b9ed9a10ae82a28bac753060bdfdac74
 (poppler-22.04.0)
 CVE-2022-27336 (Seacms v11.6 was discovered to contain a remote code execution 
(RCE) v ...)
@@ -21893,6 +21905,8 @@ CVE-2022-22966 (An authenticated, high privileged 
malicious actor with network a
NOT-FOR-US: VMware
 CVE-2022-22965 (A Spring MVC or Spring WebFlux application running on JDK 9+ 
may be vu ...)
- libspring-java 
+   [bullseye] - libspring-java  (No reverse dependencies in the 
archive affected)
+   [buster] - libspring-java  (No reverse dependencies in the 
archive affected)
[stretch] - libspring-java  (EOL'd for stretch)
NOTE: https://bugalert.org/content/notices/2022-03-30-spring.html
NOTE: https://tanzu.vmware.com/security/cve-2022-22965
@@ -21926,9 +21940,10 @@ CVE-2022-22951 (VMware Carbon Black App Control (8.5.x 
prior to 8.5.14, 8.6.x pr
NOT-FOR-US: VMware
 CVE-2022-22950 (n Spring Framework versions 5.3.0 - 5.3.16 and older 
unsupported versi ...)
- libspring-java 
+   [bullseye] - libspring-java  (Minor issue)
+   [buster] - libspring-java  (Minor issue)
[stretch] - libspring-java  (EOL'd for stretch)
NOTE: https://tanzu.vmware.com/security/cve-2022-22950
-   TODO: check, no details available
 CVE-2022-22949
RESERVED
 CVE-2022-22948 (The vCenter Server contains an information disclosure 
vulnerability du ...)
@@ -93474,10 +93489,12 @@ CVE-2021-21240 (httplib2 is a comprehensive HTTP 
client library for Python. In h
 CVE-2021-21239 (PySAML2 is a pure python implementation of SAML Version 2 
Standard. Py ...)
{DLA-2577-1}
- python-pysaml2 6.5.1-1 (bug #980772)
+   [buster] - python-pysaml2  (Minor issue)
NOTE: 
https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62
NOTE: 
https://github.com/IdentityPython/pysaml2/commit/751dbf50a51131b13d55989395f9b115045f9737
 CVE-2021-21238 (PySAML2 is a pure python implementation of SAML Version 2 
Standard. Py ...)
- python-pysaml2 6.5.1-1 (bug #980773)
+   [buster] - python-pysaml2  (Minor issue)
[stretch] - python-pysaml2  (python3-xmlschema not available 
in 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-27 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3512b536 by Moritz Muehlenhoff at 2022-04-27T20:07:08+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -137,6 +137,7 @@ CVE-2022-1475
RESERVED
{DSA-5124-1}
- ffmpeg 7:4.4.2-1
+   [buster] - ffmpeg  (Vulnerable code not present)
NOTE: https://trac.ffmpeg.org/ticket/9651
NOTE: 
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8
NOTE: 
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f
 (n4.4.2)
@@ -3535,6 +3536,8 @@ CVE-2022-28507
RESERVED
 CVE-2022-28506 (There is a heap-buffer-overflow in GIFLIB 5.2.1 function 
DumpScreen2RG ...)
- giflib 
+   [bullseye] - giflib  (Minor issue)
+   [buster] - giflib  (Minor issue)
NOTE: https://sourceforge.net/p/giflib/bugs/159/
 CVE-2022-28505
RESERVED
@@ -32864,6 +32867,8 @@ CVE-2021-43454 (An Unquoted Service Path vulnerability 
exists in AnyTXT Searcher
NOT-FOR-US: AnyTXT Searcher for Windows
 CVE-2021-43453 (A Heap-based Buffer Overflow vulnerability exists in 
JerryScript 2.4.0 ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4808
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4754
NOTE: Fixed by; 
https://github.com/jerryscript-project/jerryscript/commit/efe63a5bbc5106164a08ee2eb415a7a701f5311f
@@ -35529,6 +35534,8 @@ CVE-2021-42783 (Missing Authentication for Critical 
Function vulnerability in de
NOT-FOR-US: D-Link
 CVE-2021-42782 (Stack buffer overflow issues were found in Opensc before 
version 0.22. ...)
- opensc 0.22.0-1
+   [bullseye] - opensc  (Minor issue)
+   [buster] - opensc  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016448
NOTE: 
https://github.com/OpenSC/OpenSC/commit/1252aca9f10771ef5ba8405e73cf2da50827958f
 (0.22.0-rc1)
NOTE: 
https://github.com/OpenSC/OpenSC/commit/456ac566938a1da774db06126a2fa6c0cba514b3
 (0.22.0)
@@ -35537,6 +35544,8 @@ CVE-2021-42782 (Stack buffer overflow issues were found 
in Opensc before version
NOTE: 
https://github.com/OpenSC/OpenSC/commit/ae1cf0be90396fb6c0be95829bf0d3eecbd2fd1c
 (0.22.0-rc1)
 CVE-2021-42781 (Heap buffer overflow issues were found in Opensc before 
version 0.22.0 ...)
- opensc 0.22.0-1
+   [bullseye] - opensc  (Minor issue)
+   [buster] - opensc  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016439
NOTE: 
https://github.com/OpenSC/OpenSC/commit/05648b0604bf3e498e8d42dff3c6e7c56a5bf749
 (0.22.0-rc1)
NOTE: 
https://github.com/OpenSC/OpenSC/commit/17d8980cde7be597afc366b7e311d0d7cadcb1f4
 (0.22.0-rc1)
@@ -35545,16 +35554,22 @@ CVE-2021-42781 (Heap buffer overflow issues were 
found in Opensc before version
NOTE: 
https://github.com/OpenSC/OpenSC/commit/cae5c71f90cc5b364efe14040923fd5aa3b5dd90
 (0.22.0-rc1)
 CVE-2021-42780 (A use after return issue was found in Opensc before version 
0.22.0 in  ...)
- opensc 0.22.0-1
+   [bullseye] - opensc  (Minor issue)
+   [buster] - opensc  (Minor issue)
NOTE: 
https://github.com/OpenSC/OpenSC/commit/5df913b7f57ad89b9832555d24c08d23a534311e
 (0.22.0-rc1)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016139
 CVE-2021-42779 (A heap use after free issue was found in Opensc before version 
0.22.0  ...)
- opensc 0.22.0-1
+   [bullseye] - opensc  (Minor issue)
+   [buster] - opensc  (Minor issue)
NOTE: 
https://github.com/OpenSC/OpenSC/commit/1db88374bb7706a115d5c3617c6f16115c33bf27
 (0.22.0-rc1)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016086
 CVE-2021-42778 (A heap double free issue was found in Opensc before version 
0.22.0 in  ...)
- opensc 0.22.0-1
+   [bullseye] - opensc  (Minor issue)
+   [buster] - opensc  (Minor issue)
NOTE: 
https://github.com/OpenSC/OpenSC/commit/f015746d22d249642c19674298a18ad824db0ed7
 (0.22.0-rc1)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016083
@@ -39363,6 +39378,8 @@ CVE-2021-41752 (Stack overflow vulnerability in 
Jerryscript before commit e1ce7d
TODO: check - could be only a test artifact
 CVE-2021-41751 (Buffer overflow vulnerability in file 
ecma-builtin-array-prototype.c:9 ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-27 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f832a040 by Moritz Muehlenhoff at 2022-04-27T13:52:12+02:00
buster/bullseye triage
new busybox issue

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -755,7 +755,7 @@ CVE-2022-29568
 CVE-2022-29567
RESERVED
 CVE-2022-29566 (The Bulletproofs 2017/1066 paper mishandles Fiat-Shamir 
generation bec ...)
-   TODO: check
+   NOT-FOR-US: Bulletproofs
 CVE-2022-1427 (Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub 
repository mruby ...)
- mruby 
[bullseye] - mruby  (Minor issue)
@@ -2210,9 +2210,11 @@ CVE-2022-1305
[stretch] - chromium  (see DSA 4562)
 CVE-2022-1304 (An out-of-bounds read/write vulnerability was found in 
e2fsprogs 1.46. ...)
- e2fsprogs 
+   [bullseye] - e2fsprogs  (Minor issue)
+   [buster] - e2fsprogs  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2069726
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2068113
-   TODO: check when fixed
+   NOTE: 
https://lore.kernel.org/linux-ext4/20220421173148.20193-1-lczer...@redhat.com/T/#u
 CVE-2022-1303
RESERVED
 CVE-2022-1302 (In the MZ Automation LibIEC61850 in versions prior to 1.5.1 an 
unauthe ...)
@@ -2708,6 +2710,7 @@ CVE-2022-28806
RESERVED
 CVE-2022-28805 (singlevar in lparser.c in Lua through 5.4.4 lacks a certain 
luaK_exp2a ...)
- lua5.4 
+   [bullseye] - lua5.4  (Minor issue)
NOTE: 
https://github.com/lua/lua/commit/1f3c6f4534c6411313361697d98d1145a1f030fa
NOTE: http://lua-users.org/lists/lua-l/2022-02/msg1.html
NOTE: http://lua-users.org/lists/lua-l/2022-02/msg00070.html
@@ -3760,7 +3763,10 @@ CVE-2022-28393
 CVE-2022-28392
RESERVED
 CVE-2022-28391 (BusyBox through 1.35.0 allows remote attackers to execute 
arbitrary co ...)
-   TODO: check
+   - busybox 
+   [bullseye] - busybox  (Minor issue)
+   [buster] - busybox  (Minor issue)
+   NOTE: https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
 CVE-2022-28390 (ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the 
Linux kerne ...)
- linux 5.17.3-1
NOTE: 
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f832a04003eee506d4a3791e4088d1eab1515d61

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f832a04003eee506d4a3791e4088d1eab1515d61
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-25 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d7226b1a by Moritz Muehlenhoff at 2022-04-25T17:19:34+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -549,6 +549,8 @@ CVE-2022-1421
RESERVED
 CVE-2022-1420 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim 
prior  ...)
- vim 2:8.2.4793-1
+   [bullseye] - vim  (Minor issue)
+   [buster] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
NOTE: 
https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca 
(v8.2.4774)
 CVE-2021-46784
@@ -1307,11 +1309,15 @@ CVE-2022-1356
 CVE-2022-1355
RESERVED
- tiff 
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/400
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/323
 CVE-2022-1354
RESERVED
- tiff 
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/319
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798
 CVE-2022-1353 [af_key: add __GFP_ZERO flag for compose_sadb_supported in 
function pfkey_register]



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7226b1a525094a51768c6162a64d9f379da2823

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7226b1a525094a51768c6162a64d9f379da2823
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-25 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2993daec by Moritz Muehlenhoff at 2022-04-25T13:55:42+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -519,6 +519,8 @@ CVE-2022-29566 (The Bulletproofs 2017/1066 paper mishandles 
Fiat-Shamir generati
TODO: check
 CVE-2022-1427 (Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub 
repository mruby ...)
- mruby 
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
NOTE: https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301
NOTE: 
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
 CVE-2022-29565
@@ -4742,9 +4744,10 @@ CVE-2022-28050
 CVE-2022-28049 (NGINX NJS 0.7.2 was discovered to contain a NULL pointer 
dereference v ...)
NOT-FOR-US: njs
 CVE-2022-28048 (STB v2.27 was discovered to contain an integer shift of 
invalid size i ...)
-   - libstb 
+   - libstb  (unimportant)
NOTE: https://github.com/nothings/stb/issues/1293
NOTE: https://github.com/nothings/stb/pull/1297
+   NOTE: Negligible security impact
 CVE-2022-28047
RESERVED
 CVE-2022-28046
@@ -4759,10 +4762,14 @@ CVE-2022-28043
RESERVED
 CVE-2022-28042 (stb_image.h v2.27 was discovered to contain an heap-based 
use-after-fr ...)
- libstb 
+   [bullseye] - libstb  (Minor issue)
+   [buster] - libstb  (Minor issue)
NOTE: https://github.com/nothings/stb/issues/1289
NOTE: https://github.com/nothings/stb/pull/1297
 CVE-2022-28041 (stb_image.h v2.27 was discovered to contain an integer 
overflow via th ...)
- libstb 
+   [bullseye] - libstb  (Minor issue)
+   [buster] - libstb  (Minor issue)
NOTE: https://github.com/nothings/stb/issues/1292
NOTE: https://github.com/nothings/stb/pull/1297
 CVE-2022-28040
@@ -6331,14 +6338,20 @@ CVE-2022-27407
RESERVED
 CVE-2022-27406 (FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was 
discovere ...)
- freetype 
+   [bullseye] - freetype  (Minor issue)
+   [buster] - freetype  (Minor issue)
NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
NOTE: Fixed by: 
https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2
 (VER-2-12-0)
 CVE-2022-27405 (FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was 
discovere ...)
- freetype 
+   [bullseye] - freetype  (Minor issue)
+   [buster] - freetype  (Minor issue)
NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
NOTE: Fixed by: 
https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5
 (VER-2-12-0)
 CVE-2022-27404 (FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was 
discovere ...)
- freetype 
+   [bullseye] - freetype  (Minor issue)
+   [buster] - freetype  (Minor issue)
NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
NOTE: Fixed by: 
https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db
 (VER-2-12-0)
 CVE-2022-27403


=
data/dsa-needed.txt
=
@@ -20,6 +20,8 @@ condor/oldstable
 --
 epiphany-browser
 --
+ffmpeg (jmm)
+--
 fish/stable
 --
 freecad (aron)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2993daecc785e23d647037197bac50fea8175b1a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2993daecc785e23d647037197bac50fea8175b1a
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-19 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9980e90e by Moritz Muehlenhoff at 2022-04-19T11:56:57+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -34,6 +34,8 @@ CVE-2022-29459
RESERVED
 CVE-2022-29458 (ncurses 6.3 before patch 20220416 has an out-of-bounds read 
and segmen ...)
- ncurses 
+   [bullseye] - ncurses  (Minor issue)
+   [buster] - ncurses  (Minor issue)
NOTE: 
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html
NOTE: 
https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html
 CVE-2022-29457 (Zoho ManageEngine ADSelfService Plus before 6121, ADAuditPlus 
7060, Ex ...)
@@ -844,9 +846,13 @@ CVE-2022-1333 (Mattermost Playbooks plugin v1.24.0 and 
earlier fails to properly
 CVE-2015-20107 (In Python (aka CPython) through 3.10.4, the mailcap module 
does not ad ...)
- python3.10 
- python3.9 
+   [bullseye] - python3.9  (Minor issue)
- python3.7 
+   [buster] - python3.7  (Minor issue)
- python3.5 
- python2.7 
+   [bullseye] - python2.7  (Python 2.7 in Bullseye not covered by 
security support)
+   [buster] - python2.7  (Minor issue)
NOTE: https://bugs.python.org/issue24778
NOTE: https://github.com/python/cpython/issues/68966
NOTE: https://github.com/python/cpython/pull/91542
@@ -38153,6 +38159,8 @@ CVE-2021-41716 (Maharashtra State Electricity Board 
Mahavitara Android Applicati
NOT-FOR-US: Maharashtra State Electricity Board Mahavitara Android 
Application
 CVE-2021-41715 (libsixel 1.10.0 is vulnerable to Use after free in 
libsixel/src/dither ...)
- libsixel 1.10.3-1
+   [bullseye] - libsixel  (Minor issue)
+   [buster] - libsixel  (Minor issue)
NOTE: 
https://github.com/libsixel/libsixel/commit/d299d67c532a5133a57aade5c35ff8e612c73dd8
 (1.10.1)
NOTE: https://github.com/libsixel/libsixel/pull/28
NOTE: https://github.com/libsixel/libsixel/issues/27
@@ -39593,6 +39601,8 @@ CVE-2021-41120 (sylius/paypal-plugin is a paypal plugin 
for the Sylius developme
NOT-FOR-US: sylius/paypal-plugin
 CVE-2021-41119 (Wire-server is the system server for the wire back-end 
services. Relea ...)
- haskell-aeson  (bug #1009678)
+   [bullseye] - haskell-aeson  (Minor issue)
+   [buster] - haskell-aeson  (Minor issue)
NOTE: https://cs-syd.eu/posts/2021-09-11-json-vulnerability
NOTE: https://github.com/haskell/aeson/issues/864
NOTE: https://hackage.haskell.org/package/aeson-2.0.1.0
@@ -40746,6 +40756,8 @@ CVE-2021-40657
RESERVED
 CVE-2021-40656 (libsixel before 1.10 is vulnerable to Buffer Overflow in 
libsixel/src/ ...)
- libsixel 1.10.3-1
+   [bullseye] - libsixel  (Minor issue)
+   [buster] - libsixel  (Minor issue)
NOTE: 
https://github.com/libsixel/libsixel/commit/dc96cdc27fb53e8595af67aaf68001033c808e42
 (1.10.0)
NOTE: https://github.com/libsixel/libsixel/pull/26
NOTE: https://github.com/libsixel/libsixel/issues/25
@@ -42863,9 +42875,10 @@ CVE-2021-39798 (In Bitmap_createFromParcel of 
Bitmap.cpp, there is a possible ar
 CVE-2021-39797 (In several functions of of LauncherApps.java, there is a 
possible esca ...)
NOT-FOR-US: Android
 CVE-2021-39796 (In HarmfulAppWarningActivity of 
HarmfulAppWarningActivity.java, there  ...)
-   - android-platform-frameworks-base  (bug #1009626)
+   - android-platform-frameworks-base  (unimportant; bug #1009626)
NOTE: 
https://android.googlesource.com/platform/frameworks/base/+/e74a2a320bf896bc30618ce486203bafe453c469
NOTE: https://source.android.com/security/bulletin/2022-04-01
+   NOTE: No security impact for Android as provided in Debian
 CVE-2021-39795 (In multiple locations of MediaProvider.java , there is a 
possible way  ...)
NOT-FOR-US: Android
 CVE-2021-39794 (In broadcastPortInfo of AdbService.java, there is a possible 
way for a ...)
@@ -72994,6 +73007,7 @@ CVE-2021-27918 (encoding/xml in Go before 1.15.9 and 
1.16.x before 1.16.1 has an
- golang-1.16 1.16.3-1
- golang-1.15 1.15.9-1
- golang-1.11 
+   [buster] - golang-1.11  (Minor issue)
- golang-1.8 
[stretch] - golang-1.8  (Minor issue, DoS)
- golang-1.7 
@@ -101141,6 +101155,7 @@ CVE-2020-28367 (Go before 1.14.12 and 1.15.x before 
1.15.5 allows Argument Injec
{DLA-2460-1}
- golang-1.15 1.15.5-1
- golang-1.11 
+   [buster] - golang-1.11  (Minor issue)
- golang-1.8 
- golang-1.7 
[stretch] - golang-1.7  (validation of cgo flags first 
introduced in golang-1.8 / CVE-2018-6574)
@@ -101149,6 +101164,7 @@ CVE-2020-28367 (Go before 1.14.12 and 1.15.x before 
1.15.5 allows Argument Injec
 CVE-2020-28366 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2e21f566 by Moritz Muehlenhoff at 2022-04-06T15:30:05+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1600,11 +1600,15 @@ CVE-2022-1116
 CVE-2022-1115
RESERVED
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4974
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51
 CVE-2022-1114
RESERVED
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4947
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/78f03b619d08d7c2e0fcaccab407e3ac93c2ee8f
 CVE-2022-1113
@@ -10379,6 +10383,7 @@ CVE-2022-24804
RESERVED
 CVE-2022-24803 (Asciidoctor-include-ext is Asciidoctors standard 
include proces ...)
- ruby-asciidoctor-include-ext  (bug #1009035)
+   [bullseye] - ruby-asciidoctor-include-ext  (Minor issue)
NOTE: 
https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29
NOTE: 
https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155
 (v0.4.0)
NOTE: 
https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee
 (v0.4.0)
@@ -10632,14 +10637,20 @@ CVE-2022-24717 (ssr-pages is an HTML page builder for 
the purpose of server-side
NOT-FOR-US: ssr-pages
 CVE-2022-24716 (Icinga Web 2 is an open source monitoring web interface, 
framework and ...)
- icingaweb2 2.9.6-1
+   [bullseye] - icingaweb2  (Vulnerable code not present)
+   [buster] - icingaweb2  (Vulnerable code not present)
NOTE: 
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw
NOTE: 
https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d
 CVE-2022-24715 (Icinga Web 2 is an open source monitoring web interface, 
framework and ...)
- icingaweb2 2.9.6-1
+   [bullseye] - icingaweb2  (Minor issue)
+   [buster] - icingaweb2  (Minor issue)
NOTE: 
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63
NOTE: 
https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb
 CVE-2022-24714 (Icinga Web 2 is an open source monitoring web interface, 
framework and ...)
- icingaweb2 2.9.6-1
+   [bullseye] - icingaweb2  (Minor issue)
+   [buster] - icingaweb2  (Minor issue)
NOTE: 
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-qcmg-vr56-x9wf
NOTE: 
https://github.com/Icinga/icingaweb2/commit/6e989d05a1568a6733a3d912001251acc51d9293
 CVE-2022-24713 (regex is an implementation of regular expressions for the Rust 
languag ...)
@@ -12349,9 +12360,10 @@ CVE-2022-24193 (CasaOS before v0.2.7 was discovered to 
contain a command injecti
 CVE-2022-24192
RESERVED
 CVE-2022-24191 (In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw 
function can l ...)
-   - htmldoc 1.9.15-1
+   - htmldoc 1.9.15-1 (unimportant)
NOTE: 
https://github.com/michaelrsweet/htmldoc/commit/fb0334a51300988e9b83b9870d4063e86002b077
 (v1.9.15)
NOTE: https://github.com/michaelrsweet/htmldoc/issues/470
+   NOTE: Hang in CLI tool, no security impact
 CVE-2022-24190
RESERVED
 CVE-2022-24189
@@ -55417,7 +55429,11 @@ CVE-2021-33658 (atune before 0.3-0.8 log in as a local 
user and run the curl com
NOT-FOR-US: A-Tune OS tuning engine
 CVE-2021-33657 (There is a heap overflow problem in video/SDL_pixels.c in SDL 
(Simple  ...)
- libsdl1.2 
+   [bullseye] - libsdl1.2  (Minor issue)
+   [buster] - libsdl1.2  (Minor issue)
- libsdl2 2.0.20+dfsg-2
+   [bullseye] - libsdl2  (Minor issue)
+   [buster] - libsdl2  (Minor issue)
NOTE: 
https://github.com/libsdl-org/SDL/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9
 (release-2.0.20)
 CVE-2021-33656
RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2e21f56693fa9d0158ec05f427ab99c9bcb7f54f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2e21f56693fa9d0158ec05f427ab99c9bcb7f54f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cd09e673 by Moritz Muehlenhoff at 2022-04-04T18:18:49+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -531,6 +531,8 @@ CVE-2022-28353
RESERVED
 CVE-2022-1210 (A vulnerability classified as problematic was found in LibTIFF 
4.3.0.  ...)
- tiff 
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/402
 CVE-2021-46782
RESERVED
@@ -14471,6 +14473,8 @@ CVE-2022-23608 (PJSIP is a free and open source 
multimedia communication library
 CVE-2022-23607 (treq is an HTTP library inspired by requests but written on 
top of Twi ...)
{DLA-2954-1}
- python-treq  (bug #1005041)
+   [bullseye] - python-treq  (Minor issue)
+   [buster] - python-treq  (Minor issue)
NOTE: 
https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc
NOTE: 
https://github.com/twisted/treq/commit/1da6022cc880bbcff59321abe02bf8498b89efb2 
(release-22.1.0)
 CVE-2022-23606 (Envoy is an open source edge and service proxy, designed for 
cloud-nat ...)


