[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 67a2c04a by Moritz Muehlenhoff at 2023-06-11T15:12:02+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -936,6 +936,8 @@ CVE-2023-32310 (DataEase is an open source data visualization and analysis tool. NOT-FOR-US: DataEase CVE-2023-32181 (A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...) - libeconf + [bookworm] - libeconf (Minor issue) + [bullseye] - libeconf (Minor issue) NOTE: https://github.com/openSUSE/libeconf/issues/178 NOTE: https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19 (v0.5.2) CVE-2015-10109 (A vulnerability was found in Video Playlist and Gallery Plugin up to 1 ...) @@ -8720,6 +8722,7 @@ CVE-2023-1907 RESERVED CVE-2023-1906 (A heap-based buffer overflow issue was discovered in ImageMagick's Imp ...) - imagemagick (bug #1034373) + [bookworm] - imagemagick (Minor issue) [bullseye] - imagemagick (Minor issue) [buster] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247 @@ -29750,6 +29753,8 @@ CVE-2023-22665 (There is insufficient checking of user queries in Apache Jena ve NOTE: https://lists.apache.org/thread/s0dmpsxcwqs57l4qfs415klkgmhdxq7s CVE-2023-22652 (A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...) - libeconf + [bookworm] - libeconf (Minor issue) + [bullseye] - libeconf (Minor issue) NOTE: https://github.com/openSUSE/libeconf/issues/177 NOTE: https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19 (v0.5.2) CVE-2023-22651 (Improper Privilege Management vulnerability in SUSE Rancher allows Pri ...) = data/dsa-needed.txt = @@ -35,6 +35,10 @@ openjdk-17 (jmm) -- owslib/oldstable (aron) -- +php7.4/oldstable (jmm) +-- +php8.2/stable (jmm) +-- php-cas/oldstable -- php-horde-mime-viewer/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a2c04a691b655c0adf440e6af8e840417215cd -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a2c04a691b655c0adf440e6af8e840417215cd You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 60de9787 by Moritz Muehlenhoff at 2022-07-31T23:08:48+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -8491,6 +8491,7 @@ CVE-2022-33746 RESERVED CVE-2022-33745 (insufficient TLB flush for x86 PV guests in shadow mode For migration ...) - xen + [bullseye] - xen (Minor issue, include in next security round) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-408.html NOTE: All versions of Xen with the XSA-401 fixes applied are vulnerable @@ -30472,6 +30473,7 @@ CVE-2022-25859 RESERVED CVE-2022-25858 (The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vuln ...) - node-terser 4.8.1-1 + [bullseye] - node-terser (Minor issue) NOTE: https://snyk.io/vuln/SNYK-JS-TERSER-2806366 NOTE: https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b (v5.14.2) NOTE: https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012 (v4.8.1) @@ -42808,6 +42810,8 @@ CVE-2022-0085 (Server-Side Request Forgery (SSRF) in GitHub repository dompdf/do CVE-2022-0084 RESERVED - jboss-xnio (bug #1013280) + [bullseye] - jboss-xnio (Minor issue) + [buster] - jboss-xnio (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2064226 CVE-2021-46129 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/60de9787728bcc3187f4a415516ec02954813c0b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/60de9787728bcc3187f4a415516ec02954813c0b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a139145a by Moritz Muehlenhoff at 2022-07-30T00:13:58+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -15058,6 +15058,8 @@ CVE-2022-31161 (Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepa NOT-FOR-US: Roxy-WI CVE-2022-31160 (jQuery UI is a curated set of user interface interactions, effects, wi ...) - jqueryui 1.13.2+dfsg-1 (bug #1015982) + [bullseye] - jqueryui (Minor issue) + [buster] - jqueryui (Minor issue) NOTE: https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9 NOTE: https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9 CVE-2022-31159 (The AWS SDK for Java enables Java developers to work with Amazon Web S ...) @@ -31087,6 +31089,8 @@ CVE-2022-21209 (The affected product is vulnerable to an out-of-bounds read whil CVE-2022-0730 (Under certain ldap conditions, Cacti authentication can be bypassed wi ...) {DLA-2965-1} - cacti 1.2.20+ds1-1 (bug #1008693) + [bullseye] - cacti (Minor issue) + [buster] - cacti (Minor issue) NOTE: https://github.com/Cacti/cacti/issues/4562 NOTE: https://github.com/Cacti/cacti/commit/1386bdbf7f845a32e24ac9415f3ebb7932e77fe7 (1.2.x) NOTE: https://github.com/Cacti/cacti/commit/8694bf28edad723585915a97b95fbf5b1816a02b (1.2.x) = data/dsa-needed.txt = @@ -30,6 +30,8 @@ kopanocore/oldstable -- librecad -- +libtirpc +-- libpgjava (apo) NOTE: 20220711: libscram-java is missing in bullseye-security. I am currently NOTE: 20220711: waiting for #1014409 being resolved. View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a139145aba34b85245fb20b1000f3ce8f98dfea1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a139145aba34b85245fb20b1000f3ce8f98dfea1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 715d948a by Moritz Muehlenhoff at 2022-07-18T14:14:04+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -23082,6 +23082,8 @@ CVE-2022-26423 RESERVED CVE-2022-1071 (User after free in mrb_vm_exec in GitHub repository mruby/mruby prior ...) - mruby (bug #1014968) + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) NOTE: https://huntr.dev/bounties/6597ece9-07af-415b-809b-919ce0a17cf3 NOTE: https://github.com/mruby/mruby/commit/aaa28a508903041dd7399d4159a8ace9766b022f CVE-2022-1070 @@ -57857,9 +57859,13 @@ CVE-2021-41684 RESERVED CVE-2021-41683 (There is a stack-overflow at ecma-helpers.c:326 in ecma_get_lex_env_ty ...) - iotjs (bug #1015219) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4745 CVE-2021-41682 (There is a heap-use-after-free at ecma-helpers-string.c:1940 in ecma_c ...) - iotjs (bug #1015219) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4747 NOTE: https://github.com/jerryscript-project/jerryscript/commit/3ad76f932c8d2e3b9ba2d95e64848698ec7d7290 CVE-2021-41681 = data/dsa-needed.txt = @@ -20,6 +20,8 @@ epiphany-browser -- freecad (aron) -- +jetty +-- kicad (jmm) -- kopanocore/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/715d948a18ada3fc31c43519dfc953392fcbedf4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/715d948a18ada3fc31c43519dfc953392fcbedf4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 95af1295 by Moritz Muehlenhoff at 2022-07-11T14:31:35+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -698,9 +698,10 @@ CVE-2022-33939 CVE-2022-2346 RESERVED CVE-2022-2345 (Use After Free in GitHub repository vim/vim prior to 9.0.0046. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f NOTE: https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea (v9.0.0047) + NOTE: Crash in CLI tool, no security impact CVE-2022-2344 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - vim (unimportant) NOTE: https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996 @@ -17369,6 +17370,8 @@ CVE-2022-29218 (RubyGems is a package registry used to supply software for the R NOT-FOR-US: rubygems/rubygems.org CVE-2022-29217 (PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple ...) - pyjwt (bug #1011747) + [bullseye] - pyjwt (Vulnerable code not present) + [buster] - pyjwt (Vulnerable code not present) [stretch] - pyjwt (Vulnerable code not present) NOTE: https://github.com/jpadilla/pyjwt/security/advisories/GHSA-ffqj-6fqr-9h24 NOTE: https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc (2.4.0) @@ -51853,6 +51856,7 @@ CVE-2021-42864 RESERVED CVE-2021-42863 (A buffer overflow in ecma_builtin_typedarray_prototype_filter() in Jer ...) - iotjs + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4793 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4794 @@ -89411,6 +89415,8 @@ CVE-2021-3448 (A flaw was found in dnsmasq in versions before 2.85. When configu NOTE: https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=74d4fcd756a85bc1823232ea74334f7ccfb9d5d2 CVE-2021-3447 (A flaw was found in several ansible modules, where parameters containi ...) - ansible (bug #1014721) + [bullseye] - ansible (Minor issue) + [buster] - ansible (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1939349 CVE-2021-3446 (A flaw was found in libtpms in versions before 0.8.2. The commonly use ...) - libtpms 0.8.2-1 (bug #986799) @@ -223002,6 +223008,8 @@ CVE-2019-9837 (Doorkeeper::OpenidConnect (aka the OpenID Connect extension for D NOTE: https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66 CVE-2019-9836 (Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) ...) - amd64-microcode 3.20220411.1 (bug #970395) + [bullseye] - amd64-microcode (Minor issue) + [buster] - amd64-microcode (Minor issue) NOTE: https://seclists.org/fulldisclosure/2019/Jun/46 CVE-2019-9835 (The receiver (aka bridge) component of Fujitsu Wireless Keyboard Set L ...) NOT-FOR-US: Fujitsu Wireless Keyboard Set LX901 GK900 devices View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95af129517bafdc93b341e034302398063884e67 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95af129517bafdc93b341e034302398063884e67 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a3e800df by Moritz Muehlenhoff at 2022-07-09T00:03:00+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -19228,10 +19228,11 @@ CVE-2022-28354 CVE-2022-28353 RESERVED CVE-2022-1210 (A vulnerability classified as problematic was found in LibTIFF 4.3.0. ...) - - tiff + - tiff (unimportant) [bullseye] - tiff (Minor issue) [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/402 + NOTE: Crash in CLI tool, no security impact CVE-2021-46782 (The Pricing Table by Supsystic WordPress plugin before 1.9.5 does not ...) NOT-FOR-US: WordPress plugin CVE-2021-46781 (The Coming Soon by Supsystic WordPress plugin before 1.7.6 does not sa ...) @@ -22735,11 +22736,9 @@ CVE-2022-0989 (An unprivileged user could use the functionality of the NS WooCom CVE-2022-0988 (Delta Electronics DIAEnergie (Version 1.7.5 and prior) is vulnerable t ...) NOT-FOR-US: Delta Electronics CVE-2022-0987 (A flaw was found in PackageKit in the way some of the methods exposed ...) - - packagekit - [bullseye] - packagekit (Minor issue) - [buster] - packagekit (Minor issue) - [stretch] - packagekit (Minor issue) + - packagekit (unimportant) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2064315 + NOTE: Negligible security impact CVE-2022-0986 (Reflected Cross-site Scripting (XSS) Vulnerability in GitHub repositor ...) NOT-FOR-US: Hestia Control Panel CVE-2022-0985 (Insufficient capability checks could allow users with the moodle/site: ...) @@ -39230,13 +39229,11 @@ CVE-2021-45928 (libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other NOTE: Introduced by: https://github.com/libjxl/libjxl/pull/205 (v0.6) NOTE: Fixed by: https://github.com/libjxl/libjxl/commit/1c05e110d69b457696366fb4e762057b6855349b (v0.6) CVE-2021-45927 (MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0 ...) - - mdbtools + NOTE: Apparently an ozz-fuzz false positive NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36187 - TODO: check, possibly fixed in 0.9.3, but unclear fixing commit, related to 9b6b52cc8c5838cffeee9388c04890fe1eb73b52? CVE-2021-45926 (MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0 ...) - - mdbtools + NOTE: Apparently an ozz-fuzz false positive NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35972 - TODO: check, possibly fixed in 0.9.3, but unclear fixing commit, related to 9b6b52cc8c5838cffeee9388c04890fe1eb73b52? CVE-2021-4196 RESERVED CVE-2021-4195 @@ -267533,11 +267530,13 @@ CVE-2018-12689 (phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id NOTE: Non-security issue as demostrated in https://bugs.debian.org/902186 NOTE: and disputed as security issue. Should be properly rejected by MITRE. CVE-2018-12688 (tinyexr 0.9.5 has a segmentation fault in the wav2Decode function. ...) - - tinyexr + - tinyexr + [bullseye] - tinyexr (Minor issue) NOTE: https://github.com/syoyo/tinyexr/issues/83 CVE-2018-12687 (tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h ...) - - tinyexr + - tinyexr (unimportant) NOTE: https://github.com/syoyo/tinyexr/issues/84 + NOTE: Negligible security impact CVE-2018-12686 RESERVED CVE-2018-12685 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a3e800df0374c72f3e01148fa91b1935474be74a -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a3e800df0374c72f3e01148fa91b1935474be74a You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f808e6c8 by Moritz Muehlenhoff at 2022-07-08T14:27:59+02:00 buster/bullseye triage cyclonedds/fastdds fixed in sid - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -18819,11 +18819,10 @@ CVE-2022-28508 (An XSS issue was discovered in browser_search_plugin.php in Mant CVE-2022-28507 (Dragon Path Technologies Bharti Airtel Routers Hardware BDT-121 versio ...) NOT-FOR-US: Dragon Path Technologies Bharti Airtel Routers Hardware BDT-121 CVE-2022-28506 (There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RG ...) - - giflib - [bullseye] - giflib (Minor issue) - [buster] - giflib (Minor issue) - [stretch] - giflib (Minor issue) + - giflib (unimportant) NOTE: https://sourceforge.net/p/giflib/bugs/159/ + NOTE: https://sourceforge.net/p/giflib/code/merge-requests/11/ + NOTE: Specific to gif2rgb. Crash in CLI tool, no security impact CVE-2022-28505 (Jfinal_cms 5.1.0 is vulnerable to SQL Injection via com.jflyfox.system ...) NOT-FOR-US: Jfinal_cms CVE-2022-28504 @@ -58275,11 +58274,9 @@ CVE-2021-40635 (OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch CVE-2021-40634 RESERVED CVE-2021-40633 (A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5 ...) - - giflib - [bullseye] - giflib (Minor issue) - [buster] - giflib (Minor issue) - [stretch] - giflib (Minor issue) + - giflib (unimportant) NOTE: https://sourceforge.net/p/giflib/bugs/157/ + NOTE: Specific to gif2rgb. Crash in CLI tool, no security impact CVE-2021-40632 RESERVED CVE-2021-40631 @@ -63764,19 +63761,19 @@ CVE-2021-38445 (OCI OpenDDS versions prior to 3.18.1 do not handle a length para CVE-2021-38444 RESERVED CVE-2021-38443 (Eclipse CycloneDDS versions prior to 0.8.0 improperly handle invalid s ...) - - cyclonedds + - cyclonedds 0.8.1-2 + [bullseye] - cyclonedds (Minor issue) NOTE: No mention of CVE upstream NOTE: https://projects.eclipse.org/projects/iot.cyclonedds NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 - TODO: check for upstream commit CVE-2021-38442 (FATEK Automation WinProladder versions 3.30 and prior lacks proper val ...) NOT-FOR-US: FATEK Automation CVE-2021-38441 (Eclipse CycloneDDS versions prior to 0.8.0 are vulnerable to a write-w ...) - - cyclonedds + - cyclonedds 0.8.1-2 + [bullseye] - cyclonedds (Minor issue) NOTE: No mention of CVE upstream NOTE: https://projects.eclipse.org/projects/iot.cyclonedds NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 - TODO: check for upstream commit CVE-2021-38440 (FATEK Automation WinProladder versions 3.30 and prior is vulnerable to ...) NOT-FOR-US: FATEK Automation CVE-2021-38439 (All versions of GurumDDS are vulnerable to heap-based buffer overflow, ...) @@ -63808,10 +63805,11 @@ CVE-2021-38427 (RTI Connext DDS Professional and Connext DDS Secure Versions 4.2 CVE-2021-38426 (FATEK Automation WinProladder versions 3.30 and prior lacks proper val ...) NOT-FOR-US: FATEK Automation CVE-2021-38425 (eProsima Fast DDS versions prior to 2.4.0 (#2269) are susceptible to e ...) - - fastdds + - fastdds 2.6.1+ds-1 [bullseye] - fastdds (Minor issue) NOTE: https://github.com/eProsima/Fast-DDS/issues/2267 NOTE: https://github.com/eProsima/Fast-DDS/pull/2269 + NOTE: https://github.com/eProsima/Fast-DDS/commit/01550cfa1b8313c4cb39529960b41f95e4820312 NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 CVE-2021-38424 (The tag interface of Delta Electronics DIALink versions 1.2.4.0 and pr ...) NOT-FOR-US: Delta Electronics DIALink View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f808e6c84e6e3672c539fa964edade80b20ca059 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f808e6c84e6e3672c539fa964edade80b20ca059 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 62406382 by Moritz Muehlenhoff at 2022-07-08T11:23:00+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3854,10 +3854,16 @@ CVE-2022-2122 RESERVED CVE-2022-2121 (OFFIS DCMTK's (All versions prior to 3.6.7) has a NULL pointer derefer ...) - dcmtk (bug #1014044) + [bullseye] - dcmtk (Minor issue) + [buster] - dcmtk (Minor issue) CVE-2022-2120 (OFFIS DCMTK's (All versions prior to 3.6.7) service class user (SCU) i ...) - dcmtk (bug #1014044) + [bullseye] - dcmtk (Minor issue) + [buster] - dcmtk (Minor issue) CVE-2022-2119 (OFFIS DCMTK's (All versions prior to 3.6.7) service class provider (SC ...) - dcmtk (bug #1014044) + [bullseye] - dcmtk (Minor issue) + [buster] - dcmtk (Minor issue) CVE-2022-2118 RESERVED CVE-2014-125025 (A vulnerability classified as problematic has been found in FFmpeg 2.0 ...) @@ -9669,7 +9675,6 @@ CVE-2022-31627 CVE-2022-31626 (In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x belo ...) - php8.1 8.1.7-1 (bug #1014533) - php7.4 - [bullseye] - php7.4 (Minor issue, fix along with next security release) - php7.3 [buster] - php7.3 (Minor issue, fix along with next security release) - php7.0 @@ -9679,7 +9684,6 @@ CVE-2022-31626 (In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1. CVE-2022-31625 (In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x belo ...) - php8.1 8.1.7-1 (bug #1014533) - php7.4 - [bullseye] - php7.4 (Minor issue, fix along with next security release) - php7.3 [buster] - php7.3 (Minor issue, fix along with next security release) - php7.0 @@ -12637,9 +12641,12 @@ CVE-2022- [RUSTSEC-2022-0022] NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0022.html CVE-2022- [RUSTSEC-2022-0021] - rust-crossbeam-queue + [bullseye] - rust-crossbeam-queue (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0021.html CVE-2022- [RUSTSEC-2022-0019] - rust-crossbeam-channel + [bullseye] - rust-crossbeam-channel (Minor issue) + [buster] - rust-crossbeam-channel (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0019.html CVE-2022- [RUSTSEC-2022-0020] - rust-crossbeam @@ -28141,9 +28148,11 @@ CVE-2022-25256 (SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonA CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux ...) - qt6-base - qtbase-opensource-src 5.15.2+dfsg-15 + [bullseye] - qtbase-opensource-src (Minor issue) [buster] - qtbase-opensource-src (Breaks existing behaviour and upstream also skipped from 5.12 branch) [stretch] - qtbase-opensource-src (Vulnerable code introduced later) - qtbase-opensource-src-gles + [bullseye] - qtbase-opensource-src-gles (Minor issue) [buster] - qtbase-opensource-src-gles (Breaks existing behaviour and upstream also skipped from 5.12 branch) NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/393113 NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/394914 @@ -63332,13 +63341,19 @@ CVE-2021-38579 RESERVED CVE-2021-38578 (Existing CommBuffer checks in SmmEntryPoint will not catch underflow w ...) - edk2 (bug #1014468) + [bullseye] - edk2 (Minor issue) + [buster] - edk2 (Minor issue) NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=3387 (private) NOTE: https://edk2.groups.io/g/devel/message/90516 CVE-2021-38577 (Heap Overflow in BaseBmpSupportLib. ...) - edk2 (bug #1014468) + [bullseye] - edk2 (Minor issue) + [buster] - edk2 (Minor issue) NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=3360 (private) CVE-2021-38576 (A BIOS bug in firmware for a particular PC model leaves the Platform a ...) - edk2 (bug #1014468) + [bullseye] - edk2 (Minor issue) + [buster] - edk2 (Minor issue) NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=3499 (private) CVE-2021-38575 (NetworkPkg/IScsiDxe has remotely exploitable buffer overflows. ...) - edk2 2021.08-1 @@ -74941,6 +74956,7 @@ CVE-2021-33881 (On NXP MIFARE Ultralight and NTAG cards, an attacker can interru NOT-FOR-US: NXP CVE-2021-33880 (The aaugustin websockets library before 9.1 for Python has an Observab ...) - python-websockets 9.1-1 (bug #989561) + [bullseye] - python-websockets (Minor issue) [buster] - python-websockets (Vulnerable code introduced in 8.0) [stretch] - python-websockets (Vulnerable
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5bf53797 by Moritz Muehlenhoff at 2022-07-06T13:27:41+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -70,6 +70,8 @@ CVE-2022-2310 RESERVED CVE-2022-2309 (NULL Pointer Dereference allows attackers to cause a denial of service ...) - lxml + [bullseye] - lxml (Minor issue) + [buster] - lxml (Minor issue) NOTE: https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba/ NOTE: https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f (lxml-4.9.1) CVE-2022-2308 @@ -689,6 +691,8 @@ CVE-2022-2305 RESERVED CVE-2022-2304 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. ...) - vim + [bullseye] - vim (Minor issue) + [buster] - vim (Minor issue) NOTE: https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a/ NOTE: https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939 (v9.0.0035) CVE-2022-2303 @@ -10730,10 +10734,14 @@ CVE-2022-31118 RESERVED CVE-2022-31117 (UltraJSON is a fast JSON encoder and decoder written in pure C with bi ...) - ujson + [bullseye] - ujson (Minor issue) + [buster] - ujson (Minor issue) NOTE: https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff NOTE: https://github.com/ultrajson/ultrajson/commit/9c20de0f77b391093967e25d01fb48671104b15b (5.4.0) CVE-2022-31116 (UltraJSON is a fast JSON encoder and decoder written in pure C with bi ...) - ujson + [bullseye] - ujson (Minor issue) + [buster] - ujson (Minor issue) NOTE: https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r NOTE: https://github.com/ultrajson/ultrajson/commit/67ec07183342589d602e0fcf7bb1ff3e19272687 (5.4.0) CVE-2022-31115 (opensearch-ruby is a community-driven, open source fork of elasticsear ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bf53797deaef3c37897f131f79b84fcd6728008 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5bf53797deaef3c37897f131f79b84fcd6728008 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 87080950 by Moritz Muehlenhoff at 2022-07-05T13:58:25+02:00 buster/bullseye triage add reference for openssl issue - - - - - 2 changed files: - data/CVE/list - data/embedded-code-copies Changes: = data/CVE/list = @@ -898,6 +898,7 @@ CVE-2022-2274 (The OpenSSL 3.0.4 release introduced a serious bug in the RSA imp [buster] - openssl (Vulnerable code not present) NOTE: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4d8a88c134df634ba610ff8db1eb8478ac5fd345 NOTE: https://github.com/openssl/openssl/issues/18625 + NOTE: https://www.openssl.org/news/secadv/20220705.txt CVE-2022-2273 RESERVED CVE-2022-2272 @@ -13816,10 +13817,11 @@ CVE-2022-30047 (Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection v CVE-2022-30046 RESERVED CVE-2022-30045 (An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezx ...) - - mapcache (bug #1014389) + - mapcache (unimportant; bug #1014389) - navit (bug #1014390) - scilab (bug #1014391) NOTE: https://sourceforge.net/p/ezxml/bugs/29/ + NOTE: mapcache only uses ezxml to parse config files which are trusted CVE-2022-30044 RESERVED CVE-2022-30043 @@ -80464,9 +80466,7 @@ CVE-2021-31599 (An issue was discovered in Hitachi Vantara Pentaho through 9.1 a NOT-FOR-US: Hitachi CVE-2021-31598 (An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezx ...) {DLA-2705-1} - - mapcache (bug #989363) - [bullseye] - mapcache (Minor issue) - [buster] - mapcache (Minor issue) + - mapcache (unimportant; bug #989363) [stretch] - mapcache (Minor issue) - scilab (bug #989364) [bullseye] - scilab (Minor issue) @@ -80479,6 +80479,7 @@ CVE-2021-31598 (An issue was discovered in libezxml.a in ezXML 0.8.6. The functi [bullseye] - netcdf-parallel (Minor issue) [buster] - netcdf-parallel (Minor issue) NOTE: https://sourceforge.net/p/ezxml/bugs/28/ + NOTE: mapcache only uses ezxml to parse config files which are trusted CVE-2021-31597 (The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL c ...) - node-xmlhttprequest-ssl [buster] - node-xmlhttprequest-ssl (Minor issue, should possibly be removed from stable as well) @@ -81114,10 +81115,7 @@ CVE-2021-31349 (The usage of an internal HTTP header created an authentication b NOT-FOR-US: Juniper CVE-2021-31348 (An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezx ...) {DLA-2705-1} - - mapcache (bug #989363) - [bullseye] - mapcache (Minor issue) - [buster] - mapcache (Minor issue) - [stretch] - mapcache (Minor issue) + - mapcache (unimportant; bug #989363) - scilab (bug #989364) [bullseye] - scilab (Minor issue) [buster] - scilab (Minor issue) @@ -81129,12 +81127,10 @@ CVE-2021-31348 (An issue was discovered in libezxml.a in ezXML 0.8.6. The functi [bullseye] - netcdf-parallel (Minor issue) [buster] - netcdf-parallel (Minor issue) NOTE: https://sourceforge.net/p/ezxml/bugs/27/ + NOTE: mapcache only uses ezxml to parse config files which are trusted CVE-2021-31347 (An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezx ...) {DLA-2705-1} - - mapcache (bug #989363) - [bullseye] - mapcache (Minor issue) - [buster] - mapcache (Minor issue) - [stretch] - mapcache (Minor issue) + - mapcache (unimportant; bug #989363) - scilab (bug #989364) [bullseye] - scilab (Minor issue) [buster] - scilab (Minor issue) @@ -81146,6 +81142,7 @@ CVE-2021-31347 (An issue was discovered in libezxml.a in ezXML 0.8.6. The functi [bullseye] - netcdf-parallel (Minor issue) [buster] - netcdf-parallel (Minor issue) NOTE: https://sourceforge.net/p/ezxml/bugs/27/ + NOTE: mapcache only uses ezxml to parse config files which are trusted CVE-2021-31346 (A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All ...) NOT-FOR-US: Siemens CVE-2021-31345 (A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All ...) @@ -81433,10 +81430,7 @@ CVE-2021-31230 RESERVED CVE-2021-31229 (An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezx ...) {DLA-2705-1} - - mapcache (bug #989363) - [bullseye] - mapcache (Minor issue) - [buster] - mapcache (Minor issue) - [stretch] - mapcache (Minor issue) + - mapcache (unimportant; bug #989363) - scilab (bug #989364) [bullseye] - scilab (Minor issue) [buster] - scilab (Minor issue) @@ -81448,6 +81442,7 @@ CVE-2021-31229 (An
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 67a08c8b by Moritz Muehlenhoff at 2022-07-04T10:28:41+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -27,9 +27,10 @@ CVE-2022-34911 (An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1 CVE-2022-2290 (Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/tril ...) TODO: check CVE-2022-2289 (Use After Free in GitHub repository vim/vim prior to 9.0. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64/ NOTE: https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e (v9.0.0026) + NOTE: Crash in CLI tool, no security impact CVE-2022-2288 (Out-of-bounds Write in GitHub repository vim/vim prior to 9.0. ...) - vim NOTE: https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad/ @@ -28580,12 +28581,16 @@ CVE-2022-24737 (HTTPie is a command-line HTTP client. HTTPie has the practical c CVE-2022-24736 (Redis is an in-memory database that persists on disk. Prior to version ...) [experimental] - redis 5:7.0.0-1 - redis 5:7.0.1-4 + [bullseye] - redis (Minor issue) + [buster] - redis (Minor issue) [stretch] - redis (Minor issue, problematic to backport patch to embedded Lua engine) NOTE: https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984 NOTE: https://github.com/redis/redis/pull/10651 CVE-2022-24735 (Redis is an in-memory database that persists on disk. By exploiting we ...) [experimental] - redis 5:7.0.0-1 - redis 5:7.0.1-4 + [bullseye] - redis (Minor issue) + [buster] - redis (Minor issue) [stretch] - redis (Minor issue, problematic to backport patch to embedded Lua engine) NOTE: https://github.com/redis/redis/security/advisories/GHSA-647m-2wmq-qmvq NOTE: https://github.com/redis/redis/pull/10651 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a08c8b7180bd8df0d1998dd1d4000be48645cf -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67a08c8b7180bd8df0d1998dd1d4000be48645cf You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cfbf4d8b by Moritz Muehlenhoff at 2022-07-01T14:35:53+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -5864,6 +5864,8 @@ CVE-2022-32533 RESERVED CVE-2022-32532 (Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured ...) - shiro + [bullseye] - shiro (Minor issue) + [buster] - shiro (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/06/28/2 CVE-2022-32531 RESERVED @@ -11315,6 +11317,8 @@ CVE-2022- [RUSTSEC-2022-0019] NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0019.html CVE-2022- [RUSTSEC-2022-0020] - rust-crossbeam + [bullseye] - rust-crossbeam (Minor issue) + [buster] - rust-crossbeam (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0020.html CVE-2022-30600 (A flaw was found in moodle where logic used to count failed login atte ...) - moodle @@ -28322,6 +28326,8 @@ CVE-2022-24759 (`@chainsafe/libp2p-noise` contains TypeScript implementation of NOT-FOR-US: chainsafe/libp2p-noise CVE-2022-24758 (The Jupyter notebook is a web-based notebook environment for interacti ...) - jupyter-notebook + [bullseye] - jupyter-notebook (Minor issue) + [buster] - jupyter-notebook (Minor issue) NOTE: https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55 NOTE: https://github.com/jupyter/notebook/commit/c219ce43c1ea25123fa70d264e7735bdf4585b1e (6.4.10) CVE-2022-24757 (The Jupyter Server provides the backend (i.e. the core services, APIs, ...) @@ -32468,6 +32474,8 @@ CVE-2022-23640 (Excel-Streaming-Reader is an easy-to-use implementation of a str NOT-FOR-US: Excel-Streaming-Reader CVE-2022-23639 (crossbeam-utils provides atomics, synchronization primitives, scoped t ...) - rust-crossbeam-utils 0.8.8-1 + [bullseye] - rust-crossbeam-utils (Minor issue) + [buster] - rust-crossbeam-utils (Minor issue) - rust-crossbeam-utils-0.7 NOTE: https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-qc84-gqf4-9926 NOTE: https://github.com/crossbeam-rs/crossbeam/pull/781 = data/dsa-needed.txt = @@ -12,7 +12,7 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. -- -asterisk/oldstable +asterisk -- blender (jmm) -- @@ -34,6 +34,8 @@ linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v4.19.y versions. -- +logrotate +-- ndpi/oldstable -- netatalk View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfbf4d8b1b0cdc87216552c0e02165d0cdb8a460 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfbf4d8b1b0cdc87216552c0e02165d0cdb8a460 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: fdb2437a by Moritz Muehlenhoff at 2022-06-30T16:53:55+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -4382,6 +4382,8 @@ CVE-2022-33071 RESERVED CVE-2022-33070 (Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shif ...) - protobuf-c + [bullseye] - protobuf-c (Minor issue) + [buster] - protobuf-c (Minor issue) NOTE: https://github.com/protobuf-c/protobuf-c/issues/506 NOTE: https://github.com/protobuf-c/protobuf-c/pull/508 CVE-2022-33069 (Ethereum Solidity v0.8.14 contains an assertion failure via SMTEncoder ...) @@ -44708,6 +44710,8 @@ CVE-2022-21699 (IPython (Interactive Python) is a command shell for interactive NOTE: https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699 CVE-2022-21698 (client_golang is the instrumentation library for Go applications in Pr ...) - golang-github-prometheus-client-golang 1.11.1-1 (bug #1008008) + [bullseye] - golang-github-prometheus-client-golang (Minor issue) + [buster] - golang-github-prometheus-client-golang (Minor issue) [stretch] - golang-github-prometheus-client-golang (Minor issue, DoS in specific conditions, requires rebuilding reverse-dependencies; Limited support in stretch) NOTE: https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p NOTE: https://github.com/prometheus/client_golang/pull/962 @@ -130529,11 +130533,7 @@ CVE-2020-23906 (FFmpeg N-98388-g76a3ee996b allows attackers to cause a denial of CVE-2020-23905 RESERVED CVE-2020-23904 (** DISPUTED ** A stack buffer overflow in speexenc.c of Speex v1.2 all ...) - - speex - [bullseye] - speex (Minor issue) - [buster] - speex (Minor issue) - [stretch] - speex (Minor issue) - NOTE: https://github.com/xiph/speex/issues/14 + NOTE: Disputed speex issue CVE-2020-23903 (A Divide by Zero vulnerability in the function static int read_samples ...) - speex 1.2~rc1.2-2 [bullseye] - speex (Minor issue) = data/dsa-needed.txt = @@ -14,7 +14,7 @@ If needed, specify the release by adding a slash after the name of the source pa -- asterisk/oldstable -- -cacti +blender (jmm) -- curl -- @@ -24,6 +24,8 @@ freecad (aron) -- kicad (jmm) -- +ldap-account-manager +-- librecad -- libpgjava (apo) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fdb2437a55973d996f4af95c0efcd1f2b683e4c0 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fdb2437a55973d996f4af95c0efcd1f2b683e4c0 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6f2e90cf by Moritz Muehlenhoff at 2022-06-30T11:05:05+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,5 +1,7 @@ CVE-2022-34835 (In Das U-Boot through 2022.07-rc5, an integer signedness error and res ...) - u-boot + [bullseye] - u-boot (Minor issue) + [buster] - u-boot (Minor issue) NOTE: https://lists.denx.de/pipermail/u-boot/2022-June/486113.html NOTE: https://source.denx.de/u-boot/u-boot/-/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 CVE-2022-34834 @@ -13445,9 +13447,10 @@ CVE-2022-1508 [stretch] - linux (Vulnerable code not present) NOTE: https://git.kernel.org/linus/89c2b3b74918200e46699338d7bcc19b1ea12110 (5.15-rc1) CVE-2022-1507 (chafa: NULL Pointer Dereference in function gif_internal_decode_frame ...) - - chafa 1.10.2-1 + - chafa 1.10.2-1 (unimportant) NOTE: https://huntr.dev/bounties/104d8c5d-cac5-4baa-9ac9-291ea0bcab95/ NOTE: https://github.com/hpjansson/chafa/commit/e4b777c7b7c144cd16a0ea96108267b1004fe6c9 (1.10.2) + NOTE: Crash in CLI tool, no security impact CVE-2022-1506 (The WP Born Babies WordPress plugin through 1.0 does not sanitise and ...) NOT-FOR-US: WordPress plugin CVE-2022-1505 (The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQ ...) @@ -56522,6 +56525,7 @@ CVE-2021-40682 RESERVED CVE-2021-3779 (A malicious MySQL server can request local file content from a client ...) - ruby-mysql + [buster] - ruby-mysql (Minor issue) CVE-2021-3778 (vim is vulnerable to Heap-based Buffer Overflow ...) {DLA-2876-1} - vim 2:8.2.3455-1 (bug #994498) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2e90cf8293a02afe31a0781fb1822341c3bf5c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2e90cf8293a02afe31a0781fb1822341c3bf5c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 66c973af by Moritz Muehlenhoff at 2022-06-29T11:46:14+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -39,7 +39,7 @@ CVE-2022-34752 CVE-2022-34751 RESERVED CVE-2022-34750 (An issue was discovered in MediaWiki through 1.38.1. The lemma length ...) - TODO: check + NOT-FOR-US: MediaWiki extension WikiBase CVE-2022-34749 RESERVED CVE-2022-34748 @@ -708,9 +708,10 @@ CVE-2022-2211 [Buffer overflow in get_keys leads to Dos] NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2100862 TODO: check, upstream references, mentioned code is actually in src:guestfs-tools CVE-2022-2210 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25 NOTE: https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa (v8.2.5164) + NOTE: Crash in CLI tool, no security impact CVE-2022-2209 RESERVED CVE-2022-2208 (NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2. ...) @@ -2144,6 +2145,8 @@ CVE-2021-46823 (python-ldap before 3.4.0 is vulnerable to a denial of service wh NOTE: https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm CVE-2021-46822 (The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoa ...) - libjpeg-turbo 1:2.1.1-1 + [bullseye] - libjpeg-turbo (Minor issue) + [buster] - libjpeg-turbo (Minor issue) NOTE: https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f35fd27ec641c42d6b115bfa595e483ec58188d2 (2.1.0) CVE-2017-20081 (A vulnerability, which was classified as critical, was found in Hindu ...) NOT-FOR-US: Hindu Matrimonial Script @@ -2521,6 +2524,8 @@ CVE-2022-33880 RESERVED CVE-2022-33879 (The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in ...) - tika + [bullseye] - tika (Minor issue) + [buster] - tika (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/06/27/5 CVE-2022-33878 RESERVED @@ -9857,9 +9862,8 @@ CVE-2022-1771 (Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2. CVE-2019-25061 (The random_password_generator (aka RandomPasswordGenerator) gem throug ...) NOT-FOR-US: bvsatyaram/random_password_generator CVE-2022-30973 (We failed to apply the fix for CVE-2022-30126 to the 1.x branch in the ...) - - tika + - tika (Affected release which missed the fix was never shipped, issue tracked via CVE-2022-30126) NOTE: http://www.openwall.com/lists/oss-security/2022/05/31/2 - TODO: check how we want to handle that, because technically this is CVE is for the missing fix for CVE-2022-30126 in upstream 1.x patching specific CVE-2022-1770 (Improper Privilege Management in GitHub repository polonel/trudesk pri ...) NOT-FOR-US: Trudesk CVE-2022-1769 (Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974. ...) @@ -12385,6 +12389,8 @@ CVE-2022-1554 (Path Traversal due to `send_file` call in GitHub repository clini NOT-FOR-US: clinical-genomics/scout CVE-2022-30126 (In Apache Tika, a regular expression in our StandardsText class, used ...) - tika + [bullseye] - tika (Minor issue) + [buster] - tika (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/05/16/3 CVE-2022-1553 (Leaking password protected articles content due to improper access con ...) NOT-FOR-US: Publify @@ -16373,6 +16379,8 @@ CVE-2022-28738 (A double free was found in the Regexp compiler in Ruby 3.x befor CVE-2022-28737 RESERVED - shim + [bullseye] - shim (Fix via point update) + [buster] - shim (Fix via point update) NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/5 NOTE: https://github.com/rhboot/shim/commit/e99bdbb827a50cde019393d3ca1e89397db221a7 (15.6) NOTE: https://github.com/rhboot/shim/commit/159151b6649008793d6204a34d7b9c41221fb4b0 (15.6) @@ -26604,6 +26612,8 @@ CVE-2022-25175 (Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earli NOT-FOR-US: Jenkins Pipeline: Multibranch Plugin CVE-2022-25169 (The BPG parser in versions of Apache Tika before 1.28.2 and 2.4.0 may ...) - tika + [bullseye] - tika (Minor issue) + [buster] - tika (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/05/16/4 CVE-2022-25168 RESERVED @@ -28105,6 +28115,8 @@ CVE-2022-24713 (regex is an implementation of regular expressions for the Rust l - firefox-esr 91.8.0esr-1 - thunderbird 1:91.8.0-1 -
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8cb36f6f by Moritz Muehlenhoff at 2022-06-24T17:57:09+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -297,17 +297,15 @@ CVE-2022-2185 CVE-2022-2184 RESERVED CVE-2022-2183 (Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-3cc98975 NOTE: https://github.com/vim/vim/commit/8eba2bd291b347e3008aa9e565652d51ad638cfa (v8.2.5151) + NOTE: Crash in CLI tool, no security impact CVE-2022-2182 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8 NOTE: https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e (v8.2.5150) + NOTE: Crash in CLI tool, no security impact CVE-2022-2181 RESERVED CVE-2021-46824 (Cross Site Scripting (XSS) vulnerability in sourcecodester School File ...) @@ -449,11 +447,10 @@ CVE-2022-2177 CVE-2022-2176 RESERVED CVE-2022-2175 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55 NOTE: https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e (v8.2.5148) + NOTE: Crash in CLI tool, no security impact CVE-2022-2174 (Cross-site Scripting (XSS) - Reflected in GitHub repository microweber ...) NOT-FOR-US: microweber CVE-2022-2173 @@ -3302,8 +3299,9 @@ CVE-2022-33068 (An integer overflow in the component hb-ot-shape-fallback.cc of NOTE: https://github.com/harfbuzz/harfbuzz/issues/3557 NOTE: https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593 CVE-2022-33067 (Lrzip v0.651 was discovered to contain multiple invalid arithmetic shi ...) - - lrzip + - lrzip (unimportant) NOTE: https://github.com/ckolivas/lrzip/issues/224 + NOTE: Crash in CLI tool, no security impact CVE-2022-33066 RESERVED CVE-2022-33065 @@ -20265,6 +20263,8 @@ CVE-2022-0948 (The Order Listener for WooCommerce WordPress plugin before 3.2.2 NOT-FOR-US: WordPress plugin CVE-2022- [wordpress 5.9.2] - wordpress 5.9.2+dfsg1-1 (bug #1007145) + [bullseye] - wordpress (Minor issues, fix along in next round of updates) + [buster] - wordpress (Minor issues, fix along in next round of updates) [stretch] - wordpress 4.7.23+dfsg-0+deb9u1 NOTE: https://wordpress.org/news/2022/03/wordpress-5-9-2-security-maintenance-release/ CVE-2022-27165 (CSZ CMS 1.2.2 is vulnerable to SQL Injection via cszcms_admin_Plugin_m ...) @@ -24288,7 +24288,8 @@ CVE-2022-0727 (Improper Access Control in GitHub repository chocobozzz/peertube CVE-2022-0726 (Improper Authorization in GitHub repository chocobozzz/peertube prior ...) - peertube (bug #950821) CVE-2022-0725 (A flaw was found in KeePass. The vulnerability occurs due to logging t ...) - - keepass2 (bug #1008022) + NOTE: Non-issue, broken report against keepass2, couldn't be reproduced with + NOTE: Debian, Fedora and by upstream, see bug #1008022 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2052696 NOTE: https://sourceforge.net/p/keepass/discussion/329220/thread/da7546b7e1/ NOTE: https://sourceforge.net/p/keepass/discussion/329220/thread/33d6afdc/ = data/dsa-needed.txt = @@ -22,9 +22,7 @@ epiphany-browser -- freecad (aron) -- -grub2 --- -kicad +kicad (jmm) -- librecad -- @@ -63,7 +61,5 @@ unzip unclear information, initial report indicates writable memory corruption, but some identified patch is just for a NULL deref, needs more clarification -- -wordpress --- xen (jmm) -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8cb36f6fce2a63c65cb29133360fbfb11c465c87 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8cb36f6fce2a63c65cb29133360fbfb11c465c87 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d8ea7258 by Moritz Muehlenhoff at 2022-06-22T17:39:10+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -10537,9 +10537,13 @@ CVE-2022-1588 REJECTED CVE-2022-1587 (An out-of-bounds read vulnerability was discovered in the PCRE2 librar ...) - pcre2 10.40-1 (bug #1011954) + [bullseye] - pcre2 (Minor issue) + [buster] - pcre2 (Minor issue) NOTE: https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0 (pcre2-10.40) CVE-2022-1586 (An out-of-bounds read vulnerability was discovered in the PCRE2 librar ...) - pcre2 10.40-1 (bug #1011954) + [bullseye] - pcre2 (Minor issue) + [buster] - pcre2 (Minor issue) NOTE: https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a (pcre2-10.40) NOTE: https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c (pcre2-10.40) CVE-2022-1585 @@ -12409,11 +12413,9 @@ CVE-2022-29624 (An arbitrary file upload vulnerability in the Add File function CVE-2022-29623 (An arbitrary file upload vulnerability in the file upload module of Co ...) NOT-FOR-US: expressjs/connect-multiparty CVE-2022-29622 (An arbitrary file upload vulnerability in formidable v3.1.4 allows att ...) - - node-formidable (bug #1011341) - [stretch] - node-formidable (No longer supported in LTS) - NOTE: https://www.youtube.com/watch?v=C6QPKooxhAo - NOTE: https://github.com/vyas0189/CougarCS-Backend/issues/57 - NOTE: unclear if reported upstream + - node-formidable (unimportant; bug #1011341) + NOTE: https://github.com/node-formidable/formidable/issues/856 + NOTE: https://medium.com/@zsolt.imre/cve-2022-29622-in-vulnerability-analysis-5cf783c3721 CVE-2022-29621 RESERVED CVE-2022-29620 (** DISPUTED ** FileZilla v3.59.0 allows attackers to obtain cleartext ...) = data/dsa-needed.txt = @@ -45,6 +45,8 @@ netatalk -- nodejs (jmm) -- +php-horde-mime-viewer +-- php-horde-turba -- puma/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8ea72580431ad11ebedf8fed518f493c1332f1f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d8ea72580431ad11ebedf8fed518f493c1332f1f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 31661ef1 by Moritz Muehlenhoff at 2022-06-21T15:45:53+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -461,6 +461,8 @@ CVE-2022-2124 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...) NOTE: https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f (v8.2.5120) CVE-2021-46823 (python-ldap before 3.4.0 is vulnerable to a denial of service when lda ...) - python-ldap 3.4.0-1 + [bullseye] - python-ldap (Minor issue) + [buster] - python-ldap (Minor issue) NOTE: https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm CVE-2021-46822 (The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoa ...) - libjpeg-turbo 1:2.1.1-1 @@ -12346,7 +12348,7 @@ CVE-2021-46784 - squid 5.6-1 - squid3 NOTE: https://github.com/squid-cache/squid/security/advisories/GHSA-f5cp-6rh3-284w - NOTE: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/SQUID-2021_7.patch + NOTE: https://github.com/squid-cache/squid/commit/780c4ea1b4c9d2fb41f6962aa6ed73ae57f74b2b (v4) NOTE: Squid 5: http://www.squid-cache.org/Versions/v5/changesets/SQUID-2021_7.patch CVE-2022-29559 RESERVED @@ -17504,6 +17506,8 @@ CVE-2022-27812 RESERVED CVE-2022-27811 (GNOME OCRFeeder before 0.8.4 allows OS command injection via shell met ...) - ocrfeeder (bug #1008320) + [bullseye] - ocrfeeder (Minor issue) + [buster] - ocrfeeder (Minor issue) NOTE: https://gitlab.gnome.org/GNOME/ocrfeeder/-/merge_requests/13 NOTE: https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/9209bce8afaf6fde19cdac7f5eaea1b744c3e79e (0.8.5) NOTE: https://gitlab.gnome.org/GNOME/ocrfeeder/-/commit/afea0e722f1d14eaf14bf0e5ebb444d3271ff1ef (0.8.5) @@ -25796,6 +25800,8 @@ CVE-2022-24860 (Databasir is a team-oriented relational database model document CVE-2022-24859 (PyPDF2 is an open source python PDF library capable of splitting, merg ...) {DLA-3039-1} - pypdf2 1.27.9-1 (bug #1009879) + [bullseye] - pypdf2 (Minor issue) + [buster] - pypdf2 (Minor issue) NOTE: https://github.com/py-pdf/PyPDF2/security/advisories/GHSA-xcjx-m2pj-8g79 NOTE: https://github.com/py-pdf/PyPDF2/issues/329 NOTE: https://github.com/py-pdf/PyPDF2/pull/740 @@ -47744,6 +47750,8 @@ CVE-2021-42837 (An issue was discovered in Talend Data Catalog before 7.3-202109 NOT-FOR-US: Talend Data Catalog CVE-2021-42836 (GJSON before 1.9.3 allows a ReDoS (regular expression denial of servic ...) - golang-github-tidwall-gjson (bug #1000225) + [bullseye] - golang-github-tidwall-gjson (Minor issue) + [buster] - golang-github-tidwall-gjson (Minor issue) NOTE: https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944 NOTE: https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96 NOTE: https://github.com/tidwall/gjson/issues/236 @@ -50514,6 +50522,8 @@ CVE-2021-42249 RESERVED CVE-2021-42248 (GJSON = 1.9.2 allows attackers to cause a redos via crafted JSON i ...) - golang-github-tidwall-gjson (bug #1011616) + [bullseye] - golang-github-tidwall-gjson (Minor issue) + [buster] - golang-github-tidwall-gjson (Minor issue) NOTE: https://github.com/tidwall/gjson/issues/237 NOTE: https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96 (v1.9.3) CVE-2021-42247 @@ -104016,6 +104026,8 @@ CVE-2021-21417 (fluidsynth is a software synthesizer based on the SoundFont 2 sp NOTE: https://github.com/FluidSynth/fluidsynth/security/advisories/GHSA-6fcq-pxhc-jxc9 CVE-2021-21416 (django-registration is a user registration package for Django. The dja ...) - python-django-registration (bug #987366) + [bullseye] - python-django-registration (Minor issue) + [buster] - python-django-registration (Minor issue) [stretch] - python-django-registration (Minor issue) NOTE: https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh NOTE: https://github.com/ubernostrum/django-registration/commit/8206af081e239598cfd15d165d4d8ab9849ee23c @@ -106991,6 +107003,7 @@ CVE-2021-20292 (There is a flaw reported in the Linux kernel in versions before CVE-2021-20291 (A deadlock vulnerability was found in 'github.com/containers/storage' ...) [experimental] - golang-github-containers-storage 1.29.0+ds1-1 - golang-github-containers-storage 1.34.1+ds1-1 (bug #988942) + [bullseye] - golang-github-containers-storage (Minor issue) NOTE:
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7d2c0910 by Moritz Muehlenhoff at 2022-06-17T17:16:22+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2032,9 +2032,10 @@ CVE-2022-32767 CVE-2022-32979 RESERVED CVE-2022-32978 (There is an assertion failure in SingleComponentLSScan::ParseMCU in si ...) - - libjpeg + - libjpeg (unimportant) NOTE: https://github.com/thorfdbg/libjpeg/issues/75 NOTE: https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7 + NOTE: Crash in CLI tool, no security impact CVE-2022-32977 RESERVED CVE-2022-32976 @@ -2476,11 +2477,10 @@ CVE-2022-2044 CVE-2022-2043 RESERVED CVE-2022-2042 (Use After Free in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba NOTE: https://github.com/vim/vim/commit/2813f38e021c6e6581c0c88fcf107e41788bc835 (v8.2.5072) + NOTE: Crash in CLI tool, no security impact CVE-2022-2041 RESERVED CVE-2022-2040 @@ -2974,6 +2974,8 @@ CVE-2022-32548 RESERVED CVE-2022-32547 (In ImageMagick, there is load of misaligned address for type 'double', ...) - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091813 NOTE: https://github.com/ImageMagick/ImageMagick/issues/5033 NOTE: https://github.com/ImageMagick/ImageMagick/pull/5034 @@ -2981,6 +2983,8 @@ CVE-2022-32547 (In ImageMagick, there is load of misaligned address for type 'do NOTE: https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45) CVE-2022-32546 (A vulnerability was found in ImageMagick, causing an outside the range ...) - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091812 NOTE: https://github.com/ImageMagick/ImageMagick/issues/4985 NOTE: https://github.com/ImageMagick/ImageMagick/pull/4986 @@ -2988,6 +2992,8 @@ CVE-2022-32546 (A vulnerability was found in ImageMagick, causing an outside the NOTE: https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44) CVE-2022-32545 (A vulnerability was found in ImageMagick, causing an outside the range ...) - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091811 NOTE: https://github.com/ImageMagick/ImageMagick/issues/4962 NOTE: https://github.com/ImageMagick/ImageMagick/pull/4963 @@ -6449,6 +6455,8 @@ CVE-2022-31292 RESERVED CVE-2022-31291 (An issue in dlt_config_file_parser.c of dlt-daemon v2.18.8 allows atta ...) - dlt-daemon + [bullseye] - dlt-daemon (Minor issue) + [buster] - dlt-daemon (Minor issue) NOTE: https://github.com/COVESA/dlt-daemon/pull/376 NOTE: https://github.com/COVESA/dlt-daemon/commit/6a3bd901d825c7206797e36ea98e10a218f5aad2 CVE-2022-31290 @@ -19998,6 +20006,8 @@ CVE-2022-26636 RESERVED CVE-2022-26635 (PHP-Memcached v2.2.0 and below contains an improper NULL termination w ...) - php-memcached (bug #1009328) + [bullseye] - php-memcached (Minor issue) + [buster] - php-memcached (Minor issue) [stretch] - php-memcached (Minor issue) NOTE: https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/ CVE-2022-26634 (HMA VPN v5.3.5913.0 contains an unquoted service path which allows att ...) @@ -20314,6 +20324,8 @@ CVE-2022-26492 CVE-2022-26491 (An issue was discovered in Pidgin before 2.14.9. A remote attacker who ...) {DLA-3043-1} - pidgin 2.14.9-1 + [bullseye] - pidgin (Minor issue) + [buster] - pidgin (Minor issue) NOTE: https://pidgin.im/about/security/advisories/cve-2022-26491/ NOTE: https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc CVE-2022-26489 @@ -25435,6 +25447,8 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended version of the C reference implem - python-cmarkgfm 0.7.0-1 (bug #1006758) - ruby-commonmarker (bug #1006759) - r-cran-commonmark 1.8.0-1 (bug #1006760) + [bullseye] - r-cran-commonmark (Minor issue) + [buster] - r-cran-commonmark (Minor issue) NOTE: https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x NOTE:
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 41600bc3 by Moritz Muehlenhoff at 2022-06-16T20:05:44+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1105,6 +1105,8 @@ CVE-2022-0 CVE-2022-2085 RESERVED - ghostscript 9.56.0~dfsg-1 + [bullseye] - ghostscript (Minor issue) + [buster] - ghostscript (Minor issue) NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=704945 NOTE: Fixed by: https://git.ghostscript.com/?p=ghostpdl.git;h=ae1061d948d88667bdf51d47d918c4684d0f67df (ghostpdl-9.56.0rc1) CVE-2022-2084 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41600bc3f6886a52bff815f9c28483b4088cbb8b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41600bc3f6886a52bff815f9c28483b4088cbb8b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cb1b4183 by Moritz Muehlenhoff at 2022-06-09T08:57:46+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -4918,8 +4918,10 @@ CVE-2022-30793 RESERVED CVE-2022-30790 (Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2 ...) - u-boot + [bullseye] - u-boot (Minor issue) + [buster] - u-boot (Minor issue) NOTE: https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ - TODO: check details + NOTE: https://source.denx.de/u-boot/u-boot/-/commit/b85d130ea0cac152c21ec38ac9417b31d41b5552 CVE-2022-30789 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_ch ...) - ntfs-3g 1:2022.5.17-1 (bug #1011770) NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1 @@ -5012,6 +5014,7 @@ CVE-2022-30767 (nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and NOTE: https://lists.denx.de/pipermail/u-boot/2022-May/483952.html NOTE: https://securitylab.github.com/research/uboot-rce-nfs-vulnerability/ NOTE: Issue exists because of an incorrect fix for CVE-2019-14196. + NOTE: Patch: https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80 CVE-2022-30766 RESERVED CVE-2022-30765 (Calibre-Web before 0.6.18 allows user table SQL Injection. ...) @@ -5506,8 +5509,10 @@ CVE-2022-30553 RESERVED CVE-2022-30552 (Das U-Boot 2022.01 has a Buffer Overflow. ...) - u-boot + [bullseye] - u-boot (Minor issue) + [buster] - u-boot (Minor issue) NOTE: https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/ - TODO: check details + NOTE: Patch: https://source.denx.de/u-boot/u-boot/-/commit/b85d130ea0cac152c21ec38ac9417b31d41b5552 CVE-2022-30551 (OPC UA Legacy Java Stack 2022-04-01 allows a remote attacker to cause ...) TODO: check CVE-2022-30550 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb1b4183f73c5599b0bc16b02ad2dcd71aa5f941 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb1b4183f73c5599b0bc16b02ad2dcd71aa5f941 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2a083cab by Moritz Muehlenhoff at 2022-06-08T12:54:37+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -44562,28 +44562,34 @@ CVE-2021-42533 (Adobe Bridge version 11.1.1 (and earlier) is affected by a doubl NOT-FOR-US: Adobe CVE-2021-42532 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-b ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 NOTE: https://gitlab.freedesktop.org/libopenraw/exempi/-/releases - TODO: check for fixing commit CVE-2021-42531 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-b ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 - TODO: check for fixing commit CVE-2021-42530 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-b ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 - TODO: check for fixing commit CVE-2021-42529 (XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-b ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 NOTE: https://github.com/adobe/XMP-Toolkit-SDK/compare/v2021.07...v2021.08 - TODO: check for fixing commit CVE-2021-42528 (XMP Toolkit 2021.07 (and earlier) is affected by a Null pointer derefe ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html NOTE: https://github.com/adobe/XMP-Toolkit-SDK/commit/16e53564ae6c2689387479c04770f492075d5b7b (v2021.08) NOTE: https://cgit.freedesktop.org/exempi/commit/?h=adobe-sdk=16e53564ae6c2689387479c04770f492075d5b7b (2.6.0) @@ -50377,10 +50383,11 @@ CVE-2021-40733 (Adobe Animate version 21.0.9 (and earlier) is affected by a memo NOT-FOR-US: Adobe CVE-2021-40732 (XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 NOTE: https://gitlab.freedesktop.org/libopenraw/exempi/-/releases - TODO: check for fixing commit CVE-2021-40731 (Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.200 ...) NOT-FOR-US: Adobe CVE-2021-40730 (Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.200 ...) @@ -50413,10 +50420,11 @@ CVE-2021-40717 RESERVED CVE-2021-40716 (XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out- ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 NOTE: https://gitlab.freedesktop.org/libopenraw/exempi/-/releases - TODO: check for fixing commit CVE-2021-40715 (Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory ...) NOT-FOR-US: Adobe CVE-2021-40714 (Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by ...) @@ -52603,10 +52611,11 @@ CVE-2021-39848 RESERVED CVE-2021-39847 (XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-ba ...) - exempi 2.6.0-1 + [bullseye] - exempi (Minor issue) + [buster] - exempi (Minor issue) NOTE: https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html NOTE: https://cgit.freedesktop.org/exempi/commit/?h=2.6.0=77a3fe7096f8ebf301e2bfe1e6dc023b4ff6dc48 NOTE:
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3adefba4 by Moritz Muehlenhoff at 2022-06-07T13:12:07+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -5478,6 +5478,8 @@ CVE-2022-1651 NOTE: https://git.kernel.org/linus/ecd1735f14d6ac868ae5d8b7a2bf193fa11f388b (5.18-rc1) CVE-2022-1650 (Exposure of Sensitive Information to an Unauthorized Actor in GitHub r ...) - node-eventsource 2.0.2+~1.1.8-1 + [bullseye] - node-eventsource (Minor issue) + [buster] - node-eventsource (Minor issue) [stretch] - node-eventsource (not covered by security support) NOTE: https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/ NOTE: https://github.com/eventsource/eventsource/commit/10ee0c4881a6ba2fe65ec18ed195ac35889583c4 (v2.0.2) @@ -6792,11 +6794,9 @@ CVE-2022-30067 (GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Thro CVE-2022-30066 RESERVED CVE-2022-30065 (A use-after-free in Busybox 1.35-x's awk applet leads to denial of ser ...) - - busybox - [bullseye] - busybox (Minor issue) - [buster] - busybox (Minor issue) - [stretch] - busybox (Minor issue, requires passing arbitrary awk program, no identified patch) + - busybox (unimportant) NOTE: https://bugs.busybox.net/show_bug.cgi?id=14781 + NOTE: Crash in CLI tool, no security impact CVE-2022-30064 RESERVED CVE-2022-30063 (ftcms =2.1 was discovered to be vulnerable to code execution attac ...) @@ -7350,6 +7350,8 @@ CVE-2022-1516 (A NULL pointer dereference flaw was found in the Linux kernel NOTE: CONFIG_X25 is not set in Debian CVE-2022-1515 (A memory leak was discovered in matio 1.5.21 and earlier in Mat_VarRea ...) - libmatio 1.5.22-1 + [bullseye] - libmatio (Minor issue) + [buster] - libmatio (Minor issue) NOTE: https://github.com/tbeu/matio/issues/186 NOTE: Fixed by: https://github.com/tbeu/matio/commit/b53b62b756920f4c1509f4ee06427f66c3b5c9c4 (v1.5.22) CVE-2022-1514 (Stored XSS via upload plugin functionality in zip format in GitHub rep ...) @@ -7722,16 +7724,18 @@ CVE-2022-29801 (A vulnerability has been identified in Teamcenter V12.4 (All ver NOT-FOR-US: Siemens CVE-2022-29800 RESERVED - - networkd-dispatcher (bug #1010303) + - networkd-dispatcher (unimportant; bug #1010303) NOTE: https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/ NOTE: https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/074ff68f08d64a963a13e3cfc4fb3e3fb9006dfe NOTE: https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/2e226ee027bdc8022f0e10470318f89f25dc6133 + NOTE: No security impact in Debian, see #1010303 CVE-2022-29799 RESERVED - - networkd-dispatcher (bug #1010303) + - networkd-dispatcher (unimportant; bug #1010303) NOTE: https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/ NOTE: https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/074ff68f08d64a963a13e3cfc4fb3e3fb9006dfe NOTE: https://gitlab.com/craftyguy/networkd-dispatcher/-/commit/2e226ee027bdc8022f0e10470318f89f25dc6133 + NOTE: No security impact in Debian, see #1010303 CVE-2022-29798 RESERVED CVE-2022-29797 @@ -11578,14 +11582,17 @@ CVE-2022-28368 (Dompdf 1.2.1 allows remote code execution via a .php file in the NOTE: https://github.com/dompdf/dompdf/commit/0e0261b7bce372b3a05b712a023f6f742a22d57e (v0.8.0) CVE-2022-28367 (OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE ...) - libowasp-antisamy-java (bug #1010154) + [bullseye] - libowasp-antisamy-java (Minor issue) + [buster] - libowasp-antisamy-java (Minor issue) NOTE: https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae (v1.6.6) NOTE: Make sure to fix the issue completely and include the commit otherwise opening CVE-2022-29577 NOTE: https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0 (v1.6.7) CVE-2022-28366 (Certain Neko-related HTML parsers allow a denial of service via crafte ...) - libowasp-antisamy-java (bug #1010154) + [bullseye] - libowasp-antisamy-java (Minor issue) + [buster] - libowasp-antisamy-java (Minor issue) NOTE: https://github.com/nahsra/antisamy/releases/tag/v1.6.6 NOTE: https://github.com/nahsra/antisamy/issues/174 - TODO: check upstream for commits CVE-2022-28365 (Reprise License Manager 14.2 is affected by an Information Disclosure ...) NOT-FOR-US: Reprise License Manager