=
data/dsa-needed.txt
=
@@ -32,11 +32,15 @@ ndpi/oldstable
 --
 nodejs (jmm)
 --
+puma
+--
 python-pysaml2 (jmm)
 --
 rpki-client/stable
   new 7.6 release required libretls, which isn't in Bullseye
 --
+salt
+--
 sox
 --
 trafficserver (jmm)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cd09e673a7b367bc82a13297a8a648b4c583c285

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cd09e673a7b367bc82a13297a8a648b4c583c285
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-04-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ced45790 by Moritz Muehlenhoff at 2022-04-03T22:19:50+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -4053,6 +4053,8 @@ CVE-2022-26884
 CVE-2022-0934
RESERVED
- dnsmasq 
+   [bullseye] - dnsmasq  (Minor issue)
+   [buster] - dnsmasq  (Minor issue)
NOTE: 
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html
 CVE-2022-0933
RESERVED
@@ -5560,11 +5562,11 @@ CVE-2022-0815 (Improper access control vulnerability in 
McAfee WebAdvisor Chrome
 CVE-2022-0814
RESERVED
 CVE-2022-0813 (PhpMyAdmin 5.1.1 and before allows an attacker to retrieve 
potentially ...)
-   - phpmyadmin 4:5.1.3+dfsg1-1
-   [stretch] - phpmyadmin  (Minor issue)
+   - phpmyadmin 4:5.1.3+dfsg1-1 (unimportant)
NOTE: 
https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/
NOTE: 
https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information
NOTE: Fixed by: 
https://github.com/phpmyadmin/phpmyadmin/commit/c04f85f2bb96c442086d9ad057953567cc794486
+   NOTE: Negligible security impact
 CVE-2022-0811 (A flaw was found in CRI-O in the way it set kernel options for 
a pod.  ...)
NOT-FOR-US: cri-o
 CVE-2022-26333
@@ -8212,18 +8214,24 @@ CVE-2022-25311 (A vulnerability has been identified in 
SINEC NMS (All versions).
 CVE-2022-25310
RESERVED
- fribidi  (bug #1008793)
+   [bullseye] - fribidi  (Minor issue)
+   [buster] - fribidi  (Minor issue)
NOTE: https://github.com/fribidi/fribidi/issues/183
NOTE: https://github.com/fribidi/fribidi/pull/186
NOTE: 
https://github.com/fribidi/fribidi/commit/175850b03e1af251d705c1d04b2b9b3c1c06e48f
 CVE-2022-25309
RESERVED
- fribidi  (bug #1008793)
+   [bullseye] - fribidi  (Minor issue)
+   [buster] - fribidi  (Minor issue)
NOTE: https://github.com/fribidi/fribidi/issues/182
NOTE: https://github.com/fribidi/fribidi/pull/185
NOTE: 
https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3
 CVE-2022-25308
RESERVED
- fribidi  (bug #1008793)
+   [bullseye] - fribidi  (Minor issue)
+   [buster] - fribidi  (Minor issue)
NOTE: https://github.com/fribidi/fribidi/issues/181
NOTE: https://github.com/fribidi/fribidi/pull/184
NOTE: 
https://github.com/fribidi/fribidi/commit/ad3a19e6372b1e667128ed1ea2f49919884587e1
@@ -8399,6 +8407,7 @@ CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 
and 6.x before 6.2.4 on
[buster] - qtbase-opensource-src  (Breaks existing behaviour 
and upstream also skipped from 5.12 branch)
[stretch] - qtbase-opensource-src  (Vulnerable code 
introduced later)
- qtbase-opensource-src-gles 
+   [buster] - qtbase-opensource-src-gles  (Breaks existing 
behaviour and upstream also skipped from 5.12 branch)
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/393113
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/394914
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/396020
@@ -10353,8 +10362,8 @@ CVE-2022-24616
RESERVED
 CVE-2022-24615 (zip4j up to 2.9.0 can throw various uncaught exceptions while 
parsing  ...)
- zip4j 
+   [bullseye] - zip4j  (Minor issue)
NOTE: https://github.com/srikanth-lingala/zip4j/issues/377
-   TODO: check details
 CVE-2022-24614 (When reading a specially crafted JPEG file, metadata-extractor 
up to 2 ...)
- libmetadata-extractor-java 
[bullseye] - libmetadata-extractor-java  (Minor issue)
@@ -26609,6 +26618,7 @@ CVE-2021-43810 (Admidio is a free open source user 
management system for website
NOT-FOR-US: Admidio
 CVE-2021-43809 (`Bundler` is a package for managing application dependencies 
in Ruby.  ...)
- rubygems 3.3.5-1
+   [bullseye] - rubygems  (Minor issue)
NOTE: 
https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43
NOTE: 
https://github.com/rubygems/rubygems/commit/90b1ed8b9f8b636aa8c913f7b5a764a2e03d179c
 (v3.3.0)
NOTE: https://github.com/rubygems/rubygems/pull/5142
@@ -27692,6 +27702,7 @@ CVE-2021-43726
RESERVED
 CVE-2021-43725 (There is a Cross Site Scripting (XSS) vulnerability in 
SpotPage_login. ...)
- spotweb 
+   [buster] - spotweb  (Minor issue)
NOTE: 
https://github.com/spotweb/spotweb/commit/2bfa001689aae96009688a193c64478647ba45a1
NOTE: https://github.com/spotweb/spotweb/issues/718
 CVE-2021-43724 (A Cross Site Scripting (XSS) vulnerability exits in Subrion 
CMS throug ...)
@@ -52582,6 +52593,7 @@ CVE-2021-34558 (The crypto/tls package of Go 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-31 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0b9e2c60 by Moritz Muehlenhoff at 2022-03-31T23:55:12+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -286,6 +286,8 @@ CVE-2022-1173
RESERVED
 CVE-2022-1172 (Null Pointer Dereference Caused Segmentation Fault in GitHub 
repositor ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264/
NOTE: https://github.com/gpac/gpac/issues/2153
NOTE: 
https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8
@@ -652,6 +654,8 @@ CVE-2022-25348 (Untrusted search path vulnerability in 
AttacheCase ver.4.0.2.7 a
NOT-FOR-US: AttacheCase
 CVE-2022-1122 (A flaw was found in the opj2_decompress program in openjpeg2 
2.4.0 in  ...)
- openjpeg2 
+   [bullseye] - openjpeg2  (Minor issue)
+   [buster] - openjpeg2  (Minor issue)
NOTE: https://github.com/uclouvain/openjpeg/issues/1368
NOTE: 
https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d
 CVE-2022-1121
@@ -1840,6 +1844,8 @@ CVE-2022-1051
RESERVED
 CVE-2022-1050 (Guest driver might execute HW commands when shared buffers are 
not yet ...)
- qemu 
+   [bullseye] - qemu  (Minor issue)
+   [buster] - qemu  (Minor issue)
[stretch] - qemu  (rdma devices introduced in v2.12)
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2022-03/msg05197.html
 CVE-2022-1049 (A flaw was found in the Pacemaker configuration tool (pcs). The 
pcs da ...)
@@ -5362,6 +5368,8 @@ CVE-2022-26292
RESERVED
 CVE-2022-26291 (lrzip v0.641 was discovered to contain a multiple concurrency 
use-afte ...)
- lrzip 0.650-1
+   [bullseye] - lrzip  (Minor issue)
+   [buster] - lrzip  (Minor issue)
[stretch] - lrzip  (Minor issue, use-after-free with no 
known impact)
NOTE: https://github.com/ckolivas/lrzip/issues/206
NOTE: 
https://github.com/ckolivas/lrzip/commit/4b3942103b57c639c8e0f31d6d5fd7bac53bbdf4
 (v0.650)
@@ -5387,6 +5395,7 @@ CVE-2022-26281
RESERVED
 CVE-2022-26280 (Libarchive v3.6.0 was discovered to contain an out-of-bounds 
read via  ...)
- libarchive 
+   [bullseye] - libarchive  (Minor issue)
[buster] - libarchive  (Vulnerable code not present)
[stretch] - libarchive  (Vulnerable code not present)
NOTE: https://github.com/libarchive/libarchive/issues/1672



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b9e2c60f9c1717df2d3a30942b094ff4cc97fd7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b9e2c60f9c1717df2d3a30942b094ff4cc97fd7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f1743a9b by Moritz Muehlenhoff at 2022-03-28T17:30:31+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -5315,6 +5315,8 @@ CVE-2022-0760 (The Simple Link Directory WordPress plugin 
before 7.7.2 does not
NOT-FOR-US: WordPress plugin
 CVE-2022-0759 (A flaw was found in all versions of kubeclient up to (but not 
includin ...)
- ruby-kubeclient 
+   [bullseye] - ruby-kubeclient  (Minor issue)
+   [buster] - ruby-kubeclient  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2058404
NOTE: https://github.com/ManageIQ/kubeclient/issues/554
NOTE: https://github.com/ManageIQ/kubeclient/pull/556
@@ -15428,12 +15430,11 @@ CVE-2022-0176 (The PowerPack Lite for Beaver Builder 
WordPress plugin before 1.2
NOT-FOR-US: WordPress plugin
 CVE-2022-0175 [memory initialization issue in vrend_resource_alloc_buffer() 
can lead to info leak]
RESERVED
-   - virglrenderer 
+   - virglrenderer  (Introduced in 0.9.0 with refactor)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2039003
NOTE: 
https://gitlab.freedesktop.org/virgl/virglrenderer/-/merge_requests/654
NOTE: Code refactored in 
https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/7899e057327848300b18d8f03aa3789e00ed0221
 (0.9.0)
NOTE: Fixed by: 
https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/b05bb61f454eeb8a85164c8a31510aeb9d79129c
-   TODO: check if issue is present before refactoring in 0.9.0
 CVE-2022-0174 (dolibarr is vulnerable to Business Logic Errors ...)
- dolibarr 
 CVE-2022-0173 (radare2 is vulnerable to Out-of-bounds Read ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1743a9be596b84ad45253dbb0c1cf92aae6e07c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1743a9be596b84ad45253dbb0c1cf92aae6e07c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
25783288 by Moritz Muehlenhoff at 2022-03-28T16:16:35+02:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3159,6 +3159,8 @@ CVE-2021-46708 (The swagger-ui-dist package before 4.1.3 
for Node.js could allow
- swagger-ui  (bug #895422)
 CVE-2020-36518 (jackson-databind before 2.13.0 allows a Java StackOverflow 
exception a ...)
- jackson-databind  (bug #1007109)
+   [bullseye] - jackson-databind  (Minor issue)
+   [buster] - jackson-databind  (Minor issue)
NOTE: https://github.com/FasterXML/jackson-databind/issues/2816
 CVE-2018-25031 (Swagger UI before 4.1.3 could allow a remote attacker to 
conduct spoof ...)
- node-swagger-ui  (bug #871461)
@@ -67725,20 +67727,23 @@ CVE-2021-28280 (CSRF + Cross-site scripting (XSS) 
vulnerability in search.php in
 CVE-2021-28279
RESERVED
 CVE-2021-28278 (A Heap-based Buffer Overflow vulnerability exists in jhead 
3.04 and 3. ...)
-   - jhead 1:3.06.0.1-2
+   - jhead 1:3.06.0.1-2 (unimportant)
NOTE: 
https://github.com/Matthias-Wandel/jhead/commit/a50953a266583981b51a181c2fce73dad2ac5d7d
 (3.06.0.1)
NOTE: https://github.com/Matthias-Wandel/jhead/issues/15
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-28277 (A Heap-based Buffer Overflow vulnerabilty exists in jhead 3.04 
and 3.0 ...)
-   - jhead 1:3.06.0.1-2
+   - jhead 1:3.06.0.1-2 (unimportant)
NOTE: 
https://github.com/Matthias-Wandel/jhead/commit/b8d78e5ec982e86cdd70ebfc1ebbb2273c982eea
 (3.06.0.1)
NOTE: https://github.com/Matthias-Wandel/jhead/issues/16
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-28276 (A Denial of Service vulnerability exists in jhead 3.04 and 
3.05 via a  ...)
TODO: check CVE reference, probably invalid report or old version.
NOTE: https://github.com/Matthias-Wandel/jhead/issues/26
 CVE-2021-28275 (A Denial of Service vulnerability exists in jhead 3.04 and 
3.05 due to ...)
-   - jhead 1:3.06.0.1-2
+   - jhead 1:3.06.0.1-2 (unimportant)
NOTE: 
https://github.com/Matthias-Wandel/jhead/commit/a50953a266583981b51a181c2fce73dad2ac5d7d
 (3.06.0.1)
NOTE: https://github.com/Matthias-Wandel/jhead/issues/17
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-28274
RESERVED
 CVE-2021-28273
@@ -79818,13 +79823,14 @@ CVE-2021-23336 (The package python/cpython from 0 and 
before 3.6.13, from 3.7.0
- python-django 2:2.2.19-1 (bug #983090)
[buster] - python-django  (Minor issue; can be fixed via point 
release)
- python3.9 3.9.2-1
+   [buster] - python3.9  (Will break existing applications, don't 
backport to released suites)
- python3.8 
- python3.7 
-   [buster] - python3.7  (Minor issue)
+   [buster] - python3.7  (Will break existing applications, don't 
backport to released suites)
- python3.5 
- python2.7 
[bullseye] - python2.7  (Python 2.7 in Bullseye not covered by 
security support)
-   [buster] - python2.7  (Minor issue)
+   [buster] - python2.7  (Will break existing applications, don't 
backport to released suites)
- pypy3 7.3.3+dfsg-3
[buster] - pypy3  (Minor issue)
NOTE: https://github.com/python/cpython/pull/24297



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/257832880b1dae25b2c24adea9ae1c728cb8a9c2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/257832880b1dae25b2c24adea9ae1c728cb8a9c2
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-27 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
eed55818 by Moritz Muehlenhoff at 2022-03-27T10:50:02+02:00
buster/bullseye triage
one lemonldap-ng issue n/a for stretch