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9835c586 by Moritz Mühlenhoff at 2022-06-04T19:48:50+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -6572,6 +6572,8 @@ CVE-2022-1538 RESERVED CVE-2022-1537 (file.copy operations in GruntJS are vulnerable to a TOCTOU race condit ...) - grunt 1.5.3-1 + [bullseye] - grunt (Minor issue) + [buster] - grunt (Minor issue) NOTE: https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d/ NOTE: https://github.com/gruntjs/grunt/commit/58016ffac5ed9338b63ecc2a63710f5027362bae (v1.5.3) CVE-2022-1536 (A vulnerability has been found in automad up to 1.10.9 and classified ...) @@ -31512,6 +31514,8 @@ CVE-2021-45768 RESERVED CVE-2021-45767 (GPAC 1.1.0 was discovered to contain an invalid memory address derefer ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1982 NOTE: https://github.com/gpac/gpac/commit/830548acd030467e857f4cf0b79af8ebf1e04dde (v2.0.0) @@ -31521,16 +31525,22 @@ CVE-2021-45765 RESERVED CVE-2021-45764 (GPAC v1.1.0 was discovered to contain an invalid memory address derefe ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1971 NOTE: https://github.com/gpac/gpac/commit/e54df17892bee983d09d9437e44e6a1528fb46cb (v2.0.0) CVE-2021-45763 (GPAC v1.1.0 was discovered to contain an invalid call in the function ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1974 NOTE: https://github.com/gpac/gpac/commit/d2f74e49f2cb8d687c0dc38f66b99e3c5c7d7fec (v2.0.0) CVE-2021-45762 (GPAC v1.1.0 was discovered to contain an invalid memory address derefe ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1978 NOTE: https://github.com/gpac/gpac/commit/6d647f6e458c9b727eae1a8077d27fa433ced788 (v2.0.0) @@ -31538,6 +31548,8 @@ CVE-2021-45761 (ROPium v3.1 was discovered to contain an invalid memory address NOT-FOR-US: ROPium CVE-2021-45760 (GPAC v1.1.0 was discovered to contain an invalid memory address derefe ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1966 NOTE: https://github.com/gpac/gpac/commit/5041fcbaa904a89d280561905a163171b3828cea (v2.0.0) @@ -33150,6 +33162,8 @@ CVE-2021-45298 RESERVED CVE-2021-45297 (An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1973 NOTE: https://github.com/gpac/gpac/commit/fb13af36286b9d898e332e8762a286eb83bd1770 (v2.0.0) @@ -43575,18 +43589,24 @@ CVE-2021-42615 RESERVED CVE-2021-42614 (A use after free in info_width_internal in bk_info.c in Halibut 1.2 al ...) - halibut 1.3-1 + [bullseye] - halibut (Minor issue) + [buster] - halibut (Minor issue) NOTE: https://carteryagemann.com/halibut-case-study.html#poc-halibut-info-uaf NOTE: Inventing an errorstate to pass to all err_* functions and use it to track fatal errors: NOTE: https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=5c3db60a2911efb18bdc823264b74d8045c407b9 (1.3) NOTE: https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=edaf724febe2f9c890ef1cfdf24a78d5c1da2b32 (1.3) CVE-2021-42613 (A double free in cleanup_index in index.c in Halibut 1.2 allows an att ...) - halibut 1.3-1 + [bullseye] - halibut (Minor issue) + [buster] - halibut (Minor issue) NOTE: https://carteryagemann.com/halibut-case-study.html#poc-halibut-winhelp-df NOTE: Inventing an errorstate to pass to all err_* functions and use it to track fatal errors: NOTE: https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=5c3db60a2911efb18bdc823264b74d8045c407b9 (1.3) NOTE: https://git.tartarus.org/?p=simon/halibut.git;a=commit;h=edaf724febe2f9c890ef1cfdf24a78d5c1da2b32 (1.3)
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6bd5cc0b by Moritz Muehlenhoff at 2022-06-03T12:24:37+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -4377,7 +4377,9 @@ CVE-2022-30629 - golang-1.18 1.18.3-1 - golang-1.17 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 - golang-1.7 NOTE: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg @@ -8544,6 +8546,8 @@ CVE-2022-29243 (Nextcloud Server is the file server software for Nextcloud, a se - nextcloud-server (bug #941708) CVE-2022-29242 (GOST engine is a reference implementation of the Russian GOST crypto a ...) - libengine-gost-openssl1.1 + [bullseye] - libengine-gost-openssl1.1 (Minor issue) + [buster] - libengine-gost-openssl1.1 (Minor issue) NOTE: https://github.com/gost-engine/engine/security/advisories/GHSA-2rmw-8wpg-vgw5 NOTE: https://github.com/gost-engine/engine/commit/7df766124f87768b43b9e8947c5a01e17545772c (v3.0.1) NOTE: https://github.com/gost-engine/engine/commit/b2b4d629f100eaee9f5942a106b1ccefe85b8808 (v3.0.1) @@ -10088,6 +10092,8 @@ CVE-2022-1254 (A URL redirection vulnerability in Skyhigh SWG in main releases 1 NOT-FOR-US: Skyhigh SWG CVE-2022-1253 (Heap-based Buffer Overflow in GitHub repository strukturag/libde265 pr ...) - libde265 + [bullseye] - libde265 (Minor issue) + [buster] - libde265 (Minor issue) [stretch] - libde265 (Minor issue) NOTE: https://huntr.dev/bounties/1-other-strukturag/libde265/ NOTE: https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8 @@ -43284,24 +43290,24 @@ CVE-2021-42706 (This vulnerability could allow an attacker to disclose informati CVE-2021-42705 (PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buf ...) NOT-FOR-US: PLC Editor CVE-2021-42704 (Inkscape version 0.91 is vulnerable to an out-of-bounds write, which m ...) - - inkscape 1.0-1 + - inkscape 1.0-1 (unimportant) NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating possible patches) - TODO: Unclear if this is really fixed in 1.0+ + NOTE: oob read/crash in GUI tool, no security impact CVE-2021-42703 (This vulnerability could allow an attacker to send malicious Javascrip ...) NOT-FOR-US: Advantech CVE-2021-42702 (Inkscape version 0.91 can access an uninitialized pointer, which may a ...) - - inkscape 1.0-1 + - inkscape 1.0-1 (unimportant) NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating possible patches) - TODO: Unclear if this is really fixed in 1.0+ + NOTE: oob read/crash in GUI tool, no security impact CVE-2021-42701 (An attacker could prepare a specially crafted project file that, if op ...) NOT-FOR-US: AzeoTech CVE-2021-42700 (Inkscape 0.91 is vulnerable to an out-of-bounds read, which may allow ...) - - inkscape 1.0-1 + - inkscape 1.0-1 (unimportant) NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating possible patches) - TODO: Unclear if this is really fixed in 1.0+ + NOTE: oob read/crash in GUI tool, no security impact CVE-2021-42699 (The affected product is vulnerable to cookie information being transmi ...) NOT-FOR-US: AzeoTech CVE-2021-42698 (Project files are stored memory objects in the form of binary serializ ...) @@ -62728,6 +62734,8 @@ CVE-2021-35453 RESERVED CVE-2021-35452 (An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ...) - libde265 + [bullseye] - libde265 (Minor issue) + [buster] - libde265 (Minor issue) [stretch] - libde265 (Minor issue, revisit when fixed upstream) NOTE: https://github.com/strukturag/libde265/issues/298 CVE-2021-35451 (In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenti ...) = data/dsa-needed.txt = @@ -22,6 +22,8 @@ epiphany-browser -- freecad (aron) -- +kicad +-- libpgjava (apo) -- linux (carnil) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6bd5cc0ba63af33abf50981d733988468b0430ca -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6bd5cc0ba63af33abf50981d733988468b0430ca You're receiving this email
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 92e43a19 by Moritz Muehlenhoff at 2022-06-01T20:30:00+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -10,6 +10,8 @@ CVE-2022-32201 (In libjpeg 1.63, there is a NULL pointer dereference in Componen NOTE: Crash in CLI tool, no security impact CVE-2022-32200 (libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_strin ...) - dwarfutils + [bullseye] - dwarfutils (Minor issue) + [buster] - dwarfutils (Minor issue) NOTE: Fixed by: https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069 NOTE: https://github.com/davea42/libdwarf-code/issues/116 NOTE: https://www.prevanders.net/dwarfbug.html#DW202205-001 @@ -50031,20 +50033,22 @@ CVE-2021-40403 (An information disclosure vulnerability exists in the pick-and-p NOTE: https://github.com/gerbv/gerbv/issues/82 NOTE: Fixed by: https://github.com/gerbv/gerbv/commit/c32c6f9c0b5d3b0ecc33de21d8532de6c2df5878 (v2.9.1-rc.1) CVE-2021-40402 (An out-of-bounds read vulnerability exists in the RS-274X aperture mac ...) - - gerbv + - gerbv (unimportant) NOTE: https://github.com/gerbv/gerbv/issues/80 NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416 + NOTE: Crash in GUI tool, no security impact CVE-2021-40401 (A use-after-free vulnerability exists in the RS-274X aperture definiti ...) - gerbv NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415 NOTE: Fixed by: https://github.com/gerbv/gerbv/commit/68ee18945bcf68ff964c42f12af79c5c0e2f4069 (v2.9.0-rc.1) NOTE: https://github.com/gerbv/gerbv/issues/81 CVE-2021-40400 (An out-of-bounds read vulnerability exists in the RS-274X aperture mac ...) - - gerbv + - gerbv (unimportant) NOTE: https://github.com/gerbv/gerbv/issues/79 NOTE: https://github.com/gerbv/gerbv/pull/124 NOTE: Fixed by: https://github.com/gerbv/gerbv/commit/caa6560d5d683f827c672fd5e380f89a8ef632b6 NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413 + NOTE: Crash in GUI tool, no security impact CVE-2021-40399 (An exploitable use-after-free vulnerability exists in WPS Spreadsheets ...) NOT-FOR-US: WPS Office CVE-2021-40398 (An out-of-bounds write vulnerability exists in the parse_raster_data f ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92e43a19c4806603684092f0394aaffe05b14c92 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/92e43a19c4806603684092f0394aaffe05b14c92 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7c3bb261 by Moritz Muehlenhoff at 2022-05-30T21:03:10+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -456,9 +456,13 @@ CVE-2022-31652 RESERVED CVE-2022-31651 (In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in ...) - sox + [bullseye] - sox (Minor issue) + [buster] - sox (Minor issue) NOTE: https://sourceforge.net/p/sox/bugs/360/ CVE-2022-31650 (In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwri ...) - sox + [bullseye] - sox (Minor issue) + [buster] - sox (Minor issue) NOTE: https://sourceforge.net/p/sox/bugs/360/ CVE-2022-31649 RESERVED @@ -58344,6 +58348,8 @@ CVE-2021-36716 (A ReDoS (regular expression denial of service) flaw was found in NOT-FOR-US: Node is-email CVE-2021-3643 (A flaw was found in sox 14.4.1. The lsx_adpcm_init function within lib ...) - sox (bug #1010374) + [bullseye] - sox (Minor issue) + [buster] - sox (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1980626 NOTE: Triggered by same reproducer as for CVE-2021-23210 NOTE: https://sourceforge.net/p/sox/bugs/351/ @@ -65115,6 +65121,8 @@ CVE-2021-33841 (SGE-PLC1000 device, in its 0.9.2b firmware version, does not han CVE-2021-23210 [divide by zero in voc.c] RESERVED - sox (bug #1010374) + [bullseye] - sox (Minor issue) + [buster] - sox (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1975670 NOTE: https://sourceforge.net/p/sox/bugs/351/ CVE-2021-23172 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c3bb2610282e2e6880db746a40d44a2a47aa86e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c3bb2610282e2e6880db746a40d44a2a47aa86e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 239f0af2 by Moritz Muehlenhoff at 2022-05-30T20:13:07+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -9041,6 +9041,8 @@ CVE-2022-1216 (The Advanced Image Sitemap WordPress plugin through 1.2 does not CVE-2022-1215 RESERVED - libinput 1.20.1-1 + [bullseye] - libinput (Minor issue) + [buster] - libinput (Minor issue) [stretch] - libinput (Vulnerable code introduced later) NOTE: https://www.openwall.com/lists/oss-security/2022/04/20/2 NOTE: https://gitlab.freedesktop.org/libinput/libinput/-/commit/2a8b8fde90d63d48ce09ddae44142674bbca1c28 = data/dsa-needed.txt = @@ -36,6 +36,8 @@ nodejs (jmm) -- puma/oldstable -- +python-bottle (jmm) +-- rpki-client/stable new 7.6 release required libretls, which isn't in Bullseye -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/239f0af2be152614ac84f50b9a843dfbe1abae83 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/239f0af2be152614ac84f50b9a843dfbe1abae83 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5d6d0eff by Moritz Muehlenhoff at 2022-05-30T18:44:40+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -30,11 +30,10 @@ CVE-2022-1929 CVE-2022-1928 (Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gite ...) - gitea CVE-2022-1927 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777 NOTE: https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010 (v8.2.5037) + NOTE: Crash in CLI tool, no security impact CVE-2022-1926 RESERVED CVE-2022-31793 @@ -19670,12 +19669,16 @@ CVE-2022-24884 (ecdsautils is a tiny collection of programs used for ECDSA (keyg NOTE: https://github.com/freifunk-gluon/ecdsautils/commit/1d4b091abdf15ad7b2312535b5b95ad70f6dbd08 (v0.4.1) CVE-2022-24883 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). ...) - freerdp2 2.7.0+dfsg1-1 + [bullseye] - freerdp2 (Minor issue) + [buster] - freerdp2 (Minor issue) - freerdp NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf NOTE: Fixed by: https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc NOTE: Fixed by (backport): https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144 CVE-2022-24882 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). ...) - freerdp2 2.7.0+dfsg1-1 + [bullseye] - freerdp2 (Minor issue) + [buster] - freerdp2 (Minor issue) - freerdp NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh NOTE: https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95 @@ -95178,6 +95181,8 @@ CVE-2021-21898 (A code execution vulnerability exists in the dwgCompressor::deco NOTE: https://github.com/LibreCAD/libdxfrw/commit/ba3fa95648bef948e008dfbdd31a4d21badd71f0 CVE-2021-21897 (A code execution vulnerability exists in the DL_Dxf::handleLWPolylineD ...) - cloudcompare (bug #1010347) + [bullseye] - cloudcompare (Minor issue) + [buster] - cloudcompare (Minor issue) - dxflib 3.26.4-1 [bullseye] - dxflib (Minor issue) [buster] - dxflib (Minor issue) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d6d0eff00ebc259a6317ecc29020dc2a760ac5d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d6d0eff00ebc259a6317ecc29020dc2a760ac5d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0ffdcddf by Moritz Muehlenhoff at 2022-05-27T19:22:07+02:00 buster/bullseye triage add one more patch needed for pcre issue - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2317,12 +2317,13 @@ CVE-2022-25932 RESERVED CVE-2022-1736 RESERVED - - gnome-remote-desktop 42.1.1-2 + - gnome-remote-desktop 42.1.1-2 (unimportant) NOTE: https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1973028/comments/3 NOTE: The CVE is assigned based on the Ubuntu policy strongly discouraging open ports by NOTE: default (https://wiki.ubuntu.com/Security/Features#ports) and the fact that the user NOTE: service was enabled by default (and not automatically enabled anymore since 42.1.1-2) - TODO: check, if we want to threat this as unimportant severity issue + NOTE: Not treated as a security issue in Debian, whether to start the daemon or not is ultimately + NOTE: up to the local admin CVE-2022-1735 (Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969 ...) - vim (unimportant) NOTE: https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9 @@ -4047,6 +4048,8 @@ CVE-2022-30285 RESERVED CVE-2022-30284 (In the python-libnmap package through 0.7.2 for Python, remote command ...) - python-libnmap + [bullseye] - python-libnmap (Minor issue) + [buster] - python-libnmap (Minor issue) NOTE: https://www.swascan.com/security-advisory-libnmap-2/ CVE-2022-30283 RESERVED @@ -4104,6 +4107,7 @@ CVE-2022-1587 (An out-of-bounds read vulnerability was discovered in the PCRE2 l CVE-2022-1586 (An out-of-bounds read vulnerability was discovered in the PCRE2 librar ...) - pcre2 10.40-1 NOTE: https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a (pcre2-10.40) + NOTE: https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c CVE-2022-1585 RESERVED CVE-2022-30259 @@ -7995,6 +7999,8 @@ CVE-2022-28920 (Tieba-Cloud-Sign v4.9 was discovered to contain a cross-site scr NOT-FOR-US: Baidu Tieba CVE-2022-28919 (HTMLCreator release_stable_2020-07-29 was discovered to contain a cros ...) - dokuwiki (bug #1011056) + [bullseye] - dokuwiki (Minor issue) + [buster] - dokuwiki (Minor issue) NOTE: https://github.com/splitbrain/dokuwiki/issues/3651 NOTE: https://github.com/splitbrain/dokuwiki/commit/d3233986baa7dfe44490b805ae2e4296fad59401 CVE-2022-28918 (GreenCMS v2.3.0603 was discovered to contain an arbitrary file deletio ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ffdcddf525cecac62c1e2e1b5d1d8cdf35b741f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ffdcddf525cecac62c1e2e1b5d1d8cdf35b741f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 84d2c879 by Moritz Muehlenhoff at 2022-05-27T00:41:10+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -293,11 +293,10 @@ CVE-2022-31619 CVE-2022-1887 RESERVED CVE-2022-1886 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a NOTE: https://github.com/vim/vim/commit/2a585c85013be22f59f184d49612074fd9b115d7 (v8.2.5016) + NOTE: Crash in CLI tool, no security impact CVE-2022-1885 RESERVED CVE-2022-1884 @@ -13610,6 +13609,8 @@ CVE-2022-26968 RESERVED CVE-2022-26967 (GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It c ...) - gpac (bug #1007224) + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2138 NOTE: https://github.com/gpac/gpac/commit/ea1eca00fd92fa17f0e25ac25652622924a9a6a0 @@ -25452,6 +25453,8 @@ CVE-2022-0218 (The WP HTML Mail WordPress plugin is vulnerable to unauthorized a CVE-2022-0216 RESERVED - qemu + [bullseye] - qemu (Minor issue) + [buster] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2036953 NOTE: https://starlabs.sg/advisories/22-0216 NOTE: https://gitlab.com/qemu-project/qemu/-/issues/972 @@ -159323,6 +159326,8 @@ CVE-2020-8860 (This vulnerability allows remote attackers to execute arbitrary c CVE-2020-8859 (This vulnerability allows remote attackers to create a denial-of-servi ...) {DLA-3014-1} - elog + [bullseye] - elog (Minor issue) + [buster] - elog (Minor issue) NOTE: https://elog.psi.ch/elogs/Forum/69114 NOTE: https://www.zerodayinitiative.com/advisories/ZDI-20-252/ NOTE: https://bitbucket.org/ritt/elog/commits/033e292301fa569738b20768b8d1f1d7d0bc1ca7 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d2c8799b55ec27c1facad007ec940b85875c73 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d2c8799b55ec27c1facad007ec940b85875c73 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 470058db by Moritz Muehlenhoff at 2022-05-24T17:21:08+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,3 +1,4 @@ + CVE-2022-31598 RESERVED CVE-2022-31597 @@ -7052,17 +7053,20 @@ CVE-2022-29025 CVE-2022-29024 RESERVED CVE-2022-29023 (A buffer overflow in the razermouse driver of OpenRazer v3.3.0 and bel ...) - - openrazer 3.3.0+dfsg-1 + - openrazer 3.3.0+dfsg-1 (unimportant) NOTE: https://github.com/openrazer/openrazer/pull/1790 NOTE: https://github.com/openrazer/openrazer/commit/7e8a04feb378a679f1bcdcae079a5100cc45663b (v3.3.0) + NOTE: Negligible security impact CVE-2022-29022 (A buffer overflow in the razeraccessory driver of OpenRazer v3.3.0 and ...) - - openrazer 3.3.0+dfsg-1 + - openrazer 3.3.0+dfsg-1 (unimportant) NOTE: https://github.com/openrazer/openrazer/pull/1790 NOTE: https://github.com/openrazer/openrazer/commit/7e8a04feb378a679f1bcdcae079a5100cc45663b (v3.3.0) + NOTE: Negligible security impact CVE-2022-29021 (A buffer overflow in the razerkbd driver of OpenRazer v3.3.0 and below ...) - - openrazer 3.3.0+dfsg-1 + - openrazer 3.3.0+dfsg-1 (unimportant) NOTE: https://github.com/openrazer/openrazer/pull/1790 NOTE: https://github.com/openrazer/openrazer/commit/7e8a04feb378a679f1bcdcae079a5100cc45663b (v3.3.0) + NOTE: Negligible security impact CVE-2022-29020 (ForestBlog through 2022-02-16 allows admin/profile/save userAvatar XSS ...) NOT-FOR-US: ForestBlog CVE-2022-29019 @@ -33471,6 +33475,7 @@ CVE-2021-44550 (An Incorrect Access Control vulnerability exists in CoreNLP 4.3. NOT-FOR-US: CoreNLP CVE-2021-4070 (Off-by-one Error in GitHub repository v2fly/v2ray-core prior to 4.44.0 ...) - golang-v2ray-core 4.34.0-7 (bug #1010377) + [bullseye] - golang-v2ray-core (Minor issue) NOTE: https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877/ NOTE: https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c CVE-2021-44549 (Apache Sling Commons Messaging Mail provides a simple layer on top of ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/470058db03eceb200dbae9656629813a5590daf3 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/470058db03eceb200dbae9656629813a5590daf3 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6cbe8306 by Moritz Muehlenhoff at 2022-05-24T13:59:17+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1405,11 +1405,13 @@ CVE-2022-30976 (GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf NOTE: https://github.com/gpac/gpac/commit/915e2cba715f36b7cc29e2117831ca143d78 CVE-2022-30975 (In Artifex MuJS through 1.2.0, jsP_dumpsyntax in jsdump.c has a NULL p ...) - mujs + [bullseye] - mujs (Minor issue) NOTE: https://github.com/ccxvii/mujs/issues/161 NOTE: https://github.com/ccxvii/mujs/commit/910acc807c3c057e1c0726160808f3a9f37b40ec NOTE: https://github.com/ccxvii/mujs/commit/f5b3c703e18725e380b83427004632e744f85a6f CVE-2022-30974 (compile in regexp.c in Artifex MuJS through 1.2.0 results in stack con ...) - mujs + [bullseye] - mujs (Minor issue) NOTE: https://github.com/ccxvii/mujs/issues/162 NOTE: https://github.com/ccxvii/mujs/commit/160ae29578054dc09fd91e5401ef040d52797e61 NOTE: https://github.com/ccxvii/mujs/commit/799b62bf065b006e2bcb1c80044eab2b10412ecf @@ -3958,6 +3960,8 @@ CVE-2022-30066 RESERVED CVE-2022-30065 (A use-after-free in Busybox 1.35-x's awk applet leads to denial of ser ...) - busybox + [bullseye] - busybox (Minor issue) + [buster] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=14781 CVE-2022-30064 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6cbe83067caa3084d439fc753d990fd48c5dfee0 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6cbe83067caa3084d439fc753d990fd48c5dfee0 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 209bdb15 by Moritz Muehlenhoff at 2022-05-23T09:39:23+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -626,10 +626,10 @@ CVE-2022-30977 CVE-2022-29496 RESERVED CVE-2022-1796 (Use After Free in GitHub repository vim/vim prior to 8.2.4979. ...) - - vim - [stretch] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e NOTE: https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5 (v8.2.4979) + NOTE: Crash in CLI tool, no security impact CVE-2022-1795 (Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV. ...) - gpac [stretch] - gpac (No longer supported in LTS) @@ -657,6 +657,8 @@ CVE-2022-1786 RESERVED CVE-2022-1785 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. ...) - vim + [bullseye] - vim (Minor issue) + [buster] - vim (Minor issue) [stretch] - vim (Minor issue) NOTE: https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109 NOTE: https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839 (v8.2.4977) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/209bdb150e515717c4bc003ff75a5638aa46aae3 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/209bdb150e515717c4bc003ff75a5638aa46aae3 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a0920974 by Moritz Muehlenhoff at 2022-05-19T14:31:54+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -539,9 +539,10 @@ CVE-2022-1773 CVE-2022-1772 RESERVED CVE-2022-1771 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb NOTE: https://github.com/vim/vim/commit/51f0bfb88a3554ca2dde777d78a59880d1ee37a8 (v8.2.4975) + NOTE: Crash in CLI tool, no security impact CVE-2019-25061 (The random_password_generator (aka RandomPasswordGenerator) gem throug ...) NOT-FOR-US: bvsatyaram/random_password_generator CVE-2022-30973 @@ -3061,10 +3062,11 @@ CVE-2022-30069 CVE-2022-30068 RESERVED CVE-2022-30067 (GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a ...) - - gimp + - gimp (unimportant) NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/8120 NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/4f99f1fcfd892ead19831b5adcd38a99d71214b6 (master) NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/8cd6d05232795ac31076013db1c6be3dc67e8e09 (gimp-2-10) + NOTE: Crash in GUI application, no security impact CVE-2022-30066 RESERVED CVE-2022-30065 (A use-after-free in Busybox 1.35-x's awk applet leads to denial of ser ...) @@ -32764,99 +32766,118 @@ CVE-2021-44511 RESERVED CVE-2021-44510 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44509 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44508 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44507 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44506 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44505 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44504 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue) NOTE: http://tinco.pair.com/bhaskar/gtm/doc/articles/GTM_V7.0-002_Release_Notes.html NOTE: https://gitlab.com/YottaDB/DB/YDB/-/issues/828 - TODO: check upstream to find out which changes affect which CVE CVE-2021-44503 (An issue was discovered in FIS GT.M through V7.0-000 (related to the Y ...) - fis-gtm (bug #1009900) + [bullseye] - fis-gtm (Minor issue) + [buster] - fis-gtm (Minor issue)
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 295a2b57 by Moritz Muehlenhoff at 2022-05-17T23:04:43+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3,11 +3,10 @@ CVE-2022-30973 CVE-2022-1770 RESERVED CVE-2022-1769 (Buffer Over-read in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c NOTE: https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4 (v8.2.4974) + NOTE: Crash in CLI tool, no security impact CVE-2022-1768 RESERVED CVE-2022-1767 @@ -259,22 +258,20 @@ CVE-2022-1736 NOTE: service was enabled by default (and not automatically enabled anymore since 42.1.1-2) TODO: check, if we want to threat this as unimportant severity issue CVE-2022-1735 (Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9 NOTE: https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97 (v8.2.4969) + NOTE: Crash in CLI tool, no security impact CVE-2022-1734 RESERVED - linux (unimportant) NOTE: https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6) NOTE: Support for Marvell NFC devices (CONFIG_NFC_MRVL) not enabled CVE-2022-1733 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - - vim - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a NOTE: https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813 (v8.2.4968) + NOTE: Crash in CLI tool, no security impact CVE-2022-1732 RESERVED CVE-2022-1731 (Metasonic Doc WebClient 7.0.14.0 / 7.0.12.0 / 7.0.3.0 is vulnerable to ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a2b578e2764252ec6ebb57912dd7b326ea9c8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a2b578e2764252ec6ebb57912dd7b326ea9c8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: da3ade15 by Moritz Muehlenhoff at 2022-05-13T14:03:31+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -958,10 +958,14 @@ CVE-2022-26041 RESERVED CVE-2022-1623 (LibTIFF master branch has an out-of-bounds read in LZWDecode in libtif ...) - tiff + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a NOTE: https://gitlab.com/libtiff/libtiff/-/issues/410 CVE-2022-1622 (LibTIFF master branch has an out-of-bounds read in LZWDecode in libtif ...) - tiff + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/commit/b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a NOTE: https://gitlab.com/libtiff/libtiff/-/issues/410 CVE-2022-1621 (Heap buffer overflow in vim_strncpy find_word in GitHub repository vim ...) = data/dsa-needed.txt = @@ -56,7 +56,10 @@ trafficserver (jmm) wait until status for CVE-2021-38161 is clarified (upstream patch got reverted) -- unzip - no details public yet + unclear information, initial report indicates writable memory corruption, but + some identified patch is just for a NULL deref, needs more clarification +-- +waitress (jmm) -- wordpress -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da3ade15d88acdb6d41bcf13653cf34c13ccbfe6 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/da3ade15d88acdb6d41bcf13653cf34c13ccbfe6 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a4066781 by Moritz Muehlenhoff at 2022-05-12T16:58:57+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1670,9 +1670,13 @@ CVE-2022-29979 RESERVED CVE-2022-29978 (There is a floating point exception error in sixel_encoder_do_resize, ...) - libsixel + [bullseye] - libsixel (Minor issue) + [buster] - libsixel (Minor issue) NOTE: https://github.com/saitoha/libsixel/issues/166 CVE-2022-29977 (There is an assertion failure error in stbi__jpeg_huff_decode, stb_ima ...) - libsixel + [bullseye] - libsixel (Minor issue) + [buster] - libsixel (Minor issue) NOTE: https://github.com/saitoha/libsixel/issues/165 CVE-2022-29976 (An Authenticated Reflected Cross-site scripting at BCC Parameter was d ...) NOT-FOR-US: MDaemon View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4066781e30a5cd18d2551d9626da63c031f7834 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4066781e30a5cd18d2551d9626da63c031f7834 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b43eafdd by Moritz Muehlenhoff at 2022-05-10T10:21:10+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -456,6 +456,8 @@ CVE-2022-30334 (Brave before 1.34, when a Private Window with Tor Connectivity i TODO: check CVE-2022-30333 (RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal ...) - unrar-nonfree + [bullseye] - unrar-nonfree (Non-free not supported) + [buster] - unrar-nonfree (Non-free not supported) TODO: check details, 6.1.1 -> 6.1.2 upstream changes does not seem related CVE-2022-30332 RESERVED @@ -86658,6 +86660,8 @@ CVE-2021-23793 RESERVED CVE-2021-23792 (The package com.twelvemonkeys.imageio:imageio-metadata before 3.7.1 ar ...) - libtwelvemonkeys-java 3.8.0-1 + [bullseye] - libtwelvemonkeys-java (Minor issue) + [buster] - libtwelvemonkeys-java (Minor issue) NOTE: https://snyk.io/vuln/SNYK-JAVA-COMTWELVEMONKEYSIMAGEIO-2316763 NOTE: https://github.com/haraldk/TwelveMonkeys/commit/da4efe98bf09e1cce91b7633cb251958a200fc80 (twelvemonkeys-3.8.0) CVE-2021-23791 = data/dsa-needed.txt = @@ -16,6 +16,8 @@ asterisk/oldstable -- cacti -- +cifs-utils +-- condor/oldstable (apo) -- ecdsautils (jmm) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b43eafdd52df278263e5e4eb5068ef1979594dd4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b43eafdd52df278263e5e4eb5068ef1979594dd4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7ea55732 by Moritz Muehlenhoff at 2022-05-09T22:35:56+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -8404,6 +8404,8 @@ CVE-2022-27471 RESERVED CVE-2022-27470 (SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memor ...) - libsdl2-ttf 2.0.18+dfsg-3 (bug #1010671) + [bullseye] - libsdl2-ttf (Minor issue) + [buster] - libsdl2-ttf (Minor issue) NOTE: https://github.com/libsdl-org/SDL_ttf/commit/db1b41ab8bde6723c24b866e466cad78c2fa0448 NOTE: https://github.com/libsdl-org/SDL_ttf/issues/187 CVE-2022-27469 (Monstaftp v2.10.3 was discovered to allow attackers to execute Server- ...) @@ -40283,6 +40285,7 @@ CVE-2021-42219 (Go-Ethereum v1.10.9 was discovered to contain an issue which all - golang-github-go-ethereum (bug #890541) CVE-2021-42218 (OMPL v1.5.2 contains a memory leak in VFRRT.cpp ...) - ompl + [bullseye] - ompl (Minor issue) NOTE: https://github.com/ompl/ompl/issues/839 NOTE: https://github.com/ompl/ompl/commit/abb4fadcb4e4fe4c9cf41e5e7706143a66948eb7 CVE-2021-42217 @@ -40951,6 +40954,8 @@ CVE-2021-41960 RESERVED CVE-2021-41959 (JerryScript Git version 14ff5bf does not sufficiently track and releas ...) - iotjs + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4781 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4166 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4787 @@ -49749,11 +49754,11 @@ CVE-2021-38427 (RTI Connext DDS Professional and Connext DDS Secure Versions 4.2 CVE-2021-38426 (FATEK Automation WinProladder versions 3.30 and prior lacks proper val ...) NOT-FOR-US: FATEK Automation CVE-2021-38425 (eProsima Fast DDS versions prior to 2.4.0 (#2269) are susceptible to e ...) - - fastdds + - fastdds + [bullseye] - fastdds (Minor issue) NOTE: https://github.com/eProsima/Fast-DDS/issues/2267 NOTE: https://github.com/eProsima/Fast-DDS/pull/2269 NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 - TODO: check completeness CVE-2021-38424 (The tag interface of Delta Electronics DIALink versions 1.2.4.0 and pr ...) NOT-FOR-US: Delta Electronics DIALink CVE-2021-38423 (All versions of GurumDDS improperly calculate the size to be used when ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ea557328d4a2adbbe84e1356afcf0dc1b240585 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ea557328d4a2adbbe84e1356afcf0dc1b240585 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f4a64b16 by Moritz Muehlenhoff at 2022-05-09T16:13:48+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -379,9 +379,10 @@ CVE-2018-25033 (ADMesh through 0.98.4 has a heap-based buffer over-read in stl_u NOTE: https://github.com/admesh/admesh/issues/28 NOTE: https://github.com/admesh/admesh/commit/e84d8353f1347e1f26f0a95770d92ba14e6ede38 CVE-2022-1620 (NULL Pointer Dereference in function vim_regexec_string at regexp.c:27 ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51 NOTE: https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f (v8.2.4901) + NOTE: Crash in CLI tool, no security impact CVE-2022-1619 (Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub r ...) - vim NOTE: https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 @@ -5525,6 +5526,8 @@ CVE-2022-28464 (Apifox through 2.1.6 is vulnerable to Cross Site Scripting (XSS) NOT-FOR-US: Apifox CVE-2022-28463 (ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow. ...) - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f NOTE: https://github.com/ImageMagick/ImageMagick/issues/4988 NOTE: https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f4a64b1602558566682c1a6d9255a26088d5d924 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f4a64b1602558566682c1a6d9255a26088d5d924 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0a9201d8 by Moritz Muehlenhoff at 2022-05-06T13:06:18+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -36,6 +36,8 @@ CVE-2022-1589 RESERVED CVE-2022-30292 (thread_call in sqbaselib.cpp in SQUIRREL 3.2 lacks a certain sq_reserv ...) - squirrel3 + [bullseye] - squirrel3 (Minor issue) + [buster] - squirrel3 (Minor issue) NOTE: https://github.com/albertodemichelis/squirrel/commit/a6413aa690e0bdfef648c68693349a7b878fe60d CVE-2022-30291 RESERVED @@ -808,6 +810,8 @@ CVE-2022-29974 RESERVED CVE-2022-29973 (relan exFAT 1.3.0 allows local users to obtain sensitive information ( ...) - fuse-exfat + [bullseye] - fuse-exfat (Minor issue) + [buster] - fuse-exfat (Minor issue) NOTE: https://github.com/relan/exfat/issues/185 CVE-2022-29972 RESERVED @@ -2697,10 +2701,14 @@ CVE-2022-29341 RESERVED CVE-2022-29340 (GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vul ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 NOTE: https://github.com/gpac/gpac/issues/2163 CVE-2022-29339 (In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f NOTE: https://github.com/gpac/gpac/issues/2165 CVE-2022-29338 @@ -6371,6 +6379,8 @@ CVE-2022-28067 (An incorrect access control issue in Sandboxie Classic v5.55.13 NOT-FOR-US: Sandboxie Classic CVE-2022-28066 (Libarchive v3.6.0 was discovered to contain a read memory access vulne ...) - libarchive + [bullseye] - libarchive (Minor issue) + [buster] - libarchive (Minor issue) NOTE: https://github.com/libarchive/libarchive/issues/1672 NOTE: https://github.com/libarchive/libarchive/commit/cfaa28168a07ea4a53276b63068f94fce37d6aff (v3.6.1) CVE-2022-28065 @@ -8225,6 +8235,8 @@ CVE-2022-27338 RESERVED CVE-2022-27337 (A logic error in the Hints::Hints function of Poppler v22.03.0 allows ...) - poppler + [bullseye] - poppler (Minor issue) + [buster] - poppler (Minor issue) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1230 NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/commit/81044c64b9ed9a10ae82a28bac753060bdfdac74 (poppler-22.04.0) CVE-2022-27336 (Seacms v11.6 was discovered to contain a remote code execution (RCE) v ...) @@ -21893,6 +21905,8 @@ CVE-2022-22966 (An authenticated, high privileged malicious actor with network a NOT-FOR-US: VMware CVE-2022-22965 (A Spring MVC or Spring WebFlux application running on JDK 9+ may be vu ...) - libspring-java + [bullseye] - libspring-java (No reverse dependencies in the archive affected) + [buster] - libspring-java (No reverse dependencies in the archive affected) [stretch] - libspring-java (EOL'd for stretch) NOTE: https://bugalert.org/content/notices/2022-03-30-spring.html NOTE: https://tanzu.vmware.com/security/cve-2022-22965 @@ -21926,9 +21940,10 @@ CVE-2022-22951 (VMware Carbon Black App Control (8.5.x prior to 8.5.14, 8.6.x pr NOT-FOR-US: VMware CVE-2022-22950 (n Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versi ...) - libspring-java + [bullseye] - libspring-java (Minor issue) + [buster] - libspring-java (Minor issue) [stretch] - libspring-java (EOL'd for stretch) NOTE: https://tanzu.vmware.com/security/cve-2022-22950 - TODO: check, no details available CVE-2022-22949 RESERVED CVE-2022-22948 (The vCenter Server contains an information disclosure vulnerability du ...) @@ -93474,10 +93489,12 @@ CVE-2021-21240 (httplib2 is a comprehensive HTTP client library for Python. In h CVE-2021-21239 (PySAML2 is a pure python implementation of SAML Version 2 Standard. Py ...) {DLA-2577-1} - python-pysaml2 6.5.1-1 (bug #980772) + [buster] - python-pysaml2 (Minor issue) NOTE: https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62 NOTE: https://github.com/IdentityPython/pysaml2/commit/751dbf50a51131b13d55989395f9b115045f9737 CVE-2021-21238 (PySAML2 is a pure python implementation of SAML Version 2 Standard. Py ...) - python-pysaml2 6.5.1-1 (bug #980773) + [buster] - python-pysaml2 (Minor issue) [stretch] - python-pysaml2 (python3-xmlschema not available in
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3512b536 by Moritz Muehlenhoff at 2022-04-27T20:07:08+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -137,6 +137,7 @@ CVE-2022-1475 RESERVED {DSA-5124-1} - ffmpeg 7:4.4.2-1 + [buster] - ffmpeg (Vulnerable code not present) NOTE: https://trac.ffmpeg.org/ticket/9651 NOTE: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=757da974b21833529cc41bdcc9684c29660cdfa8 NOTE: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e9e2ddbc6c78cc18b76093617f82c920e58a8d1f (n4.4.2) @@ -3535,6 +3536,8 @@ CVE-2022-28507 RESERVED CVE-2022-28506 (There is a heap-buffer-overflow in GIFLIB 5.2.1 function DumpScreen2RG ...) - giflib + [bullseye] - giflib (Minor issue) + [buster] - giflib (Minor issue) NOTE: https://sourceforge.net/p/giflib/bugs/159/ CVE-2022-28505 RESERVED @@ -32864,6 +32867,8 @@ CVE-2021-43454 (An Unquoted Service Path vulnerability exists in AnyTXT Searcher NOT-FOR-US: AnyTXT Searcher for Windows CVE-2021-43453 (A Heap-based Buffer Overflow vulnerability exists in JerryScript 2.4.0 ...) - iotjs + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4808 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4754 NOTE: Fixed by; https://github.com/jerryscript-project/jerryscript/commit/efe63a5bbc5106164a08ee2eb415a7a701f5311f @@ -35529,6 +35534,8 @@ CVE-2021-42783 (Missing Authentication for Critical Function vulnerability in de NOT-FOR-US: D-Link CVE-2021-42782 (Stack buffer overflow issues were found in Opensc before version 0.22. ...) - opensc 0.22.0-1 + [bullseye] - opensc (Minor issue) + [buster] - opensc (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016448 NOTE: https://github.com/OpenSC/OpenSC/commit/1252aca9f10771ef5ba8405e73cf2da50827958f (0.22.0-rc1) NOTE: https://github.com/OpenSC/OpenSC/commit/456ac566938a1da774db06126a2fa6c0cba514b3 (0.22.0) @@ -35537,6 +35544,8 @@ CVE-2021-42782 (Stack buffer overflow issues were found in Opensc before version NOTE: https://github.com/OpenSC/OpenSC/commit/ae1cf0be90396fb6c0be95829bf0d3eecbd2fd1c (0.22.0-rc1) CVE-2021-42781 (Heap buffer overflow issues were found in Opensc before version 0.22.0 ...) - opensc 0.22.0-1 + [bullseye] - opensc (Minor issue) + [buster] - opensc (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016439 NOTE: https://github.com/OpenSC/OpenSC/commit/05648b0604bf3e498e8d42dff3c6e7c56a5bf749 (0.22.0-rc1) NOTE: https://github.com/OpenSC/OpenSC/commit/17d8980cde7be597afc366b7e311d0d7cadcb1f4 (0.22.0-rc1) @@ -35545,16 +35554,22 @@ CVE-2021-42781 (Heap buffer overflow issues were found in Opensc before version NOTE: https://github.com/OpenSC/OpenSC/commit/cae5c71f90cc5b364efe14040923fd5aa3b5dd90 (0.22.0-rc1) CVE-2021-42780 (A use after return issue was found in Opensc before version 0.22.0 in ...) - opensc 0.22.0-1 + [bullseye] - opensc (Minor issue) + [buster] - opensc (Minor issue) NOTE: https://github.com/OpenSC/OpenSC/commit/5df913b7f57ad89b9832555d24c08d23a534311e (0.22.0-rc1) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016139 CVE-2021-42779 (A heap use after free issue was found in Opensc before version 0.22.0 ...) - opensc 0.22.0-1 + [bullseye] - opensc (Minor issue) + [buster] - opensc (Minor issue) NOTE: https://github.com/OpenSC/OpenSC/commit/1db88374bb7706a115d5c3617c6f16115c33bf27 (0.22.0-rc1) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016086 CVE-2021-42778 (A heap double free issue was found in Opensc before version 0.22.0 in ...) - opensc 0.22.0-1 + [bullseye] - opensc (Minor issue) + [buster] - opensc (Minor issue) NOTE: https://github.com/OpenSC/OpenSC/commit/f015746d22d249642c19674298a18ad824db0ed7 (0.22.0-rc1) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2016083 @@ -39363,6 +39378,8 @@ CVE-2021-41752 (Stack overflow vulnerability in Jerryscript before commit e1ce7d TODO: check - could be only a test artifact CVE-2021-41751 (Buffer overflow vulnerability in file ecma-builtin-array-prototype.c:9 ...) - iotjs + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue)
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f832a040 by Moritz Muehlenhoff at 2022-04-27T13:52:12+02:00 buster/bullseye triage new busybox issue - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -755,7 +755,7 @@ CVE-2022-29568 CVE-2022-29567 RESERVED CVE-2022-29566 (The Bulletproofs 2017/1066 paper mishandles Fiat-Shamir generation bec ...) - TODO: check + NOT-FOR-US: Bulletproofs CVE-2022-1427 (Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby ...) - mruby [bullseye] - mruby (Minor issue) @@ -2210,9 +2210,11 @@ CVE-2022-1305 [stretch] - chromium (see DSA 4562) CVE-2022-1304 (An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46. ...) - e2fsprogs + [bullseye] - e2fsprogs (Minor issue) + [buster] - e2fsprogs (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2069726 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2068113 - TODO: check when fixed + NOTE: https://lore.kernel.org/linux-ext4/20220421173148.20193-1-lczer...@redhat.com/T/#u CVE-2022-1303 RESERVED CVE-2022-1302 (In the MZ Automation LibIEC61850 in versions prior to 1.5.1 an unauthe ...) @@ -2708,6 +2710,7 @@ CVE-2022-28806 RESERVED CVE-2022-28805 (singlevar in lparser.c in Lua through 5.4.4 lacks a certain luaK_exp2a ...) - lua5.4 + [bullseye] - lua5.4 (Minor issue) NOTE: https://github.com/lua/lua/commit/1f3c6f4534c6411313361697d98d1145a1f030fa NOTE: http://lua-users.org/lists/lua-l/2022-02/msg1.html NOTE: http://lua-users.org/lists/lua-l/2022-02/msg00070.html @@ -3760,7 +3763,10 @@ CVE-2022-28393 CVE-2022-28392 RESERVED CVE-2022-28391 (BusyBox through 1.35.0 allows remote attackers to execute arbitrary co ...) - TODO: check + - busybox + [bullseye] - busybox (Minor issue) + [buster] - busybox (Minor issue) + NOTE: https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661 CVE-2022-28390 (ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kerne ...) - linux 5.17.3-1 NOTE: https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f832a04003eee506d4a3791e4088d1eab1515d61 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f832a04003eee506d4a3791e4088d1eab1515d61 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d7226b1a by Moritz Muehlenhoff at 2022-04-25T17:19:34+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -549,6 +549,8 @@ CVE-2022-1421 RESERVED CVE-2022-1420 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior ...) - vim 2:8.2.4793-1 + [bullseye] - vim (Minor issue) + [buster] - vim (Minor issue) NOTE: https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326 NOTE: https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774) CVE-2021-46784 @@ -1307,11 +1309,15 @@ CVE-2022-1356 CVE-2022-1355 RESERVED - tiff + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/400 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/323 CVE-2022-1354 RESERVED - tiff + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/319 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/87f580f39011109b3bb5f6eca13fac543a542798 CVE-2022-1353 [af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register] View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7226b1a525094a51768c6162a64d9f379da2823 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d7226b1a525094a51768c6162a64d9f379da2823 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2993daec by Moritz Muehlenhoff at 2022-04-25T13:55:42+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -519,6 +519,8 @@ CVE-2022-29566 (The Bulletproofs 2017/1066 paper mishandles Fiat-Shamir generati TODO: check CVE-2022-1427 (Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby ...) - mruby + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) NOTE: https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301 NOTE: https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b CVE-2022-29565 @@ -4742,9 +4744,10 @@ CVE-2022-28050 CVE-2022-28049 (NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference v ...) NOT-FOR-US: njs CVE-2022-28048 (STB v2.27 was discovered to contain an integer shift of invalid size i ...) - - libstb + - libstb (unimportant) NOTE: https://github.com/nothings/stb/issues/1293 NOTE: https://github.com/nothings/stb/pull/1297 + NOTE: Negligible security impact CVE-2022-28047 RESERVED CVE-2022-28046 @@ -4759,10 +4762,14 @@ CVE-2022-28043 RESERVED CVE-2022-28042 (stb_image.h v2.27 was discovered to contain an heap-based use-after-fr ...) - libstb + [bullseye] - libstb (Minor issue) + [buster] - libstb (Minor issue) NOTE: https://github.com/nothings/stb/issues/1289 NOTE: https://github.com/nothings/stb/pull/1297 CVE-2022-28041 (stb_image.h v2.27 was discovered to contain an integer overflow via th ...) - libstb + [bullseye] - libstb (Minor issue) + [buster] - libstb (Minor issue) NOTE: https://github.com/nothings/stb/issues/1292 NOTE: https://github.com/nothings/stb/pull/1297 CVE-2022-28040 @@ -6331,14 +6338,20 @@ CVE-2022-27407 RESERVED CVE-2022-27406 (FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovere ...) - freetype + [bullseye] - freetype (Minor issue) + [buster] - freetype (Minor issue) NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140 NOTE: Fixed by: https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2 (VER-2-12-0) CVE-2022-27405 (FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovere ...) - freetype + [bullseye] - freetype (Minor issue) + [buster] - freetype (Minor issue) NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139 NOTE: Fixed by: https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 (VER-2-12-0) CVE-2022-27404 (FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovere ...) - freetype + [bullseye] - freetype (Minor issue) + [buster] - freetype (Minor issue) NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138 NOTE: Fixed by: https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db (VER-2-12-0) CVE-2022-27403 = data/dsa-needed.txt = @@ -20,6 +20,8 @@ condor/oldstable -- epiphany-browser -- +ffmpeg (jmm) +-- fish/stable -- freecad (aron) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2993daecc785e23d647037197bac50fea8175b1a -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2993daecc785e23d647037197bac50fea8175b1a You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9980e90e by Moritz Muehlenhoff at 2022-04-19T11:56:57+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -34,6 +34,8 @@ CVE-2022-29459 RESERVED CVE-2022-29458 (ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmen ...) - ncurses + [bullseye] - ncurses (Minor issue) + [buster] - ncurses (Minor issue) NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00014.html NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2022-04/msg00016.html CVE-2022-29457 (Zoho ManageEngine ADSelfService Plus before 6121, ADAuditPlus 7060, Ex ...) @@ -844,9 +846,13 @@ CVE-2022-1333 (Mattermost Playbooks plugin v1.24.0 and earlier fails to properly CVE-2015-20107 (In Python (aka CPython) through 3.10.4, the mailcap module does not ad ...) - python3.10 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 + [buster] - python3.7 (Minor issue) - python3.5 - python2.7 + [bullseye] - python2.7 (Python 2.7 in Bullseye not covered by security support) + [buster] - python2.7 (Minor issue) NOTE: https://bugs.python.org/issue24778 NOTE: https://github.com/python/cpython/issues/68966 NOTE: https://github.com/python/cpython/pull/91542 @@ -38153,6 +38159,8 @@ CVE-2021-41716 (Maharashtra State Electricity Board Mahavitara Android Applicati NOT-FOR-US: Maharashtra State Electricity Board Mahavitara Android Application CVE-2021-41715 (libsixel 1.10.0 is vulnerable to Use after free in libsixel/src/dither ...) - libsixel 1.10.3-1 + [bullseye] - libsixel (Minor issue) + [buster] - libsixel (Minor issue) NOTE: https://github.com/libsixel/libsixel/commit/d299d67c532a5133a57aade5c35ff8e612c73dd8 (1.10.1) NOTE: https://github.com/libsixel/libsixel/pull/28 NOTE: https://github.com/libsixel/libsixel/issues/27 @@ -39593,6 +39601,8 @@ CVE-2021-41120 (sylius/paypal-plugin is a paypal plugin for the Sylius developme NOT-FOR-US: sylius/paypal-plugin CVE-2021-41119 (Wire-server is the system server for the wire back-end services. Relea ...) - haskell-aeson (bug #1009678) + [bullseye] - haskell-aeson (Minor issue) + [buster] - haskell-aeson (Minor issue) NOTE: https://cs-syd.eu/posts/2021-09-11-json-vulnerability NOTE: https://github.com/haskell/aeson/issues/864 NOTE: https://hackage.haskell.org/package/aeson-2.0.1.0 @@ -40746,6 +40756,8 @@ CVE-2021-40657 RESERVED CVE-2021-40656 (libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/ ...) - libsixel 1.10.3-1 + [bullseye] - libsixel (Minor issue) + [buster] - libsixel (Minor issue) NOTE: https://github.com/libsixel/libsixel/commit/dc96cdc27fb53e8595af67aaf68001033c808e42 (1.10.0) NOTE: https://github.com/libsixel/libsixel/pull/26 NOTE: https://github.com/libsixel/libsixel/issues/25 @@ -42863,9 +42875,10 @@ CVE-2021-39798 (In Bitmap_createFromParcel of Bitmap.cpp, there is a possible ar CVE-2021-39797 (In several functions of of LauncherApps.java, there is a possible esca ...) NOT-FOR-US: Android CVE-2021-39796 (In HarmfulAppWarningActivity of HarmfulAppWarningActivity.java, there ...) - - android-platform-frameworks-base (bug #1009626) + - android-platform-frameworks-base (unimportant; bug #1009626) NOTE: https://android.googlesource.com/platform/frameworks/base/+/e74a2a320bf896bc30618ce486203bafe453c469 NOTE: https://source.android.com/security/bulletin/2022-04-01 + NOTE: No security impact for Android as provided in Debian CVE-2021-39795 (In multiple locations of MediaProvider.java , there is a possible way ...) NOT-FOR-US: Android CVE-2021-39794 (In broadcastPortInfo of AdbService.java, there is a possible way for a ...) @@ -72994,6 +73007,7 @@ CVE-2021-27918 (encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an - golang-1.16 1.16.3-1 - golang-1.15 1.15.9-1 - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 [stretch] - golang-1.8 (Minor issue, DoS) - golang-1.7 @@ -101141,6 +101155,7 @@ CVE-2020-28367 (Go before 1.14.12 and 1.15.x before 1.15.5 allows Argument Injec {DLA-2460-1} - golang-1.15 1.15.5-1 - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 - golang-1.7 [stretch] - golang-1.7 (validation of cgo flags first introduced in golang-1.8 / CVE-2018-6574) @@ -101149,6 +101164,7 @@ CVE-2020-28367 (Go before 1.14.12 and 1.15.x before 1.15.5 allows Argument Injec CVE-2020-28366
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2e21f566 by Moritz Muehlenhoff at 2022-04-06T15:30:05+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1600,11 +1600,15 @@ CVE-2022-1116 CVE-2022-1115 RESERVED - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/issues/4974 NOTE: https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51 CVE-2022-1114 RESERVED - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/issues/4947 NOTE: https://github.com/ImageMagick/ImageMagick6/commit/78f03b619d08d7c2e0fcaccab407e3ac93c2ee8f CVE-2022-1113 @@ -10379,6 +10383,7 @@ CVE-2022-24804 RESERVED CVE-2022-24803 (Asciidoctor-include-ext is Asciidoctors standard include proces ...) - ruby-asciidoctor-include-ext (bug #1009035) + [bullseye] - ruby-asciidoctor-include-ext (Minor issue) NOTE: https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29 NOTE: https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155 (v0.4.0) NOTE: https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee (v0.4.0) @@ -10632,14 +10637,20 @@ CVE-2022-24717 (ssr-pages is an HTML page builder for the purpose of server-side NOT-FOR-US: ssr-pages CVE-2022-24716 (Icinga Web 2 is an open source monitoring web interface, framework and ...) - icingaweb2 2.9.6-1 + [bullseye] - icingaweb2 (Vulnerable code not present) + [buster] - icingaweb2 (Vulnerable code not present) NOTE: https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw NOTE: https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d CVE-2022-24715 (Icinga Web 2 is an open source monitoring web interface, framework and ...) - icingaweb2 2.9.6-1 + [bullseye] - icingaweb2 (Minor issue) + [buster] - icingaweb2 (Minor issue) NOTE: https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63 NOTE: https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb CVE-2022-24714 (Icinga Web 2 is an open source monitoring web interface, framework and ...) - icingaweb2 2.9.6-1 + [bullseye] - icingaweb2 (Minor issue) + [buster] - icingaweb2 (Minor issue) NOTE: https://github.com/Icinga/icingaweb2/security/advisories/GHSA-qcmg-vr56-x9wf NOTE: https://github.com/Icinga/icingaweb2/commit/6e989d05a1568a6733a3d912001251acc51d9293 CVE-2022-24713 (regex is an implementation of regular expressions for the Rust languag ...) @@ -12349,9 +12360,10 @@ CVE-2022-24193 (CasaOS before v0.2.7 was discovered to contain a command injecti CVE-2022-24192 RESERVED CVE-2022-24191 (In HTMLDOC 1.9.14, an infinite loop in the gif_read_lzw function can l ...) - - htmldoc 1.9.15-1 + - htmldoc 1.9.15-1 (unimportant) NOTE: https://github.com/michaelrsweet/htmldoc/commit/fb0334a51300988e9b83b9870d4063e86002b077 (v1.9.15) NOTE: https://github.com/michaelrsweet/htmldoc/issues/470 + NOTE: Hang in CLI tool, no security impact CVE-2022-24190 RESERVED CVE-2022-24189 @@ -55417,7 +55429,11 @@ CVE-2021-33658 (atune before 0.3-0.8 log in as a local user and run the curl com NOT-FOR-US: A-Tune OS tuning engine CVE-2021-33657 (There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple ...) - libsdl1.2 + [bullseye] - libsdl1.2 (Minor issue) + [buster] - libsdl1.2 (Minor issue) - libsdl2 2.0.20+dfsg-2 + [bullseye] - libsdl2 (Minor issue) + [buster] - libsdl2 (Minor issue) NOTE: https://github.com/libsdl-org/SDL/commit/8c91cf7dba5193f5ce12d06db1336515851c9ee9 (release-2.0.20) CVE-2021-33656 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2e21f56693fa9d0158ec05f427ab99c9bcb7f54f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2e21f56693fa9d0158ec05f427ab99c9bcb7f54f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cd09e673 by Moritz Muehlenhoff at 2022-04-04T18:18:49+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -531,6 +531,8 @@ CVE-2022-28353 RESERVED CVE-2022-1210 (A vulnerability classified as problematic was found in LibTIFF 4.3.0. ...) - tiff + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/402 CVE-2021-46782 RESERVED @@ -14471,6 +14473,8 @@ CVE-2022-23608 (PJSIP is a free and open source multimedia communication library CVE-2022-23607 (treq is an HTTP library inspired by requests but written on top of Twi ...) {DLA-2954-1} - python-treq (bug #1005041) + [bullseye] - python-treq (Minor issue) + [buster] - python-treq (Minor issue) NOTE: https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc NOTE: https://github.com/twisted/treq/commit/1da6022cc880bbcff59321abe02bf8498b89efb2 (release-22.1.0) CVE-2022-23606 (Envoy is an open source edge and service proxy, designed for cloud-nat ...) = data/dsa-needed.txt = @@ -32,11 +32,15 @@ ndpi/oldstable -- nodejs (jmm) -- +puma +-- python-pysaml2 (jmm) -- rpki-client/stable new 7.6 release required libretls, which isn't in Bullseye -- +salt +-- sox -- trafficserver (jmm) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cd09e673a7b367bc82a13297a8a648b4c583c285 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cd09e673a7b367bc82a13297a8a648b4c583c285 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ced45790 by Moritz Muehlenhoff at 2022-04-03T22:19:50+02:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -4053,6 +4053,8 @@ CVE-2022-26884 CVE-2022-0934 RESERVED - dnsmasq + [bullseye] - dnsmasq (Minor issue) + [buster] - dnsmasq (Minor issue) NOTE: https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016272.html CVE-2022-0933 RESERVED @@ -5560,11 +5562,11 @@ CVE-2022-0815 (Improper access control vulnerability in McAfee WebAdvisor Chrome CVE-2022-0814 RESERVED CVE-2022-0813 (PhpMyAdmin 5.1.1 and before allows an attacker to retrieve potentially ...) - - phpmyadmin 4:5.1.3+dfsg1-1 - [stretch] - phpmyadmin (Minor issue) + - phpmyadmin 4:5.1.3+dfsg1-1 (unimportant) NOTE: https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/ NOTE: https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information NOTE: Fixed by: https://github.com/phpmyadmin/phpmyadmin/commit/c04f85f2bb96c442086d9ad057953567cc794486 + NOTE: Negligible security impact CVE-2022-0811 (A flaw was found in CRI-O in the way it set kernel options for a pod. ...) NOT-FOR-US: cri-o CVE-2022-26333 @@ -8212,18 +8214,24 @@ CVE-2022-25311 (A vulnerability has been identified in SINEC NMS (All versions). CVE-2022-25310 RESERVED - fribidi (bug #1008793) + [bullseye] - fribidi (Minor issue) + [buster] - fribidi (Minor issue) NOTE: https://github.com/fribidi/fribidi/issues/183 NOTE: https://github.com/fribidi/fribidi/pull/186 NOTE: https://github.com/fribidi/fribidi/commit/175850b03e1af251d705c1d04b2b9b3c1c06e48f CVE-2022-25309 RESERVED - fribidi (bug #1008793) + [bullseye] - fribidi (Minor issue) + [buster] - fribidi (Minor issue) NOTE: https://github.com/fribidi/fribidi/issues/182 NOTE: https://github.com/fribidi/fribidi/pull/185 NOTE: https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3 CVE-2022-25308 RESERVED - fribidi (bug #1008793) + [bullseye] - fribidi (Minor issue) + [buster] - fribidi (Minor issue) NOTE: https://github.com/fribidi/fribidi/issues/181 NOTE: https://github.com/fribidi/fribidi/pull/184 NOTE: https://github.com/fribidi/fribidi/commit/ad3a19e6372b1e667128ed1ea2f49919884587e1 @@ -8399,6 +8407,7 @@ CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on [buster] - qtbase-opensource-src (Breaks existing behaviour and upstream also skipped from 5.12 branch) [stretch] - qtbase-opensource-src (Vulnerable code introduced later) - qtbase-opensource-src-gles + [buster] - qtbase-opensource-src-gles (Breaks existing behaviour and upstream also skipped from 5.12 branch) NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/393113 NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/394914 NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/396020 @@ -10353,8 +10362,8 @@ CVE-2022-24616 RESERVED CVE-2022-24615 (zip4j up to 2.9.0 can throw various uncaught exceptions while parsing ...) - zip4j + [bullseye] - zip4j (Minor issue) NOTE: https://github.com/srikanth-lingala/zip4j/issues/377 - TODO: check details CVE-2022-24614 (When reading a specially crafted JPEG file, metadata-extractor up to 2 ...) - libmetadata-extractor-java [bullseye] - libmetadata-extractor-java (Minor issue) @@ -26609,6 +26618,7 @@ CVE-2021-43810 (Admidio is a free open source user management system for website NOT-FOR-US: Admidio CVE-2021-43809 (`Bundler` is a package for managing application dependencies in Ruby. ...) - rubygems 3.3.5-1 + [bullseye] - rubygems (Minor issue) NOTE: https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43 NOTE: https://github.com/rubygems/rubygems/commit/90b1ed8b9f8b636aa8c913f7b5a764a2e03d179c (v3.3.0) NOTE: https://github.com/rubygems/rubygems/pull/5142 @@ -27692,6 +27702,7 @@ CVE-2021-43726 RESERVED CVE-2021-43725 (There is a Cross Site Scripting (XSS) vulnerability in SpotPage_login. ...) - spotweb + [buster] - spotweb (Minor issue) NOTE: https://github.com/spotweb/spotweb/commit/2bfa001689aae96009688a193c64478647ba45a1 NOTE: https://github.com/spotweb/spotweb/issues/718 CVE-2021-43724 (A Cross Site Scripting (XSS) vulnerability exits in Subrion CMS throug ...) @@ -52582,6 +52593,7 @@ CVE-2021-34558 (The crypto/tls package of Go