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -773,6 +773,8 @@ CVE-2022-1050
RESERVED
 CVE-2022-1049 (A flaw was found in the Pacemaker configuration tool (pcs). The 
pcs da ...)
- pcs 
+   [bullseye] - pcs  (Minor issue)
+   [buster] - pcs  (Minor issue)
NOTE: https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5
NOTE: 
https://github.com/ClusterLabs/pcs/commit/fb860005117dc9e092649687dfa1304fb423efc5
 CVE-2022-1048 [race condition in snd_pcm_hw_free leading to use-after-free]
@@ -2995,6 +2997,8 @@ CVE-2022-0898
RESERVED
 CVE-2022-0897 (A flaw was found in the libvirt nwfilter driver. The 
virNWFilterObjLis ...)
- libvirt 
+   [bullseye] - libvirt  (Minor issue)
+   [buster] - libvirt  (Minor issue)
NOTE: 
https://gitlab.com/libvirt/libvirt/-/commit/a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36
 CVE-2022-0896 (Improper Neutralization of Special Elements Used in a Template 
Engine  ...)
NOT-FOR-US: microweber
@@ -35592,7 +35596,7 @@ CVE-2021-40874 [RESTServer pwdConfirm always returns 
true with Combination + Ker
- lemonldap-ng 2.0.14+ds-1 (bug #1005302)
[bullseye] - lemonldap-ng 2.0.11+ds-4+deb11u1
[buster] - lemonldap-ng 2.0.2+ds-7+deb10u7
-   [stretch] - lemonldap-ng  (Minor issue)
+   [stretch] - lemonldap-ng  (Vulnerable code introduced in 
2.0)
NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612
NOTE: 
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/66946e8f754812b375768c2124937137c856fe0c
 CVE-2021-40873 (An issue was discovered in Softing Industrial Automation OPC 
UA C++ SD ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eed55818c5c182b1943d2cf5c8a1a6b97e4c508a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eed55818c5c182b1943d2cf5c8a1a6b97e4c508a
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
05194bf6 by Moritz Muehlenhoff at 2022-03-24T15:37:04+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3722,10 +3722,13 @@ CVE-2022-26355 (Citrix Federated Authentication Service 
(FAS) 7.17 - 10.6 causes
NOT-FOR-US: Citrix
 CVE-2022-26354 (A flaw was found in the vhost-vsock device of QEMU. In case of 
error,  ...)
- qemu 
+   [bullseye] - qemu  (Minor issue)
+   [buster] - qemu  (Vulnerable code not present)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2063257
NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf
 CVE-2022-26353 (A flaw was found in the virtio-net device of QEMU. This flaw 
was inadv ...)
- qemu 
+   [bullseye] - qemu  (Minor issue)
[buster] - qemu  (Original upstream fix for CVE-2021-3748 
not applied)
[stretch] - qemu  (Original upstream fix for 
CVE-2021-3748 not applied)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2063197
@@ -5998,8 +6001,9 @@ CVE-2022-25486 (CuppaCMS v1.0 was discovered to contain a 
local file inclusion v
 CVE-2022-25485 (CuppaCMS v1.0 was discovered to contain a local file inclusion 
via the ...)
NOT-FOR-US: CuppaCMS
 CVE-2022-25484 (tcpprep v4.4.1 has a reachable assertion (assert(l2len  
0)) in pac ...)
-   - tcpreplay 
+   - tcpreplay  (unimportant)
NOTE: https://github.com/appneta/tcpreplay/issues/715
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-25483
RESERVED
 CVE-2022-25482
@@ -13538,6 +13542,7 @@ CVE-2022-0236 (The WP Import Export WordPress plugin 
(both free and premium vers
 CVE-2022-0235 (node-fetch is vulnerable to Exposure of Sensitive Information 
to an Un ...)
- node-fetch 2.6.1-7
[bullseye] - node-fetch  (Minor issue)
+   [buster] - node-fetch  (Minor issue)
NOTE: https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/
NOTE: Fixed by: 
https://github.com/node-fetch/node-fetch/commit/f5d3cf5e2579cb8f4c76c291871e69696aef8f80
 (v3.1.1)
 CVE-2022-0234 (The WOOCS WordPress plugin before 1.3.7.5 does not sanitise and 
escape ...)
@@ -17105,6 +17110,8 @@ CVE-2021-45959
 CVE-2021-45958 (UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer 
overflow  ...)
{DLA-2929-1}
- ujson  (bug #1005140)
+   [bullseye] - ujson  (Minor issue)
+   [buster] - ujson  (Minor issue)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009
NOTE: https://github.com/ultrajson/ultrajson/issues/501
NOTE: https://github.com/ultrajson/ultrajson/issues/502
@@ -33623,27 +33630,28 @@ CVE-2021-41500 (Incomplete string comparison 
vulnerability exits in cvxopt.org c
NOTE: https://github.com/cvxopt/cvxopt/issues/193
 CVE-2021-41499 (Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n 
Pyo  ...)
- python-pyo 1.0.4-1
+   [bullseye] - python-pyo  (Minor issue)
+   [buster] - python-pyo  (Minor issue)
[stretch] - python-pyo  (Minor issue)
NOTE: https://github.com/belangeo/pyo/issues/222
NOTE: 
https://github.com/belangeo/pyo/commit/e7e6d2880469b523e4c41f0da2087a6a3eec4a45 
(1.0.4)
 CVE-2021-41498 (Buffer overflow in ajaxsoundstudio.com Pyo lt and 1.03 in 
the Ser ...)
- python-pyo 1.0.4-1
+   [bullseye] - python-pyo  (Minor issue)
+   [buster] - python-pyo  (Minor issue)
[stretch] - python-pyo  (Minor issue)
NOTE: https://github.com/belangeo/pyo/issues/221
NOTE: 
https://github.com/belangeo/pyo/commit/017702c73332a8560c8554a36250a6da587a2418 
(1.0.4)
 CVE-2021-41497 (Null pointer reference in CMS_Conservative_increment_obj in 
RaRe-Techn ...)
NOT-FOR-US: RaRe-Technologies bounter
 CVE-2021-41496 (** DISPUTED ** Buffer overflow in the array_from_pyobj 
function of for ...)
-   - numpy 
-   [bullseye] - numpy  (Minor issue)
+   - numpy  (unimportant)
NOTE: https://github.com/numpy/numpy/issues/19000
NOTE: https://github.com/numpy/numpy/pull/20630
NOTE: 
https://github.com/numpy/numpy/commit/271010f1037150e95017f803f4214b8861e528f2
 CVE-2021-41495 (** DISPUTED ** Null Pointer Dereference vulnerability exists 
in numpy. ...)
-   - numpy 
-   [bullseye] - numpy  (Minor issue)
+   - numpy  (unimportant)
NOTE: https://github.com/numpy/numpy/issues/19038
-   TODO: check for classification/severity
 CVE-2021-41494
RESERVED
 CVE-2021-41493
@@ -34362,6 +34370,7 @@ CVE-2021-41185 (Mycodo is an environmental monitoring 
and regulation system. An
 CVE-2021-41184 (jQuery-UI is the official jQuery user interface library. Prior 
to vers ...)
- jqueryui 1.13.0+dfsg-1
[bullseye] - jqueryui 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e6100af0 by Moritz Muehlenhoff at 2022-03-23T14:58:16+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -943,6 +943,7 @@ CVE-2022-1020
 CVE-2022-27240 (scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has 
a buffer ...)
- glewlwyd 2.6.1-2
[bullseye] - glewlwyd  (Minor issue)
+   [buster] - glewlwyd  (Minor issue)
NOTE: 
https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a
 (v2.6.2)
 CVE-2022-27239
RESERVED
@@ -4084,18 +4085,28 @@ CVE-2020-36516 (An issue was discovered in the Linux 
kernel through 5.16.11. The
NOTE: https://dl.acm.org/doi/10.1145/3372297.3417884
 CVE-2022-26129 (Buffer overflow vulnerabilities exist in FRRouting through 
8.1.0 due t ...)
- frr  (bug #1008010)
+   [bullseye] - frr  (Minor issue)
+   [buster] - frr  (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10503
 CVE-2022-26128 (A buffer overflow vulnerability exists in FRRouting through 
8.1.0 due  ...)
- frr  (bug #1008010)
+   [bullseye] - frr  (Minor issue)
+   [buster] - frr  (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10502
 CVE-2022-26127 (A buffer overflow vulnerability exists in FRRouting through 
8.1.0 due  ...)
- frr  (bug #1008010)
+   [bullseye] - frr  (Minor issue)
+   [buster] - frr  (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10487
 CVE-2022-26126 (Buffer overflow vulnerabilities exist in FRRouting through 
8.1.0 due t ...)
- frr  (bug #1008010)
+   [bullseye] - frr  (Minor issue)
+   [buster] - frr  (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10505
 CVE-2022-26125 (Buffer overflow vulnerabilities exist in FRRouting through 
8.1.0 due t ...)
- frr  (bug #1008010)
+   [bullseye] - frr  (Minor issue)
+   [buster] - frr  (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10507
 CVE-2022-26122
RESERVED
@@ -6505,8 +6516,10 @@ CVE-2021-4220
 CVE-2021-4219
RESERVED
- imagemagick 
+   [bullseye] - imagemagick  (Minor issue)
+   [buster] - imagemagick  (Minor issue)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4626
-   TODO: check details
+   NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/c10351c16b8d2cabd11d2627a02de522570f6ceb
 CVE-2022-25212 (A cross-site request forgery (CSRF) vulnerability in Jenkins 
SWAMP Plu ...)
NOT-FOR-US: Jenkins plugin
 CVE-2022-25211 (A missing permission check in Jenkins SWAMP Plugin 1.2.6 and 
earlier a ...)
@@ -7611,14 +7624,20 @@ CVE-2022-24774 (CycloneDX BOM Repository Server is a 
bill of materials (BOM) rep
TODO: check
 CVE-2022-24773 (Forge (also called `node-forge`) is a native implementation of 
Transpo ...)
- node-node-forge 
+   [bullseye] - node-node-forge  (Minor issue)
+   [buster] - node-node-forge  (Minor issue)
NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr
NOTE: 
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1
 (v1.3.0)
 CVE-2022-24772 (Forge (also called `node-forge`) is a native implementation of 
Transpo ...)
- node-node-forge 
+   [bullseye] - node-node-forge  (Minor issue)
+   [buster] - node-node-forge  (Minor issue)
NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g
NOTE: 
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1
 (v1.3.0)
 CVE-2022-24771 (Forge (also called `node-forge`) is a native implementation of 
Transpo ...)
- node-node-forge 
+   [bullseye] - node-node-forge  (Minor issue)
+   [buster] - node-node-forge  (Minor issue)
NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765
NOTE: 
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1
 (v1.3.0)
 CVE-2022-24770 (`gradio` is an open source framework for building interactive 
machine  ...)
@@ -7631,6 +7650,8 @@ CVE-2022-24767
RESERVED
 CVE-2022-24766 (mitmproxy is an interactive, SSL/TLS-capable intercepting 
proxy. In mi ...)
- mitmproxy 
+   [bullseye] - mitmproxy  (Minor issue)
+   [buster] - mitmproxy  (Minor issue)
NOTE: 
https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3
NOTE: 
https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b
 (v8.0.0)
 CVE-2022-24765
@@ -19956,24 +19977,28 @@ CVE-2021-45089 (Stormshield Endpoint Security 2.x 
before 2.1.2 has Incorrect Acc
 CVE-2021-45088 (XSS can occur in GNOME Web (aka 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-21 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1898dd4b by Moritz Muehlenhoff at 2022-03-21T15:52:46+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -6029,11 +6029,13 @@ CVE-2022-25052
RESERVED
 CVE-2022-25051 (An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 
when deco ...)
- rtl-433  (bug #1008000)
+   [bullseye] - rtl-433  (Minor issue)
NOTE: 
https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
NOTE: https://github.com/merbanan/rtl_433/issues/1960
NOTE: https://huntr.dev/bounties/78eee103-bd61-4b4f-b054-04ad996b39e7/
 CVE-2022-25050 (rtl_433 21.12 was discovered to contain a stack overflow in 
the functi ...)
- rtl-433  (bug #1008000)
+   [bullseye] - rtl-433  (Minor issue)
NOTE: 
https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
NOTE: https://github.com/merbanan/rtl_433/issues/1960
NOTE: https://huntr.dev/bounties/6c9cd35f-a206-4fdf-b6d1-fcd50926c2d9/
@@ -7053,6 +7055,8 @@ CVE-2022-24669
RESERVED
 CVE-2022-0547 (OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication 
bypass  ...)
- openvpn 2.5.6-1 (bug #1008015)
+   [bullseye] - openvpn  (Minor issue)
+   [buster] - openvpn  (Minor issue)
NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2022-0547
NOTE: 
https://github.com/OpenVPN/openvpn/commit/58ec3bb4aac77131118dbbc39a65181e7847adee
 (v2.4.12)
NOTE: 
https://github.com/OpenVPN/openvpn/commit/af3e382649d96ae77cc5e42be8270f355e5cfec5
 (v2.5.6)
@@ -9573,6 +9577,8 @@ CVE-2022-23944 (User can access /plugin api without 
authentication. This issue a
NOT-FOR-US: Apache ShenYu Admin
 CVE-2022-23943 (Out-of-bounds Write vulnerability in mod_sed of Apache HTTP 
Server all ...)
- apache2 2.4.53-1
+   [bullseye] - apache2  (Minor issue)
+   [buster] - apache2  (Minor issue)
NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
NOTE: Fixed by: https://svn.apache.org/r1898695
NOTE: Fixed by: https://svn.apache.org/r1898772
@@ -11261,6 +11267,8 @@ CVE-2022-23438
RESERVED
 CVE-2022-23437 (There's a vulnerability within the Apache Xerces Java 
(XercesJ) XML pa ...)
- libxerces2-java 
+   [bullseye] - libxerces2-java  (revisit when/if fix is 
complete)
+   [buster] - libxerces2-java  (revisit when/if fix is complete)
[stretch] - libxerces2-java  (revisit when/if fix is 
complete)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/24/3
 CVE-2022-0311 (Heap buffer overflow in Task Manager in Google Chrome prior to 
97.0.46 ...)
@@ -14191,14 +14199,20 @@ CVE-2022-22722 (A CWE-798: Use of Hard-coded 
Credentials vulnerability exists th
NOT-FOR-US: Schneider Electric
 CVE-2022-22721 (If LimitXMLRequestBody is set to allow request bodies larger 
than 350M ...)
- apache2 2.4.53-1
+   [bullseye] - apache2  (Minor issue)
+   [buster] - apache2  (Minor issue)
NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
NOTE: Fixed by: https://svn.apache.org/r1898693
 CVE-2022-22720 (Apache HTTP Server 2.4.52 and earlier fails to close inbound 
connectio ...)
- apache2 2.4.53-1
+   [bullseye] - apache2  (Minor issue)
+   [buster] - apache2  (Minor issue)
NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
NOTE: Fixed by: https://svn.apache.org/r1898692
 CVE-2022-22719 (A carefully crafted request body can cause a read to a random 
memory a ...)
- apache2 2.4.53-1
+   [bullseye] - apache2  (Minor issue)
+   [buster] - apache2  (Minor issue)
NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
NOTE: Fixed by: https://svn.apache.org/r1898694
 CVE-2022-22718 (Windows Print Spooler Elevation of Privilege Vulnerability. 
This CVE I ...)
@@ -19627,7 +19641,6 @@ CVE-2021-44964 (Use after free in garbage collector and 
finalizer of lgc.c in Lu
NOTE: http://lua-users.org/lists/lua-l/2021-12/msg00015.html
NOTE: http://lua-users.org/lists/lua-l/2021-12/msg00030.html
NOTE: 
https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability
-   TODO: check possible fix and other versions of lua
 CVE-2021-44963
RESERVED
 CVE-2021-44962 (An out-of-bounds read vulnerability exists in the 
GCode::extrude() fun ...)
@@ -21029,6 +21042,7 @@ CVE-2021-44538 (The olm_session_describe function in 
Matrix libolm before 3.2.7
NOTE: Fixed by: 
https://gitlab.matrix.org/matrix-org/olm/-/commit/c23ce70fc66c26db5839ddb5a3b46d4c3d3abed6
 (3.2.8)
 CVE-2021-44537 (ownCloud owncloud/client 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0980c6ec by Moritz Muehlenhoff at 2022-03-16T09:50:28+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -694,6 +694,8 @@ CVE-2022-0943 (Heap-based Buffer Overflow occurs in vim in 
GitHub repository vim
NOTE: 
https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 
(v8.2.4563)
 CVE-2022-26981 (Liblouis through 3.21.0 has a buffer overflow in 
compilePassOpcode in  ...)
- liblouis 
+   [bullseye] - liblouis  (Minor issue)
+   [buster] - liblouis  (Minor issue)
NOTE: https://github.com/liblouis/liblouis/issues/1171
 CVE-2022-26980
RESERVED
@@ -1831,6 +1833,8 @@ CVE-2022-26506
RESERVED
 CVE-2022-26505 (A DNS rebinding issue in ReadyMedia (formerly MiniDLNA) before 
1.3.1 a ...)
- minidlna  (bug #1006798)
+   [bullseye] - minidlna  (Minor issue)
+   [buster] - minidlna  (Minor issue)
NOTE: 
https://sourceforge.net/p/minidlna/git/ci/c21208508dbc131712281ec5340687e5ae89e940/
NOTE: https://www.openwall.com/lists/oss-security/2022/03/03/1
 CVE-2022-26504
@@ -6542,6 +6546,8 @@ CVE-2022-24757
RESERVED
 CVE-2022-24756 (Bareos is open source software for backup, archiving, and 
recovery of  ...)
- bareos 
+   [buster] - bareos  (PAM support not yet present)
+   [stretch] - bareos  (PAM support not yet present)
NOTE: 
https://github.com/bareos/bareos/security/advisories/GHSA-jh55-4wgw-xc9j
NOTE: https://github.com/bareos/bareos/pull/1115
NOTE: https://github.com/bareos/bareos/pull/1119
@@ -6549,6 +6555,8 @@ CVE-2022-24756 (Bareos is open source software for 
backup, archiving, and recove
NOTE: https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/
 CVE-2022-24755 (Bareos is open source software for backup, archiving, and 
recovery of  ...)
- bareos 
+   [buster] - bareos  (PAM support not yet present)
+   [stretch] - bareos  (PAM support not yet present)
NOTE: 
https://github.com/bareos/bareos/security/advisories/GHSA-4979-8ffj-4q26
NOTE: https://github.com/bareos/bareos/pull/1115
NOTE: https://github.com/bareos/bareos/pull/1119
@@ -6593,6 +6601,8 @@ CVE-2022-24738 (Evmos is the Ethereum Virtual Machine 
(EVM) Hub on the Cosmos Ne
NOT-FOR-US: Evmos
 CVE-2022-24737 (HTTPie is a command-line HTTP client. HTTPie has the practical 
concept ...)
- httpie 
+   [bullseye] - httpie  (Minor issue)
+   [buster] - httpie  (Minor issue)
NOTE: 
https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq
NOTE: Fixed by: 
https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b
 (3.1.0)
 CVE-2022-24736
@@ -8180,6 +8190,8 @@ CVE-2022-0431
RESERVED
 CVE-2022-0430 (Exposure of Sensitive Information to an Unauthorized Actor in 
GitHub r ...)
- httpie 
+   [bullseye] - httpie  (Minor issue)
+   [buster] - httpie  (Minor issue)
NOTE: https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f
NOTE: Fixed by: 
https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b
 (3.1.0)
 CVE-2022-0429 (The WP Cerber Security, Anti-spam  Malware Scan WordPress 
plugin  ...)
@@ -44782,7 +44794,7 @@ CVE-2021-36370 (An issue was discovered in Midnight 
Commander through 4.8.26. Wh
 CVE-2021-36369
RESERVED
 CVE-2021-36368 (** DISPUTED ** An issue was discovered in OpenSSH before 8.9. 
If a cli ...)
-   - openssh 1:8.9p1-1
+   - openssh 1:8.9p1-1 (unimportant)
NOTE: https://bugzilla.mindrot.org/show_bug.cgi?id=3316
NOTE: https://docs.ssh-mitm.at/trivialauth.html
 CVE-2021-36367 (PuTTY through 0.75 proceeds with establishing an SSH session 
even if i ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0980c6ec2cdc73108891cda6ad02e303d35615e3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0980c6ec2cdc73108891cda6ad02e303d35615e3
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-14 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2205981b by Moritz Muehlenhoff at 2022-03-14T12:04:15+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3409,7 +3409,7 @@ CVE-2022-0742 [ipv6: fix skb drops in igmp6_event_query() 
and igmp6_event_report
[bullseye] - linux  (Vulnerable code not present)
[buster] - linux  (Vulnerable code not present)
[stretch] - linux  (Vulnerable code not present)
-   NOTE: 
https://git.kernel/org/linus/2d3916f3189172d5c69d33065c3c21119fe539fc (5.17-rc7)
+   NOTE: 
https://git.kernel.org/linus/2d3916f3189172d5c69d33065c3c21119fe539fc (5.17-rc7)
 CVE-2022-0741
RESERVED
[experimental] - gitlab 14.6.5+ds1-1
@@ -7713,23 +7713,27 @@ CVE-2022-0436
 CVE-2021-46669 (MariaDB through 10.5.9 allows attackers to trigger a 
convert_const_to_ ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-25638
 CVE-2021-46668 (MariaDB through 10.5.9 allows an application crash via certain 
long SE ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-25787
NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46667 (MariaDB before 10.6.5 has a sql_lex.cc integer overflow, 
leading to an ...)
- mariadb-10.6 1:10.6.5-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-26350
NOTE: Fixed in MariaDB: 10.2.41, 10.3.32, 10.4.22, 10.5.13, 10.6.5
 CVE-2021-4 (MariaDB before 10.6.2 allows an application crash because of 
mishandli ...)
- mariadb-10.6  (Fixed before initial upload to Debian)
- mariadb-10.5 1:10.5.11-1
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
[buster] - mariadb-10.3 1:10.3.31-0+deb10u1
NOTE: https://jira.mariadb.org/browse/MDEV-25635
@@ -7737,24 +7741,28 @@ CVE-2021-4 (MariaDB before 10.6.2 allows an 
application crash because of mis
 CVE-2021-46665 (MariaDB through 10.5.9 allows a sql_parse.cc application crash 
because ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-25636
NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46664 (MariaDB through 10.5.9 allows an application crash in 
sub_select_postj ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-25761
NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46663 (MariaDB through 10.5.13 allows a ha_maria::extra application 
crash via ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-26351
NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46662 (MariaDB through 10.5.9 allows a set_var.cc application crash 
via certa ...)
- mariadb-10.6 1:10.6.5-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-25637
NOTE: https://jira.mariadb.org/browse/MDEV-22464
@@ -7762,6 +7770,7 @@ CVE-2021-46662 (MariaDB through 10.5.9 allows a 
set_var.cc application crash via
 CVE-2021-46661 (MariaDB through 10.5.9 allows an application crash in 
find_field_in_ta ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in next 
point release)
- mariadb-10.3 
NOTE: https://jira.mariadb.org/browse/MDEV-25766
NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
@@ -8164,12 +8173,14 @@ CVE-2021-46660 (Signiant Manager+Agents before 15.1 
allows XML External Entity (
 CVE-2021-46659 (MariaDB before 10.7.2 allows an application crash because it 
does not  ...)
- mariadb-10.6 1:10.6.7-1
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed in 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-03-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
26b4faa3 by Moritz Muehlenhoff at 2022-03-04T21:15:22+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -4792,10 +4792,11 @@ CVE-2022-0531
 CVE-2022-0530 (A flaw was found in Unzip. The vulnerability occurs during the 
convers ...)
- unzip 
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2051395
-   NOTE: Crash in CLI tool, no security impact
+   NOTE: No details available yet
 CVE-2022-0529 (A flaw was found in Unzip. The vulnerability occurs during the 
convers ...)
- unzip 
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2051402
+   NOTE: No details available yet
 CVE-2021-46681
RESERVED
 CVE-2021-46680
@@ -4961,9 +4962,13 @@ CVE-2022-24615 (zip4j up to 2.9.0 can throw various 
uncaught exceptions while pa
TODO: check details
 CVE-2022-24614 (When reading a specially crafted JPEG file, metadata-extractor 
up to 2 ...)
- libmetadata-extractor-java 
+   [bullseye] - libmetadata-extractor-java  (Minor issue)
+   [buster] - libmetadata-extractor-java  (Minor issue)
NOTE: https://github.com/drewnoakes/metadata-extractor/issues/561
 CVE-2022-24613 (metadata-extractor up to 2.16.0 can throw various uncaught 
exceptions  ...)
- libmetadata-extractor-java 
+   [bullseye] - libmetadata-extractor-java  (Minor issue)
+   [buster] - libmetadata-extractor-java  (Minor issue)
NOTE: https://github.com/drewnoakes/metadata-extractor/issues/561
 CVE-2022-24612 (An authenticated user can upload an XML file containing an XSS 
via the ...)
NOT-FOR-US: EyesOfNetwork (EON) eonweb
@@ -15477,6 +15482,8 @@ CVE-2021-45430
RESERVED
 CVE-2021-45429 (A Buffer Overflow vulnerablity exists in VirusTotal YARA git 
commit: 6 ...)
- yara 
+   [bullseye] - yara  (Minor issue)
+   [buster] - yara  (Minor issue)
[stretch] - yara  (Minor issue)
NOTE: https://github.com/VirusTotal/yara/issues/1616
NOTE: 
https://github.com/VirusTotal/yara/commit/a36b497926b141624ea673111a101e9ddd7ac2eb
 (v4.2.0-rc1)
@@ -15659,6 +15666,8 @@ CVE-2021-45347 (An Incorrect Access Control 
vulnerability exists in zzcms 8.2, w
NOT-FOR-US: zzcms
 CVE-2021-45346 (A Memory Leak vulnerabilty exists in SQLite Project SQLite3 
3.35.1 and ...)
- sqlite3  (bug #1005974)
+   [bullseye] - sqlite3  (Minor issue)
+   [buster] - sqlite3  (Minor issue)
NOTE: https://github.com/guyinatuxedo/sqlite3_record_leaking
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2054793
 CVE-2021-45345
@@ -17986,6 +17995,7 @@ CVE-2021-44716 (net/http in Go before 1.16.12 and 
1.17.x before 1.17.5 allows un
- golang-1.15 1.15.15-5
[bullseye] - golang-1.15 1.15.15-1~deb11u2
- golang-1.11 
+   [buster] - golang-1.11  (Minor issue)
- golang-1.8 
- golang-1.7 
- golang-golang-x-net 1:0.0+git20211209.491a49a+dfsg-1
@@ -18166,11 +18176,13 @@ CVE-2021-44649 (Django CMS 3.7.3 does not validate 
the plugin_type parameter whi
- python-django-cms  (bug #516183)
 CVE-2021-44648 (GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer 
overflow vulner ...)
- gdk-pixbuf 
+   [bullseye] - gdk-pixbuf  (Minor issue)
[buster] - gdk-pixbuf  (Vulnerable code introduced later)
[stretch] - gdk-pixbuf  (Vulnerable code introduced later)
NOTE: https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
NOTE: 
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
NOTE: Introduced by: 
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/b88f1ce91a610a4e491a4ad6352183791e78afac
 (2.39.2)
+   NOTE: https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/130
 CVE-2021-44647 (Lua 5.4.4 and 5.4.2 are affected by SEGV by type confusion in 
funcname ...)
- lua5.4 5.4.4-1 (bug #1004189)
NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00195.html
@@ -20381,6 +20393,8 @@ CVE-2022-21709
RESERVED
 CVE-2022-21708 (graphql-go is a GraphQL server with a focus on ease of use. In 
version ...)
- golang-github-graph-gophers-graphql-go 1.3.0-1
+   [bullseye] - golang-github-graph-gophers-graphql-go  (Minor 
issue)
+   [buster] - golang-github-graph-gophers-graphql-go  (Minor issue)
NOTE: 
https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe
 (v1.3.0)
NOTE: 
https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh
NOTE: https://github.com/graph-gophers/graphql-go/pull/492


=
data/dsa-needed.txt
=
@@ -14,9 +14,11 @@ If needed, specify the release 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-25 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bf15f3f6 by Moritz Muehlenhoff at 2022-02-25T13:45:22+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1795,11 +1795,15 @@ CVE-2022-25329 (Trend Micro ServerProtect 6.0/5.8 
Information Server uses a stat
 CVE-2022-25328
RESERVED
- fscrypt 
+   [bullseye] - fscrypt  (Minor issue)
+   [buster] - fscrypt  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/02/24/1
NOTE: 
https://github.com/google/fscrypt/commit/fa1a1fdbdea65829ce24a6b6f86ce2961e465b02
 CVE-2022-25327
RESERVED
- fscrypt 
+   [bullseye] - fscrypt  (Minor issue)
+   [buster] - fscrypt  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/02/24/1
NOTE: 
https://github.com/google/fscrypt/commit/1a47718420317f893831b0223153d56005d5b02b
NOTE: 
https://github.com/google/fscrypt/commit/74e870b7bd1585b4b509da47e0e75db66336e576
@@ -1807,6 +1811,8 @@ CVE-2022-25327
 CVE-2022-25326
RESERVED
- fscrypt 
+   [bullseye] - fscrypt  (Minor issue)
+   [buster] - fscrypt  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/02/24/1
NOTE: 
https://github.com/google/fscrypt/commit/6e355131670ad014e45f879475ddf800f0080d41
 CVE-2022-23183



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf15f3f68e57064574fbb79c9ffcc58d54dc145b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf15f3f68e57064574fbb79c9ffcc58d54dc145b
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
232999db by Moritz Muehlenhoff at 2022-02-22T23:37:38+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3037,6 +3037,8 @@ CVE-2022-24600
RESERVED
 CVE-2022-24599 (In autofile Audio File Library 0.3.6, there exists one memory 
leak vul ...)
- audiofile 
+   [bullseye] - audiofile  (Minor issue)
+   [buster] - audiofile  (Minor issue)
NOTE: https://github.com/mpruett/audiofile/issues/60
 CVE-2022-24598
RESERVED
@@ -14688,7 +14690,7 @@ CVE-2021-45051 (Adobe Bridge version 11.1.2 (and 
earlier) and version 12.0 (and
 CVE-2021-4120 (snapd 2.54.2 fails to perform sufficient validation of snap 
content in ...)
- snapd 
[bullseye] - snapd 2.49-1+deb11u1
-   [buster] - snapd  (Minor issue)
+   [buster] - snapd  (Minor issue, intrusive backport)
NOTE: https://bugs.launchpad.net/snapd/+bug/1949368
NOTE: https://www.openwall.com/lists/oss-security/2022/02/18/2
 CVE-2021-45050



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/232999dbb2987165009db0b6827343b6f1ca338e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/232999dbb2987165009db0b6827343b6f1ca338e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
084458e5 by Moritz Muehlenhoff at 2022-02-22T21:05:31+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -972,6 +972,7 @@ CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 
and 6.x before 6.2.4 on
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/396020
NOTE: https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff
NOTE: https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff
+   NOTE: https://www.qt.io/blog/security-advisory-qprocess
 CVE-2022-25254
RESERVED
 CVE-2022-25253
@@ -93555,6 +93556,8 @@ CVE-2021-0184
RESERVED
 CVE-2021-0183 (Improper Validation of Specified Index, Position, or Offset in 
Input i ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0182 (Uncontrolled resource consumption in the Intel(R) HAXM software 
before ...)
@@ -93565,78 +93568,116 @@ CVE-2021-0180 (Uncontrolled resource consumption in 
the Intel(R) HAXM software b
NOT-FOR-US: Intel Hardware Accelerated Execution Manager
 CVE-2021-0179 (Improper Use of Validation Framework in software for Intel(R) 
PROSet/W ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0178 (Improper input validation in software for Intel(R) 
PROSet/Wireless Wi- ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0177 (Improper Validation of Consistency within input in software for 
Intel( ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0176 (Improper input validation in firmware for some Intel(R) 
PROSet/Wireles ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0175 (Improper Validation of Specified Index, Position, or Offset in 
Input i ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0174 (Improper Use of Validation Framework in firmware for some 
Intel(R) PRO ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0173 (Improper Validation of Consistency within input in firmware for 
some I ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0172 (Improper input validation in firmware for some Intel(R) 
PROSet/Wireles ...)
- firmware-nonfree 
+   [bullseye] - firmware-nonfree  (Non-free not supported)
+   [buster] - firmware-nonfree  (Non-free not supported)

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-21 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9e4d9721 by Moritz Muehlenhoff at 2022-02-21T17:03:33+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -502,6 +502,8 @@ CVE-2022-0684
RESERVED
 CVE-2021-46700 (In libsixel 1.8.6, sixel_encoder_output_without_macro (called 
from six ...)
- libsixel 
+   [bullseye] - libsixel  (Minor issue)
+   [buster] - libsixel  (Minor issue)
NOTE: https://github.com/saitoha/libsixel/issues/158
 CVE-2021-4222
RESERVED
@@ -871,6 +873,8 @@ CVE-2022-0640
RESERVED
 CVE-2022-0639 (Authorization Bypass Through User-Controlled Key in NPM 
url-parse prio ...)
- node-url-parse 1.5.7-1
+   [bullseye] - node-url-parse  (Minor issue)
+   [buster] - node-url-parse  (Minor issue)
NOTE: https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155
NOTE: 
https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788
 (1.5.7)
 CVE-2022-0638 (Cross-Site Request Forgery (CSRF) in Packagist 
microweber/microweber p ...)
@@ -2404,10 +2408,11 @@ CVE-2022-0536 (Exposure of Sensitive Information to an 
Unauthorized Actor in NPM
 CVE-2022-0535
RESERVED
 CVE-2022-0534 (A vulnerability was found in htmldoc version 1.9.15 where the 
stack ou ...)
-   - htmldoc 1.9.15-1
+   - htmldoc 1.9.15-1 (unimportant)
NOTE: https://github.com/michaelrsweet/htmldoc/issues/463
NOTE: Fixed by: 
https://github.com/michaelrsweet/htmldoc/commit/776cf0fc4c760f1fb7b966ce28dc92dd7d44ed50
 (v1.9.15)
NOTE: Fixed by: 
https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9
 (v1.9.15)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-0533
RESERVED
 CVE-2022-0532 (An incorrect sysctls validation vulnerability was found in 
CRI-O 1.18  ...)
@@ -2989,6 +2994,8 @@ CVE-2022-0513 (The WP Statistics WordPress plugin is 
vulnerable to SQL Injection
NOT-FOR-US: WordPress plugin
 CVE-2022-0512 (Authorization Bypass Through User-Controlled Key in NPM 
url-parse prio ...)
- node-url-parse 1.5.7-1
+   [bullseye] - node-url-parse  (Minor issue)
+   [buster] - node-url-parse  (Minor issue)
NOTE: https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b
NOTE: 
https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40
 (1.5.6)
 CVE-2022-0511
@@ -4834,8 +4841,11 @@ CVE-2021-4214
 CVE-2021-4213
RESERVED
- jss 
+   [bullseye] - jss  (Minor issue)
+   [buster] - jss  (Minor issue)
[stretch] - jss  (revisit when/if fix is complete)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2042900
+   NOTE: 
https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448
 CVE-2022-23941
RESERVED
 CVE-2022-23940
@@ -6802,11 +6812,15 @@ CVE-2022-23321 (A persistent cross-site scripting (XSS) 
vulnerability exists on
 CVE-2022-23320 (XMPie uStore 12.3.7244.0 allows for administrators to generate 
reports ...)
NOT-FOR-US: XMPie uStore
 CVE-2022-23319 (A segmentation fault during PCF file parsing in pcf2bdf 
versions = ...)
-   - pcf2bdf 
-   TODO: check, no additional references provided, double check
+   - pcf2bdf  (unimportant)
+   NOTE: https://github.com/ganaware/pcf2bdf
+   NOTE: https://github.com/ganaware/pcf2bdf/issues/5
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-23318 (A heap-buffer-overflow in pcf2bdf, versions = 1.05 allows 
an attac ...)
-   - pcf2bdf 
-   TODO: check, no additional references provided, double check
+   - pcf2bdf  (unimportant)
+   NOTE: https://github.com/ganaware/pcf2bdf
+   NOTE: https://github.com/ganaware/pcf2bdf/issues/4
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-23317 (CobaltStrike =4.5 HTTP(S) listener does not determine 
whether the  ...)
NOT-FOR-US: CobaltStrike
 CVE-2022-23316 (An issue was discovered in taoCMS v3.0.2. There is an 
arbitrary file r ...)
@@ -10675,22 +10689,32 @@ CVE-2021-46043 (A Pointer Dereference Vulnerability 
exits in GPAC 1.0.1 in the g
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46042 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via 
the _fsee ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2002
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46041 (A Segmentation Fault Vulnerability exists in GPAC 1.0.1 via 
the co64_b ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
963074a1 by Moritz Muehlenhoff at 2022-02-16T12:36:55+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -21445,6 +21445,8 @@ CVE-2021-3904 (grav is vulnerable to Improper 
Neutralization of Input During Web
NOT-FOR-US: Grav CMS
 CVE-2021-3903 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim 2:8.2.3565-1
+   [bullseye] - vim  (Minor issue)
+   [buster] - vim  (Minor issue)
[stretch] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
NOTE: 
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
@@ -33471,6 +33473,8 @@ CVE-2021-3701
 CVE-2021-3700
RESERVED
- usbredir 0.11.0-1
+   [bullseye] - usbredir  (Minor issue)
+   [buster] - usbredir  (Minor issue)
NOTE: 
https://gitlab.freedesktop.org/spice/usbredir/-/commit/03c519ff5831ba75120e00ebebbf1d5a1f7220ab
 (usbredir-0.11.0)
 CVE-2021-38562 (Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 
before 4.4. ...)
- request-tracker5  (bug #995167)
@@ -43286,10 +43290,9 @@ CVE-2021-34559 (In PEPPERL+FUCHS WirelessHART-Gateway 
= 3.0.8 a vulnerabilit
NOT-FOR-US: PEPPERL+FUCHS WirelessHART-Gateway
 CVE-2021-3596 [NULL pointer dereference in ReadSVGImage() in coders/svg.c]
RESERVED
-   - imagemagick 
+   - imagemagick  (Specific to IM7)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/2624
NOTE: 
https://github.com/ImageMagick/ImageMagick/commit/43dfb1894761c4929d5d5c98dc80ba4e59a0d114
-   TODO: check if affects Imagemagick6
 CVE-2021-3595 (An invalid pointer initialization issue was found in the SLiRP 
network ...)
{DLA-2753-1}
- libslirp 4.6.1-1 (bug #989996)
@@ -43866,11 +43869,15 @@ CVE-2021-34336
RESERVED
 CVE-2021-34335 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 0.27.5-1 (bug #992707)
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984
NOTE: https://github.com/Exiv2/exiv2/pull/1750
 CVE-2021-34334 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 0.27.5-1 (bug #992706)
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p
NOTE: https://github.com/Exiv2/exiv2/pull/1766
@@ -47534,6 +47541,8 @@ CVE-2021-32816 (ProtonMail Web Client is the official 
AngularJS web client for t
NOT-FOR-US: ProtonMail Web Client
 CVE-2021-32815 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 0.27.5-1 (bug #992705)
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m
NOTE: https://github.com/Exiv2/exiv2/pull/1739


=
data/dsa-needed.txt
=
@@ -18,8 +18,12 @@ chromium
 --
 condor
 --
+expat
+--
 faad2/oldstable (jmm)
 --
+freecad (aron)
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/963074a13a6f07f735753e249b795c83c79b8e18

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/963074a13a6f07f735753e249b795c83c79b8e18
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
eaeb30e2 by Moritz Muehlenhoff at 2022-02-15T11:06:57+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -472,6 +472,8 @@ CVE-2022-24981
RESERVED
 CVE-2022-0586 (Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 
3.6.1  ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17813
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-01.html
 CVE-2022-0585
@@ -480,14 +482,20 @@ CVE-2022-0584
RESERVED
 CVE-2022-0583 (Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 
3.6.1 and 3 ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17840
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-03.html
 CVE-2022-0582 (Unaligned access in the CSN.1 protocol dissector in Wireshark 
3.6.0 to ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17882
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-04.html
 CVE-2022-0581 (Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 
and 3. ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17935
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-05.html
 CVE-2022-0580 (Improper Access Control in Packagist librenms/librenms prior to 
22.2.0 ...)
@@ -1093,10 +1101,11 @@ CVE-2022-23104
RESERVED
 CVE-2022-0563 [partial disclosure of arbitrary files in chfn and chsh when 
compiled with libreadline]
RESERVED
-   - util-linux 
+   - util-linux  (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2053151
NOTE: 
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoi...@ws.net.home/T/#u
NOTE: 
https://github.com/util-linux/util-linux/commit/faa5a3a83ad0cb5e2c303edbfd8cd823c9d94c17
+   NOTE: util-linux in Debian not built with readline support
 CVE-2022-0562 (Null source pointer passed as an argument to memcpy() function 
within  ...)
- tiff 4.3.0-4
[bullseye] - tiff  (Minor issue)
@@ -13087,6 +13096,7 @@ CVE-2021-4116 (yetiforcecrm is vulnerable to Improper 
Neutralization of Input Du
 CVE-2021-4115 [file descriptor leak allows an unprivileged user to cause a 
crash]
RESERVED
- policykit-1  (bug #1005784)
+   [bullseye] - policykit-1  (Minor issue)
[buster] - policykit-1  (Vulnerable code not present, 
patch introducing issue not backported)
[stretch] - policykit-1  (Vulnerable code not present, 
patch introducing issue not backported)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2007534



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eaeb30e27c7c179334bfb3c7b75b425a26c8d9ef

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eaeb30e27c7c179334bfb3c7b75b425a26c8d9ef
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-14 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0a34bb7b by Moritz Muehlenhoff at 2022-02-14T17:36:57+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -947,10 +947,14 @@ CVE-2022-0563
RESERVED
 CVE-2022-0562 (Null source pointer passed as an argument to memcpy() function 
within  ...)
- tiff 4.3.0-4
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/362
NOTE: Fixed by: 
https://gitlab.com/libtiff/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b
 CVE-2022-0561 (Null source pointer passed as an argument to memcpy() function 
within  ...)
- tiff 4.3.0-4
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/362
NOTE: Fixed by: 
https://gitlab.com/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
 CVE-2022-0560 (Open Redirect in Packagist microweber/microweber prior to 
1.2.11. ...)
@@ -6245,6 +6249,8 @@ CVE-2022-23184 (In affected Octopus Server versions when 
the server HTTP and HTT
NOT-FOR-US: Octopus Server
 CVE-2022-23181 (The fix for bug CVE-2020-9484 introduced a time of check, time 
of use  ...)
- tomcat9 
+   [bullseye] - tomcat9  (Minor issue, fix along in future DSA)
+   [buster] - tomcat9  (Minor issue, fix along in future DSA)
- tomcat8 
[stretch] - tomcat8  (Minor issue; local race condition)
NOTE: https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
@@ -11754,15 +11760,15 @@ CVE-2021-45389 (StarWind SAN  NAS build 1578 and 
StarWind Command Center Bu
 CVE-2021-45388
REJECTED
 CVE-2021-45387 (tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv4() 
at tree.c ...)
-   - tcpreplay 4.4.0-1
-   [stretch] - tcpreplay  (Minor issue)
+   - tcpreplay 4.4.0-1 (unimportant)
NOTE: https://github.com/appneta/tcpreplay/issues/687
NOTE: Fixed by: 
https://github.com/appneta/tcpreplay/commit/46cf964a7db636da76abeebf10482acf6f682a87
 (v4.4.0)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-45386 (tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() 
at tree.c ...)
-   - tcpreplay 4.4.0-1
-   [stretch] - tcpreplay  (Minor issue)
+   - tcpreplay 4.4.0-1 (unimportant)
NOTE: https://github.com/appneta/tcpreplay/issues/687
NOTE: Fixed by: 
https://github.com/appneta/tcpreplay/commit/46cf964a7db636da76abeebf10482acf6f682a87
 (v4.4.0)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-45385 (A Null Pointer Dereference vulnerability exits in ffjpeg 
d5cfd49 (2021 ...)
NOT-FOR-US: ffjpeg
 CVE-2021-45384
@@ -16488,6 +16494,8 @@ CVE-2022-21713 (Grafana is an open-source platform for 
monitoring and observabil
- grafana 
 CVE-2022-21712 (twisted is an event-driven networking engine written in 
Python. In aff ...)
- twisted 
+   [bullseye] - twisted  (Minor issue)
+   [buster] - twisted  (Minor issue)
NOTE: 
https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx
NOTE: 
https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2
 (twisted-22.1.0rc1)
 CVE-2022-21711 (elfspirit is an ELF static analysis and injection framework 
that parse ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a34bb7b9a203b0774caf929b791b199f1a991cc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a34bb7b9a203b0774caf929b791b199f1a991cc
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-14 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9a076b33 by Moritz Muehlenhoff at 2022-02-14T16:47:51+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1720,14 +1720,14 @@ CVE-2022-0498
REJECTED
 CVE-2022-0497
RESERVED
-   - openscad 2021.01-4 (bug #1005641)
-   [stretch] - openscad  (Minor issue)
+   - openscad 2021.01-4 (unimportant; bug #1005641)
NOTE: https://github.com/openscad/openscad/issues/4043
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-0496
RESERVED
-   - openscad 2021.01-4 (bug #1005641)
-   [stretch] - openscad  (Minor issue)
+   - openscad 2021.01-4 (unimportant; bug #1005641)
NOTE: https://github.com/openscad/openscad/issues/4037
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-0495
RESERVED
 CVE-2022-0494
@@ -2033,6 +2033,8 @@ CVE-2022-24304
 CVE-2022-24303
RESERVED
- pillow 
+   [bullseye] - pillow  (Minor issue)
+   [buster] - pillow  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2052682
NOTE: 
https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
NOTE: 
https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26
 (9.0.1)
@@ -9384,9 +9386,10 @@ CVE-2021-46021 (An Use-After-Free vulnerability in 
rec_record_destroy() at rec-r
NOTE: Negligible security impact
 CVE-2021-46020 (An untrusted pointer dereference in mrb_vm_exec() of mruby 
v3.0.0 can  ...)
- mruby 
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
[stretch] - mruby  (revisit when/if fix is complete)
NOTE: https://github.com/mruby/mruby/issues/5613
-   TODO: check details
 CVE-2021-46019 (An untrusted pointer dereference in rec_db_destroy() at 
rec-db.c of GN ...)
- recutils  (unimportant)
NOTE: 
https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg9.html



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a076b33d85296483f71cd222a676ef1faff6e9d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a076b33d85296483f71cd222a676ef1faff6e9d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-10 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3f442621 by Moritz Muehlenhoff at 2022-02-10T10:57:36+01:00
buster/bullseye triage
new jss issue