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0b9e2c60 by Moritz Muehlenhoff at 2022-03-31T23:55:12+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -286,6 +286,8 @@ CVE-2022-1173 RESERVED CVE-2022-1172 (Null Pointer Dereference Caused Segmentation Fault in GitHub repositor ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264/ NOTE: https://github.com/gpac/gpac/issues/2153 NOTE: https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8 @@ -652,6 +654,8 @@ CVE-2022-25348 (Untrusted search path vulnerability in AttacheCase ver.4.0.2.7 a NOT-FOR-US: AttacheCase CVE-2022-1122 (A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in ...) - openjpeg2 + [bullseye] - openjpeg2 (Minor issue) + [buster] - openjpeg2 (Minor issue) NOTE: https://github.com/uclouvain/openjpeg/issues/1368 NOTE: https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d CVE-2022-1121 @@ -1840,6 +1844,8 @@ CVE-2022-1051 RESERVED CVE-2022-1050 (Guest driver might execute HW commands when shared buffers are not yet ...) - qemu + [bullseye] - qemu (Minor issue) + [buster] - qemu (Minor issue) [stretch] - qemu (rdma devices introduced in v2.12) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2022-03/msg05197.html CVE-2022-1049 (A flaw was found in the Pacemaker configuration tool (pcs). The pcs da ...) @@ -5362,6 +5368,8 @@ CVE-2022-26292 RESERVED CVE-2022-26291 (lrzip v0.641 was discovered to contain a multiple concurrency use-afte ...) - lrzip 0.650-1 + [bullseye] - lrzip (Minor issue) + [buster] - lrzip (Minor issue) [stretch] - lrzip (Minor issue, use-after-free with no known impact) NOTE: https://github.com/ckolivas/lrzip/issues/206 NOTE: https://github.com/ckolivas/lrzip/commit/4b3942103b57c639c8e0f31d6d5fd7bac53bbdf4 (v0.650) @@ -5387,6 +5395,7 @@ CVE-2022-26281 RESERVED CVE-2022-26280 (Libarchive v3.6.0 was discovered to contain an out-of-bounds read via ...) - libarchive + [bullseye] - libarchive (Minor issue) [buster] - libarchive (Vulnerable code not present) [stretch] - libarchive (Vulnerable code not present) NOTE: https://github.com/libarchive/libarchive/issues/1672 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b9e2c60f9c1717df2d3a30942b094ff4cc97fd7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b9e2c60f9c1717df2d3a30942b094ff4cc97fd7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f1743a9b by Moritz Muehlenhoff at 2022-03-28T17:30:31+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -5315,6 +5315,8 @@ CVE-2022-0760 (The Simple Link Directory WordPress plugin before 7.7.2 does not NOT-FOR-US: WordPress plugin CVE-2022-0759 (A flaw was found in all versions of kubeclient up to (but not includin ...) - ruby-kubeclient + [bullseye] - ruby-kubeclient (Minor issue) + [buster] - ruby-kubeclient (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2058404 NOTE: https://github.com/ManageIQ/kubeclient/issues/554 NOTE: https://github.com/ManageIQ/kubeclient/pull/556 @@ -15428,12 +15430,11 @@ CVE-2022-0176 (The PowerPack Lite for Beaver Builder WordPress plugin before 1.2 NOT-FOR-US: WordPress plugin CVE-2022-0175 [memory initialization issue in vrend_resource_alloc_buffer() can lead to info leak] RESERVED - - virglrenderer + - virglrenderer (Introduced in 0.9.0 with refactor) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2039003 NOTE: https://gitlab.freedesktop.org/virgl/virglrenderer/-/merge_requests/654 NOTE: Code refactored in https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/7899e057327848300b18d8f03aa3789e00ed0221 (0.9.0) NOTE: Fixed by: https://gitlab.freedesktop.org/virgl/virglrenderer/-/commit/b05bb61f454eeb8a85164c8a31510aeb9d79129c - TODO: check if issue is present before refactoring in 0.9.0 CVE-2022-0174 (dolibarr is vulnerable to Business Logic Errors ...) - dolibarr CVE-2022-0173 (radare2 is vulnerable to Out-of-bounds Read ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1743a9be596b84ad45253dbb0c1cf92aae6e07c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1743a9be596b84ad45253dbb0c1cf92aae6e07c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 25783288 by Moritz Muehlenhoff at 2022-03-28T16:16:35+02:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3159,6 +3159,8 @@ CVE-2021-46708 (The swagger-ui-dist package before 4.1.3 for Node.js could allow - swagger-ui (bug #895422) CVE-2020-36518 (jackson-databind before 2.13.0 allows a Java StackOverflow exception a ...) - jackson-databind (bug #1007109) + [bullseye] - jackson-databind (Minor issue) + [buster] - jackson-databind (Minor issue) NOTE: https://github.com/FasterXML/jackson-databind/issues/2816 CVE-2018-25031 (Swagger UI before 4.1.3 could allow a remote attacker to conduct spoof ...) - node-swagger-ui (bug #871461) @@ -67725,20 +67727,23 @@ CVE-2021-28280 (CSRF + Cross-site scripting (XSS) vulnerability in search.php in CVE-2021-28279 RESERVED CVE-2021-28278 (A Heap-based Buffer Overflow vulnerability exists in jhead 3.04 and 3. ...) - - jhead 1:3.06.0.1-2 + - jhead 1:3.06.0.1-2 (unimportant) NOTE: https://github.com/Matthias-Wandel/jhead/commit/a50953a266583981b51a181c2fce73dad2ac5d7d (3.06.0.1) NOTE: https://github.com/Matthias-Wandel/jhead/issues/15 + NOTE: Crash in CLI tool, no security impact CVE-2021-28277 (A Heap-based Buffer Overflow vulnerabilty exists in jhead 3.04 and 3.0 ...) - - jhead 1:3.06.0.1-2 + - jhead 1:3.06.0.1-2 (unimportant) NOTE: https://github.com/Matthias-Wandel/jhead/commit/b8d78e5ec982e86cdd70ebfc1ebbb2273c982eea (3.06.0.1) NOTE: https://github.com/Matthias-Wandel/jhead/issues/16 + NOTE: Crash in CLI tool, no security impact CVE-2021-28276 (A Denial of Service vulnerability exists in jhead 3.04 and 3.05 via a ...) TODO: check CVE reference, probably invalid report or old version. NOTE: https://github.com/Matthias-Wandel/jhead/issues/26 CVE-2021-28275 (A Denial of Service vulnerability exists in jhead 3.04 and 3.05 due to ...) - - jhead 1:3.06.0.1-2 + - jhead 1:3.06.0.1-2 (unimportant) NOTE: https://github.com/Matthias-Wandel/jhead/commit/a50953a266583981b51a181c2fce73dad2ac5d7d (3.06.0.1) NOTE: https://github.com/Matthias-Wandel/jhead/issues/17 + NOTE: Crash in CLI tool, no security impact CVE-2021-28274 RESERVED CVE-2021-28273 @@ -79818,13 +79823,14 @@ CVE-2021-23336 (The package python/cpython from 0 and before 3.6.13, from 3.7.0 - python-django 2:2.2.19-1 (bug #983090) [buster] - python-django (Minor issue; can be fixed via point release) - python3.9 3.9.2-1 + [buster] - python3.9 (Will break existing applications, don't backport to released suites) - python3.8 - python3.7 - [buster] - python3.7 (Minor issue) + [buster] - python3.7 (Will break existing applications, don't backport to released suites) - python3.5 - python2.7 [bullseye] - python2.7 (Python 2.7 in Bullseye not covered by security support) - [buster] - python2.7 (Minor issue) + [buster] - python2.7 (Will break existing applications, don't backport to released suites) - pypy3 7.3.3+dfsg-3 [buster] - pypy3 (Minor issue) NOTE: https://github.com/python/cpython/pull/24297 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/257832880b1dae25b2c24adea9ae1c728cb8a9c2 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/257832880b1dae25b2c24adea9ae1c728cb8a9c2 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: eed55818 by Moritz Muehlenhoff at 2022-03-27T10:50:02+02:00 buster/bullseye triage one lemonldap-ng issue n/a for stretch - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -773,6 +773,8 @@ CVE-2022-1050 RESERVED CVE-2022-1049 (A flaw was found in the Pacemaker configuration tool (pcs). The pcs da ...) - pcs + [bullseye] - pcs (Minor issue) + [buster] - pcs (Minor issue) NOTE: https://huntr.dev/bounties/7aa921fc-a568-4fd8-96f4-7cd826246aa5 NOTE: https://github.com/ClusterLabs/pcs/commit/fb860005117dc9e092649687dfa1304fb423efc5 CVE-2022-1048 [race condition in snd_pcm_hw_free leading to use-after-free] @@ -2995,6 +2997,8 @@ CVE-2022-0898 RESERVED CVE-2022-0897 (A flaw was found in the libvirt nwfilter driver. The virNWFilterObjLis ...) - libvirt + [bullseye] - libvirt (Minor issue) + [buster] - libvirt (Minor issue) NOTE: https://gitlab.com/libvirt/libvirt/-/commit/a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36 CVE-2022-0896 (Improper Neutralization of Special Elements Used in a Template Engine ...) NOT-FOR-US: microweber @@ -35592,7 +35596,7 @@ CVE-2021-40874 [RESTServer pwdConfirm always returns true with Combination + Ker - lemonldap-ng 2.0.14+ds-1 (bug #1005302) [bullseye] - lemonldap-ng 2.0.11+ds-4+deb11u1 [buster] - lemonldap-ng 2.0.2+ds-7+deb10u7 - [stretch] - lemonldap-ng (Minor issue) + [stretch] - lemonldap-ng (Vulnerable code introduced in 2.0) NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612 NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/66946e8f754812b375768c2124937137c856fe0c CVE-2021-40873 (An issue was discovered in Softing Industrial Automation OPC UA C++ SD ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eed55818c5c182b1943d2cf5c8a1a6b97e4c508a -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eed55818c5c182b1943d2cf5c8a1a6b97e4c508a You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 05194bf6 by Moritz Muehlenhoff at 2022-03-24T15:37:04+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3722,10 +3722,13 @@ CVE-2022-26355 (Citrix Federated Authentication Service (FAS) 7.17 - 10.6 causes NOT-FOR-US: Citrix CVE-2022-26354 (A flaw was found in the vhost-vsock device of QEMU. In case of error, ...) - qemu + [bullseye] - qemu (Minor issue) + [buster] - qemu (Vulnerable code not present) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2063257 NOTE: https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf CVE-2022-26353 (A flaw was found in the virtio-net device of QEMU. This flaw was inadv ...) - qemu + [bullseye] - qemu (Minor issue) [buster] - qemu (Original upstream fix for CVE-2021-3748 not applied) [stretch] - qemu (Original upstream fix for CVE-2021-3748 not applied) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2063197 @@ -5998,8 +6001,9 @@ CVE-2022-25486 (CuppaCMS v1.0 was discovered to contain a local file inclusion v CVE-2022-25485 (CuppaCMS v1.0 was discovered to contain a local file inclusion via the ...) NOT-FOR-US: CuppaCMS CVE-2022-25484 (tcpprep v4.4.1 has a reachable assertion (assert(l2len 0)) in pac ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/715 + NOTE: Crash in CLI tool, no security impact CVE-2022-25483 RESERVED CVE-2022-25482 @@ -13538,6 +13542,7 @@ CVE-2022-0236 (The WP Import Export WordPress plugin (both free and premium vers CVE-2022-0235 (node-fetch is vulnerable to Exposure of Sensitive Information to an Un ...) - node-fetch 2.6.1-7 [bullseye] - node-fetch (Minor issue) + [buster] - node-fetch (Minor issue) NOTE: https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/ NOTE: Fixed by: https://github.com/node-fetch/node-fetch/commit/f5d3cf5e2579cb8f4c76c291871e69696aef8f80 (v3.1.1) CVE-2022-0234 (The WOOCS WordPress plugin before 1.3.7.5 does not sanitise and escape ...) @@ -17105,6 +17110,8 @@ CVE-2021-45959 CVE-2021-45958 (UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow ...) {DLA-2929-1} - ujson (bug #1005140) + [bullseye] - ujson (Minor issue) + [buster] - ujson (Minor issue) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 NOTE: https://github.com/ultrajson/ultrajson/issues/501 NOTE: https://github.com/ultrajson/ultrajson/issues/502 @@ -33623,27 +33630,28 @@ CVE-2021-41500 (Incomplete string comparison vulnerability exits in cvxopt.org c NOTE: https://github.com/cvxopt/cvxopt/issues/193 CVE-2021-41499 (Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo ...) - python-pyo 1.0.4-1 + [bullseye] - python-pyo (Minor issue) + [buster] - python-pyo (Minor issue) [stretch] - python-pyo (Minor issue) NOTE: https://github.com/belangeo/pyo/issues/222 NOTE: https://github.com/belangeo/pyo/commit/e7e6d2880469b523e4c41f0da2087a6a3eec4a45 (1.0.4) CVE-2021-41498 (Buffer overflow in ajaxsoundstudio.com Pyo lt and 1.03 in the Ser ...) - python-pyo 1.0.4-1 + [bullseye] - python-pyo (Minor issue) + [buster] - python-pyo (Minor issue) [stretch] - python-pyo (Minor issue) NOTE: https://github.com/belangeo/pyo/issues/221 NOTE: https://github.com/belangeo/pyo/commit/017702c73332a8560c8554a36250a6da587a2418 (1.0.4) CVE-2021-41497 (Null pointer reference in CMS_Conservative_increment_obj in RaRe-Techn ...) NOT-FOR-US: RaRe-Technologies bounter CVE-2021-41496 (** DISPUTED ** Buffer overflow in the array_from_pyobj function of for ...) - - numpy - [bullseye] - numpy (Minor issue) + - numpy (unimportant) NOTE: https://github.com/numpy/numpy/issues/19000 NOTE: https://github.com/numpy/numpy/pull/20630 NOTE: https://github.com/numpy/numpy/commit/271010f1037150e95017f803f4214b8861e528f2 CVE-2021-41495 (** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy. ...) - - numpy - [bullseye] - numpy (Minor issue) + - numpy (unimportant) NOTE: https://github.com/numpy/numpy/issues/19038 - TODO: check for classification/severity CVE-2021-41494 RESERVED CVE-2021-41493 @@ -34362,6 +34370,7 @@ CVE-2021-41185 (Mycodo is an environmental monitoring and regulation system. An CVE-2021-41184 (jQuery-UI is the official jQuery user interface library. Prior to vers ...) - jqueryui 1.13.0+dfsg-1 [bullseye] - jqueryui
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e6100af0 by Moritz Muehlenhoff at 2022-03-23T14:58:16+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -943,6 +943,7 @@ CVE-2022-1020 CVE-2022-27240 (scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a buffer ...) - glewlwyd 2.6.1-2 [bullseye] - glewlwyd (Minor issue) + [buster] - glewlwyd (Minor issue) NOTE: https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a (v2.6.2) CVE-2022-27239 RESERVED @@ -4084,18 +4085,28 @@ CVE-2020-36516 (An issue was discovered in the Linux kernel through 5.16.11. The NOTE: https://dl.acm.org/doi/10.1145/3372297.3417884 CVE-2022-26129 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...) - frr (bug #1008010) + [bullseye] - frr (Minor issue) + [buster] - frr (Minor issue) NOTE: https://github.com/FRRouting/frr/issues/10503 CVE-2022-26128 (A buffer overflow vulnerability exists in FRRouting through 8.1.0 due ...) - frr (bug #1008010) + [bullseye] - frr (Minor issue) + [buster] - frr (Minor issue) NOTE: https://github.com/FRRouting/frr/issues/10502 CVE-2022-26127 (A buffer overflow vulnerability exists in FRRouting through 8.1.0 due ...) - frr (bug #1008010) + [bullseye] - frr (Minor issue) + [buster] - frr (Minor issue) NOTE: https://github.com/FRRouting/frr/issues/10487 CVE-2022-26126 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...) - frr (bug #1008010) + [bullseye] - frr (Minor issue) + [buster] - frr (Minor issue) NOTE: https://github.com/FRRouting/frr/issues/10505 CVE-2022-26125 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...) - frr (bug #1008010) + [bullseye] - frr (Minor issue) + [buster] - frr (Minor issue) NOTE: https://github.com/FRRouting/frr/issues/10507 CVE-2022-26122 RESERVED @@ -6505,8 +6516,10 @@ CVE-2021-4220 CVE-2021-4219 RESERVED - imagemagick + [bullseye] - imagemagick (Minor issue) + [buster] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/issues/4626 - TODO: check details + NOTE: https://github.com/ImageMagick/ImageMagick6/commit/c10351c16b8d2cabd11d2627a02de522570f6ceb CVE-2022-25212 (A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plu ...) NOT-FOR-US: Jenkins plugin CVE-2022-25211 (A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier a ...) @@ -7611,14 +7624,20 @@ CVE-2022-24774 (CycloneDX BOM Repository Server is a bill of materials (BOM) rep TODO: check CVE-2022-24773 (Forge (also called `node-forge`) is a native implementation of Transpo ...) - node-node-forge + [bullseye] - node-node-forge (Minor issue) + [buster] - node-node-forge (Minor issue) NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0) CVE-2022-24772 (Forge (also called `node-forge`) is a native implementation of Transpo ...) - node-node-forge + [bullseye] - node-node-forge (Minor issue) + [buster] - node-node-forge (Minor issue) NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0) CVE-2022-24771 (Forge (also called `node-forge`) is a native implementation of Transpo ...) - node-node-forge + [bullseye] - node-node-forge (Minor issue) + [buster] - node-node-forge (Minor issue) NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765 NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0) CVE-2022-24770 (`gradio` is an open source framework for building interactive machine ...) @@ -7631,6 +7650,8 @@ CVE-2022-24767 RESERVED CVE-2022-24766 (mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mi ...) - mitmproxy + [bullseye] - mitmproxy (Minor issue) + [buster] - mitmproxy (Minor issue) NOTE: https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3 NOTE: https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b (v8.0.0) CVE-2022-24765 @@ -19956,24 +19977,28 @@ CVE-2021-45089 (Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Acc CVE-2021-45088 (XSS can occur in GNOME Web (aka
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1898dd4b by Moritz Muehlenhoff at 2022-03-21T15:52:46+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6029,11 +6029,13 @@ CVE-2022-25052 RESERVED CVE-2022-25051 (An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when deco ...) - rtl-433 (bug #1008000) + [bullseye] - rtl-433 (Minor issue) NOTE: https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8 NOTE: https://github.com/merbanan/rtl_433/issues/1960 NOTE: https://huntr.dev/bounties/78eee103-bd61-4b4f-b054-04ad996b39e7/ CVE-2022-25050 (rtl_433 21.12 was discovered to contain a stack overflow in the functi ...) - rtl-433 (bug #1008000) + [bullseye] - rtl-433 (Minor issue) NOTE: https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8 NOTE: https://github.com/merbanan/rtl_433/issues/1960 NOTE: https://huntr.dev/bounties/6c9cd35f-a206-4fdf-b6d1-fcd50926c2d9/ @@ -7053,6 +7055,8 @@ CVE-2022-24669 RESERVED CVE-2022-0547 (OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass ...) - openvpn 2.5.6-1 (bug #1008015) + [bullseye] - openvpn (Minor issue) + [buster] - openvpn (Minor issue) NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2022-0547 NOTE: https://github.com/OpenVPN/openvpn/commit/58ec3bb4aac77131118dbbc39a65181e7847adee (v2.4.12) NOTE: https://github.com/OpenVPN/openvpn/commit/af3e382649d96ae77cc5e42be8270f355e5cfec5 (v2.5.6) @@ -9573,6 +9577,8 @@ CVE-2022-23944 (User can access /plugin api without authentication. This issue a NOT-FOR-US: Apache ShenYu Admin CVE-2022-23943 (Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server all ...) - apache2 2.4.53-1 + [bullseye] - apache2 (Minor issue) + [buster] - apache2 (Minor issue) NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943 NOTE: Fixed by: https://svn.apache.org/r1898695 NOTE: Fixed by: https://svn.apache.org/r1898772 @@ -11261,6 +11267,8 @@ CVE-2022-23438 RESERVED CVE-2022-23437 (There's a vulnerability within the Apache Xerces Java (XercesJ) XML pa ...) - libxerces2-java + [bullseye] - libxerces2-java (revisit when/if fix is complete) + [buster] - libxerces2-java (revisit when/if fix is complete) [stretch] - libxerces2-java (revisit when/if fix is complete) NOTE: https://www.openwall.com/lists/oss-security/2022/01/24/3 CVE-2022-0311 (Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.46 ...) @@ -14191,14 +14199,20 @@ CVE-2022-22722 (A CWE-798: Use of Hard-coded Credentials vulnerability exists th NOT-FOR-US: Schneider Electric CVE-2022-22721 (If LimitXMLRequestBody is set to allow request bodies larger than 350M ...) - apache2 2.4.53-1 + [bullseye] - apache2 (Minor issue) + [buster] - apache2 (Minor issue) NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721 NOTE: Fixed by: https://svn.apache.org/r1898693 CVE-2022-22720 (Apache HTTP Server 2.4.52 and earlier fails to close inbound connectio ...) - apache2 2.4.53-1 + [bullseye] - apache2 (Minor issue) + [buster] - apache2 (Minor issue) NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720 NOTE: Fixed by: https://svn.apache.org/r1898692 CVE-2022-22719 (A carefully crafted request body can cause a read to a random memory a ...) - apache2 2.4.53-1 + [bullseye] - apache2 (Minor issue) + [buster] - apache2 (Minor issue) NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719 NOTE: Fixed by: https://svn.apache.org/r1898694 CVE-2022-22718 (Windows Print Spooler Elevation of Privilege Vulnerability. This CVE I ...) @@ -19627,7 +19641,6 @@ CVE-2021-44964 (Use after free in garbage collector and finalizer of lgc.c in Lu NOTE: http://lua-users.org/lists/lua-l/2021-12/msg00015.html NOTE: http://lua-users.org/lists/lua-l/2021-12/msg00030.html NOTE: https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability - TODO: check possible fix and other versions of lua CVE-2021-44963 RESERVED CVE-2021-44962 (An out-of-bounds read vulnerability exists in the GCode::extrude() fun ...) @@ -21029,6 +21042,7 @@ CVE-2021-44538 (The olm_session_describe function in Matrix libolm before 3.2.7 NOTE: Fixed by: https://gitlab.matrix.org/matrix-org/olm/-/commit/c23ce70fc66c26db5839ddb5a3b46d4c3d3abed6 (3.2.8) CVE-2021-44537 (ownCloud owncloud/client
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0980c6ec by Moritz Muehlenhoff at 2022-03-16T09:50:28+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -694,6 +694,8 @@ CVE-2022-0943 (Heap-based Buffer Overflow occurs in vim in GitHub repository vim NOTE: https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563) CVE-2022-26981 (Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in ...) - liblouis + [bullseye] - liblouis (Minor issue) + [buster] - liblouis (Minor issue) NOTE: https://github.com/liblouis/liblouis/issues/1171 CVE-2022-26980 RESERVED @@ -1831,6 +1833,8 @@ CVE-2022-26506 RESERVED CVE-2022-26505 (A DNS rebinding issue in ReadyMedia (formerly MiniDLNA) before 1.3.1 a ...) - minidlna (bug #1006798) + [bullseye] - minidlna (Minor issue) + [buster] - minidlna (Minor issue) NOTE: https://sourceforge.net/p/minidlna/git/ci/c21208508dbc131712281ec5340687e5ae89e940/ NOTE: https://www.openwall.com/lists/oss-security/2022/03/03/1 CVE-2022-26504 @@ -6542,6 +6546,8 @@ CVE-2022-24757 RESERVED CVE-2022-24756 (Bareos is open source software for backup, archiving, and recovery of ...) - bareos + [buster] - bareos (PAM support not yet present) + [stretch] - bareos (PAM support not yet present) NOTE: https://github.com/bareos/bareos/security/advisories/GHSA-jh55-4wgw-xc9j NOTE: https://github.com/bareos/bareos/pull/1115 NOTE: https://github.com/bareos/bareos/pull/1119 @@ -6549,6 +6555,8 @@ CVE-2022-24756 (Bareos is open source software for backup, archiving, and recove NOTE: https://huntr.dev/bounties/480121f2-bc3c-427e-986e-5acffb1606c5/ CVE-2022-24755 (Bareos is open source software for backup, archiving, and recovery of ...) - bareos + [buster] - bareos (PAM support not yet present) + [stretch] - bareos (PAM support not yet present) NOTE: https://github.com/bareos/bareos/security/advisories/GHSA-4979-8ffj-4q26 NOTE: https://github.com/bareos/bareos/pull/1115 NOTE: https://github.com/bareos/bareos/pull/1119 @@ -6593,6 +6601,8 @@ CVE-2022-24738 (Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Ne NOT-FOR-US: Evmos CVE-2022-24737 (HTTPie is a command-line HTTP client. HTTPie has the practical concept ...) - httpie + [bullseye] - httpie (Minor issue) + [buster] - httpie (Minor issue) NOTE: https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq NOTE: Fixed by: https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b (3.1.0) CVE-2022-24736 @@ -8180,6 +8190,8 @@ CVE-2022-0431 RESERVED CVE-2022-0430 (Exposure of Sensitive Information to an Unauthorized Actor in GitHub r ...) - httpie + [bullseye] - httpie (Minor issue) + [buster] - httpie (Minor issue) NOTE: https://huntr.dev/bounties/dafb2e4f-c6b6-4768-8ef5-b396cd6a801f NOTE: Fixed by: https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b (3.1.0) CVE-2022-0429 (The WP Cerber Security, Anti-spam Malware Scan WordPress plugin ...) @@ -44782,7 +44794,7 @@ CVE-2021-36370 (An issue was discovered in Midnight Commander through 4.8.26. Wh CVE-2021-36369 RESERVED CVE-2021-36368 (** DISPUTED ** An issue was discovered in OpenSSH before 8.9. If a cli ...) - - openssh 1:8.9p1-1 + - openssh 1:8.9p1-1 (unimportant) NOTE: https://bugzilla.mindrot.org/show_bug.cgi?id=3316 NOTE: https://docs.ssh-mitm.at/trivialauth.html CVE-2021-36367 (PuTTY through 0.75 proceeds with establishing an SSH session even if i ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0980c6ec2cdc73108891cda6ad02e303d35615e3 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0980c6ec2cdc73108891cda6ad02e303d35615e3 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2205981b by Moritz Muehlenhoff at 2022-03-14T12:04:15+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3409,7 +3409,7 @@ CVE-2022-0742 [ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report [bullseye] - linux (Vulnerable code not present) [buster] - linux (Vulnerable code not present) [stretch] - linux (Vulnerable code not present) - NOTE: https://git.kernel/org/linus/2d3916f3189172d5c69d33065c3c21119fe539fc (5.17-rc7) + NOTE: https://git.kernel.org/linus/2d3916f3189172d5c69d33065c3c21119fe539fc (5.17-rc7) CVE-2022-0741 RESERVED [experimental] - gitlab 14.6.5+ds1-1 @@ -7713,23 +7713,27 @@ CVE-2022-0436 CVE-2021-46669 (MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_ ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-25638 CVE-2021-46668 (MariaDB through 10.5.9 allows an application crash via certain long SE ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-25787 NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 10.2.43 CVE-2021-46667 (MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an ...) - mariadb-10.6 1:10.6.5-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-26350 NOTE: Fixed in MariaDB: 10.2.41, 10.3.32, 10.4.22, 10.5.13, 10.6.5 CVE-2021-4 (MariaDB before 10.6.2 allows an application crash because of mishandli ...) - mariadb-10.6 (Fixed before initial upload to Debian) - mariadb-10.5 1:10.5.11-1 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 [buster] - mariadb-10.3 1:10.3.31-0+deb10u1 NOTE: https://jira.mariadb.org/browse/MDEV-25635 @@ -7737,24 +7741,28 @@ CVE-2021-4 (MariaDB before 10.6.2 allows an application crash because of mis CVE-2021-46665 (MariaDB through 10.5.9 allows a sql_parse.cc application crash because ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-25636 NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 10.2.43 CVE-2021-46664 (MariaDB through 10.5.9 allows an application crash in sub_select_postj ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-25761 NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 10.2.43 CVE-2021-46663 (MariaDB through 10.5.13 allows a ha_maria::extra application crash via ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-26351 NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 10.2.43 CVE-2021-46662 (MariaDB through 10.5.9 allows a set_var.cc application crash via certa ...) - mariadb-10.6 1:10.6.5-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-25637 NOTE: https://jira.mariadb.org/browse/MDEV-22464 @@ -7762,6 +7770,7 @@ CVE-2021-46662 (MariaDB through 10.5.9 allows a set_var.cc application crash via CVE-2021-46661 (MariaDB through 10.5.9 allows an application crash in find_field_in_ta ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in next point release) - mariadb-10.3 NOTE: https://jira.mariadb.org/browse/MDEV-25766 NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 10.2.43 @@ -8164,12 +8173,14 @@ CVE-2021-46660 (Signiant Manager+Agents before 15.1 allows XML External Entity ( CVE-2021-46659 (MariaDB before 10.7.2 allows an application crash because it does not ...) - mariadb-10.6 1:10.6.7-1 - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed in