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -847,6 +847,7 @@ CVE-2022-0486
 CVE-2022-0485 [nbdcopy: missing error handling may create corrupted 
destination image]
RESERVED
- libnbd 
+   [bullseye] - libnbd  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2050324
NOTE: Fixed by: 
https://gitlab.com/nbdkit/libnbd/-/commit/8d444b41d09a700c7ee6f9182a649f3f2d325abb
NOTE: 
https://listman.redhat.com/archives/libguestfs/2022-February/msg00104.html
@@ -2507,6 +2508,8 @@ CVE-2021-4214
NOTE: Crash in CLI package, not shipped in binary packages
 CVE-2021-4213
RESERVED
+   - jss 
+   NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2042900
 CVE-2022-23941
RESERVED
 CVE-2022-23940
@@ -3032,8 +3035,12 @@ CVE-2022-23854
 CVE-2022-23853
RESERVED
- kate 
+   [bullseye] - kate  (Minor issue)
+   [buster] - kate  (Minor issue)
[stretch] - kate  (Minor issue)
- ktexteditor 
+   [bullseye] - ktexteditor  (Minor issue)
+   [buster] - ktexteditor  (Minor issue)
[stretch] - ktexteditor  (Minor issue)
NOTE: https://kde.org/info/security/advisory-20220131-1.txt
NOTE: KTextEditor: Fixed by: 
https://commits.kde.org/ktexteditor/804e49444c093fe58ec0df2ab436565e50dc147e
@@ -11239,7 +11246,7 @@ CVE-2022-21988 (Microsoft Office Visio Remote Code 
Execution Vulnerability. ...)
 CVE-2022-21987 (Microsoft SharePoint Server Spoofing Vulnerability. ...)
NOT-FOR-US: Microsoft
 CVE-2022-21986 (.NET Denial of Service Vulnerability. ...)
-   TODO: check
+   NOT-FOR-US: Microsoft .NET
 CVE-2022-21985 (Windows Remote Access Connection Manager Information 
Disclosure Vulner ...)
NOT-FOR-US: Microsoft
 CVE-2022-21984 (Windows DNS Server Remote Code Execution Vulnerability. ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3f442621dcaf789085f13e2d03d05494df3bc7f7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3f442621dcaf789085f13e2d03d05494df3bc7f7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
48e50b1a by Moritz Muehlenhoff at 2022-02-09T11:58:58+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -934,6 +934,8 @@ CVE-2022-21177
RESERVED
 CVE-2022-0481 (NULL Pointer Dereference in Homebrew mruby prior to 3.2. ...)
- mruby 
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
NOTE: https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027
NOTE: 
https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e
TODO: check, possibly only introduced with 
dccd66f9efecd0a974b735c62836fe566015cf37 in 3.1.0-rc
@@ -1348,6 +1350,8 @@ CVE-2022-24250
RESERVED
 CVE-2022-24249 (A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 
via the  ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2081
NOTE: 
https://github.com/gpac/gpac/commit/71f9871fc210e60df041b58c84572782b4849de9
 CVE-2022-24248
@@ -4747,6 +4751,8 @@ CVE-2022-0241
RESERVED
 CVE-2022-0240 (mruby is vulnerable to NULL Pointer Dereference ...)
- mruby 
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
NOTE: https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb/
NOTE: 
https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca
 CVE-2022-0239 (corenlp is vulnerable to Improper Restriction of XML External 
Entity R ...)
@@ -13632,6 +13638,8 @@ CVE-2021-4044 (Internally libssl in OpenSSL calls 
X509_verify_cert() on the clie
NOTE: https://www.openssl.org/news/secadv/20211214.txt
 CVE-2021-4043 (NULL Pointer Dereference in GitHub repository gpac/gpac prior 
to 1.1.0 ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47
NOTE: https://github.com/gpac/gpac/issues/2092
NOTE: 
https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/48e50b1aff15f1ee6357862a7624d6320a8cc9a9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/48e50b1aff15f1ee6357862a7624d6320a8cc9a9
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-07 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
59300f89 by Moritz Muehlenhoff at 2022-02-07T23:03:36+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3913,11 +3913,10 @@ CVE-2022-0285 (Cross-site Scripting (XSS) - Stored in 
Packagist pimcore/pimcore
NOT-FOR-US: pimcore
 CVE-2022-0284
RESERVED
-   - imagemagick 
+   - imagemagick  (Specific to IM7)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2045943
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4729
NOTE: 
https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7
-   TODO: check if it affects ImageMagick6
 CVE-2022-0283
RESERVED
 CVE-2022-0282 (Code Injection in Packagist microweber/microweber prior to 
1.2.11. ...)
@@ -6249,6 +6248,7 @@ CVE-2022-22814
RESERVED
 CVE-2022-0155 (follow-redirects is vulnerable to Exposure of Private Personal 
Informa ...)
- node-follow-redirects 1.14.7+~1.13.1-1
+   [bullseye] - node-follow-redirects  (Minor issue)
[buster] - node-follow-redirects  (Minor issue, too intrusive 
to backport)
NOTE: https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406
NOTE: https://github.com/follow-redirects/follow-redirects/issues/183
@@ -7954,18 +7954,26 @@ CVE-2021-46047 (A Pointer Dereference Vulnerability 
exists in GPAC 1.0.1 via the
NOTE: 
https://github.com/gpac/gpac/commit/dd2e8b1b9378a9679de8e7e5dcb2d7841acd5dbd
 CVE-2021-46046 (A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the 
gf_isom_box_si ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2005
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46045 (GPAC 1.0.1 is affected by: Abort failed. The impact is: cause 
a denial ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2007
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46044 (A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via 
ShiftMetaOf ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2006
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46043 (A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the 
gf_list ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2001
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46042 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via 
the _fsee ...)
@@ -8242,6 +8250,8 @@ CVE-2021-45949 (Ghostscript GhostPDL 9.50 through 9.54.0 
has a heap-based buffer
NOTE: 
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=2a3129365d3bc0d4a41f107ef175920d1505d1f7
 CVE-2021-45948 (Open Asset Import Library (aka assimp) 5.1.0 and 5.1.1 has a 
heap-base ...)
- assimp 5.1.1~ds0-1
+   [bullseye] - assimp  (Vulnerable code not present)
+   [buster] - assimp  (Vulnerable code not present)
[stretch] - assimp  (M3D format support not present)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34416
NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/assimp/OSV-2021-775.yaml
@@ -13416,11 +13426,13 @@ CVE-2021-44514 (OpUtils in Zoho ManageEngine 
OpManager 12.5 before 125490 mishan
NOT-FOR-US: ManageEngine
 CVE-2021-44513 (Insecure creation of temporary directories in tmate-ssh-server 
2.3.0 a ...)
- tmate-ssh-server  (bug #1001225)
+   [bullseye] - tmate-ssh-server  (Minor issue)
NOTE: Fixed by: 
https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596
NOTE: https://www.openwall.com/lists/oss-security/2021/12/06/2
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1189388
 CVE-2021-44512 (World-writable permissions on the /tmp/tmate/sessions 
directory in tma ...)
- tmate-ssh-server  (bug #1001225)
+   [bullseye] - tmate-ssh-server  (Minor issue)
NOTE: Fixed by: 
https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596
NOTE: https://www.openwall.com/lists/oss-security/2021/12/06/2
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1189388
@@ -20619,6 +20631,7 @@ CVE-2021-42577
RESERVED
 CVE-2021-42576 (The bluemonday sanitizer before 1.0.16 for Go, and before 
0.0.8 for Py ...)
- 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
eff3784b by Moritz Muehlenhoff at 2022-02-05T14:06:23+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3911,12 +3911,16 @@ CVE-2022-0265
 CVE-2022-23307 (CVE-2020-9493 identified a deserialization issue that was 
present in A ...)
{DLA-2905-1}
- apache-log4j1.2 1.2.17-11 (bug #1004482)
+   [bullseye] - apache-log4j1.2  (Minor issue)
+   [buster] - apache-log4j1.2  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/5
 CVE-2022-23306
RESERVED
 CVE-2022-23305 (By design, the JDBCAppender in Log4j 1.2.x accepts an SQL 
statement as ...)
{DLA-2905-1}
- apache-log4j1.2 1.2.17-11 (bug #1004482)
+   [bullseye] - apache-log4j1.2  (Minor issue)
+   [buster] - apache-log4j1.2  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/4
 CVE-2022-0263 (Unrestricted Upload of File with Dangerous Type in Packagist 
pimcore/p ...)
NOT-FOR-US: pimcore
@@ -3984,6 +3988,8 @@ CVE-2022-0243 (Cross-site Scripting (XSS) - Stored in 
NuGet OrchardCore.Applicat
 CVE-2022-23302 (JMSSink in all versions of Log4j 1.x is vulnerable to 
deserialization  ...)
{DLA-2905-1}
- apache-log4j1.2 1.2.17-11 (bug #1004482)
+   [bullseye] - apache-log4j1.2  (Minor issue)
+   [buster] - apache-log4j1.2  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/3
 CVE-2022-22142
RESERVED
@@ -4426,6 +4432,8 @@ CVE-2022-0205
 CVE-2022-0204 [Heap overflow vulnerability in the implementation of the gatt 
protocol]
RESERVED
- bluez  (bug #1003712)
+   [bullseye] - bluez  (Minor issue)
+   [buster] - bluez  (Minor issue)
[stretch] - bluez  (Minor issue)
NOTE: 
https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
NOTE: Fixed by: 
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=591c546c536b42bef696d027f64aa22434f8c3f0
 (5.63)
@@ -14560,6 +14568,8 @@ CVE-2022-21705
RESERVED
 CVE-2022-21704 (log4js-node is a port of log4js to node.js. In affected 
versions defau ...)
- node-log4js 6.4.1+~cs8.3.5-1
+   [bullseye] - node-log4js  (Minor issue)
+   [buster] - node-log4js  (Minor issue)
NOTE: https://github.com/log4js-node/log4js-node/pull/1141 (v6.4.1)
NOTE: https://github.com/log4js-node/streamroller/pull/87
NOTE: 
https://github.com/log4js-node/log4js-node/security/advisories/GHSA-82v2-mx6x-wq7q
@@ -14716,6 +14726,8 @@ CVE-2022-21659 (Flask-AppBuilder is an application 
development framework, built
TODO: check
 CVE-2022-21658 (Rust is a multi-paradigm, general-purpose programming language 
designe ...)
- rustc 
+   [bullseye] - rustc  (Minor issue)
+   [buster] - rustc  (Minor issue)
NOTE: 
https://github.com/rust-lang/wg-security-response/tree/master/patches/CVE-2022-21658
NOTE: https://www.openwall.com/lists/oss-security/2022/01/20/1
 CVE-2022-21657
@@ -68697,10 +68709,14 @@ CVE-2021-23522
RESERVED
 CVE-2021-23521 (This affects the package juce-framework/JUCE before 6.1.5. 
This vulner ...)
- juce 6.1.5~ds0-1
+   [bullseye] - juce  (Minor issue)
+   [buster] - juce  (Minor issue)
NOTE: 
https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f
NOTE: 
https://security.snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388608
 CVE-2021-23520 (The package juce-framework/juce before 6.1.5 are vulnerable to 
Arbitra ...)
- juce 6.1.5~ds0-1
+   [bullseye] - juce  (Minor issue)
+   [buster] - juce  (Minor issue)
NOTE: 
https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f
NOTE: https://snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388607
NOTE: https://snyk.io/research/zip-slip-vulnerability



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eff3784b741a917c8925e27afd6aa9a48a5fd383

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eff3784b741a917c8925e27afd6aa9a48a5fd383
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
64eb78cb by Moritz Muehlenhoff at 2022-02-03T19:45:55+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -14112,6 +14112,8 @@ CVE-2021-3980 (elgg is vulnerable to Exposure of 
Private Personal Information to
 CVE-2021-3979 [ceph: Ceph volume does not honour osd_dmcrypt_key_size]
RESERVED
- ceph 
+   [bullseye] - ceph  (Minor issue)
+   [buster] - ceph  (Minor issue)
[stretch] - ceph  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/11/5
 CVE-2021-44034
@@ -26105,6 +26107,8 @@ CVE-2021-40530 (The ElGamal implementation in Crypto++ 
through 8.5 allows plaint
NOTE: https://github.com/weidai11/cryptopp/commit/bee8e8ca6658 
(CRYPTOPP_8_6_0)
 CVE-2021-40529 (The ElGamal implementation in Botan through 2.18.1, as used in 
Thunder ...)
- botan 2.18.1+dfsg-3 (bug #993840)
+   [bullseye] - botan  (Minor issue)
+   [buster] - botan  (Minor issue)
- botan1.10 
[stretch] - botan1.10  (Affected function encrypt(...) has 
changed drastically. Backport is too instrusive to backport)
NOTE: https://eprint.iacr.org/2021/923
@@ -68090,6 +68094,8 @@ CVE-2021-23728
RESERVED
 CVE-2021-23727 (This affects the package celery before 5.2.2. It by default 
trusts the ...)
- celery 5.2.3-1
+   [bullseye] - celery  (Minor issue)
+   [buster] - celery  (Vulnerable code not present)
[stretch] - celery  (Vulnerable code introduced later)
NOTE: 
https://github.com/celery/celery/commit/5c3f1559df16c32fb8d82918b4497f688d42ad0a
 (v5.2.3)
NOTE: Introduced by: 
https://github.com/celery/celery/commit/d20b8a5d469c80f48468e251cbe6451c798d1c29
 (4.4.0rc1)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64eb78cb0eb427ad45e0729e36c9456078ea6a38

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64eb78cb0eb427ad45e0729e36c9456078ea6a38
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-02 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c0e38621 by Moritz Muehlenhoff at 2022-02-02T20:19:06+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1408,9 +1408,9 @@ CVE-2021-4215
RESERVED
 CVE-2021-4214
RESERVED
-   - libpng1.6 
+   - libpng1.6  (unimportant)
NOTE: https://github.com/glennrp/libpng/issues/302
-   TODO: check, does the issue only affects the contrib/tests?
+   NOTE: Crash in CLI package, not shipped in binary packages
 CVE-2021-4213
RESERVED
 CVE-2022-23941
@@ -4348,12 +4348,18 @@ CVE-2022-23099
RESERVED
 CVE-2022-23098 (An issue was discovered in the DNS proxy in Connman through 
1.40. The  ...)
- connman 
+   [bullseye] - connman  (Minor issue)
+   [buster] - connman  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/25/1
 CVE-2022-23097 (An issue was discovered in the DNS proxy in Connman through 
1.40. forw ...)
- connman 
+   [bullseye] - connman  (Minor issue)
+   [buster] - connman  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/25/1
 CVE-2022-23096 (An issue was discovered in the DNS proxy in Connman through 
1.40. The  ...)
- connman 
+   [bullseye] - connman  (Minor issue)
+   [buster] - connman  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/25/1
 CVE-2022-23095 (Open Design Alliance Drawings SDK before 2022.12.1 mishandles 
the load ...)
NOT-FOR-US: Open Design Alliance Drawings SDK



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0e386212756cb558e199092bfc6b601d23de29c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0e386212756cb558e199092bfc6b601d23de29c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-02-02 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a8bfc354 by Moritz Muehlenhoff at 2022-02-02T11:11:29+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2015,6 +2015,8 @@ CVE-2022-23833
RESERVED
{DLA-2906-1}
- python-django 2:3.2.12-1 (bug #1004752)
+   [bullseye] - python-django  (Minor issue)
+   [buster] - python-django  (Minor issue)
NOTE: 
https://www.djangoproject.com/weblog/2022/feb/01/security-releases/
NOTE: 
https://github.com/django/django/commit/fc18f36c4ab94399366ca2f2007b3692559a6f23
 (main)
NOTE: 
https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9
 (4.0.2)
@@ -3556,12 +3558,16 @@ CVE-2021-46314
RESERVED
 CVE-2021-46313 (The binary MP4Box in GPAC v1.0.1 was discovered to contain a 
segmentat ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2039
NOTE: 
https://github.com/gpac/gpac/commit/ee969d3c4c425ecb25999eb68ada616925b58eba
 CVE-2021-46312
RESERVED
 CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 
via the ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2038
NOTE: 
https://github.com/gpac/gpac/commit/ad19e0c4504a89ca273442b1b1483ae7adfb9491
 CVE-2021-46310
@@ -5015,28 +5021,40 @@ CVE-2021-46241
RESERVED
 CVE-2021-46240 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 
via the ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2028
NOTE: 
https://github.com/gpac/gpac/commit/31eb879ea67b3a6ff67d3211f4c6b83369d4898d
 CVE-2021-46239 (The binary MP4Box in GPAC v1.1.0 was discovered to contain an 
invalid  ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2026
NOTE: 
https://github.com/gpac/gpac/commit/4e1215758fa89455e8de1262df36f11740bb1bc4
 CVE-2021-46238 (GPAC v1.1.0 was discovered to contain a stack overflow via the 
functio ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2027
NOTE: 
https://github.com/gpac/gpac/commit/4b9736ab8c9274db5858e5bf9fe0470bc3e7b6cf
 CVE-2021-46237 (An untrusted pointer dereference vulnerability exists in GPAC 
v1.1.0 v ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2033
NOTE: 
https://github.com/gpac/gpac/commit/3cc122ad664a2355cce9784f50b59c6272d43f00
 CVE-2021-46236 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 
via the ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2024
NOTE: 
https://github.com/gpac/gpac/commit/6a5effb57153cb05e72f6e9bd72afefc334a673d
 CVE-2021-46235
RESERVED
 CVE-2021-46234 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 
via the ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2023
NOTE: 
https://github.com/gpac/gpac/commit/70c6f6f832dccff814a19a74d87b97b3d68a4af5
 CVE-2021-46233
@@ -5313,6 +5331,8 @@ CVE-2022-22818
RESERVED
{DLA-2906-1}
- python-django 2:3.2.12-1 (bug #1004752)
+   [bullseye] - python-django  (Minor issue)
+   [buster] - python-django  (Minor issue)
NOTE: 
https://www.djangoproject.com/weblog/2022/feb/01/security-releases/
NOTE: 
https://github.com/django/django/commit/394517f07886495efcf79f95c7ee402a9437bd68
 (main)
NOTE: 
https://github.com/django/django/commit/01422046065d2b51f8f613409cad2c81b39487e5
 (4.0.2)
@@ -89818,10 +89838,11 @@ CVE-2020-27662 (In GLPI before 9.5.3, 
ajax/comments.php has an Insecure Direct O
- glpi 
 CVE-2020-27661 (A divide-by-zero issue was found in dwc2_handle_packet in 
hw/usb/hcd-d ...)
- qemu 1:5.2+dfsg-1 (bug #972864)
-   [buster] - qemu  (Fix along in future DSA)
+   [buster] - qemu  (Vulnerable code not present)
[stretch] - qemu  (Vulnerable code introduced later)
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html
NOTE: Fixed by: 
https://git.qemu.org/?p=qemu.git;a=commit;h=bea2a9e3e00b275dc40cfa09c760c715b8753e03
 (v5.2.0-rc0)
+   NOTE: Introduced in v5.1.0-rc0
 CVE-2020-27660 (SQL injection vulnerability in 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-31 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bc12ea8c by Moritz Muehlenhoff at 2022-01-31T18:58:31+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3146,11 +3146,13 @@ CVE-2021-46350 (There is an Assertion 
'ecma_is_value_object (value)' failed at j
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4936
 CVE-2021-46349 (There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || 
type == ECM ...)
- iotjs  (bug #1004288)
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4954
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4937
 CVE-2021-46348 (There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE 
(string_p)' fa ...)
- iotjs  (bug #1004288)
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4961
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4941
@@ -3160,6 +3162,8 @@ CVE-2021-46347 (There is an Assertion 
'ecma_object_check_class_name_is_object (o
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4938
 CVE-2021-46346 (There is an Assertion 'local_tza == 
ecma_date_local_time_zone_adjustme ...)
- iotjs  (bug #1004288)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4955
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4939
 CVE-2021-46345 (There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed 
at /jerry ...)
@@ -3182,6 +3186,7 @@ CVE-2021-46341
RESERVED
 CVE-2021-46340 (There is an Assertion 'context_p-stack_top_uint8 == 
SCAN_STACK_TRY ...)
- iotjs  (bug #1004288)
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4964
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4924
@@ -3190,6 +3195,8 @@ CVE-2021-46339 (There is an Assertion 
'lit_is_valid_cesu8_string (string_p, stri
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4935
 CVE-2021-46338 (There is an Assertion 'ecma_is_lexical_environment (object_p)' 
failed  ...)
- iotjs  (bug #1004288)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4943
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4933
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4900
@@ -3295,6 +3302,8 @@ CVE-2022-0262 (Cross-site Scripting (XSS) - Stored in 
Packagist pimcore/pimcore
NOT-FOR-US: pimcore
 CVE-2022-0261 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 8.2. ...)
- vim 
+   [bullseye] - vim  (Minor issue)
+   [buster] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
NOTE: 
https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc 
(v8.2.4120)
 CVE-2022-0260 (Cross-site Scripting (XSS) - Stored in GitHub repository 
pimcore/pimco ...)
@@ -4848,6 +4857,8 @@ CVE-2021-46171 (Modex v2.11 was discovered to contain a 
NULL pointer dereference
NOT-FOR-US: Modex
 CVE-2021-46170 (An issue was discovered in JerryScript commit a6ab5e9. There 
is an Use ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4917
NOTE: 
https://github.com/jerryscript-project/jerryscript/pull/4942/commits/5e1fdd1d1e75105b43392b4bb3996099cdc50f3d
 CVE-2021-46169 (Modex v2.11 was discovered to contain an Use-After-Free 
vulnerability  ...)
@@ -5323,6 +5334,8 @@ CVE-2022-22731
RESERVED
 CVE-2022-0144 (shelljs is vulnerable to Improper Privilege Management ...)
- node-shelljs 0.8.5+~cs0.8.10-1
+   [bullseye] - node-shelljs  (Minor issue)
+   [buster] - node-shelljs  (Minor issue)
[stretch] - node-shelljs  (Nodejs in stretch not covered 
by security support)
NOTE: https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/
NOTE: https://github.com/shelljs/shelljs/issues/1058
@@ -12939,6 +12952,8 @@ CVE-2021-4020 (janus-gateway is vulnerable to Improper 
Neutralization of Input D
NOTE: Issues only in janus-demos built from src:janus
 CVE-2021-4019 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim 2:8.2.3995-1
+   [bullseye] - vim  (Minor issue)
+ 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-31 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ad0538b7 by Moritz Muehlenhoff at 2022-01-31T17:13:55+01:00
buster/bullseye triage

- - - - -


3 changed files:

- data/CVE/list
- data/DSA/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -12658,6 +12658,8 @@ CVE-2021-44274
RESERVED
 CVE-2021-44273 (e2guardian v5.4.x = v5.4.3r is affected by missing SSL 
certificate ...)
- e2guardian 5.3.5-3 (bug #1003125)
+   [bullseye] - e2guardian  (Minor issue)
+   [buster] - e2guardian  (Minor issue)
[stretch] - e2guardian  (Minor issue; can be fixed later)
NOTE: https://www.openwall.com/lists/oss-security/2021/12/23/2
NOTE: https://github.com/e2guardian/e2guardian/issues/707
@@ -70156,15 +70158,19 @@ CVE-2021-22571
 CVE-2021-22570 (Nullptr dereference when a null char is present in a proto 
symbol. The ...)
[experimental] - protobuf 3.17.1-1
- protobuf 
+   [bullseye] - protobuf  (Minor issue)
+   [buster] - protobuf  (Minor issue)
NOTE: Fixed upstream in v3.15.0: 
https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0
-   TODO: check details
 CVE-2021-22569 (An issue in protobuf-java allowed the interleaving of 
com.google.proto ...)
[experimental] - protobuf 3.19.3-1
- protobuf 
+   [bullseye] - protobuf  (Minor issue)
+   [buster] - protobuf  (Minor issue)
[stretch] - protobuf  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/12/4
NOTE: https://cloud.google.com/support/bulletins#gcp-2022-001
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 
(unclear, might be bogus)
+   NOTE: 
https://github.com/protocolbuffers/protobuf/pull/9371/commits/5ea2bdf6d7483d64a6b02fcf00ee51fbfb80e847
 CVE-2021-22568 (When using the dart pub publish command to publish a package 
to a thir ...)
NOT-FOR-US: Dart language
 CVE-2021-22567 (Bidirectional Unicode text can be interpreted and compiled 
differently ...)