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 26b4faa3 by Moritz Muehlenhoff at 2022-03-04T21:15:22+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -4792,10 +4792,11 @@ CVE-2022-0531 CVE-2022-0530 (A flaw was found in Unzip. The vulnerability occurs during the convers ...) - unzip NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2051395 - NOTE: Crash in CLI tool, no security impact + NOTE: No details available yet CVE-2022-0529 (A flaw was found in Unzip. The vulnerability occurs during the convers ...) - unzip NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2051402 + NOTE: No details available yet CVE-2021-46681 RESERVED CVE-2021-46680 @@ -4961,9 +4962,13 @@ CVE-2022-24615 (zip4j up to 2.9.0 can throw various uncaught exceptions while pa TODO: check details CVE-2022-24614 (When reading a specially crafted JPEG file, metadata-extractor up to 2 ...) - libmetadata-extractor-java + [bullseye] - libmetadata-extractor-java (Minor issue) + [buster] - libmetadata-extractor-java (Minor issue) NOTE: https://github.com/drewnoakes/metadata-extractor/issues/561 CVE-2022-24613 (metadata-extractor up to 2.16.0 can throw various uncaught exceptions ...) - libmetadata-extractor-java + [bullseye] - libmetadata-extractor-java (Minor issue) + [buster] - libmetadata-extractor-java (Minor issue) NOTE: https://github.com/drewnoakes/metadata-extractor/issues/561 CVE-2022-24612 (An authenticated user can upload an XML file containing an XSS via the ...) NOT-FOR-US: EyesOfNetwork (EON) eonweb @@ -15477,6 +15482,8 @@ CVE-2021-45430 RESERVED CVE-2021-45429 (A Buffer Overflow vulnerablity exists in VirusTotal YARA git commit: 6 ...) - yara + [bullseye] - yara (Minor issue) + [buster] - yara (Minor issue) [stretch] - yara (Minor issue) NOTE: https://github.com/VirusTotal/yara/issues/1616 NOTE: https://github.com/VirusTotal/yara/commit/a36b497926b141624ea673111a101e9ddd7ac2eb (v4.2.0-rc1) @@ -15659,6 +15666,8 @@ CVE-2021-45347 (An Incorrect Access Control vulnerability exists in zzcms 8.2, w NOT-FOR-US: zzcms CVE-2021-45346 (A Memory Leak vulnerabilty exists in SQLite Project SQLite3 3.35.1 and ...) - sqlite3 (bug #1005974) + [bullseye] - sqlite3 (Minor issue) + [buster] - sqlite3 (Minor issue) NOTE: https://github.com/guyinatuxedo/sqlite3_record_leaking NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2054793 CVE-2021-45345 @@ -17986,6 +17995,7 @@ CVE-2021-44716 (net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows un - golang-1.15 1.15.15-5 [bullseye] - golang-1.15 1.15.15-1~deb11u2 - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 - golang-1.7 - golang-golang-x-net 1:0.0+git20211209.491a49a+dfsg-1 @@ -18166,11 +18176,13 @@ CVE-2021-44649 (Django CMS 3.7.3 does not validate the plugin_type parameter whi - python-django-cms (bug #516183) CVE-2021-44648 (GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer overflow vulner ...) - gdk-pixbuf + [bullseye] - gdk-pixbuf (Minor issue) [buster] - gdk-pixbuf (Vulnerable code introduced later) [stretch] - gdk-pixbuf (Vulnerable code introduced later) NOTE: https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136 NOTE: https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/ NOTE: Introduced by: https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/b88f1ce91a610a4e491a4ad6352183791e78afac (2.39.2) + NOTE: https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/130 CVE-2021-44647 (Lua 5.4.4 and 5.4.2 are affected by SEGV by type confusion in funcname ...) - lua5.4 5.4.4-1 (bug #1004189) NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00195.html @@ -20381,6 +20393,8 @@ CVE-2022-21709 RESERVED CVE-2022-21708 (graphql-go is a GraphQL server with a focus on ease of use. In version ...) - golang-github-graph-gophers-graphql-go 1.3.0-1 + [bullseye] - golang-github-graph-gophers-graphql-go (Minor issue) + [buster] - golang-github-graph-gophers-graphql-go (Minor issue) NOTE: https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe (v1.3.0) NOTE: https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh NOTE: https://github.com/graph-gophers/graphql-go/pull/492 = data/dsa-needed.txt = @@ -14,9 +14,11 @@ If needed, specify the release
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: bf15f3f6 by Moritz Muehlenhoff at 2022-02-25T13:45:22+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1795,11 +1795,15 @@ CVE-2022-25329 (Trend Micro ServerProtect 6.0/5.8 Information Server uses a stat CVE-2022-25328 RESERVED - fscrypt + [bullseye] - fscrypt (Minor issue) + [buster] - fscrypt (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/02/24/1 NOTE: https://github.com/google/fscrypt/commit/fa1a1fdbdea65829ce24a6b6f86ce2961e465b02 CVE-2022-25327 RESERVED - fscrypt + [bullseye] - fscrypt (Minor issue) + [buster] - fscrypt (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/02/24/1 NOTE: https://github.com/google/fscrypt/commit/1a47718420317f893831b0223153d56005d5b02b NOTE: https://github.com/google/fscrypt/commit/74e870b7bd1585b4b509da47e0e75db66336e576 @@ -1807,6 +1811,8 @@ CVE-2022-25327 CVE-2022-25326 RESERVED - fscrypt + [bullseye] - fscrypt (Minor issue) + [buster] - fscrypt (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/02/24/1 NOTE: https://github.com/google/fscrypt/commit/6e355131670ad014e45f879475ddf800f0080d41 CVE-2022-23183 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf15f3f68e57064574fbb79c9ffcc58d54dc145b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf15f3f68e57064574fbb79c9ffcc58d54dc145b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 232999db by Moritz Muehlenhoff at 2022-02-22T23:37:38+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3037,6 +3037,8 @@ CVE-2022-24600 RESERVED CVE-2022-24599 (In autofile Audio File Library 0.3.6, there exists one memory leak vul ...) - audiofile + [bullseye] - audiofile (Minor issue) + [buster] - audiofile (Minor issue) NOTE: https://github.com/mpruett/audiofile/issues/60 CVE-2022-24598 RESERVED @@ -14688,7 +14690,7 @@ CVE-2021-45051 (Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and CVE-2021-4120 (snapd 2.54.2 fails to perform sufficient validation of snap content in ...) - snapd [bullseye] - snapd 2.49-1+deb11u1 - [buster] - snapd (Minor issue) + [buster] - snapd (Minor issue, intrusive backport) NOTE: https://bugs.launchpad.net/snapd/+bug/1949368 NOTE: https://www.openwall.com/lists/oss-security/2022/02/18/2 CVE-2021-45050 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/232999dbb2987165009db0b6827343b6f1ca338e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/232999dbb2987165009db0b6827343b6f1ca338e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 084458e5 by Moritz Muehlenhoff at 2022-02-22T21:05:31+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -972,6 +972,7 @@ CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/396020 NOTE: https://download.qt.io/official_releases/qt/5.15/qprocess5-15.diff NOTE: https://download.qt.io/official_releases/qt/6.2/qprocess6-2.diff + NOTE: https://www.qt.io/blog/security-advisory-qprocess CVE-2022-25254 RESERVED CVE-2022-25253 @@ -93555,6 +93556,8 @@ CVE-2021-0184 RESERVED CVE-2021-0183 (Improper Validation of Specified Index, Position, or Offset in Input i ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0182 (Uncontrolled resource consumption in the Intel(R) HAXM software before ...) @@ -93565,78 +93568,116 @@ CVE-2021-0180 (Uncontrolled resource consumption in the Intel(R) HAXM software b NOT-FOR-US: Intel Hardware Accelerated Execution Manager CVE-2021-0179 (Improper Use of Validation Framework in software for Intel(R) PROSet/W ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0178 (Improper input validation in software for Intel(R) PROSet/Wireless Wi- ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0177 (Improper Validation of Consistency within input in software for Intel( ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0176 (Improper input validation in firmware for some Intel(R) PROSet/Wireles ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0175 (Improper Validation of Specified Index, Position, or Offset in Input i ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0174 (Improper Use of Validation Framework in firmware for some Intel(R) PRO ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0173 (Improper Validation of Consistency within input in firmware for some I ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree CVE-2021-0172 (Improper input validation in firmware for some Intel(R) PROSet/Wireles ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) + [buster] - firmware-nonfree (Non-free not supported)
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9e4d9721 by Moritz Muehlenhoff at 2022-02-21T17:03:33+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -502,6 +502,8 @@ CVE-2022-0684 RESERVED CVE-2021-46700 (In libsixel 1.8.6, sixel_encoder_output_without_macro (called from six ...) - libsixel + [bullseye] - libsixel (Minor issue) + [buster] - libsixel (Minor issue) NOTE: https://github.com/saitoha/libsixel/issues/158 CVE-2021-4222 RESERVED @@ -871,6 +873,8 @@ CVE-2022-0640 RESERVED CVE-2022-0639 (Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...) - node-url-parse 1.5.7-1 + [bullseye] - node-url-parse (Minor issue) + [buster] - node-url-parse (Minor issue) NOTE: https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155 NOTE: https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788 (1.5.7) CVE-2022-0638 (Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber p ...) @@ -2404,10 +2408,11 @@ CVE-2022-0536 (Exposure of Sensitive Information to an Unauthorized Actor in NPM CVE-2022-0535 RESERVED CVE-2022-0534 (A vulnerability was found in htmldoc version 1.9.15 where the stack ou ...) - - htmldoc 1.9.15-1 + - htmldoc 1.9.15-1 (unimportant) NOTE: https://github.com/michaelrsweet/htmldoc/issues/463 NOTE: Fixed by: https://github.com/michaelrsweet/htmldoc/commit/776cf0fc4c760f1fb7b966ce28dc92dd7d44ed50 (v1.9.15) NOTE: Fixed by: https://github.com/michaelrsweet/htmldoc/commit/312f0f9c12f26fbe015cd0e6cefa40e4b99017d9 (v1.9.15) + NOTE: Crash in CLI tool, no security impact CVE-2022-0533 RESERVED CVE-2022-0532 (An incorrect sysctls validation vulnerability was found in CRI-O 1.18 ...) @@ -2989,6 +2994,8 @@ CVE-2022-0513 (The WP Statistics WordPress plugin is vulnerable to SQL Injection NOT-FOR-US: WordPress plugin CVE-2022-0512 (Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...) - node-url-parse 1.5.7-1 + [bullseye] - node-url-parse (Minor issue) + [buster] - node-url-parse (Minor issue) NOTE: https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b NOTE: https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40 (1.5.6) CVE-2022-0511 @@ -4834,8 +4841,11 @@ CVE-2021-4214 CVE-2021-4213 RESERVED - jss + [bullseye] - jss (Minor issue) + [buster] - jss (Minor issue) [stretch] - jss (revisit when/if fix is complete) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2042900 + NOTE: https://github.com/dogtagpki/jss/commit/5922560a78d0dee61af8a33cc9cfbf4cfa291448 CVE-2022-23941 RESERVED CVE-2022-23940 @@ -6802,11 +6812,15 @@ CVE-2022-23321 (A persistent cross-site scripting (XSS) vulnerability exists on CVE-2022-23320 (XMPie uStore 12.3.7244.0 allows for administrators to generate reports ...) NOT-FOR-US: XMPie uStore CVE-2022-23319 (A segmentation fault during PCF file parsing in pcf2bdf versions = ...) - - pcf2bdf - TODO: check, no additional references provided, double check + - pcf2bdf (unimportant) + NOTE: https://github.com/ganaware/pcf2bdf + NOTE: https://github.com/ganaware/pcf2bdf/issues/5 + NOTE: Crash in CLI tool, no security impact CVE-2022-23318 (A heap-buffer-overflow in pcf2bdf, versions = 1.05 allows an attac ...) - - pcf2bdf - TODO: check, no additional references provided, double check + - pcf2bdf (unimportant) + NOTE: https://github.com/ganaware/pcf2bdf + NOTE: https://github.com/ganaware/pcf2bdf/issues/4 + NOTE: Crash in CLI tool, no security impact CVE-2022-23317 (CobaltStrike =4.5 HTTP(S) listener does not determine whether the ...) NOT-FOR-US: CobaltStrike CVE-2022-23316 (An issue was discovered in taoCMS v3.0.2. There is an arbitrary file r ...) @@ -10675,22 +10689,32 @@ CVE-2021-46043 (A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the g NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46042 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the _fsee ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2002 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46041 (A Segmentation Fault Vulnerability exists in GPAC 1.0.1 via the co64_b ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE:
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 963074a1 by Moritz Muehlenhoff at 2022-02-16T12:36:55+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -21445,6 +21445,8 @@ CVE-2021-3904 (grav is vulnerable to Improper Neutralization of Input During Web NOT-FOR-US: Grav CMS CVE-2021-3903 (vim is vulnerable to Heap-based Buffer Overflow ...) - vim 2:8.2.3565-1 + [bullseye] - vim (Minor issue) + [buster] - vim (Minor issue) [stretch] - vim (Minor issue) NOTE: https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 NOTE: https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 @@ -33471,6 +33473,8 @@ CVE-2021-3701 CVE-2021-3700 RESERVED - usbredir 0.11.0-1 + [bullseye] - usbredir (Minor issue) + [buster] - usbredir (Minor issue) NOTE: https://gitlab.freedesktop.org/spice/usbredir/-/commit/03c519ff5831ba75120e00ebebbf1d5a1f7220ab (usbredir-0.11.0) CVE-2021-38562 (Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4. ...) - request-tracker5 (bug #995167) @@ -43286,10 +43290,9 @@ CVE-2021-34559 (In PEPPERL+FUCHS WirelessHART-Gateway = 3.0.8 a vulnerabilit NOT-FOR-US: PEPPERL+FUCHS WirelessHART-Gateway CVE-2021-3596 [NULL pointer dereference in ReadSVGImage() in coders/svg.c] RESERVED - - imagemagick + - imagemagick (Specific to IM7) NOTE: https://github.com/ImageMagick/ImageMagick/issues/2624 NOTE: https://github.com/ImageMagick/ImageMagick/commit/43dfb1894761c4929d5d5c98dc80ba4e59a0d114 - TODO: check if affects Imagemagick6 CVE-2021-3595 (An invalid pointer initialization issue was found in the SLiRP network ...) {DLA-2753-1} - libslirp 4.6.1-1 (bug #989996) @@ -43866,11 +43869,15 @@ CVE-2021-34336 RESERVED CVE-2021-34335 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 0.27.5-1 (bug #992707) + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984 NOTE: https://github.com/Exiv2/exiv2/pull/1750 CVE-2021-34334 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 0.27.5-1 (bug #992706) + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p NOTE: https://github.com/Exiv2/exiv2/pull/1766 @@ -47534,6 +47541,8 @@ CVE-2021-32816 (ProtonMail Web Client is the official AngularJS web client for t NOT-FOR-US: ProtonMail Web Client CVE-2021-32815 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 0.27.5-1 (bug #992705) + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m NOTE: https://github.com/Exiv2/exiv2/pull/1739 = data/dsa-needed.txt = @@ -18,8 +18,12 @@ chromium -- condor -- +expat +-- faad2/oldstable (jmm) -- +freecad (aron) +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v4.19.y versions. View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/963074a13a6f07f735753e249b795c83c79b8e18 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/963074a13a6f07f735753e249b795c83c79b8e18 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: eaeb30e2 by Moritz Muehlenhoff at 2022-02-15T11:06:57+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -472,6 +472,8 @@ CVE-2022-24981 RESERVED CVE-2022-0586 (Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17813 NOTE: https://www.wireshark.org/security/wnpa-sec-2022-01.html CVE-2022-0585 @@ -480,14 +482,20 @@ CVE-2022-0584 RESERVED CVE-2022-0583 (Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3 ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17840 NOTE: https://www.wireshark.org/security/wnpa-sec-2022-03.html CVE-2022-0582 (Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17882 NOTE: https://www.wireshark.org/security/wnpa-sec-2022-04.html CVE-2022-0581 (Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3. ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17935 NOTE: https://www.wireshark.org/security/wnpa-sec-2022-05.html CVE-2022-0580 (Improper Access Control in Packagist librenms/librenms prior to 22.2.0 ...) @@ -1093,10 +1101,11 @@ CVE-2022-23104 RESERVED CVE-2022-0563 [partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline] RESERVED - - util-linux + - util-linux (unimportant) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2053151 NOTE: https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoi...@ws.net.home/T/#u NOTE: https://github.com/util-linux/util-linux/commit/faa5a3a83ad0cb5e2c303edbfd8cd823c9d94c17 + NOTE: util-linux in Debian not built with readline support CVE-2022-0562 (Null source pointer passed as an argument to memcpy() function within ...) - tiff 4.3.0-4 [bullseye] - tiff (Minor issue) @@ -13087,6 +13096,7 @@ CVE-2021-4116 (yetiforcecrm is vulnerable to Improper Neutralization of Input Du CVE-2021-4115 [file descriptor leak allows an unprivileged user to cause a crash] RESERVED - policykit-1 (bug #1005784) + [bullseye] - policykit-1 (Minor issue) [buster] - policykit-1 (Vulnerable code not present, patch introducing issue not backported) [stretch] - policykit-1 (Vulnerable code not present, patch introducing issue not backported) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2007534 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eaeb30e27c7c179334bfb3c7b75b425a26c8d9ef -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eaeb30e27c7c179334bfb3c7b75b425a26c8d9ef You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0a34bb7b by Moritz Muehlenhoff at 2022-02-14T17:36:57+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -947,10 +947,14 @@ CVE-2022-0563 RESERVED CVE-2022-0562 (Null source pointer passed as an argument to memcpy() function within ...) - tiff 4.3.0-4 + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/362 NOTE: Fixed by: https://gitlab.com/libtiff/libtiff/-/commit/561599c99f987dc32ae110370cfdd7df7975586b CVE-2022-0561 (Null source pointer passed as an argument to memcpy() function within ...) - tiff 4.3.0-4 + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/362 NOTE: Fixed by: https://gitlab.com/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef CVE-2022-0560 (Open Redirect in Packagist microweber/microweber prior to 1.2.11. ...) @@ -6245,6 +6249,8 @@ CVE-2022-23184 (In affected Octopus Server versions when the server HTTP and HTT NOT-FOR-US: Octopus Server CVE-2022-23181 (The fix for bug CVE-2020-9484 introduced a time of check, time of use ...) - tomcat9 + [bullseye] - tomcat9 (Minor issue, fix along in future DSA) + [buster] - tomcat9 (Minor issue, fix along in future DSA) - tomcat8 [stretch] - tomcat8 (Minor issue; local race condition) NOTE: https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9 @@ -11754,15 +11760,15 @@ CVE-2021-45389 (StarWind SAN NAS build 1578 and StarWind Command Center Bu CVE-2021-45388 REJECTED CVE-2021-45387 (tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv4() at tree.c ...) - - tcpreplay 4.4.0-1 - [stretch] - tcpreplay (Minor issue) + - tcpreplay 4.4.0-1 (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/687 NOTE: Fixed by: https://github.com/appneta/tcpreplay/commit/46cf964a7db636da76abeebf10482acf6f682a87 (v4.4.0) + NOTE: Crash in CLI tool, no security impact CVE-2021-45386 (tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c ...) - - tcpreplay 4.4.0-1 - [stretch] - tcpreplay (Minor issue) + - tcpreplay 4.4.0-1 (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/687 NOTE: Fixed by: https://github.com/appneta/tcpreplay/commit/46cf964a7db636da76abeebf10482acf6f682a87 (v4.4.0) + NOTE: Crash in CLI tool, no security impact CVE-2021-45385 (A Null Pointer Dereference vulnerability exits in ffjpeg d5cfd49 (2021 ...) NOT-FOR-US: ffjpeg CVE-2021-45384 @@ -16488,6 +16494,8 @@ CVE-2022-21713 (Grafana is an open-source platform for monitoring and observabil - grafana CVE-2022-21712 (twisted is an event-driven networking engine written in Python. In aff ...) - twisted + [bullseye] - twisted (Minor issue) + [buster] - twisted (Minor issue) NOTE: https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx NOTE: https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2 (twisted-22.1.0rc1) CVE-2022-21711 (elfspirit is an ELF static analysis and injection framework that parse ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a34bb7b9a203b0774caf929b791b199f1a991cc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a34bb7b9a203b0774caf929b791b199f1a991cc You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9a076b33 by Moritz Muehlenhoff at 2022-02-14T16:47:51+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1720,14 +1720,14 @@ CVE-2022-0498 REJECTED CVE-2022-0497 RESERVED - - openscad 2021.01-4 (bug #1005641) - [stretch] - openscad (Minor issue) + - openscad 2021.01-4 (unimportant; bug #1005641) NOTE: https://github.com/openscad/openscad/issues/4043 + NOTE: Crash in CLI tool, no security impact CVE-2022-0496 RESERVED - - openscad 2021.01-4 (bug #1005641) - [stretch] - openscad (Minor issue) + - openscad 2021.01-4 (unimportant; bug #1005641) NOTE: https://github.com/openscad/openscad/issues/4037 + NOTE: Crash in CLI tool, no security impact CVE-2022-0495 RESERVED CVE-2022-0494 @@ -2033,6 +2033,8 @@ CVE-2022-24304 CVE-2022-24303 RESERVED - pillow + [bullseye] - pillow (Minor issue) + [buster] - pillow (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2052682 NOTE: https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security NOTE: https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26 (9.0.1) @@ -9384,9 +9386,10 @@ CVE-2021-46021 (An Use-After-Free vulnerability in rec_record_destroy() at rec-r NOTE: Negligible security impact CVE-2021-46020 (An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0 can ...) - mruby + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) [stretch] - mruby (revisit when/if fix is complete) NOTE: https://github.com/mruby/mruby/issues/5613 - TODO: check details CVE-2021-46019 (An untrusted pointer dereference in rec_db_destroy() at rec-db.c of GN ...) - recutils (unimportant) NOTE: https://lists.gnu.org/archive/html/bug-recutils/2021-12/msg9.html View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a076b33d85296483f71cd222a676ef1faff6e9d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a076b33d85296483f71cd222a676ef1faff6e9d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3f442621 by Moritz Muehlenhoff at 2022-02-10T10:57:36+01:00 buster/bullseye triage new jss issue - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -847,6 +847,7 @@ CVE-2022-0486 CVE-2022-0485 [nbdcopy: missing error handling may create corrupted destination image] RESERVED - libnbd + [bullseye] - libnbd (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2050324 NOTE: Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/8d444b41d09a700c7ee6f9182a649f3f2d325abb NOTE: https://listman.redhat.com/archives/libguestfs/2022-February/msg00104.html @@ -2507,6 +2508,8 @@ CVE-2021-4214 NOTE: Crash in CLI package, not shipped in binary packages CVE-2021-4213 RESERVED + - jss + NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2042900 CVE-2022-23941 RESERVED CVE-2022-23940 @@ -3032,8 +3035,12 @@ CVE-2022-23854 CVE-2022-23853 RESERVED - kate + [bullseye] - kate (Minor issue) + [buster] - kate (Minor issue) [stretch] - kate (Minor issue) - ktexteditor + [bullseye] - ktexteditor (Minor issue) + [buster] - ktexteditor (Minor issue) [stretch] - ktexteditor (Minor issue) NOTE: https://kde.org/info/security/advisory-20220131-1.txt NOTE: KTextEditor: Fixed by: https://commits.kde.org/ktexteditor/804e49444c093fe58ec0df2ab436565e50dc147e @@ -11239,7 +11246,7 @@ CVE-2022-21988 (Microsoft Office Visio Remote Code Execution Vulnerability. ...) CVE-2022-21987 (Microsoft SharePoint Server Spoofing Vulnerability. ...) NOT-FOR-US: Microsoft CVE-2022-21986 (.NET Denial of Service Vulnerability. ...) - TODO: check + NOT-FOR-US: Microsoft .NET CVE-2022-21985 (Windows Remote Access Connection Manager Information Disclosure Vulner ...) NOT-FOR-US: Microsoft CVE-2022-21984 (Windows DNS Server Remote Code Execution Vulnerability. ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3f442621dcaf789085f13e2d03d05494df3bc7f7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3f442621dcaf789085f13e2d03d05494df3bc7f7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 48e50b1a by Moritz Muehlenhoff at 2022-02-09T11:58:58+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -934,6 +934,8 @@ CVE-2022-21177 RESERVED CVE-2022-0481 (NULL Pointer Dereference in Homebrew mruby prior to 3.2. ...) - mruby + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) NOTE: https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027 NOTE: https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e TODO: check, possibly only introduced with dccd66f9efecd0a974b735c62836fe566015cf37 in 3.1.0-rc @@ -1348,6 +1350,8 @@ CVE-2022-24250 RESERVED CVE-2022-24249 (A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2081 NOTE: https://github.com/gpac/gpac/commit/71f9871fc210e60df041b58c84572782b4849de9 CVE-2022-24248 @@ -4747,6 +4751,8 @@ CVE-2022-0241 RESERVED CVE-2022-0240 (mruby is vulnerable to NULL Pointer Dereference ...) - mruby + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) NOTE: https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb/ NOTE: https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca CVE-2022-0239 (corenlp is vulnerable to Improper Restriction of XML External Entity R ...) @@ -13632,6 +13638,8 @@ CVE-2021-4044 (Internally libssl in OpenSSL calls X509_verify_cert() on the clie NOTE: https://www.openssl.org/news/secadv/20211214.txt CVE-2021-4043 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0 ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47 NOTE: https://github.com/gpac/gpac/issues/2092 NOTE: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/48e50b1aff15f1ee6357862a7624d6320a8cc9a9 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/48e50b1aff15f1ee6357862a7624d6320a8cc9a9 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 59300f89 by Moritz Muehlenhoff at 2022-02-07T23:03:36+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3913,11 +3913,10 @@ CVE-2022-0285 (Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore NOT-FOR-US: pimcore CVE-2022-0284 RESERVED - - imagemagick + - imagemagick (Specific to IM7) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2045943 NOTE: https://github.com/ImageMagick/ImageMagick/issues/4729 NOTE: https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7 - TODO: check if it affects ImageMagick6 CVE-2022-0283 RESERVED CVE-2022-0282 (Code Injection in Packagist microweber/microweber prior to 1.2.11. ...) @@ -6249,6 +6248,7 @@ CVE-2022-22814 RESERVED CVE-2022-0155 (follow-redirects is vulnerable to Exposure of Private Personal Informa ...) - node-follow-redirects 1.14.7+~1.13.1-1 + [bullseye] - node-follow-redirects (Minor issue) [buster] - node-follow-redirects (Minor issue, too intrusive to backport) NOTE: https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406 NOTE: https://github.com/follow-redirects/follow-redirects/issues/183 @@ -7954,18 +7954,26 @@ CVE-2021-46047 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the NOTE: https://github.com/gpac/gpac/commit/dd2e8b1b9378a9679de8e7e5dcb2d7841acd5dbd CVE-2021-46046 (A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the gf_isom_box_si ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2005 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46045 (GPAC 1.0.1 is affected by: Abort failed. The impact is: cause a denial ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2007 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46044 (A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOf ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2006 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46043 (A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the gf_list ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2001 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46042 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the _fsee ...) @@ -8242,6 +8250,8 @@ CVE-2021-45949 (Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer NOTE: https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=2a3129365d3bc0d4a41f107ef175920d1505d1f7 CVE-2021-45948 (Open Asset Import Library (aka assimp) 5.1.0 and 5.1.1 has a heap-base ...) - assimp 5.1.1~ds0-1 + [bullseye] - assimp (Vulnerable code not present) + [buster] - assimp (Vulnerable code not present) [stretch] - assimp (M3D format support not present) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34416 NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/assimp/OSV-2021-775.yaml @@ -13416,11 +13426,13 @@ CVE-2021-44514 (OpUtils in Zoho ManageEngine OpManager 12.5 before 125490 mishan NOT-FOR-US: ManageEngine CVE-2021-44513 (Insecure creation of temporary directories in tmate-ssh-server 2.3.0 a ...) - tmate-ssh-server (bug #1001225) + [bullseye] - tmate-ssh-server (Minor issue) NOTE: Fixed by: https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596 NOTE: https://www.openwall.com/lists/oss-security/2021/12/06/2 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1189388 CVE-2021-44512 (World-writable permissions on the /tmp/tmate/sessions directory in tma ...) - tmate-ssh-server (bug #1001225) + [bullseye] - tmate-ssh-server (Minor issue) NOTE: Fixed by: https://github.com/tmate-io/tmate-ssh-server/commit/1c020d1f5ca462f5b150b46a027aaa1bbe3c9596 NOTE: https://www.openwall.com/lists/oss-security/2021/12/06/2 NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1189388 @@ -20619,6 +20631,7 @@ CVE-2021-42577 RESERVED CVE-2021-42576 (The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Py ...) -