=
data/DSA/list
=
@@ -134,7 +134,7 @@
[buster] - sogo 4.0.7-1+deb10u2
[bullseye] - sogo 5.0.1-4+deb11u1
 [22 Dec 2021] DSA-5028-1 spip - security update
-   {CVE-2021-44120 CVE-2021-44122}
+   {CVE-2021-44120 CVE-2021-44122 CVE-2021-44123 CVE-2021-44118}
[buster] - spip 3.2.4-1+deb10u5
[bullseye] - spip 3.2.11-3+deb11u1
 [21 Dec 2021] DSA-5027-1 xorg-server - security update


=
data/dsa-needed.txt
=
@@ -52,8 +52,6 @@ ruby2.7/stable
 --
 runc
 --
-spip
---
 trafficserver (jmm)
   wait until status for CVE-2021-38161 is clarified (upstream patch got 
reverted)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad0538b7ee90fa8096bac3ccc31a61b54f4a3c9e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad0538b7ee90fa8096bac3ccc31a61b54f4a3c9e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-29 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0650b366 by Moritz Muehlenhoff at 2022-01-29T11:56:16+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -736,6 +736,7 @@ CVE-2022-0358
RESERVED
- qemu 
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2044863
+   NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/449e8171f96a6a944d1f3b7d3627ae059eae21ca
 CVE-2022-0357
RESERVED
 CVE-2022-0356
@@ -15904,6 +15905,7 @@ CVE-2021-3929 [nvme: DMA reentrancy issue leads to 
use-after-free]
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2020298
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/556
NOTE: Proposed patchset: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-08/msg03692.html
+   NOTE: No upstream patch as of 2022-01-28
 CVE-2021-43400 (An issue was discovered in gatt-database.c in BlueZ 5.61. A 
use-after- ...)
- bluez 5.62-1 (bug #998626)
[bullseye] - bluez  (Minor issue; can be fixed in point release)
@@ -25675,6 +25677,7 @@ CVE-2021-3750 [hcd-ehci: DMA reentrancy issue leads to 
use-after-free]
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/541
NOTE: Fix for whole class of DMA MMIO reentrancy issues: 
https://gitlab.com/qemu-project/qemu/-/issues/556
NOTE: Patchset: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-08/msg03692.html
+   NOTE: No upstream patch as of 2022-01-28
 CVE-2021-3749 (axios is vulnerable to Inefficient Regular Expression 
Complexity ...)
- node-axios 0.21.3+dfsg-1
[bullseye] - node-axios 0.21.1+dfsg-1+deb11u1
@@ -26258,6 +26261,7 @@ CVE-2021-3735 [ahci: deadlock issue leads to denial of 
service]
[buster] - qemu  (Minor issue)
[stretch] - qemu  (Fix along with a future DLA)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1997184
+   NOTE: No upstream patch as of 2022-01-28
 CVE-2021-40083 (Knot Resolver before 5.3.2 is prone to an assertion failure, 
triggerab ...)
[experimental] - knot-resolver 5.4.1-1
- knot-resolver 5.4.1-2 (bug #991463)
@@ -28343,6 +28347,7 @@ CVE-2021-3713 (An out-of-bounds write flaw was found in 
the UAS (USB Attached SC
- qemu 1:6.1+dfsg-2 (bug #992727)
[buster] - qemu  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1994640
+   NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/13b250b12ad3c59114a6a17d59caf073ce45b33a
 CVE-2021-39230 (Butter is a system usability utility. Due to a kernel error 
the JPNS k ...)
NOT-FOR-US: Butter
 CVE-2021-39229 (Apprise is an open source library which allows you to send a 
notificat ...)
@@ -39035,6 +39040,7 @@ CVE-2021-3608 [pvrdma: uninitialized memory unmap in 
pvrdma_ring_init()]
[buster] - qemu  (Minor issue)
[stretch] - qemu  (Vulnerable code introduced later)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1973383
+   NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=66ae37d8cc313f89272e711174a846a229bcdbd3CVE-2021-3594
 CVE-2021-3607 [pvrdma: unchecked malloc size due to integer overflow in 
init_dev_ring()]
RESERVED
- qemu 1:5.2+dfsg-11 (bug #990564)
@@ -44578,7 +44584,7 @@ CVE-2021-32606 (In the Linux kernel 5.11 through 
5.12.2, isotp_setsockopt in net
 CVE-2021-3545 (An information disclosure vulnerability was found in the virtio 
vhost- ...)
{DSA-4980-1}
- qemu 1:6.1+dfsg-1 (bug #989042)
-   [buster] - qemu  (Minor issue)
+   [buster] - qemu  (Only minimal support present and not 
installed in binary packages)
[stretch] - qemu  (The vulnerable code was introduced 
later)
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01153.html
@@ -44586,7 +44592,7 @@ CVE-2021-3545 (An information disclosure vulnerability 
was found in the virtio v
 CVE-2021-3544 (Several memory leaks were found in the virtio vhost-user GPU 
device (v ...)
{DSA-4980-1}
- qemu 1:6.1+dfsg-1 (bug #989042)
-   [buster] - qemu  (Minor issue)
+   [buster] - qemu  (Only minimal support present and not 
installed in binary packages)
[stretch] - qemu  (The vulnerable code was introduced 
later)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1958935
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html
@@ -44825,7 +44831,7 @@ CVE-2021-32563 (An issue was discovered in Thunar 
before 4.16.7 and 4.17.x befor
 CVE-2021-3546 (An out-of-bounds write vulnerability was found in the virtio 
vhost-use ...)
{DSA-4980-1}
- qemu 1:6.1+dfsg-1 (bug #989042)
-   [buster] - qemu  (Minor issue)
+   [buster] - qemu  (Only minimal 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3db1fe1a by Moritz Muehlenhoff at 2022-01-26T11:55:52+01:00
buster/bullseye triage
remove node-matrix-js-sdk for CVE-2021-44538, seems unrelated

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -131,6 +131,8 @@ CVE-2022-23936
RESERVED
 CVE-2022-23935 (lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a 
$file =~ / ...)
- libimage-exiftool-perl 12.38+dfsg-1
+   [bullseye] - libimage-exiftool-perl  (Minor issue)
+   [buster] - libimage-exiftool-perl  (Minor issue)
NOTE: 
https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582
 (12.38)
 CVE-2022-23934
RESERVED
@@ -3432,35 +3434,46 @@ CVE-2022-22896
RESERVED
 CVE-2022-22895 (Jerryscript 3.0.0 was discovered to contain a 
heap-buffer-overflow via ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4850
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4882
 CVE-2022-22894 (Jerryscript 3.0.0 was discovered to contain a stack overflow 
via ecma_ ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4890
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4899
 CVE-2022-22893 (Jerryscript 3.0.0 was discovered to contain a stack overflow 
via vm_lo ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4901
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4945
 CVE-2022-22892 (There is an Assertion 'ecma_is_value_undefined (value) || 
ecma_is_valu ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4872
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4878
 CVE-2022-22891 (Jerryscript 3.0.0 was discovered to contain a SEGV 
vulnerability via e ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
[buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4871
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4885
 CVE-2022-22890 (There is an Assertion 'arguments_type != 
SCANNER_ARGUMENTS_PRESENT  ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4849
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4847
 CVE-2022-22889
RESERVED
 CVE-2022-22888 (Jerryscript 3.0.0 was discovered to contain a stack overflow 
via ecma_ ...)
- iotjs  (bug #1004298)
+   [bullseye] - iotjs  (Minor issue)
+   [buster] - iotjs  (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4877
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4848
 CVE-2022-22887
@@ -8143,6 +8156,8 @@ CVE-2021-45341 (A buffer overflow vulnerability in 
CDataMoji of the jwwlib compo
NOTE: Fixed by: 
https://github.com/LibreCAD/LibreCAD/commit/f3502963eaf379a429bc9da73c1224c5db649997
 CVE-2021-45340 (In Libsixel prior to and including v1.10.3, a NULL pointer 
dereference ...)
- libsixel  (bug #1004377)
+   [bullseye] - libsixel  (Minor issue)
+   [buster] - libsixel  (Minor issue)
NOTE: https://github.com/libsixel/libsixel/issues/51
NOTE: Fixed by: https://github.com/libsixel/libsixel/pull/52
 CVE-2021-45339 (Privilege escalation vulnerability in Avast Antivirus prior to 
20.4 al ...)
@@ -10914,7 +10929,6 @@ CVE-2021-44538 (The olm_session_describe function in 
Matrix libolm before 3.2.7
- olm 3.2.8~dfsg-1 (bug #1001664)
[bullseye] - olm  (Minor issue)
[buster] - olm  (Vulnerable code introduced later)
-   - node-matrix-js-sdk 
- thunderbird 1:91.4.1-1
NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-55/#CVE-2021-44538
NOTE: 
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk/


=
data/dsa-needed.txt
=
@@ -28,6 +28,8 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-21 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1328c577 by Moritz Muehlenhoff at 2022-01-21T15:30:03+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -22127,6 +22127,8 @@ CVE-2021-41044
RESERVED
 CVE-2021-41043 (Use after free in tcpslice triggers AddressSanitizer, no other 
confirm ...)
- tcpslice  (bug #1003190)
+   [bullseye] - tcpslice  (Minor issue)
+   [buster] - tcpslice  (Minor issue)
NOTE: https://github.com/the-tcpdump-group/tcpslice/issues/11
NOTE: 
https://github.com/the-tcpdump-group/tcpslice/commit/030859fce9c77417de657b9bb29c0f78c2d68f4a
 (tcpslice-1.5)
 CVE-2021-41042
@@ -31627,6 +31629,7 @@ CVE-2021-37219 (HashiCorp Consul and Consul Enterprise 
1.10.1 Raft RPC layer all
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024
 CVE-2021-37218 (HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows 
non-server  ...)
- nomad 
+   [bullseye] - nomad  (Minor issue)
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023
NOTE: https://github.com/hashicorp/nomad/pull/11089 (main)
NOTE: 
https://github.com/hashicorp/nomad/commit/768d7c72a77e9c0415d92900753fc83e8822145a
 (release-1.1.4)
@@ -64983,6 +64986,7 @@ CVE-2021-3122 (CMCAgent in NCR Command Center Agent 
16.3 on Aloha POS/BOH server
NOT-FOR-US: CMCAgent in NCR Command Center Agent
 CVE-2021-3121 (An issue was discovered in GoGo Protobuf before 1.3.2. 
plugin/unmarsha ...)
- golang-gogoprotobuf 1.3.2-1
+   [buster] - golang-gogoprotobuf  (Minor issue)
[stretch] - golang-gogoprotobuf  (Minor issue)
NOTE: 
https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc
 CVE-2021-3120 (An arbitrary file upload vulnerability in the YITH WooCommerce 
Gift Ca ...)
@@ -80835,12 +80839,14 @@ CVE-2020-28853
 CVE-2020-28852 (In x/text in Go before v0.3.5, a "slice bounds out of range" 
panic occ ...)
- golang-golang-x-text 0.3.5-1 (bug #980002)
- golang-x-text 
+   [buster] - golang-x-text  (Minor issue)
[stretch] - golang-x-text  (Minor issue. Golang has limited 
support in stretch.)
NOTE: https://github.com/golang/go/issues/42536
NOTE: 
https://github.com/golang/text/commit/4482a914f52311356f6f4b7a695d4075ca22c0c6 
(v0.3.5)
 CVE-2020-28851 (In x/text in Go 1.15.4, an "index out of range" panic occurs 
in langua ...)
- golang-golang-x-text 0.3.6-1 (bug #980001)
- golang-x-text 
+   [buster] - golang-x-text  (Minor issue)
[stretch] - golang-x-text  (Minor issue. Golang has limited 
support in stretch.)
NOTE: https://github.com/golang/go/issues/42535
 CVE-2020-28850


=
data/dsa-needed.txt
=
@@ -14,6 +14,8 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 asterisk/oldstable
 --
+chromium (jmm)
+--
 condor
 --
 faad2/oldstable (jmm)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1328c577f67bd9fb21ec1f4f20d77c41bc282cdf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1328c577f67bd9fb21ec1f4f20d77c41bc282cdf
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7155dbe5 by Moritz Muehlenhoff at 2022-01-17T17:26:32+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -6570,12 +6570,16 @@ CVE-2021-45105 (Apache Log4j2 versions 2.0-alpha1 
through 2.16.0 (excluding 2.12
 CVE-2021-31566 [symbolic links incorrectly followed when changing modes, 
times, ACL and flags of a file while extracting an archive]
RESERVED
- libarchive 3.5.2-1 (bug #1001990)
+   [bullseye] - libarchive  (Minor issue)
+   [buster] - libarchive  (Minor issue)
NOTE: https://github.com/libarchive/libarchive/issues/1566
NOTE: 
https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043
 (v3.5.2)
NOTE: 
https://github.com/libarchive/libarchive/commit/e2ad1a2c3064fa9eba6274b3641c4c1beed25c0b
 (v3.5.2)
 CVE-2021-23177 [extracting a symlink with ACLs modifies ACLs of target]
RESERVED
- libarchive 3.5.2-1 (bug #1001986)
+   [bullseye] - libarchive  (Minor issue)
+   [buster] - libarchive  (Minor issue)
NOTE: https://github.com/libarchive/libarchive/issues/1565
NOTE: 
https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad
 (v3.5.2)
 CVE-2022-21943
@@ -7964,6 +7968,7 @@ CVE-2021-44717 (Go before 1.16.12 and 1.17.x before 
1.17.5 on UNIX allows write
- golang-1.15 1.15.15-5
[bullseye] - golang-1.15 1.15.15-1~deb11u2
- golang-1.11 
+   [buster] - golang-1.11  (Minor issue)
- golang-1.8 
- golang-1.7 
NOTE: https://github.com/golang/go/issues/50057
@@ -9803,10 +9808,14 @@ CVE-2021-4000 (showdoc is vulnerable to URL Redirection 
to Untrusted Site ...)
 CVE-2021-3999 [Off-by-one buffer overflow/underflow in getcwd()]
RESERVED
- glibc 
+   [bullseye] - glibc  (Minor issue)
+   [buster] - glibc  (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28769
 CVE-2021-3998 [Unexpected return value from realpath() for too long results]
RESERVED
- glibc 
+   [bullseye] - glibc  (Minor issue)
+   [buster] - glibc  (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28770
NOTE: 
https://patchwork.sourceware.org/project/glibc/patch/20220113055920.3155918-1-siddh...@sourceware.org/
 CVE-2021-3997 [Uncontrolled recursion in systemd's systemd-tmpfiles]
@@ -9941,6 +9950,7 @@ CVE-2021-44039
RESERVED
 CVE-2021-44038 (An issue was discovered in Quagga through 1.2.4. Unsafe 
chown/chmod op ...)
- quagga 
+   [buster] - quagga  (Minor issue)
[stretch] - quagga  (revisit when/if fixed upstream)
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1191890
NOTE: Debian installed systemd unit files install the problematic 
redhat/*.service
@@ -39086,6 +39096,7 @@ CVE-2021-33431
RESERVED
 CVE-2021-33430 (A Buffer Overflow vulnerability exists in NumPy 1.9.x in the 
PyArray_N ...)
- numpy 1:1.21.4-2
+   [bullseye] - numpy  (Minor issue)
NOTE: https://github.com/numpy/numpy/issues/18939
NOTE: https://github.com/numpy/numpy/pull/18989
NOTE: 
https://github.com/numpy/numpy/commit/16f7824b4d935b6aee98298ca4123d57174a6f2e 
(v1.22.0.dev0)


=
data/dsa-needed.txt
=
@@ -29,12 +29,17 @@ linux (carnil)
 --
 ndpi/oldstable
 --
+nss
+--
 nodejs (jmm)
 --
 pillow (jmm)
 --
 python-pysaml2 (jmm)
 --
+rpki-client/stable
+  new 7.6 release required libretls, which isn't in Bullseye
+--
 ruby2.5/oldstable
   Maintainer is preparing updates
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7155dbe5fe85c561f31a848b8f13a75fef301c81

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7155dbe5fe85c561f31a848b8f13a75fef301c81
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3c26aa00 by Moritz Muehlenhoff at 2022-01-17T09:33:02+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -2389,6 +2389,7 @@ CVE-2022-0120
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0119
RESERVED
@@ -2396,116 +2397,139 @@ CVE-2022-0118
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0117
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0116
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0115
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0114
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0113
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0112
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0111
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0110
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0109
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0108
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0107
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0106
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0105
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0104
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0103
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0102
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0101
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0100
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0099
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0098
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0097
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0096
RESERVED
{DSA-5046-1}
- chromium 97.0.4692.71-0.1
+   [buster] - chromium  (see DSA 5046)
[stretch] - chromium  (see DSA 4562)
 CVE-2022-0095
RESERVED
@@ -3479,40 +3503,40 @@ CVE-2021-45958 (UltraJSON (aka ujson) 4.0.2 through 
5.0.0 has a stack-based buff
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009
TODO: claimed to be fixed in range 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e63ac987 by Moritz Muehlenhoff at 2022-01-15T14:04:53+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -189,9 +189,13 @@ CVE-2022-23222 (kernel/bpf/verifier.c in the Linux kernel 
through 5.15.14 allows
NOTE: https://www.openwall.com/lists/oss-security/2022/01/13/1
 CVE-2022-23219 (The deprecated compatibility function clnt_create in the 
sunrpc module ...)
- glibc 
+   [bullseye] - glibc  (Minor issue)
+   [buster] - glibc  (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 CVE-2022-23218 (The deprecated compatibility function svcunix_create in the 
sunrpc mod ...)
- glibc 
+   [bullseye] - glibc  (Minor issue)
+   [buster] - glibc  (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 CVE-2022-23217
RESERVED
@@ -3154,9 +3158,9 @@ CVE-2021-46059 (A Pointer Dereference vulnerability 
exists in Vim 8.2.3883 via t
NOTE: https://huntr.dev/bounties/a9b015e2-59e3-4ed9-8812-d9021e40b8f2/
NOTE: Fixed by: 
https://github.com/vim/vim/commit/5937c7505f444dd896f336fa0119a93a55ebe9a2 
(v8.2.3883)
 CVE-2021-46058 (AHheap-based Buffer Overflow vulnerabiity exists in GNU 
inetutils 2.2  ...)
-   - inetutils 
+   - inetutils  (unimportant)
NOTE: 
https://lists.gnu.org/archive/html/bug-inetutils/2021-12/msg00016.html
-   TODO: check details
+   NOTE: Negligible security impact
 CVE-2021-46057
RESERVED
 CVE-2021-46056
@@ -10524,6 +10528,7 @@ CVE-2021-43862 (jQuery Terminal Emulator is a plugin 
for creating command line i
NOT-FOR-US: jQuery Terminal Emulator
 CVE-2021-43861 (Mermaid is a Javascript based diagramming and charting tool 
that uses  ...)
- node-mermaid 8.13.8+~cs10.4.16-1
+   [bullseye] - node-mermaid  (Minor issue)
NOTE: 
https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v
NOTE: 
https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83
 CVE-2021-43860 (Flatpak is a Linux application sandboxing and distribution 
framework.  ...)
@@ -20893,6 +20898,8 @@ CVE-2021-40875 (Improper Access Control in Gurock 
TestRail versions  7.2.0.3
 CVE-2021-40874 [RESTServer pwdConfirm always returns true with Combination + 
Kerberos]
RESERVED
- lemonldap-ng 
+   [bullseye] - lemonldap-ng  (Minor issue)
+   [buster] - lemonldap-ng  (Minor issue)
NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612
NOTE: 
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/66946e8f754812b375768c2124937137c856fe0c
 CVE-2021-40873 (An issue was discovered in Softing Industrial Automation OPC 
UA C++ SD ...)
@@ -55319,6 +55326,7 @@ CVE-2021-27022 (A flaw was discovered in bolt-server 
and ace where running a tas
NOTE: https://puppet.com/security/cve/CVE-2021-27022/
 CVE-2021-27021 (A flaw was discovered in Puppet DB, this flaw results in an 
escalation ...)
- puppetdb  (bug #990419)
+   [buster] - puppetdb  (Minor issue)
NOTE: https://puppet.com/security/cve/cve-2021-27021/
NOTE: 
https://github.com/puppetlabs/puppetdb/commit/c146e624d230f7410fb648d58ae28c0e3cd457a2
NOTE: 
https://github.com/puppetlabs/puppetdb/commit/f8dc81678cf347739838e42cc1c426d96406c266


=
data/dsa-needed.txt
=
@@ -38,8 +38,6 @@ pillow (jmm)
 --
 prosody (jmm)
 --
-puppetdb (jmm)
---
 python-pysaml2 (jmm)
 --
 ruby2.5/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e63ac987a26f22356149bae1d84612ca4b1c8e79

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e63ac987a26f22356149bae1d84612ca4b1c8e79
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-12 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
edcdb865 by Moritz Muehlenhoff at 2022-01-12T12:26:54+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2699,6 +2699,8 @@ CVE-2021-46052 (A Denial of Service vulnerability exists 
in Binaryen 104 due to
NOTE: Crash in CLI tool, no security impact
 CVE-2021-46051 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via 
the Media ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2011
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46050 (A Stack Overflow vulnerability exists in Binaryen 103 via the 
printf_c ...)
@@ -2707,6 +2709,8 @@ CVE-2021-46050 (A Stack Overflow vulnerability exists in 
Binaryen 103 via the pr
NOTE: Crash in CLI tool, no security impact
 CVE-2021-46049 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via 
the gf_fi ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2013
NOTE: 
https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f
 CVE-2021-46048 (A Denial of Service vulnerability exists in Binaryen 104 due 
to an ass ...)
@@ -2715,6 +2719,8 @@ CVE-2021-46048 (A Denial of Service vulnerability exists 
in Binaryen 104 due to
NOTE: Crash in CLI tool, no security impact
 CVE-2021-46047 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via 
the gf_hi ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2008
NOTE: 
https://github.com/gpac/gpac/commit/dd2e8b1b9378a9679de8e7e5dcb2d7841acd5dbd
 CVE-2021-46046 (A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the 
gf_isom_box_si ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/edcdb865704b2f428b1a763de6cf07b37d184078