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: eff3784b by Moritz Muehlenhoff at 2022-02-05T14:06:23+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3911,12 +3911,16 @@ CVE-2022-0265 CVE-2022-23307 (CVE-2020-9493 identified a deserialization issue that was present in A ...) {DLA-2905-1} - apache-log4j1.2 1.2.17-11 (bug #1004482) + [bullseye] - apache-log4j1.2 (Minor issue) + [buster] - apache-log4j1.2 (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/5 CVE-2022-23306 RESERVED CVE-2022-23305 (By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as ...) {DLA-2905-1} - apache-log4j1.2 1.2.17-11 (bug #1004482) + [bullseye] - apache-log4j1.2 (Minor issue) + [buster] - apache-log4j1.2 (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/4 CVE-2022-0263 (Unrestricted Upload of File with Dangerous Type in Packagist pimcore/p ...) NOT-FOR-US: pimcore @@ -3984,6 +3988,8 @@ CVE-2022-0243 (Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Applicat CVE-2022-23302 (JMSSink in all versions of Log4j 1.x is vulnerable to deserialization ...) {DLA-2905-1} - apache-log4j1.2 1.2.17-11 (bug #1004482) + [bullseye] - apache-log4j1.2 (Minor issue) + [buster] - apache-log4j1.2 (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/18/3 CVE-2022-22142 RESERVED @@ -4426,6 +4432,8 @@ CVE-2022-0205 CVE-2022-0204 [Heap overflow vulnerability in the implementation of the gatt protocol] RESERVED - bluez (bug #1003712) + [bullseye] - bluez (Minor issue) + [buster] - bluez (Minor issue) [stretch] - bluez (Minor issue) NOTE: https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q NOTE: Fixed by: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=591c546c536b42bef696d027f64aa22434f8c3f0 (5.63) @@ -14560,6 +14568,8 @@ CVE-2022-21705 RESERVED CVE-2022-21704 (log4js-node is a port of log4js to node.js. In affected versions defau ...) - node-log4js 6.4.1+~cs8.3.5-1 + [bullseye] - node-log4js (Minor issue) + [buster] - node-log4js (Minor issue) NOTE: https://github.com/log4js-node/log4js-node/pull/1141 (v6.4.1) NOTE: https://github.com/log4js-node/streamroller/pull/87 NOTE: https://github.com/log4js-node/log4js-node/security/advisories/GHSA-82v2-mx6x-wq7q @@ -14716,6 +14726,8 @@ CVE-2022-21659 (Flask-AppBuilder is an application development framework, built TODO: check CVE-2022-21658 (Rust is a multi-paradigm, general-purpose programming language designe ...) - rustc + [bullseye] - rustc (Minor issue) + [buster] - rustc (Minor issue) NOTE: https://github.com/rust-lang/wg-security-response/tree/master/patches/CVE-2022-21658 NOTE: https://www.openwall.com/lists/oss-security/2022/01/20/1 CVE-2022-21657 @@ -68697,10 +68709,14 @@ CVE-2021-23522 RESERVED CVE-2021-23521 (This affects the package juce-framework/JUCE before 6.1.5. This vulner ...) - juce 6.1.5~ds0-1 + [bullseye] - juce (Minor issue) + [buster] - juce (Minor issue) NOTE: https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f NOTE: https://security.snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388608 CVE-2021-23520 (The package juce-framework/juce before 6.1.5 are vulnerable to Arbitra ...) - juce 6.1.5~ds0-1 + [bullseye] - juce (Minor issue) + [buster] - juce (Minor issue) NOTE: https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f NOTE: https://snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388607 NOTE: https://snyk.io/research/zip-slip-vulnerability View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eff3784b741a917c8925e27afd6aa9a48a5fd383 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eff3784b741a917c8925e27afd6aa9a48a5fd383 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 64eb78cb by Moritz Muehlenhoff at 2022-02-03T19:45:55+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -14112,6 +14112,8 @@ CVE-2021-3980 (elgg is vulnerable to Exposure of Private Personal Information to CVE-2021-3979 [ceph: Ceph volume does not honour osd_dmcrypt_key_size] RESERVED - ceph + [bullseye] - ceph (Minor issue) + [buster] - ceph (Minor issue) [stretch] - ceph (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/11/5 CVE-2021-44034 @@ -26105,6 +26107,8 @@ CVE-2021-40530 (The ElGamal implementation in Crypto++ through 8.5 allows plaint NOTE: https://github.com/weidai11/cryptopp/commit/bee8e8ca6658 (CRYPTOPP_8_6_0) CVE-2021-40529 (The ElGamal implementation in Botan through 2.18.1, as used in Thunder ...) - botan 2.18.1+dfsg-3 (bug #993840) + [bullseye] - botan (Minor issue) + [buster] - botan (Minor issue) - botan1.10 [stretch] - botan1.10 (Affected function encrypt(...) has changed drastically. Backport is too instrusive to backport) NOTE: https://eprint.iacr.org/2021/923 @@ -68090,6 +68094,8 @@ CVE-2021-23728 RESERVED CVE-2021-23727 (This affects the package celery before 5.2.2. It by default trusts the ...) - celery 5.2.3-1 + [bullseye] - celery (Minor issue) + [buster] - celery (Vulnerable code not present) [stretch] - celery (Vulnerable code introduced later) NOTE: https://github.com/celery/celery/commit/5c3f1559df16c32fb8d82918b4497f688d42ad0a (v5.2.3) NOTE: Introduced by: https://github.com/celery/celery/commit/d20b8a5d469c80f48468e251cbe6451c798d1c29 (4.4.0rc1) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64eb78cb0eb427ad45e0729e36c9456078ea6a38 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/64eb78cb0eb427ad45e0729e36c9456078ea6a38 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: c0e38621 by Moritz Muehlenhoff at 2022-02-02T20:19:06+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1408,9 +1408,9 @@ CVE-2021-4215 RESERVED CVE-2021-4214 RESERVED - - libpng1.6 + - libpng1.6 (unimportant) NOTE: https://github.com/glennrp/libpng/issues/302 - TODO: check, does the issue only affects the contrib/tests? + NOTE: Crash in CLI package, not shipped in binary packages CVE-2021-4213 RESERVED CVE-2022-23941 @@ -4348,12 +4348,18 @@ CVE-2022-23099 RESERVED CVE-2022-23098 (An issue was discovered in the DNS proxy in Connman through 1.40. The ...) - connman + [bullseye] - connman (Minor issue) + [buster] - connman (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/25/1 CVE-2022-23097 (An issue was discovered in the DNS proxy in Connman through 1.40. forw ...) - connman + [bullseye] - connman (Minor issue) + [buster] - connman (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/25/1 CVE-2022-23096 (An issue was discovered in the DNS proxy in Connman through 1.40. The ...) - connman + [bullseye] - connman (Minor issue) + [buster] - connman (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/25/1 CVE-2022-23095 (Open Design Alliance Drawings SDK before 2022.12.1 mishandles the load ...) NOT-FOR-US: Open Design Alliance Drawings SDK View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0e386212756cb558e199092bfc6b601d23de29c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c0e386212756cb558e199092bfc6b601d23de29c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a8bfc354 by Moritz Muehlenhoff at 2022-02-02T11:11:29+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2015,6 +2015,8 @@ CVE-2022-23833 RESERVED {DLA-2906-1} - python-django 2:3.2.12-1 (bug #1004752) + [bullseye] - python-django (Minor issue) + [buster] - python-django (Minor issue) NOTE: https://www.djangoproject.com/weblog/2022/feb/01/security-releases/ NOTE: https://github.com/django/django/commit/fc18f36c4ab94399366ca2f2007b3692559a6f23 (main) NOTE: https://github.com/django/django/commit/f9c7d48fdd6f198a6494a9202f90242f176e4fc9 (4.0.2) @@ -3556,12 +3558,16 @@ CVE-2021-46314 RESERVED CVE-2021-46313 (The binary MP4Box in GPAC v1.0.1 was discovered to contain a segmentat ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2039 NOTE: https://github.com/gpac/gpac/commit/ee969d3c4c425ecb25999eb68ada616925b58eba CVE-2021-46312 RESERVED CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2038 NOTE: https://github.com/gpac/gpac/commit/ad19e0c4504a89ca273442b1b1483ae7adfb9491 CVE-2021-46310 @@ -5015,28 +5021,40 @@ CVE-2021-46241 RESERVED CVE-2021-46240 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2028 NOTE: https://github.com/gpac/gpac/commit/31eb879ea67b3a6ff67d3211f4c6b83369d4898d CVE-2021-46239 (The binary MP4Box in GPAC v1.1.0 was discovered to contain an invalid ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2026 NOTE: https://github.com/gpac/gpac/commit/4e1215758fa89455e8de1262df36f11740bb1bc4 CVE-2021-46238 (GPAC v1.1.0 was discovered to contain a stack overflow via the functio ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2027 NOTE: https://github.com/gpac/gpac/commit/4b9736ab8c9274db5858e5bf9fe0470bc3e7b6cf CVE-2021-46237 (An untrusted pointer dereference vulnerability exists in GPAC v1.1.0 v ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2033 NOTE: https://github.com/gpac/gpac/commit/3cc122ad664a2355cce9784f50b59c6272d43f00 CVE-2021-46236 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2024 NOTE: https://github.com/gpac/gpac/commit/6a5effb57153cb05e72f6e9bd72afefc334a673d CVE-2021-46235 RESERVED CVE-2021-46234 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2023 NOTE: https://github.com/gpac/gpac/commit/70c6f6f832dccff814a19a74d87b97b3d68a4af5 CVE-2021-46233 @@ -5313,6 +5331,8 @@ CVE-2022-22818 RESERVED {DLA-2906-1} - python-django 2:3.2.12-1 (bug #1004752) + [bullseye] - python-django (Minor issue) + [buster] - python-django (Minor issue) NOTE: https://www.djangoproject.com/weblog/2022/feb/01/security-releases/ NOTE: https://github.com/django/django/commit/394517f07886495efcf79f95c7ee402a9437bd68 (main) NOTE: https://github.com/django/django/commit/01422046065d2b51f8f613409cad2c81b39487e5 (4.0.2) @@ -89818,10 +89838,11 @@ CVE-2020-27662 (In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct O - glpi CVE-2020-27661 (A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-d ...) - qemu 1:5.2+dfsg-1 (bug #972864) - [buster] - qemu (Fix along in future DSA) + [buster] - qemu (Vulnerable code not present) [stretch] - qemu (Vulnerable code introduced later) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html NOTE: Fixed by: https://git.qemu.org/?p=qemu.git;a=commit;h=bea2a9e3e00b275dc40cfa09c760c715b8753e03 (v5.2.0-rc0) + NOTE: Introduced in v5.1.0-rc0 CVE-2020-27660 (SQL injection vulnerability in
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: bc12ea8c by Moritz Muehlenhoff at 2022-01-31T18:58:31+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3146,11 +3146,13 @@ CVE-2021-46350 (There is an Assertion 'ecma_is_value_object (value)' failed at j NOTE: https://github.com/jerryscript-project/jerryscript/issues/4936 CVE-2021-46349 (There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECM ...) - iotjs (bug #1004288) + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4954 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4937 CVE-2021-46348 (There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' fa ...) - iotjs (bug #1004288) + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4961 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4941 @@ -3160,6 +3162,8 @@ CVE-2021-46347 (There is an Assertion 'ecma_object_check_class_name_is_object (o NOTE: https://github.com/jerryscript-project/jerryscript/issues/4938 CVE-2021-46346 (There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustme ...) - iotjs (bug #1004288) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4955 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4939 CVE-2021-46345 (There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry ...) @@ -3182,6 +3186,7 @@ CVE-2021-46341 RESERVED CVE-2021-46340 (There is an Assertion 'context_p-stack_top_uint8 == SCAN_STACK_TRY ...) - iotjs (bug #1004288) + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4964 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4924 @@ -3190,6 +3195,8 @@ CVE-2021-46339 (There is an Assertion 'lit_is_valid_cesu8_string (string_p, stri NOTE: https://github.com/jerryscript-project/jerryscript/issues/4935 CVE-2021-46338 (There is an Assertion 'ecma_is_lexical_environment (object_p)' failed ...) - iotjs (bug #1004288) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4943 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4933 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4900 @@ -3295,6 +3302,8 @@ CVE-2022-0262 (Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore NOT-FOR-US: pimcore CVE-2022-0261 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - vim + [bullseye] - vim (Minor issue) + [buster] - vim (Minor issue) NOTE: https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82 NOTE: https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120) CVE-2022-0260 (Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimco ...) @@ -4848,6 +4857,8 @@ CVE-2021-46171 (Modex v2.11 was discovered to contain a NULL pointer dereference NOT-FOR-US: Modex CVE-2021-46170 (An issue was discovered in JerryScript commit a6ab5e9. There is an Use ...) - iotjs + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4917 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4942/commits/5e1fdd1d1e75105b43392b4bb3996099cdc50f3d CVE-2021-46169 (Modex v2.11 was discovered to contain an Use-After-Free vulnerability ...) @@ -5323,6 +5334,8 @@ CVE-2022-22731 RESERVED CVE-2022-0144 (shelljs is vulnerable to Improper Privilege Management ...) - node-shelljs 0.8.5+~cs0.8.10-1 + [bullseye] - node-shelljs (Minor issue) + [buster] - node-shelljs (Minor issue) [stretch] - node-shelljs (Nodejs in stretch not covered by security support) NOTE: https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/ NOTE: https://github.com/shelljs/shelljs/issues/1058 @@ -12939,6 +12952,8 @@ CVE-2021-4020 (janus-gateway is vulnerable to Improper Neutralization of Input D NOTE: Issues only in janus-demos built from src:janus CVE-2021-4019 (vim is vulnerable to Heap-based Buffer Overflow ...) - vim 2:8.2.3995-1 + [bullseye] - vim (Minor issue) +
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ad0538b7 by Moritz Muehlenhoff at 2022-01-31T17:13:55+01:00 buster/bullseye triage - - - - - 3 changed files: - data/CVE/list - data/DSA/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -12658,6 +12658,8 @@ CVE-2021-44274 RESERVED CVE-2021-44273 (e2guardian v5.4.x = v5.4.3r is affected by missing SSL certificate ...) - e2guardian 5.3.5-3 (bug #1003125) + [bullseye] - e2guardian (Minor issue) + [buster] - e2guardian (Minor issue) [stretch] - e2guardian (Minor issue; can be fixed later) NOTE: https://www.openwall.com/lists/oss-security/2021/12/23/2 NOTE: https://github.com/e2guardian/e2guardian/issues/707 @@ -70156,15 +70158,19 @@ CVE-2021-22571 CVE-2021-22570 (Nullptr dereference when a null char is present in a proto symbol. The ...) [experimental] - protobuf 3.17.1-1 - protobuf + [bullseye] - protobuf (Minor issue) + [buster] - protobuf (Minor issue) NOTE: Fixed upstream in v3.15.0: https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0 - TODO: check details CVE-2021-22569 (An issue in protobuf-java allowed the interleaving of com.google.proto ...) [experimental] - protobuf 3.19.3-1 - protobuf + [bullseye] - protobuf (Minor issue) + [buster] - protobuf (Minor issue) [stretch] - protobuf (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/01/12/4 NOTE: https://cloud.google.com/support/bulletins#gcp-2022-001 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 (unclear, might be bogus) + NOTE: https://github.com/protocolbuffers/protobuf/pull/9371/commits/5ea2bdf6d7483d64a6b02fcf00ee51fbfb80e847 CVE-2021-22568 (When using the dart pub publish command to publish a package to a thir ...) NOT-FOR-US: Dart language CVE-2021-22567 (Bidirectional Unicode text can be interpreted and compiled differently ...) = data/DSA/list = @@ -134,7 +134,7 @@ [buster] - sogo 4.0.7-1+deb10u2 [bullseye] - sogo 5.0.1-4+deb11u1 [22 Dec 2021] DSA-5028-1 spip - security update - {CVE-2021-44120 CVE-2021-44122} + {CVE-2021-44120 CVE-2021-44122 CVE-2021-44123 CVE-2021-44118} [buster] - spip 3.2.4-1+deb10u5 [bullseye] - spip 3.2.11-3+deb11u1 [21 Dec 2021] DSA-5027-1 xorg-server - security update = data/dsa-needed.txt = @@ -52,8 +52,6 @@ ruby2.7/stable -- runc -- -spip --- trafficserver (jmm) wait until status for CVE-2021-38161 is clarified (upstream patch got reverted) -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad0538b7ee90fa8096bac3ccc31a61b54f4a3c9e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad0538b7ee90fa8096bac3ccc31a61b54f4a3c9e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0650b366 by Moritz Muehlenhoff at 2022-01-29T11:56:16+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -736,6 +736,7 @@ CVE-2022-0358 RESERVED - qemu NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2044863 + NOTE: https://gitlab.com/qemu-project/qemu/-/commit/449e8171f96a6a944d1f3b7d3627ae059eae21ca CVE-2022-0357 RESERVED CVE-2022-0356 @@ -15904,6 +15905,7 @@ CVE-2021-3929 [nvme: DMA reentrancy issue leads to use-after-free] NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2020298 NOTE: https://gitlab.com/qemu-project/qemu/-/issues/556 NOTE: Proposed patchset: https://lists.nongnu.org/archive/html/qemu-devel/2021-08/msg03692.html + NOTE: No upstream patch as of 2022-01-28 CVE-2021-43400 (An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after- ...) - bluez 5.62-1 (bug #998626) [bullseye] - bluez (Minor issue; can be fixed in point release) @@ -25675,6 +25677,7 @@ CVE-2021-3750 [hcd-ehci: DMA reentrancy issue leads to use-after-free] NOTE: https://gitlab.com/qemu-project/qemu/-/issues/541 NOTE: Fix for whole class of DMA MMIO reentrancy issues: https://gitlab.com/qemu-project/qemu/-/issues/556 NOTE: Patchset: https://lists.nongnu.org/archive/html/qemu-devel/2021-08/msg03692.html + NOTE: No upstream patch as of 2022-01-28 CVE-2021-3749 (axios is vulnerable to Inefficient Regular Expression Complexity ...) - node-axios 0.21.3+dfsg-1 [bullseye] - node-axios 0.21.1+dfsg-1+deb11u1 @@ -26258,6 +26261,7 @@ CVE-2021-3735 [ahci: deadlock issue leads to denial of service] [buster] - qemu (Minor issue) [stretch] - qemu (Fix along with a future DLA) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1997184 + NOTE: No upstream patch as of 2022-01-28 CVE-2021-40083 (Knot Resolver before 5.3.2 is prone to an assertion failure, triggerab ...) [experimental] - knot-resolver 5.4.1-1 - knot-resolver 5.4.1-2 (bug #991463) @@ -28343,6 +28347,7 @@ CVE-2021-3713 (An out-of-bounds write flaw was found in the UAS (USB Attached SC - qemu 1:6.1+dfsg-2 (bug #992727) [buster] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1994640 + NOTE: https://gitlab.com/qemu-project/qemu/-/commit/13b250b12ad3c59114a6a17d59caf073ce45b33a CVE-2021-39230 (Butter is a system usability utility. Due to a kernel error the JPNS k ...) NOT-FOR-US: Butter CVE-2021-39229 (Apprise is an open source library which allows you to send a notificat ...) @@ -39035,6 +39040,7 @@ CVE-2021-3608 [pvrdma: uninitialized memory unmap in pvrdma_ring_init()] [buster] - qemu (Minor issue) [stretch] - qemu (Vulnerable code introduced later) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1973383 + NOTE: https://git.qemu.org/?p=qemu.git;a=commit;h=66ae37d8cc313f89272e711174a846a229bcdbd3CVE-2021-3594 CVE-2021-3607 [pvrdma: unchecked malloc size due to integer overflow in init_dev_ring()] RESERVED - qemu 1:5.2+dfsg-11 (bug #990564) @@ -44578,7 +44584,7 @@ CVE-2021-32606 (In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net CVE-2021-3545 (An information disclosure vulnerability was found in the virtio vhost- ...) {DSA-4980-1} - qemu 1:6.1+dfsg-1 (bug #989042) - [buster] - qemu (Minor issue) + [buster] - qemu (Only minimal support present and not installed in binary packages) [stretch] - qemu (The vulnerable code was introduced later) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01153.html @@ -44586,7 +44592,7 @@ CVE-2021-3545 (An information disclosure vulnerability was found in the virtio v CVE-2021-3544 (Several memory leaks were found in the virtio vhost-user GPU device (v ...) {DSA-4980-1} - qemu 1:6.1+dfsg-1 (bug #989042) - [buster] - qemu (Minor issue) + [buster] - qemu (Only minimal support present and not installed in binary packages) [stretch] - qemu (The vulnerable code was introduced later) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1958935 NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html @@ -44825,7 +44831,7 @@ CVE-2021-32563 (An issue was discovered in Thunar before 4.16.7 and 4.17.x befor CVE-2021-3546 (An out-of-bounds write vulnerability was found in the virtio vhost-use ...) {DSA-4980-1} - qemu 1:6.1+dfsg-1 (bug #989042) - [buster] - qemu (Minor issue) + [buster] - qemu (Only minimal
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3db1fe1a by Moritz Muehlenhoff at 2022-01-26T11:55:52+01:00 buster/bullseye triage remove node-matrix-js-sdk for CVE-2021-44538, seems unrelated - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -131,6 +131,8 @@ CVE-2022-23936 RESERVED CVE-2022-23935 (lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ / ...) - libimage-exiftool-perl 12.38+dfsg-1 + [bullseye] - libimage-exiftool-perl (Minor issue) + [buster] - libimage-exiftool-perl (Minor issue) NOTE: https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582 (12.38) CVE-2022-23934 RESERVED @@ -3432,35 +3434,46 @@ CVE-2022-22896 RESERVED CVE-2022-22895 (Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4850 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4882 CVE-2022-22894 (Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_ ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4890 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4899 CVE-2022-22893 (Jerryscript 3.0.0 was discovered to contain a stack overflow via vm_lo ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4901 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4945 CVE-2022-22892 (There is an Assertion 'ecma_is_value_undefined (value) || ecma_is_valu ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4872 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4878 CVE-2022-22891 (Jerryscript 3.0.0 was discovered to contain a SEGV vulnerability via e ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4871 NOTE: https://github.com/jerryscript-project/jerryscript/pull/4885 CVE-2022-22890 (There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4849 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4847 CVE-2022-22889 RESERVED CVE-2022-22888 (Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_ ...) - iotjs (bug #1004298) + [bullseye] - iotjs (Minor issue) + [buster] - iotjs (Vulnerable code introduced later) NOTE: https://github.com/jerryscript-project/jerryscript/pull/4877 NOTE: https://github.com/jerryscript-project/jerryscript/issues/4848 CVE-2022-22887 @@ -8143,6 +8156,8 @@ CVE-2021-45341 (A buffer overflow vulnerability in CDataMoji of the jwwlib compo NOTE: Fixed by: https://github.com/LibreCAD/LibreCAD/commit/f3502963eaf379a429bc9da73c1224c5db649997 CVE-2021-45340 (In Libsixel prior to and including v1.10.3, a NULL pointer dereference ...) - libsixel (bug #1004377) + [bullseye] - libsixel (Minor issue) + [buster] - libsixel (Minor issue) NOTE: https://github.com/libsixel/libsixel/issues/51 NOTE: Fixed by: https://github.com/libsixel/libsixel/pull/52 CVE-2021-45339 (Privilege escalation vulnerability in Avast Antivirus prior to 20.4 al ...) @@ -10914,7 +10929,6 @@ CVE-2021-44538 (The olm_session_describe function in Matrix libolm before 3.2.7 - olm 3.2.8~dfsg-1 (bug #1001664) [bullseye] - olm (Minor issue) [buster] - olm (Vulnerable code introduced later) - - node-matrix-js-sdk - thunderbird 1:91.4.1-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2021-55/#CVE-2021-44538 NOTE: https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk/ = data/dsa-needed.txt = @@ -28,6 +28,8 @@ linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1328c577 by Moritz Muehlenhoff at 2022-01-21T15:30:03+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -22127,6 +22127,8 @@ CVE-2021-41044 RESERVED CVE-2021-41043 (Use after free in tcpslice triggers AddressSanitizer, no other confirm ...) - tcpslice (bug #1003190) + [bullseye] - tcpslice (Minor issue) + [buster] - tcpslice (Minor issue) NOTE: https://github.com/the-tcpdump-group/tcpslice/issues/11 NOTE: https://github.com/the-tcpdump-group/tcpslice/commit/030859fce9c77417de657b9bb29c0f78c2d68f4a (tcpslice-1.5) CVE-2021-41042 @@ -31627,6 +31629,7 @@ CVE-2021-37219 (HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer all NOTE: https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024 CVE-2021-37218 (HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server ...) - nomad + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023 NOTE: https://github.com/hashicorp/nomad/pull/11089 (main) NOTE: https://github.com/hashicorp/nomad/commit/768d7c72a77e9c0415d92900753fc83e8822145a (release-1.1.4) @@ -64983,6 +64986,7 @@ CVE-2021-3122 (CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH server NOT-FOR-US: CMCAgent in NCR Command Center Agent CVE-2021-3121 (An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarsha ...) - golang-gogoprotobuf 1.3.2-1 + [buster] - golang-gogoprotobuf (Minor issue) [stretch] - golang-gogoprotobuf (Minor issue) NOTE: https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc CVE-2021-3120 (An arbitrary file upload vulnerability in the YITH WooCommerce Gift Ca ...) @@ -80835,12 +80839,14 @@ CVE-2020-28853 CVE-2020-28852 (In x/text in Go before v0.3.5, a "slice bounds out of range" panic occ ...) - golang-golang-x-text 0.3.5-1 (bug #980002) - golang-x-text + [buster] - golang-x-text (Minor issue) [stretch] - golang-x-text (Minor issue. Golang has limited support in stretch.) NOTE: https://github.com/golang/go/issues/42536 NOTE: https://github.com/golang/text/commit/4482a914f52311356f6f4b7a695d4075ca22c0c6 (v0.3.5) CVE-2020-28851 (In x/text in Go 1.15.4, an "index out of range" panic occurs in langua ...) - golang-golang-x-text 0.3.6-1 (bug #980001) - golang-x-text + [buster] - golang-x-text (Minor issue) [stretch] - golang-x-text (Minor issue. Golang has limited support in stretch.) NOTE: https://github.com/golang/go/issues/42535 CVE-2020-28850 = data/dsa-needed.txt = @@ -14,6 +14,8 @@ If needed, specify the release by adding a slash after the name of the source pa -- asterisk/oldstable -- +chromium (jmm) +-- condor -- faad2/oldstable (jmm) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1328c577f67bd9fb21ec1f4f20d77c41bc282cdf -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1328c577f67bd9fb21ec1f4f20d77c41bc282cdf You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7155dbe5 by Moritz Muehlenhoff at 2022-01-17T17:26:32+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6570,12 +6570,16 @@ CVE-2021-45105 (Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12 CVE-2021-31566 [symbolic links incorrectly followed when changing modes, times, ACL and flags of a file while extracting an archive] RESERVED - libarchive 3.5.2-1 (bug #1001990) + [bullseye] - libarchive (Minor issue) + [buster] - libarchive (Minor issue) NOTE: https://github.com/libarchive/libarchive/issues/1566 NOTE: https://github.com/libarchive/libarchive/commit/b41daecb5ccb4c8e3b2c53fd6147109fc12c3043 (v3.5.2) NOTE: https://github.com/libarchive/libarchive/commit/e2ad1a2c3064fa9eba6274b3641c4c1beed25c0b (v3.5.2) CVE-2021-23177 [extracting a symlink with ACLs modifies ACLs of target] RESERVED - libarchive 3.5.2-1 (bug #1001986) + [bullseye] - libarchive (Minor issue) + [buster] - libarchive (Minor issue) NOTE: https://github.com/libarchive/libarchive/issues/1565 NOTE: https://github.com/libarchive/libarchive/commit/fba4f123cc456d2b2538f811bb831483bf336bad (v3.5.2) CVE-2022-21943 @@ -7964,6 +7968,7 @@ CVE-2021-44717 (Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write - golang-1.15 1.15.15-5 [bullseye] - golang-1.15 1.15.15-1~deb11u2 - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 - golang-1.7 NOTE: https://github.com/golang/go/issues/50057 @@ -9803,10 +9808,14 @@ CVE-2021-4000 (showdoc is vulnerable to URL Redirection to Untrusted Site ...) CVE-2021-3999 [Off-by-one buffer overflow/underflow in getcwd()] RESERVED - glibc + [bullseye] - glibc (Minor issue) + [buster] - glibc (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28769 CVE-2021-3998 [Unexpected return value from realpath() for too long results] RESERVED - glibc + [bullseye] - glibc (Minor issue) + [buster] - glibc (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28770 NOTE: https://patchwork.sourceware.org/project/glibc/patch/20220113055920.3155918-1-siddh...@sourceware.org/ CVE-2021-3997 [Uncontrolled recursion in systemd's systemd-tmpfiles] @@ -9941,6 +9950,7 @@ CVE-2021-44039 RESERVED CVE-2021-44038 (An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod op ...) - quagga + [buster] - quagga (Minor issue) [stretch] - quagga (revisit when/if fixed upstream) NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1191890 NOTE: Debian installed systemd unit files install the problematic redhat/*.service @@ -39086,6 +39096,7 @@ CVE-2021-33431 RESERVED CVE-2021-33430 (A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_N ...) - numpy 1:1.21.4-2 + [bullseye] - numpy (Minor issue) NOTE: https://github.com/numpy/numpy/issues/18939 NOTE: https://github.com/numpy/numpy/pull/18989 NOTE: https://github.com/numpy/numpy/commit/16f7824b4d935b6aee98298ca4123d57174a6f2e (v1.22.0.dev0) = data/dsa-needed.txt = @@ -29,12 +29,17 @@ linux (carnil) -- ndpi/oldstable -- +nss +-- nodejs (jmm) -- pillow (jmm) -- python-pysaml2 (jmm) -- +rpki-client/stable + new 7.6 release required libretls, which isn't in Bullseye +-- ruby2.5/oldstable Maintainer is preparing updates -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7155dbe5fe85c561f31a848b8f13a75fef301c81 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7155dbe5fe85c561f31a848b8f13a75fef301c81 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3c26aa00 by Moritz Muehlenhoff at 2022-01-17T09:33:02+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2389,6 +2389,7 @@ CVE-2022-0120 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0119 RESERVED @@ -2396,116 +2397,139 @@ CVE-2022-0118 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0117 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0116 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0115 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0114 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0113 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0112 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0111 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0110 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0109 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0108 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0107 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0106 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0105 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0104 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0103 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0102 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0101 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0100 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0099 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0098 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0097 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0096 RESERVED {DSA-5046-1} - chromium 97.0.4692.71-0.1 + [buster] - chromium (see DSA 5046) [stretch] - chromium (see DSA 4562) CVE-2022-0095 RESERVED @@ -3479,40 +3503,40 @@ CVE-2021-45958 (UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buff NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 TODO: claimed to be fixed in range