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/edcdb865704b2f428b1a763de6cf07b37d184078
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-10 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d012b8bb by Moritz Muehlenhoff at 2022-01-10T18:31:50+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -6750,6 +6750,7 @@ CVE-2021-44538 (The olm_session_describe function in 
Matrix libolm before 3.2.7
{DSA-5034-1 DLA-2874-1}
- element-web  (bug #866502)
- olm 3.2.8~dfsg-1 (bug #1001664)
+   [bullseye] - olm  (Minor issue)
[buster] - olm  (Vulnerable code introduced later)
- node-matrix-js-sdk 
- thunderbird 1:91.4.1-1
@@ -10616,6 +10617,8 @@ CVE-2021-43519 (Stack overflow in lua_resume of ldo.c 
in Lua Interpreter 5.1.0~5
NOTE: Fixed by: 
https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868
 CVE-2021-43518 (Teeworlds up to and including 0.7.5 is vulnerable to Buffer 
Overflow.  ...)
- teeworlds 
+   [bullseye] - teeworlds  (Minor issue)
+   [buster] - teeworlds  (Minor issue)
NOTE: https://github.com/teeworlds/teeworlds/issues/2981
NOTE: https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/
 CVE-2021-43517


=
data/dsa-needed.txt
=
@@ -26,6 +26,8 @@ faad2/oldstable (jmm)
 --
 librecad
 --
+lighttpd (jmm)
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d012b8bb5ec9413a949a226cba97980babe4ff01

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d012b8bb5ec9413a949a226cba97980babe4ff01
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f6bf1612 by Moritz Muehlenhoff at 2022-01-09T20:06:52+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -9,6 +9,8 @@ CVE-2022-22845
RESERVED
 CVE-2022-22844 (LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in 
tif_unix.c i ...)
- tiff 
+   [bullseye] - tiff  (Minor issue)
+   [buster] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/355
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/287
 CVE-2022-22843
@@ -1569,9 +1571,9 @@ CVE-2021-46062
 CVE-2021-46061
RESERVED
 CVE-2021-46060 (A NULL Pointer Dereference vulnerability exists in GNU 
inetutils 2.2 v ...)
-   - inetutils 
+   - inetutils  (unimportant)
NOTE: 
https://lists.gnu.org/archive/html/bug-inetutils/2021-12/msg00017.html
-   TODO: check details
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-46059 (A Pointer Dereference vulnerability exists in Vim 8.2.3883 via 
the vim ...)
- vim 2:8.2.3995-1
[bullseye] - vim  (Minor issue)
@@ -1967,6 +1969,8 @@ CVE-2021-45931 (HarfBuzz 2.9.0 has an out-of-bounds write 
in hb_bit_set_invertib
TODO: check correctness of commit, might not affect any Debian released 
version
 CVE-2021-45930 (Qt SVG in Qt 5.0.0 through 5.15.2 and 6.0.0 through 6.2.1 has 
an out-o ...)
- qtsvg-opensource-src 5.15.2-4 (bug #1002991)
+   [bullseye] - qtsvg-opensource-src  (Minor issue)
+   [buster] - qtsvg-opensource-src  (Minor issue)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37025
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37306
NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qt/OSV-2021-1121.yaml


=
data/dsa-needed.txt
=
@@ -24,6 +24,8 @@ condor
 --
 faad2/oldstable (jmm)
 --
+librecad
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f6bf1612701684e094b80bf8d25df461d96f9b27

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f6bf1612701684e094b80bf8d25df461d96f9b27
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
38011ab3 by Moritz Mühlenhoff at 2022-01-04T17:16:49+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -834,6 +834,8 @@ CVE-2021-45961
RESERVED
 CVE-2022-0080 (mruby is vulnerable to Heap-based Buffer Overflow ...)
- mruby 
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
NOTE: https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e/
NOTE: 
https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6
 CVE-2021-45960 (In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or 
more) pla ...)
@@ -1087,9 +1089,13 @@ CVE-2021-4189 [ftplib should not use the host from the 
PASV response]
RESERVED
- python3.10  (Fixed before initial upload to Debian 
unstable)
- python3.9 3.9.7-1
+   [bullseye] - python3.9  (Minor issue)
- python3.7 
+   [buster] - python3.7  (Minor issue)
- python3.5 
- python2.7 
+   [bullseye] - python2.7  (Python 2.7 in Bullseye not covered by 
security support)
+   [buster] - python2.7  (Minor issue)
NOTE: https://bugs.python.org/issue43285
NOTE: 
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e
 (master)
NOTE: 
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335
 (v3.9.3)
@@ -4298,6 +4304,8 @@ CVE-2021-45041 (SuiteCRM before 7.12.2 and 8.x before 
8.0.1 allows authenticated
NOT-FOR-US: SuiteCRM
 CVE-2021-4110 (mruby is vulnerable to NULL Pointer Dereference ...)
- mruby  (bug #1001768)
+   [bullseye] - mruby  (Minor issue)
+   [buster] - mruby  (Minor issue)
[stretch] - mruby  (revisit when/if fix is complete)
NOTE: https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20
NOTE: 
https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34
@@ -4756,6 +4764,8 @@ CVE-2021-44848 (In Cibele Thinfinity VirtualUI before 
3.0, /changePassword retur
NOT-FOR-US: Cibele Thinfinity VirtualUI
 CVE-2021-44847 (A stack-based buffer overflow in handle_request function in 
DHT.c in t ...)
- libtoxcore 0.2.13-1 (bug #1001711)
+   [bullseye] - libtoxcore  (Minor issue)
+   [buster] - libtoxcore  (Minor issue)
NOTE: https://github.com/TokTok/c-toxcore/pull/1718
NOTE: 
https://blog.tox.chat/2021/12/stack-based-buffer-overflow-vulnerability-in-udp-packet-handling-in-toxcore-cve-2021-44847/
NOTE: Introduced by: 
https://github.com/TokTok/c-toxcore/commit/71260e38e8d12547b0e55916daf6cadd72f52e19
 (v0.1.9)
@@ -16602,11 +16612,13 @@ CVE-2021-41497 (Null pointer reference in 
CMS_Conservative_increment_obj in RaRe
NOT-FOR-US: RaRe-Technologies bounter
 CVE-2021-41496 (Buffer overflow in the array_from_pyobj function of 
fortranobject.c in ...)
- numpy 
+   [bullseye] - numpy  (Minor issue)
NOTE: https://github.com/numpy/numpy/issues/19000
NOTE: https://github.com/numpy/numpy/pull/20630
NOTE: 
https://github.com/numpy/numpy/commit/271010f1037150e95017f803f4214b8861e528f2
 CVE-2021-41495 (Null Pointer Dereference vulnerability exists in numpy.sort in 
NumPy & ...)
- numpy 
+   [bullseye] - numpy  (Minor issue)
NOTE: https://github.com/numpy/numpy/issues/19038
TODO: check for classification/severity
 CVE-2021-41494
@@ -26994,6 +27006,8 @@ CVE-2021-37233
RESERVED
 CVE-2021-37232 (A stack overflow vulnerability occurs in Atomicparsley 
20210124.204813 ...)
- atomicparsley 20210715.151551.e7ad03a-1 (bug #993366)
+   [bullseye] - atomicparsley  (Minor issue)
+   [buster] - atomicparsley  (Minor issue)
[stretch] - atomicparsley  (Minor issue)
- gtkpod  (bug #993376)
[bullseye] - gtkpod  (Minor issue)
@@ -27003,6 +27017,8 @@ CVE-2021-37232 (A stack overflow vulnerability occurs 
in Atomicparsley 20210124.
NOTE: https://github.com/wez/atomicparsley/issues/32
 CVE-2021-37231 (A stack-buffer-overflow occurs in Atomicparsley 
20210124.204813.840499 ...)
- atomicparsley 20210715.151551.e7ad03a-1 (bug #993372)
+   [bullseye] - atomicparsley  (Minor issue)
+   [buster] - atomicparsley  (Minor issue)
[stretch] - atomicparsley  (Minor issue)
- gtkpod  (bug #993375)
[bullseye] - gtkpod  (Minor issue)
@@ -34279,9 +34295,9 @@ CVE-2021-34142
RESERVED
 CVE-2021-34141 (Incomplete string comparison in the numpy.core component in 
NumPy1.9.x ...)
- numpy 
+   [bullseye] - numpy  (Minor issue)
NOTE: https://github.com/numpy/numpy/issues/18993
NOTE: 
https://github.com/numpy/numpy/commit/eeef9d4646103c3b1afd3085f1393f2b3f9575b2 

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4790e347 by Moritz Muehlenhoff at 2022-01-03T15:29:07+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -6963,6 +6963,8 @@ CVE-2021-43855 (Wiki.js is a wiki app built on node.js. 
Wiki.js 2.5.263 and earl
NOT-FOR-US: Wiki.js
 CVE-2021-43854 (NLTK (Natural Language Toolkit) is a suite of open source 
Python modul ...)
- nltk  (bug #1002623)
+   [bullseye] - nltk  (Minor issue)
+   [buster] - nltk  (Minor issue)
NOTE: 
https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x
NOTE: https://github.com/nltk/nltk/issues/2866
NOTE: https://github.com/nltk/nltk/pull/2869
@@ -10543,7 +10545,9 @@ CVE-2021-43173 (In NLnet Labs Routinator prior to 
0.10.2, a validation run can b
 CVE-2021-43172 (NLnet Labs Routinator prior to 0.10.2 happily processes a 
chain of RRD ...)
- routinator  (bug #929024)
- fort-validator 
+   [bullseye] - fort-validator  (Minor issue, revisit when 
fixed upstream)
- cfrpki 
+   [bullseye] - cfrpki  (Minor issue, revisit when fixed 
upstream)
- rpki-client 7.5-1
NOTE: 
https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt
NOTE: https://github.com/NLnetLabs/routinator/pull/665



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4790e3475603ca694671aeb453f87db9d0ca2677

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4790e3475603ca694671aeb453f87db9d0ca2677
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2022-01-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a683fc19 by Moritz Muehlenhoff at 2022-01-03T11:44:28+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -307,6 +307,8 @@ CVE-2021-45919
RESERVED
 CVE-2021-4190 (Large loop in the Kafka dissector in Wireshark 3.6.0 allows 
denial of  ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-22.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17811
 CVE-2021-4189 [ftplib should not use the host from the PASV response]
@@ -546,26 +548,38 @@ CVE-2021-45885 (An issue was discovered in Stormshield 
Network Security (SNS) 4.
NOT-FOR-US: Stormshield Network Security (SNS)
 CVE-2021-4186 (Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 
allows den ...)
- wireshark 3.6.0-1
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-16.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17737
 CVE-2021-4185 (Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 
3.4.0 to 3 ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-17.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17745
 CVE-2021-4184 (Infinite loop in the BitTorrent DHT dissector in Wireshark 
3.6.0 and 3 ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-18.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17754
 CVE-2021-4183 (Crash in the pcapng file parser in Wireshark 3.6.0 allows 
denial of se ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-19.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17755
 CVE-2021-4182 (Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 
3.4.10 ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-20.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17801
 CVE-2021-4181 (Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 
3.4.0 to 3. ...)
- wireshark 
+   [bullseye] - wireshark  (Minor issue)
+   [buster] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2021-21.html
NOTE: https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
 CVE-2021-45884 (In Brave Desktop 1.17 through 1.33 before 1.33.106, when 
CNAME-based a ...)
@@ -1511,6 +1525,8 @@ CVE-2021-45464
RESERVED
 CVE-2021-45463 (GEGL before 0.4.34, as used (for example) in GIMP before 
2.10.30, allo ...)
- gegl 1:0.4.34-1 (bug #1002661)
+   [bullseye] - gegl  (Minor issue)
+   [buster] - gegl  (Minor issue)
[stretch] - gegl  (Minor issue; can be fixed later)
NOTE: Fixed by: 
https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b
 (GEGL_0_4_34)
NOTE: Followup: 
https://gitlab.gnome.org/GNOME/gegl/-/commit/2172cf7e8d7e8891ae2053d6eef213d5bef939cb
 (GEGL_0_4_34)


=
data/dsa-needed.txt
=
@@ -27,6 +27,8 @@ condor
 --
 faad2/oldstable (jmm)
 --
+ghostscript
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a683fc19f56af499938ee5f02a09f9e872676cf4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a683fc19f56af499938ee5f02a09f9e872676cf4
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-12-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0f729fa7 by Moritz Muehlenhoff at 2021-12-23T17:29:58+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -20,6 +20,8 @@ CVE-2021-4157 [pNFS/flexfiles: fix incorrect size check in 
decode_nfs_fh()]
 CVE-2021-4156 [heap out-of-bounds read in src/flac.c in flac_buffer_copy]
RESERVED
- libsndfile 
+   [bullseye] - libsndfile  (Minor issue)
+   [buster] - libsndfile  (Minor issue)
NOTE: https://github.com/libsndfile/libsndfile/issues/731
NOTE: 
https://github.com/libsndfile/libsndfile/commit/ced91d7b971be6173b604154c39279ce90ad87cc
 (1.1.0beta1)
 CVE-2021-4155
@@ -913,14 +915,20 @@ CVE-2021-45261 (An Invalid Pointer vulnerability exists 
in GNU patch 2.7 via the
NOTE: Negligible security impact
 CVE-2021-45260 (A null pointer dereference vulnerability exists in gpac 1.1.0 
in the l ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/1979
TODO: check, fixing commit, cf. 
https://github.com/gpac/gpac/issues/1979#issuecomment-992471979
 CVE-2021-45259 (An Invalid pointer reference vulnerability exists in gpac 
1.1.0 via th ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/1986
NOTE: 
https://github.com/gpac/gpac/commit/654c796482c2609aa736315f9273d6c5912e0a29
 CVE-2021-45258 (A stack overflow vulnerability exists in gpac 1.1.0 via the 
gf_bifs_de ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
+   [buster] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/1970
NOTE: 
https://github.com/gpac/gpac/commit/47a26a32c9a2cd630c48517c3e6ab2fa5f6a26ad
 CVE-2021-45257 (An infinite loop vulnerability exists in nasm 2.16rc0 via the 
gpaste_t ...)
@@ -14195,6 +14203,8 @@ CVE-2021-41501
RESERVED
 CVE-2021-41500 (Incomplete string comparison vulnerability exits in cvxopt.org 
cvxop & ...)
- cvxopt 1.2.7+dfsg-1
+   [bullseye] - cvxopt  (Minor issue)
+   [buster] - cvxopt  (Minor issue)
NOTE: https://github.com/cvxopt/cvxopt/issues/193
 CVE-2021-41499 (Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n 
Pyo  ...)
- python-pyo 1.0.4-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f729fa73b827fecffa27a8b0e9e7320eb3e49ee

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f729fa73b827fecffa27a8b0e9e7320eb3e49ee
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-12-13 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1cefdd8b by Moritz Muehlenhoff at 2021-12-13T16:45:45+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2992,6 +2992,8 @@ CVE-2021-43798 (Grafana is an open-source platform for 
monitoring and observabil
- grafana 
 CVE-2021-43797 (Netty is an asynchronous event-driven network application 
framework fo ...)
- netty  (bug #1001437)
+   [bullseye] - netty  (Minor issue)
+   [buster] - netty  (Minor issue)
NOTE: 
https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq
NOTE: 
https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323 
(netty-4.1.71.Final)
 CVE-2021-43796
@@ -31665,6 +31667,8 @@ CVE-2021-33179 (The general user interface in Nagios XI 
versions prior to 5.8.4
NOT-FOR-US: Nagios XI
 CVE-2021-33178 (The Manage Backgrounds functionality within Nagvis versions 
prior to 2 ...)
- nagvis 1:1.9.29-1
+   [bullseye] - nagvis  (Minor issue)
+   [buster] - nagvis  (Minor issue)
TODO: check, affects nagvis plugin used in Nagios XI and should be 
fixed in 2.0.9, 
https://www.synopsys.com/blogs/software-security/cyrc-advisory-nagios-xi/
 CVE-2021-33177 (The Bulk Modifications functionality in Nagios XI versions 
prior to 5. ...)
NOT-FOR-US: Nagios XI
@@ -77845,6 +77849,7 @@ CVE-2020-27512
 CVE-2020-27511 (An issue was discovered in the stripTags and unescapeHTML 
components i ...)
- prototypejs  (bug #991898)
[bullseye] - prototypejs  (Minor issue)
+   [buster] - prototypejs  (Minor issue)
[stretch] - prototypejs  (Minor issue)
NOTE: 
https://github.com/prototypejs/prototype/blame/dee2f7d8611248abce81287e1be4156011953c90/src/prototype/lang/string.js#L283
NOTE: 
https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md
@@ -107696,6 +107701,8 @@ CVE-2020-14425 (Foxit Reader before 10.0 allows 
Remote Command Execution via the
NOT-FOR-US: Foxit Reader
 CVE-2020-14424 (Cacti before 1.2.18 allows remote attackers to trigger XSS via 
templat ...)
- cacti 1.2.19+ds1-1
+   [bullseye] - cacti  (Minor issue)
+   [buster] - cacti  (Minor issue)
[stretch] - cacti  (Vulnerable code not present)
NOTE: https://github.com/Cacti/cacti/pull/4261
NOTE: 
https://github.com/Cacti/cacti/commit/d12800ab479ad95a091bc577f28fd99ec95eb64c 
(release/1.2.18)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cefdd8b44ef101b84116f1569cee8fba2e77eb4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cefdd8b44ef101b84116f1569cee8fba2e77eb4
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-12-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8914f268 by Moritz Muehlenhoff at 2021-12-09T11:20:09+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -62,6 +62,7 @@ CVE-2021-23145
RESERVED
 CVE-2021- [Rainloop stores passwords in cleartext in logfile]
- rainloop 1.14.0-1 (bug #962629)
+   [buster] - rainloop  (Minor issue)
NOTE: https://github.com/RainLoop/rainloop-webmail/issues/1872
 CVE-2021-44738
RESERVED
@@ -598,7 +599,11 @@ CVE-2021-44477
RESERVED
 CVE-2021-4048 (An out-of-bounds read flaw was found in the CLARRV, DLARRV, 
SLARRV, an ...)
- lapack 
+   [bullseye] - lapack  (Minor issue)
+   [buster] - lapack  (Minor issue)
- openblas 0.3.18+ds-1
+   [bullseye] - openblas  (Minor issue)
+   [buster] - openblas  (Minor issue)
NOTE: https://github.com/Reference-LAPACK/lapack/pull/625
NOTE: 
https://github.com/Reference-LAPACK/lapack/commit/38f33108b18158409ca2a100e6fe03754781
NOTE: https://github.com/JuliaLang/julia/issues/42415
@@ -20588,6 +20593,8 @@ CVE-2021-37699 (Next.js is an open source website 
development framework to be us
 CVE-2021-37698 (Icinga is a monitoring system which checks the availability of 
network ...)
{DLA-2816-1}
- icinga2 2.13.1-1
+   [bullseye] - icinga2  (Minor issue)
+   [buster] - icinga2  (Minor issue)
NOTE: 
https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2
NOTE: https://icinga.com/blog/2021/08/19/icinga-2-13-1-security-release/
NOTE: 
https://github.com/Icinga/icinga2/commit/8910abc5882774c067dfc22cdf8bf8b830257608
 (v2.12.6)
@@ -32367,6 +32374,8 @@ CVE-2021-32743 (Icinga is a monitoring system which 
checks the availability of n
{DLA-2816-1}
[experimental] - icinga2 2.12.5-1~exp1
- icinga2 2.12.5-1 (bug #991494)
+   [bullseye] - icinga2  (Minor issue)
+   [buster] - icinga2  (Minor issue)
NOTE: 
https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/
NOTE: 
https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7
NOTE: 
https://github.com/Icinga/icinga2/commit/843353ab69f79b3abfeb38ac249b05e1944369ab
 (v2.12.5)
@@ -32383,6 +32392,8 @@ CVE-2021-32739 (Icinga is a monitoring system which 
checks the availability of n
{DLA-2816-1}
[experimental] - icinga2 2.12.5-1~exp1
- icinga2 2.12.5-1 (bug #991494)
+   [bullseye] - icinga2  (Minor issue)
+   [buster] - icinga2  (Minor issue)
NOTE: 
https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/
NOTE: 
https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5
NOTE: 
https://github.com/Icinga/icinga2/commit/b5b83fa51564662ff2e78d7529ff77e1085d4522
 (v2.12.5)
@@ -87804,6 +87815,8 @@ CVE-2020-23110
RESERVED
 CVE-2020-23109 (Buffer overflow vulnerability in function convert_colorspace 
in heif_c ...)
- libheif 
+   [bullseye] - libheif  (Minor issue)
+   [buster] - libheif  (Minor issue)
NOTE: https://github.com/strukturag/libheif/issues/207
 CVE-2020-23108
RESERVED


=
data/dsa-needed.txt
=
@@ -48,6 +48,8 @@ python-pysaml2 (jmm)
 --
 rabbitmq-server
 --
+ruby2.7
+--
 runc
 --
 sogo
@@ -61,5 +63,5 @@ trafficserver (jmm)
 --
 varnish
 --
-wireshark
+wireshark (jmm)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8914f26837165d32dd0f63bd306ba876ababecf8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8914f26837165d32dd0f63bd306ba876ababecf8
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-12-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7e85cbf2 by Moritz Muehlenhoff at 2021-12-06T12:52:16+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -1125,6 +1125,7 @@ CVE-2021-4024 [podman: podman machine spawns gvproxy with 
port binded to all IPs
NOTE: Fixed by: 
https://github.com/containers/podman/commit/295d87bb0b028e57dc2739791dee4820fe5fcc48
 CVE-2021-44227 (In GNU Mailman before 2.1.38, a list member or moderator can 
get a CSR ...)
- mailman 
+   [buster] - mailman  (Minor issue)
[stretch] - mailman  (Minor issue; can be fixed with the next 
DLA)
NOTE: https://bugs.launchpad.net/mailman/+bug/1952384
NOTE: Patch: https://launchpadlibrarian.net/570827498/patch.txt
@@ -9086,6 +9087,8 @@ CVE-2021-42261 (Revisor Video Management System (VMS) 
before 2.0.0 has a directo
NOT-FOR-US: Revisor Video Management System (VMS)
 CVE-2021-42260 (TinyXML through 2.6.2 has an infinite loop in 
TiXmlParsingData::Stamp  ...)
- tinyxml 
+   [bullseye] - tinyxml  (Minor issue)
+   [buster] - tinyxml  (Minor issue)
[stretch] - tinyxml  (Minor issue; can be fixed with the next 
DLA)
NOTE: https://sourceforge.net/p/tinyxml/bugs/141/
NOTE: https://sourceforge.net/p/tinyxml/git/merge-requests/1/
@@ -10306,6 +10309,7 @@ CVE-2021-41771 (ImportedSymbols in debug/macho (for 
Open or OpenFat) in Go befor
- golang-1.15 
[bullseye] - golang-1.15  (Minor issue; will be fixed via point 
release)
- golang-1.11 
+   [buster] - golang-1.11  (Minor issue)
- golang-1.8 
- golang-1.7 
[stretch] - golang-1.7  (Minor issue; can be fixed with the 
next DLA)
@@ -13730,6 +13734,8 @@ CVE-2021-40331
RESERVED
 CVE-2021-3756 (libmysofa is vulnerable to Heap-based Buffer Overflow ...)
- libmysofa 1.2.1~dfsg0-1
+   [bullseye] - libmysofa  (Minor issue)
+   [buster] - libmysofa  (Minor issue)
NOTE: https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/
NOTE: 
https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1
 (v1.2.1)
 CVE-2021-3755
@@ -42499,7 +42505,6 @@ CVE-2021-28703
NOTE: 
https://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=c65ea16dbcafbe4fe21693b18f8c2a3c5d14600e
 (4.14.0-rc1)
 CVE-2021-28702 (PCI devices with RMRRs not deassigned correctly Certain PCI 
devices in ...)
- xen 4.14.3+32-g9de3671772-1
-   [bullseye] - xen  (Minor issue, fix along with next DSA)
[buster] - xen  (Vulnerable code introduced later)
[stretch] - xen  (Vulnerable code introduced later)
NOTE: https://xenbits.xen.org/xsa/advisory-386.html
@@ -56328,6 +56333,7 @@ CVE-2021-22943 (A vulnerability found in UniFi Protect 
application V1.18.1 and e
 CVE-2021-22942 (A possible open redirect vulnerability in the Host 
Authorization middl ...)
[experimental] - rails 2:6.1.4.1+dfsg-1
- rails  (bug #992586)
+   [bullseye] - rails  (Minor issue)
[buster] - rails  (Vulnerable code not present)
[stretch] - rails  (Vulnerable code not present)
NOTE: https://www.openwall.com/lists/oss-security/2021/08/20/1
@@ -61686,6 +61692,7 @@ CVE-2021-21306 (Marked is an open-source markdown 
parser and compiler (npm packa
NOTE: 
https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd
 CVE-2021-21305 (CarrierWave is an open-source RubyGem which provides a simple 
and flex ...)
- ruby-carrierwave  (bug #982551)
+   [buster] - ruby-carrierwave  (Minor issue)
[stretch] - ruby-carrierwave  (No reverse dependencies)
NOTE: 
https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4
NOTE: 
https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7
@@ -61741,6 +61748,7 @@ CVE-2021-21289 (Mechanize is an open-source ruby 
library that makes automated we
NOTE: Test warnings fixup: 
https://github.com/sparklemotion/mechanize/commit/5b30aed33cbac9825e8978f8e36dd221cbd4c093
 (v2.7.7)
 CVE-2021-21288 (CarrierWave is an open-source RubyGem which provides a simple 
and flex ...)
- ruby-carrierwave 1.3.2-1 (bug #982552)
+   [buster] - ruby-carrierwave  (Minor issue)
[stretch] - ruby-carrierwave  (No reverse dependencies)
NOTE: 
https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5
NOTE: 
https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0


=
data/dsa-needed.txt
=
@@ -17,16 +17,15 @@ asterisk/oldstable
 condor
 --
 chromium
+  inactive, removal from stable likely

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-12-01 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8986aaa7 by Moritz Muehlenhoff at 2021-12-01T19:51:12+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -11303,6 +11303,8 @@ CVE-2021-41126 (October is a Content Management System 
(CMS) and web platform bu
NOT-FOR-US: October CMS
 CVE-2021-41125 (Scrapy is a high-level web crawling and scraping framework for 
Python. ...)
- python-scrapy 2.5.1-1
+   [bullseye] - python-scrapy  (Minor issue)
+   [buster] - python-scrapy  (Minor issue)
NOTE: 
https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498
 CVE-2021-41124 (Scrapy-splash is a library which provides Scrapy and 
JavaScript integr ...)
NOT-FOR-US: Scrapy-splash
@@ -74019,6 +74021,7 @@ CVE-2020-28164
 CVE-2020-28163
RESERVED
- dwarfutils 20201201-1
+   [buster] - dwarfutils  (Minor issue)
NOTE: 
https://github.com/davea42/libdwarf-code/commit/faf99408e3f9f706fc3809dd400e831f989778d3
NOTE: https://www.prevanders.net/dwarfbug.html#DW202010-003
 CVE-2020-28162
@@ -76349,6 +76352,7 @@ CVE-2020-27546
 CVE-2020-27545
RESERVED
- dwarfutils 20201201-1
+   [buster] - dwarfutils  (Minor issue)
NOTE: https://www.prevanders.net/dwarfbug.html#DW202010-001
NOTE: 
https://github.com/davea42/libdwarf-code/commit/95f634808c01f1c61bbec56ed2395af997f397ea
 CVE-2020-27544



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8986aaa79834cd2ce0c408c216d1e2e6f12276b1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8986aaa79834cd2ce0c408c216d1e2e6f12276b1
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-11-29 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e688eed0 by Moritz Muehlenhoff at 2021-11-29T16:19:24+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -2893,6 +2893,7 @@ CVE-2021-43520
RESERVED
 CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 
5.1.0~5.4.4 a ...)
- lua5.4  (bug #1000228)
+   [bullseye] - lua5.4  (Minor issue)
- lua5.3 
[bullseye] - lua5.3  (Minor issue)
[buster] - lua5.3  (Minor issue)
@@ -3152,6 +3153,8 @@ CVE-2021-3931 (snipe-it is vulnerable to Cross-Site 
Request Forgery (CSRF) ...)
 CVE-2021-3930 [off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c]
RESERVED
- qemu 
+   [bullseye] - qemu  (Minor issue)
+   [buster] - qemu  (Minor issue)
[stretch] - qemu  (Fix along with a future DLA)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2020588
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/546
@@ -3182,12 +3185,11 @@ CVE-2021-43393
 CVE-2021-43392
RESERVED
 CVE-2021-43396 (** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C 
Library (aka  ...)
-   - glibc  (bug #998622)
-   [buster] - glibc  (Vulnerable code not present)
-   [stretch] - glibc  (Vulnerable code not present)
+   - glibc  (unimportant; bug #998622)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28524
NOTE: Fixed by: 
https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d
NOTE: Introduced by the fix for CVE-2021-3326 / BZ#27256: 
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
+   NOTE: No security impact per upstream assessment
 CVE-2021-43391 (An Out-of-Bounds Read vulnerability exists when reading a DXF 
file usi ...)
NOT-FOR-US: Open Design Alliance Drawings SDK
 CVE-2021-43390 (An Out-of-Bounds Write vulnerability exists when reading a DGN 
file us ...)
@@ -8680,6 +8682,7 @@ CVE-2021-42007
RESERVED
 CVE-2021-42006 (An out-of-bounds access in GffLine::GffLine in gff.cpp in 
GCLib 0.12.7 ...)
- libgclib 0.12.7+ds-2 (bug #996591)
+   [bullseye] - libgclib  (Minor issue)
NOTE: https://github.com/gpertea/gclib/issues/11
 CVE-2021-42005
RESERVED
@@ -17883,6 +17886,7 @@ CVE-2020-36466 (An issue was discovered in the cgc 
crate through 2020-12-10 for
NOT-FOR-US: Rust crate cgc
 CVE-2020-36465 (An issue was discovered in the generic-array crate before 
0.13.3 for R ...)
- rust-generic-array 0.14.4-1
+   [buster] - rust-generic-array  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0146.html
 CVE-2020-36464 (An issue was discovered in the heapless crate before 0.6.1 for 
Rust. T ...)
NOT-FOR-US: Rust crate heapless
@@ -32563,8 +32567,8 @@ CVE-2021-32066 (An issue was discovered in Ruby through 
2.6.7, 2.7.x through 2.7
{DLA-2780-1}
- ruby2.7 2.7.4-1 (bug #990815)
- ruby2.5 
+   [buster] - ruby2.5  (Minor issue)
- ruby2.3 
-   [buster] - ruby2.3  (Minor issue)
- jruby 
[buster] - jruby  (Minor issue)
[stretch] - jruby  (Minor issue)
@@ -58284,7 +58288,9 @@ CVE-2021-21707 (In PHP versions 7.3.x below 7.3.33, 
7.4.x below 7.4.26 and 8.0.x
- php8.1 8.1.0-1
- php8.0 
- php7.4 
+   [bullseye] - php7.4  (Minor issue, fix along with next DSA)
- php7.3 
+   [buster] - php7.3  (Minor issue, fix along with next DSA)
- php7.0 
NOTE: Fixed in 8.1.0, 8.0.13, 7.4.26, 7.3.33
NOTE: PHP Bug: https://bugs.php.net/79971
@@ -73350,6 +73356,7 @@ CVE-2020-28201
RESERVED
 CVE-2020-28200 (The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled 
Resource ...)
- dovecot 1:2.3.16+dfsg1-1 (bug #990566; bug #991323)
+   [bullseye] - dovecot  (Minor issue, fix along with next 
update)
[buster] - dovecot  (Minor issue, fix along with next update)
[stretch] - dovecot  (Minor issue)
NOTE: https://dovecot.org/pipermail/dovecot-news/2021-June/000460.html
@@ -84524,6 +84531,7 @@ CVE-2020-23885
RESERVED
 CVE-2020-23884 (A buffer overflow in Nomacs v3.15.0 allows attackers to cause 
a denial ...)
- nomacs 
+   [buster] - nomacs  (Minor issue)
[stretch] - nomacs  (Minor issue)
NOTE: https://github.com/nomacs/nomacs/issues/516
 CVE-2020-23883


=
data/dsa-needed.txt
=
@@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it.
 
 If needed, specify the release by adding a slash after the name of the source 
package.
 
+--
+asterisk/oldstable
 --
 condor
 --
@@ -33,6 +35,9 @@ ndpi/oldstable
 --
 nodejs (jmm)
 --

[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-11-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
91b14bd7 by Moritz Muehlenhoff at 2021-11-24T13:48:44+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -100581,16 +100581,22 @@ CVE-2020-16157 (A Stored XSS vulnerability exists 
in Nagios Log Server before 2.
 CVE-2020-16156 [Signature Verification Bypass]
RESERVED
- perl 
+   [bullseye] - perl  (Minor issue)
+   [buster] - perl  (Minor issue)
NOTE: 
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
NOTE: 
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
 CVE-2020-16155 [does not uniquely define signed data]
RESERVED
- libcpan-checksums-perl 
+   [bullseye] - libcpan-checksums-perl  (Minor issue)
+   [buster] - libcpan-checksums-perl  (Minor issue)
NOTE: 
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
NOTE: 
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
 CVE-2020-16154 [Signature Verification Bypass]
RESERVED
- cpanminus 
+   [bullseye] - cpanminus  (Minor issue)
+   [buster] - cpanminus  (Minor issue)
NOTE: 
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
NOTE: 
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
 CVE-2020-16153



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91b14bd7f23100923b81874367b749e50546aa16

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91b14bd7f23100923b81874367b749e50546aa16
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-11-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0b4ea1d4 by Moritz Muehlenhoff at 2021-11-24T09:36:30+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2929,6 +2929,8 @@ CVE-2021-43399
RESERVED
 CVE-2021-43398 (Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing 
leakage in ...)
- libcrypto++  (bug #1000227)
+   [bullseye] - libcrypto++  (Minor issue)
+   [buster] - libcrypto++  (Minor issue)
NOTE: https://github.com/weidai11/cryptopp/issues/1080
 CVE-2021-43397 (LiquidFiles before 3.6.3 allows remote attackers to elevate 
their priv ...)
NOT-FOR-US: LiquidFiles
@@ -19126,6 +19128,8 @@ CVE-2021-37593 (PEEL Shopping version 9.4.0 allows 
remote SQL injection. A publi
NOT-FOR-US: PEEL Shopping
 CVE-2021-37592 (Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion 
via a cl ...)
- suricata 1:6.0.4-1
+   [bullseye] - suricata  (Minor issue)
+   [buster] - suricata  (Minor issue)
NOTE: https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
NOTE: https://redmine.openinfosecfoundation.org/issues/4569 (not public)
 CVE-2021-37591



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b4ea1d4c378f2c21103bd762c5e3c60b692d046

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b4ea1d4c378f2c21103bd762c5e3c60b692d046
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-11-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c72c97f8 by Moritz Muehlenhoff at 2021-11-22T12:02:05+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2065,6 +2065,8 @@ CVE-2021-3957 (kimai2 is vulnerable to Cross-Site Request 
Forgery (CSRF) ...)
NOT-FOR-US: kimai2
 CVE-2021-43616 (The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds 
with an i ...)
- npm 
+   [bullseye] - npm  (Minor issue)
+   [buster] - npm  (Minor issue)
NOTE: https://github.com/npm/cli/issues/2701
 CVE-2021-43615
RESERVED
@@ -4158,6 +4160,8 @@ CVE-2021-43175
RESERVED
 CVE-2021-3918 (json-schema is vulnerable to Improperly Controlled Modification 
of Obj ...)
- node-json-schema 0.4.0+~7.0.9-1 (bug #999765)
+   [bullseye] - node-json-schema  (Minor issue)
+   [buster] - node-json-schema  (Minor issue)
NOTE: 
https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
 (v0.4.0)
 CVE-2021-43174 (NLnet Labs Routinator versions 0.9.0 up to and including 
0.10.1, suppo ...)
- routinator  (bug #929024)
@@ -5190,6 +5194,8 @@ CVE-2020-36490 (DedeCMS v7.5 SP2 was discovered to 
contain multiple cross-site s
NOT-FOR-US: DedeCMS
 CVE-2021- [RUSTSEC-2020-0159: Potential segfault in localtime_r 
invocations]
- rust-chrono  (bug #996913)
+   [bullseye] - rust-chrono  (Minor issue)
+   [buster] - rust-chrono  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0159.html
NOTE: https://github.com/chronotope/chrono/issues/499
 CVE-2021-42742
@@ -28404,6 +28410,7 @@ CVE-2021-33516 (An issue was discovered in GUPnP before 
1.0.7 and 1.1.x and 1.2.
NOTE: 
https://gitlab.gnome.org/GNOME/gupnp/-/commit/ca6ec9dcb26fd7a2a630eb6a68118659b589afac
 (master)
 CVE-2021-33515 (The submission service in Dovecot before 2.3.15 allows 
STARTTLS comman ...)
- dovecot 1:2.3.13+dfsg1-2 (bug #990566)
+   [bullseye] - dovecot  (Minor issue, fix along with next 
update)
[buster] - dovecot  (Minor issue, fix along with next update)
[stretch] - dovecot  (Vulnerable code 
(smtp_server_command queue) introduced later)
NOTE: https://dovecot.org/pipermail/dovecot-news/2021-June/000462.html
@@ -83872,9 +83879,13 @@ CVE-2020-23905
RESERVED
 CVE-2020-23904 (A stack buffer overflow in speexenc.c of Speex v1.2 allows 
attackers t ...)
- speex 
+   [bullseye] - speex  (Minor issue)
+   [buster] - speex  (Minor issue)
NOTE: https://github.com/xiph/speex/issues/14
 CVE-2020-23903 (A Divide by Zero vulnerability in the function static int 
read_samples ...)
- speex 
+   [bullseye] - speex  (Minor issue)
+   [buster] - speex  (Minor issue)
NOTE: https://github.com/xiph/speex/issues/13
 CVE-2020-23902 (A buffer overflow in WildBit Viewer v6.6 allows attackers to 
cause a d ...)
NOT-FOR-US: WildBit Viewer



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c72c97f8af266b80bb36db2848903881fd1f894d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c72c97f8af266b80bb36db2848903881fd1f894d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-11-19 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ca0a644c by Moritz Muehlenhoff at 2021-11-19T17:33:25+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -75,6 +75,8 @@ CVE-2021-3976
 CVE-2021-3975 [segmentation fault during VM shutdown can lead to vdsm hung]
RESERVED
- libvirt 7.6.0-1
+   [bullseye] - libvirt  (Minor issue)
+   [buster] - libvirt  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2024326
NOTE: Fixed by: 
https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
 (v7.1.0-rc2)
 CVE-2021-44025 (Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to 
XSS in han ...)
@@ -2234,8 +2236,14 @@ CVE-2021-43520
 CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 
5.1.0~5.4.4 a ...)
- lua5.4 
- lua5.3 
+   [bullseye] - lua5.3  (Minor issue)
+   [buster] - lua5.3  (Minor issue)
- lua5.2 
+   [bullseye] - lua5.2  (Minor issue)
+   [buster] - lua5.2  (Minor issue)
- lua5.1 
+   [bullseye] - lua5.1  (Minor issue)
+   [buster] - lua5.1  (Minor issue)
NOTE: http://lua-users.org/lists/lua-l/2021-10/msg00123.html
NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00015.html
NOTE: Fixed by: 
https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868
@@ -5096,11 +5104,15 @@ CVE-2021-42717
RESERVED
 CVE-2021-42716 (An issue was discovered in stb stb_image.h 2.27. The PNM 
loader incorr ...)
- libstb 
+   [bullseye] - libstb  (Minor issue)
+   [buster] - libstb  (Minor issue)
NOTE: https://github.com/nothings/stb/issues/1166
NOTE: https://github.com/nothings/stb/issues/1225
NOTE: https://github.com/nothings/stb/pull/1223
 CVE-2021-42715 (An issue was discovered in stb stb_image.h 1.33 through 2.27. 
The HDR  ...)
- libstb 
+   [bullseye] - libstb  (Minor issue)
+   [buster] - libstb  (Minor issue)
NOTE: https://github.com/nothings/stb/issues/1224
NOTE: https://github.com/nothings/stb/pull/1223
 CVE-2021-42714


=
data/dsa-needed.txt
=
@@ -55,3 +55,5 @@ trafficserver (jmm)
 --
 varnish
 --
+wireshark
+--



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ca0a644cbf14fd2ef7bde52692ef572a4de15ce4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ca0a644cbf14fd2ef7bde52692ef572a4de15ce4
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

2021-11-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4211c616 by Moritz Muehlenhoff at 2021-11-03T16:11:26+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -7234,18 +7234,23 @@ CVE-2021-41093 (Wire is an open source secure 
messenger. In affected versions if
NOT-FOR-US: Wire iOS
 CVE-2021-41092 (Docker CLI is the command line interface for the docker 
container runt ...)
- docker.io  (bug #998292)
+   [bullseye] - docker.io  (Minor issue)
+   [buster] - docker.io  (Minor issue)
NOTE: 
https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v
NOTE: 
https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b
 CVE-2021-41091 (Moby is an open-source project created by Docker to enable 
software co ...)
- docker.io 
+   [bullseye] - docker.io  (Minor issue)
+   [buster] - docker.io  (Minor issue)
NOTE: 
https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558
NOTE: 
https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64
 CVE-2021-41090
RESERVED
 CVE-2021-41089 (Moby is an open-source project created by Docker to enable 
software co ...)
- docker.io 
+   [bullseye] - docker.io  (Minor issue)
+   [buster] - docker.io  (Minor issue)
NOTE: 
https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4
-   TODO: check details
 CVE-2021-41088 (Elvish is a programming language and interactive shell, 
combined into  ...)
- elvish 0.14.0-1
[buster] - elvish  (Minor issue)
@@ -15619,25 +15624,35 @@ CVE-2021-37624 (FreeSWITCH is a Software Defined 
Telecom Stack enabling the digi
NOTE: 
https://github.com/signalwire/freeswitch/security/advisories/GHSA-mjcm-q9h8-9xv3
 CVE-2021-37623 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq
NOTE: https://github.com/Exiv2/exiv2/pull/1790
 CVE-2021-37622 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv
NOTE: https://github.com/Exiv2/exiv2/pull/1788
 CVE-2021-37621 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg
NOTE: https://github.com/Exiv2/exiv2/pull/1778
 CVE-2021-37620 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728
NOTE: https://github.com/Exiv2/exiv2/pull/1769
 CVE-2021-37619 (Exiv2 is a command-line utility and C++ library for reading, 
writing,  ...)
- exiv2 
+   [bullseye] - exiv2  (Minor issue)
+   [buster] - exiv2  (Minor issue)
[stretch] - exiv2  (Minor issue)
NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v
NOTE: https://github.com/Exiv2/exiv2/pull/1752


=
data/dsa-needed.txt
=
@@ -56,5 +56,8 @@ tomcat9
   from previous CVE-2021-30640 and another non-security fix for #987179, might
   need a SRM ack.
 --
+trafficserver (jmm)
+  wait until status for CVE-2021-38161 is clarified (upstream patch got 
reverted)
+--
 varnish
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4211c616563795a774305ffa87f9435ab6adbe76

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4211c616563795a774305ffa87f9435ab6adbe76
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


  1   2   >