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e63ac987 by Moritz Muehlenhoff at 2022-01-15T14:04:53+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -189,9 +189,13 @@ CVE-2022-23222 (kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows NOTE: https://www.openwall.com/lists/oss-security/2022/01/13/1 CVE-2022-23219 (The deprecated compatibility function clnt_create in the sunrpc module ...) - glibc + [bullseye] - glibc (Minor issue) + [buster] - glibc (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=22542 CVE-2022-23218 (The deprecated compatibility function svcunix_create in the sunrpc mod ...) - glibc + [bullseye] - glibc (Minor issue) + [buster] - glibc (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28768 CVE-2022-23217 RESERVED @@ -3154,9 +3158,9 @@ CVE-2021-46059 (A Pointer Dereference vulnerability exists in Vim 8.2.3883 via t NOTE: https://huntr.dev/bounties/a9b015e2-59e3-4ed9-8812-d9021e40b8f2/ NOTE: Fixed by: https://github.com/vim/vim/commit/5937c7505f444dd896f336fa0119a93a55ebe9a2 (v8.2.3883) CVE-2021-46058 (AHheap-based Buffer Overflow vulnerabiity exists in GNU inetutils 2.2 ...) - - inetutils + - inetutils (unimportant) NOTE: https://lists.gnu.org/archive/html/bug-inetutils/2021-12/msg00016.html - TODO: check details + NOTE: Negligible security impact CVE-2021-46057 RESERVED CVE-2021-46056 @@ -10524,6 +10528,7 @@ CVE-2021-43862 (jQuery Terminal Emulator is a plugin for creating command line i NOT-FOR-US: jQuery Terminal Emulator CVE-2021-43861 (Mermaid is a Javascript based diagramming and charting tool that uses ...) - node-mermaid 8.13.8+~cs10.4.16-1 + [bullseye] - node-mermaid (Minor issue) NOTE: https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v NOTE: https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83 CVE-2021-43860 (Flatpak is a Linux application sandboxing and distribution framework. ...) @@ -20893,6 +20898,8 @@ CVE-2021-40875 (Improper Access Control in Gurock TestRail versions 7.2.0.3 CVE-2021-40874 [RESTServer pwdConfirm always returns true with Combination + Kerberos] RESERVED - lemonldap-ng + [bullseye] - lemonldap-ng (Minor issue) + [buster] - lemonldap-ng (Minor issue) NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612 NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/66946e8f754812b375768c2124937137c856fe0c CVE-2021-40873 (An issue was discovered in Softing Industrial Automation OPC UA C++ SD ...) @@ -55319,6 +55326,7 @@ CVE-2021-27022 (A flaw was discovered in bolt-server and ace where running a tas NOTE: https://puppet.com/security/cve/CVE-2021-27022/ CVE-2021-27021 (A flaw was discovered in Puppet DB, this flaw results in an escalation ...) - puppetdb (bug #990419) + [buster] - puppetdb (Minor issue) NOTE: https://puppet.com/security/cve/cve-2021-27021/ NOTE: https://github.com/puppetlabs/puppetdb/commit/c146e624d230f7410fb648d58ae28c0e3cd457a2 NOTE: https://github.com/puppetlabs/puppetdb/commit/f8dc81678cf347739838e42cc1c426d96406c266 = data/dsa-needed.txt = @@ -38,8 +38,6 @@ pillow (jmm) -- prosody (jmm) -- -puppetdb (jmm) --- python-pysaml2 (jmm) -- ruby2.5/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e63ac987a26f22356149bae1d84612ca4b1c8e79 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e63ac987a26f22356149bae1d84612ca4b1c8e79 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: edcdb865 by Moritz Muehlenhoff at 2022-01-12T12:26:54+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2699,6 +2699,8 @@ CVE-2021-46052 (A Denial of Service vulnerability exists in Binaryen 104 due to NOTE: Crash in CLI tool, no security impact CVE-2021-46051 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the Media ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2011 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46050 (A Stack Overflow vulnerability exists in Binaryen 103 via the printf_c ...) @@ -2707,6 +2709,8 @@ CVE-2021-46050 (A Stack Overflow vulnerability exists in Binaryen 103 via the pr NOTE: Crash in CLI tool, no security impact CVE-2021-46049 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_fi ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2013 NOTE: https://github.com/gpac/gpac/commit/f5a778edd1febd574ff9558d2faa57133bdb4a5f CVE-2021-46048 (A Denial of Service vulnerability exists in Binaryen 104 due to an ass ...) @@ -2715,6 +2719,8 @@ CVE-2021-46048 (A Denial of Service vulnerability exists in Binaryen 104 due to NOTE: Crash in CLI tool, no security impact CVE-2021-46047 (A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_hi ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2008 NOTE: https://github.com/gpac/gpac/commit/dd2e8b1b9378a9679de8e7e5dcb2d7841acd5dbd CVE-2021-46046 (A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the gf_isom_box_si ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/edcdb865704b2f428b1a763de6cf07b37d184078 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/edcdb865704b2f428b1a763de6cf07b37d184078 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d012b8bb by Moritz Muehlenhoff at 2022-01-10T18:31:50+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6750,6 +6750,7 @@ CVE-2021-44538 (The olm_session_describe function in Matrix libolm before 3.2.7 {DSA-5034-1 DLA-2874-1} - element-web (bug #866502) - olm 3.2.8~dfsg-1 (bug #1001664) + [bullseye] - olm (Minor issue) [buster] - olm (Vulnerable code introduced later) - node-matrix-js-sdk - thunderbird 1:91.4.1-1 @@ -10616,6 +10617,8 @@ CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5 NOTE: Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868 CVE-2021-43518 (Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. ...) - teeworlds + [bullseye] - teeworlds (Minor issue) + [buster] - teeworlds (Minor issue) NOTE: https://github.com/teeworlds/teeworlds/issues/2981 NOTE: https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/ CVE-2021-43517 = data/dsa-needed.txt = @@ -26,6 +26,8 @@ faad2/oldstable (jmm) -- librecad -- +lighttpd (jmm) +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v4.19.y versions. View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d012b8bb5ec9413a949a226cba97980babe4ff01 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d012b8bb5ec9413a949a226cba97980babe4ff01 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f6bf1612 by Moritz Muehlenhoff at 2022-01-09T20:06:52+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -9,6 +9,8 @@ CVE-2022-22845 RESERVED CVE-2022-22844 (LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c i ...) - tiff + [bullseye] - tiff (Minor issue) + [buster] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/355 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/287 CVE-2022-22843 @@ -1569,9 +1571,9 @@ CVE-2021-46062 CVE-2021-46061 RESERVED CVE-2021-46060 (A NULL Pointer Dereference vulnerability exists in GNU inetutils 2.2 v ...) - - inetutils + - inetutils (unimportant) NOTE: https://lists.gnu.org/archive/html/bug-inetutils/2021-12/msg00017.html - TODO: check details + NOTE: Crash in CLI tool, no security impact CVE-2021-46059 (A Pointer Dereference vulnerability exists in Vim 8.2.3883 via the vim ...) - vim 2:8.2.3995-1 [bullseye] - vim (Minor issue) @@ -1967,6 +1969,8 @@ CVE-2021-45931 (HarfBuzz 2.9.0 has an out-of-bounds write in hb_bit_set_invertib TODO: check correctness of commit, might not affect any Debian released version CVE-2021-45930 (Qt SVG in Qt 5.0.0 through 5.15.2 and 6.0.0 through 6.2.1 has an out-o ...) - qtsvg-opensource-src 5.15.2-4 (bug #1002991) + [bullseye] - qtsvg-opensource-src (Minor issue) + [buster] - qtsvg-opensource-src (Minor issue) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37025 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37306 NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qt/OSV-2021-1121.yaml = data/dsa-needed.txt = @@ -24,6 +24,8 @@ condor -- faad2/oldstable (jmm) -- +librecad +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v4.19.y versions. View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f6bf1612701684e094b80bf8d25df461d96f9b27 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f6bf1612701684e094b80bf8d25df461d96f9b27 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 38011ab3 by Moritz Mühlenhoff at 2022-01-04T17:16:49+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -834,6 +834,8 @@ CVE-2021-45961 RESERVED CVE-2022-0080 (mruby is vulnerable to Heap-based Buffer Overflow ...) - mruby + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) NOTE: https://huntr.dev/bounties/59a70392-4864-4ce3-8e35-6ac2111d1e2e/ NOTE: https://github.com/mruby/mruby/commit/28ccc664e5dcd3f9d55173e9afde77c4705a9ab6 CVE-2021-45960 (In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) pla ...) @@ -1087,9 +1089,13 @@ CVE-2021-4189 [ftplib should not use the host from the PASV response] RESERVED - python3.10 (Fixed before initial upload to Debian unstable) - python3.9 3.9.7-1 + [bullseye] - python3.9 (Minor issue) - python3.7 + [buster] - python3.7 (Minor issue) - python3.5 - python2.7 + [bullseye] - python2.7 (Python 2.7 in Bullseye not covered by security support) + [buster] - python2.7 (Minor issue) NOTE: https://bugs.python.org/issue43285 NOTE: https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) NOTE: https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) @@ -4298,6 +4304,8 @@ CVE-2021-45041 (SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated NOT-FOR-US: SuiteCRM CVE-2021-4110 (mruby is vulnerable to NULL Pointer Dereference ...) - mruby (bug #1001768) + [bullseye] - mruby (Minor issue) + [buster] - mruby (Minor issue) [stretch] - mruby (revisit when/if fix is complete) NOTE: https://huntr.dev/bounties/4ce5dc47-2512-4c87-8609-453adc8cad20 NOTE: https://github.com/mruby/mruby/commit/f5e10c5a79a17939af763b1dcf5232ce47e24a34 @@ -4756,6 +4764,8 @@ CVE-2021-44848 (In Cibele Thinfinity VirtualUI before 3.0, /changePassword retur NOT-FOR-US: Cibele Thinfinity VirtualUI CVE-2021-44847 (A stack-based buffer overflow in handle_request function in DHT.c in t ...) - libtoxcore 0.2.13-1 (bug #1001711) + [bullseye] - libtoxcore (Minor issue) + [buster] - libtoxcore (Minor issue) NOTE: https://github.com/TokTok/c-toxcore/pull/1718 NOTE: https://blog.tox.chat/2021/12/stack-based-buffer-overflow-vulnerability-in-udp-packet-handling-in-toxcore-cve-2021-44847/ NOTE: Introduced by: https://github.com/TokTok/c-toxcore/commit/71260e38e8d12547b0e55916daf6cadd72f52e19 (v0.1.9) @@ -16602,11 +16612,13 @@ CVE-2021-41497 (Null pointer reference in CMS_Conservative_increment_obj in RaRe NOT-FOR-US: RaRe-Technologies bounter CVE-2021-41496 (Buffer overflow in the array_from_pyobj function of fortranobject.c in ...) - numpy + [bullseye] - numpy (Minor issue) NOTE: https://github.com/numpy/numpy/issues/19000 NOTE: https://github.com/numpy/numpy/pull/20630 NOTE: https://github.com/numpy/numpy/commit/271010f1037150e95017f803f4214b8861e528f2 CVE-2021-41495 (Null Pointer Dereference vulnerability exists in numpy.sort in NumPy & ...) - numpy + [bullseye] - numpy (Minor issue) NOTE: https://github.com/numpy/numpy/issues/19038 TODO: check for classification/severity CVE-2021-41494 @@ -26994,6 +27006,8 @@ CVE-2021-37233 RESERVED CVE-2021-37232 (A stack overflow vulnerability occurs in Atomicparsley 20210124.204813 ...) - atomicparsley 20210715.151551.e7ad03a-1 (bug #993366) + [bullseye] - atomicparsley (Minor issue) + [buster] - atomicparsley (Minor issue) [stretch] - atomicparsley (Minor issue) - gtkpod (bug #993376) [bullseye] - gtkpod (Minor issue) @@ -27003,6 +27017,8 @@ CVE-2021-37232 (A stack overflow vulnerability occurs in Atomicparsley 20210124. NOTE: https://github.com/wez/atomicparsley/issues/32 CVE-2021-37231 (A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499 ...) - atomicparsley 20210715.151551.e7ad03a-1 (bug #993372) + [bullseye] - atomicparsley (Minor issue) + [buster] - atomicparsley (Minor issue) [stretch] - atomicparsley (Minor issue) - gtkpod (bug #993375) [bullseye] - gtkpod (Minor issue) @@ -34279,9 +34295,9 @@ CVE-2021-34142 RESERVED CVE-2021-34141 (Incomplete string comparison in the numpy.core component in NumPy1.9.x ...) - numpy + [bullseye] - numpy (Minor issue) NOTE: https://github.com/numpy/numpy/issues/18993 NOTE: https://github.com/numpy/numpy/commit/eeef9d4646103c3b1afd3085f1393f2b3f9575b2
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 4790e347 by Moritz Muehlenhoff at 2022-01-03T15:29:07+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -6963,6 +6963,8 @@ CVE-2021-43855 (Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earl NOT-FOR-US: Wiki.js CVE-2021-43854 (NLTK (Natural Language Toolkit) is a suite of open source Python modul ...) - nltk (bug #1002623) + [bullseye] - nltk (Minor issue) + [buster] - nltk (Minor issue) NOTE: https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x NOTE: https://github.com/nltk/nltk/issues/2866 NOTE: https://github.com/nltk/nltk/pull/2869 @@ -10543,7 +10545,9 @@ CVE-2021-43173 (In NLnet Labs Routinator prior to 0.10.2, a validation run can b CVE-2021-43172 (NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRD ...) - routinator (bug #929024) - fort-validator + [bullseye] - fort-validator (Minor issue, revisit when fixed upstream) - cfrpki + [bullseye] - cfrpki (Minor issue, revisit when fixed upstream) - rpki-client 7.5-1 NOTE: https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt NOTE: https://github.com/NLnetLabs/routinator/pull/665 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4790e3475603ca694671aeb453f87db9d0ca2677 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4790e3475603ca694671aeb453f87db9d0ca2677 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a683fc19 by Moritz Muehlenhoff at 2022-01-03T11:44:28+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -307,6 +307,8 @@ CVE-2021-45919 RESERVED CVE-2021-4190 (Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-22.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17811 CVE-2021-4189 [ftplib should not use the host from the PASV response] @@ -546,26 +548,38 @@ CVE-2021-45885 (An issue was discovered in Stormshield Network Security (SNS) 4. NOT-FOR-US: Stormshield Network Security (SNS) CVE-2021-4186 (Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows den ...) - wireshark 3.6.0-1 + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-16.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17737 CVE-2021-4185 (Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3 ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-17.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17745 CVE-2021-4184 (Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3 ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-18.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17754 CVE-2021-4183 (Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of se ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-19.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17755 CVE-2021-4182 (Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-20.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17801 CVE-2021-4181 (Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3. ...) - wireshark + [bullseye] - wireshark (Minor issue) + [buster] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2021-21.html NOTE: https://gitlab.com/wireshark/wireshark/-/merge_requests/5429 CVE-2021-45884 (In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based a ...) @@ -1511,6 +1525,8 @@ CVE-2021-45464 RESERVED CVE-2021-45463 (GEGL before 0.4.34, as used (for example) in GIMP before 2.10.30, allo ...) - gegl 1:0.4.34-1 (bug #1002661) + [bullseye] - gegl (Minor issue) + [buster] - gegl (Minor issue) [stretch] - gegl (Minor issue; can be fixed later) NOTE: Fixed by: https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b (GEGL_0_4_34) NOTE: Followup: https://gitlab.gnome.org/GNOME/gegl/-/commit/2172cf7e8d7e8891ae2053d6eef213d5bef939cb (GEGL_0_4_34) = data/dsa-needed.txt = @@ -27,6 +27,8 @@ condor -- faad2/oldstable (jmm) -- +ghostscript +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v4.19.y versions. View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a683fc19f56af499938ee5f02a09f9e872676cf4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a683fc19f56af499938ee5f02a09f9e872676cf4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0f729fa7 by Moritz Muehlenhoff at 2021-12-23T17:29:58+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -20,6 +20,8 @@ CVE-2021-4157 [pNFS/flexfiles: fix incorrect size check in decode_nfs_fh()] CVE-2021-4156 [heap out-of-bounds read in src/flac.c in flac_buffer_copy] RESERVED - libsndfile + [bullseye] - libsndfile (Minor issue) + [buster] - libsndfile (Minor issue) NOTE: https://github.com/libsndfile/libsndfile/issues/731 NOTE: https://github.com/libsndfile/libsndfile/commit/ced91d7b971be6173b604154c39279ce90ad87cc (1.1.0beta1) CVE-2021-4155 @@ -913,14 +915,20 @@ CVE-2021-45261 (An Invalid Pointer vulnerability exists in GNU patch 2.7 via the NOTE: Negligible security impact CVE-2021-45260 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the l ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/1979 TODO: check, fixing commit, cf. https://github.com/gpac/gpac/issues/1979#issuecomment-992471979 CVE-2021-45259 (An Invalid pointer reference vulnerability exists in gpac 1.1.0 via th ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/1986 NOTE: https://github.com/gpac/gpac/commit/654c796482c2609aa736315f9273d6c5912e0a29 CVE-2021-45258 (A stack overflow vulnerability exists in gpac 1.1.0 via the gf_bifs_de ...) - gpac + [bullseye] - gpac (Minor issue) + [buster] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/1970 NOTE: https://github.com/gpac/gpac/commit/47a26a32c9a2cd630c48517c3e6ab2fa5f6a26ad CVE-2021-45257 (An infinite loop vulnerability exists in nasm 2.16rc0 via the gpaste_t ...) @@ -14195,6 +14203,8 @@ CVE-2021-41501 RESERVED CVE-2021-41500 (Incomplete string comparison vulnerability exits in cvxopt.org cvxop & ...) - cvxopt 1.2.7+dfsg-1 + [bullseye] - cvxopt (Minor issue) + [buster] - cvxopt (Minor issue) NOTE: https://github.com/cvxopt/cvxopt/issues/193 CVE-2021-41499 (Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo ...) - python-pyo 1.0.4-1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f729fa73b827fecffa27a8b0e9e7320eb3e49ee -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0f729fa73b827fecffa27a8b0e9e7320eb3e49ee You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1cefdd8b by Moritz Muehlenhoff at 2021-12-13T16:45:45+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2992,6 +2992,8 @@ CVE-2021-43798 (Grafana is an open-source platform for monitoring and observabil - grafana CVE-2021-43797 (Netty is an asynchronous event-driven network application framework fo ...) - netty (bug #1001437) + [bullseye] - netty (Minor issue) + [buster] - netty (Minor issue) NOTE: https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq NOTE: https://github.com/netty/netty/commit/07aa6b5938a8b6ed7a6586e066400e2643897323 (netty-4.1.71.Final) CVE-2021-43796 @@ -31665,6 +31667,8 @@ CVE-2021-33179 (The general user interface in Nagios XI versions prior to 5.8.4 NOT-FOR-US: Nagios XI CVE-2021-33178 (The Manage Backgrounds functionality within Nagvis versions prior to 2 ...) - nagvis 1:1.9.29-1 + [bullseye] - nagvis (Minor issue) + [buster] - nagvis (Minor issue) TODO: check, affects nagvis plugin used in Nagios XI and should be fixed in 2.0.9, https://www.synopsys.com/blogs/software-security/cyrc-advisory-nagios-xi/ CVE-2021-33177 (The Bulk Modifications functionality in Nagios XI versions prior to 5. ...) NOT-FOR-US: Nagios XI @@ -77845,6 +77849,7 @@ CVE-2020-27512 CVE-2020-27511 (An issue was discovered in the stripTags and unescapeHTML components i ...) - prototypejs (bug #991898) [bullseye] - prototypejs (Minor issue) + [buster] - prototypejs (Minor issue) [stretch] - prototypejs (Minor issue) NOTE: https://github.com/prototypejs/prototype/blame/dee2f7d8611248abce81287e1be4156011953c90/src/prototype/lang/string.js#L283 NOTE: https://github.com/yetingli/PoCs/blob/main/CVE-2020-27511/Prototype.md @@ -107696,6 +107701,8 @@ CVE-2020-14425 (Foxit Reader before 10.0 allows Remote Command Execution via the NOT-FOR-US: Foxit Reader CVE-2020-14424 (Cacti before 1.2.18 allows remote attackers to trigger XSS via templat ...) - cacti 1.2.19+ds1-1 + [bullseye] - cacti (Minor issue) + [buster] - cacti (Minor issue) [stretch] - cacti (Vulnerable code not present) NOTE: https://github.com/Cacti/cacti/pull/4261 NOTE: https://github.com/Cacti/cacti/commit/d12800ab479ad95a091bc577f28fd99ec95eb64c (release/1.2.18) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cefdd8b44ef101b84116f1569cee8fba2e77eb4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cefdd8b44ef101b84116f1569cee8fba2e77eb4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8914f268 by Moritz Muehlenhoff at 2021-12-09T11:20:09+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -62,6 +62,7 @@ CVE-2021-23145 RESERVED CVE-2021- [Rainloop stores passwords in cleartext in logfile] - rainloop 1.14.0-1 (bug #962629) + [buster] - rainloop (Minor issue) NOTE: https://github.com/RainLoop/rainloop-webmail/issues/1872 CVE-2021-44738 RESERVED @@ -598,7 +599,11 @@ CVE-2021-44477 RESERVED CVE-2021-4048 (An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, an ...) - lapack + [bullseye] - lapack (Minor issue) + [buster] - lapack (Minor issue) - openblas 0.3.18+ds-1 + [bullseye] - openblas (Minor issue) + [buster] - openblas (Minor issue) NOTE: https://github.com/Reference-LAPACK/lapack/pull/625 NOTE: https://github.com/Reference-LAPACK/lapack/commit/38f33108b18158409ca2a100e6fe03754781 NOTE: https://github.com/JuliaLang/julia/issues/42415 @@ -20588,6 +20593,8 @@ CVE-2021-37699 (Next.js is an open source website development framework to be us CVE-2021-37698 (Icinga is a monitoring system which checks the availability of network ...) {DLA-2816-1} - icinga2 2.13.1-1 + [bullseye] - icinga2 (Minor issue) + [buster] - icinga2 (Minor issue) NOTE: https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2 NOTE: https://icinga.com/blog/2021/08/19/icinga-2-13-1-security-release/ NOTE: https://github.com/Icinga/icinga2/commit/8910abc5882774c067dfc22cdf8bf8b830257608 (v2.12.6) @@ -32367,6 +32374,8 @@ CVE-2021-32743 (Icinga is a monitoring system which checks the availability of n {DLA-2816-1} [experimental] - icinga2 2.12.5-1~exp1 - icinga2 2.12.5-1 (bug #991494) + [bullseye] - icinga2 (Minor issue) + [buster] - icinga2 (Minor issue) NOTE: https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ NOTE: https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 NOTE: https://github.com/Icinga/icinga2/commit/843353ab69f79b3abfeb38ac249b05e1944369ab (v2.12.5) @@ -32383,6 +32392,8 @@ CVE-2021-32739 (Icinga is a monitoring system which checks the availability of n {DLA-2816-1} [experimental] - icinga2 2.12.5-1~exp1 - icinga2 2.12.5-1 (bug #991494) + [bullseye] - icinga2 (Minor issue) + [buster] - icinga2 (Minor issue) NOTE: https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ NOTE: https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5 NOTE: https://github.com/Icinga/icinga2/commit/b5b83fa51564662ff2e78d7529ff77e1085d4522 (v2.12.5) @@ -87804,6 +87815,8 @@ CVE-2020-23110 RESERVED CVE-2020-23109 (Buffer overflow vulnerability in function convert_colorspace in heif_c ...) - libheif + [bullseye] - libheif (Minor issue) + [buster] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/issues/207 CVE-2020-23108 RESERVED = data/dsa-needed.txt = @@ -48,6 +48,8 @@ python-pysaml2 (jmm) -- rabbitmq-server -- +ruby2.7 +-- runc -- sogo @@ -61,5 +63,5 @@ trafficserver (jmm) -- varnish -- -wireshark +wireshark (jmm) -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8914f26837165d32dd0f63bd306ba876ababecf8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8914f26837165d32dd0f63bd306ba876ababecf8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7e85cbf2 by Moritz Muehlenhoff at 2021-12-06T12:52:16+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1125,6 +1125,7 @@ CVE-2021-4024 [podman: podman machine spawns gvproxy with port binded to all IPs NOTE: Fixed by: https://github.com/containers/podman/commit/295d87bb0b028e57dc2739791dee4820fe5fcc48 CVE-2021-44227 (In GNU Mailman before 2.1.38, a list member or moderator can get a CSR ...) - mailman + [buster] - mailman (Minor issue) [stretch] - mailman (Minor issue; can be fixed with the next DLA) NOTE: https://bugs.launchpad.net/mailman/+bug/1952384 NOTE: Patch: https://launchpadlibrarian.net/570827498/patch.txt @@ -9086,6 +9087,8 @@ CVE-2021-42261 (Revisor Video Management System (VMS) before 2.0.0 has a directo NOT-FOR-US: Revisor Video Management System (VMS) CVE-2021-42260 (TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp ...) - tinyxml + [bullseye] - tinyxml (Minor issue) + [buster] - tinyxml (Minor issue) [stretch] - tinyxml (Minor issue; can be fixed with the next DLA) NOTE: https://sourceforge.net/p/tinyxml/bugs/141/ NOTE: https://sourceforge.net/p/tinyxml/git/merge-requests/1/ @@ -10306,6 +10309,7 @@ CVE-2021-41771 (ImportedSymbols in debug/macho (for Open or OpenFat) in Go befor - golang-1.15 [bullseye] - golang-1.15 (Minor issue; will be fixed via point release) - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 - golang-1.7 [stretch] - golang-1.7 (Minor issue; can be fixed with the next DLA) @@ -13730,6 +13734,8 @@ CVE-2021-40331 RESERVED CVE-2021-3756 (libmysofa is vulnerable to Heap-based Buffer Overflow ...) - libmysofa 1.2.1~dfsg0-1 + [bullseye] - libmysofa (Minor issue) + [buster] - libmysofa (Minor issue) NOTE: https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/ NOTE: https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 (v1.2.1) CVE-2021-3755 @@ -42499,7 +42505,6 @@ CVE-2021-28703 NOTE: https://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=c65ea16dbcafbe4fe21693b18f8c2a3c5d14600e (4.14.0-rc1) CVE-2021-28702 (PCI devices with RMRRs not deassigned correctly Certain PCI devices in ...) - xen 4.14.3+32-g9de3671772-1 - [bullseye] - xen (Minor issue, fix along with next DSA) [buster] - xen (Vulnerable code introduced later) [stretch] - xen (Vulnerable code introduced later) NOTE: https://xenbits.xen.org/xsa/advisory-386.html @@ -56328,6 +56333,7 @@ CVE-2021-22943 (A vulnerability found in UniFi Protect application V1.18.1 and e CVE-2021-22942 (A possible open redirect vulnerability in the Host Authorization middl ...) [experimental] - rails 2:6.1.4.1+dfsg-1 - rails (bug #992586) + [bullseye] - rails (Minor issue) [buster] - rails (Vulnerable code not present) [stretch] - rails (Vulnerable code not present) NOTE: https://www.openwall.com/lists/oss-security/2021/08/20/1 @@ -61686,6 +61692,7 @@ CVE-2021-21306 (Marked is an open-source markdown parser and compiler (npm packa NOTE: https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd CVE-2021-21305 (CarrierWave is an open-source RubyGem which provides a simple and flex ...) - ruby-carrierwave (bug #982551) + [buster] - ruby-carrierwave (Minor issue) [stretch] - ruby-carrierwave (No reverse dependencies) NOTE: https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4 NOTE: https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7 @@ -61741,6 +61748,7 @@ CVE-2021-21289 (Mechanize is an open-source ruby library that makes automated we NOTE: Test warnings fixup: https://github.com/sparklemotion/mechanize/commit/5b30aed33cbac9825e8978f8e36dd221cbd4c093 (v2.7.7) CVE-2021-21288 (CarrierWave is an open-source RubyGem which provides a simple and flex ...) - ruby-carrierwave 1.3.2-1 (bug #982552) + [buster] - ruby-carrierwave (Minor issue) [stretch] - ruby-carrierwave (No reverse dependencies) NOTE: https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5 NOTE: https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0 = data/dsa-needed.txt = @@ -17,16 +17,15 @@ asterisk/oldstable condor -- chromium + inactive, removal from stable likely
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8986aaa7 by Moritz Muehlenhoff at 2021-12-01T19:51:12+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -11303,6 +11303,8 @@ CVE-2021-41126 (October is a Content Management System (CMS) and web platform bu NOT-FOR-US: October CMS CVE-2021-41125 (Scrapy is a high-level web crawling and scraping framework for Python. ...) - python-scrapy 2.5.1-1 + [bullseye] - python-scrapy (Minor issue) + [buster] - python-scrapy (Minor issue) NOTE: https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498 CVE-2021-41124 (Scrapy-splash is a library which provides Scrapy and JavaScript integr ...) NOT-FOR-US: Scrapy-splash @@ -74019,6 +74021,7 @@ CVE-2020-28164 CVE-2020-28163 RESERVED - dwarfutils 20201201-1 + [buster] - dwarfutils (Minor issue) NOTE: https://github.com/davea42/libdwarf-code/commit/faf99408e3f9f706fc3809dd400e831f989778d3 NOTE: https://www.prevanders.net/dwarfbug.html#DW202010-003 CVE-2020-28162 @@ -76349,6 +76352,7 @@ CVE-2020-27546 CVE-2020-27545 RESERVED - dwarfutils 20201201-1 + [buster] - dwarfutils (Minor issue) NOTE: https://www.prevanders.net/dwarfbug.html#DW202010-001 NOTE: https://github.com/davea42/libdwarf-code/commit/95f634808c01f1c61bbec56ed2395af997f397ea CVE-2020-27544 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8986aaa79834cd2ce0c408c216d1e2e6f12276b1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8986aaa79834cd2ce0c408c216d1e2e6f12276b1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e688eed0 by Moritz Muehlenhoff at 2021-11-29T16:19:24+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2893,6 +2893,7 @@ CVE-2021-43520 RESERVED CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 a ...) - lua5.4 (bug #1000228) + [bullseye] - lua5.4 (Minor issue) - lua5.3 [bullseye] - lua5.3 (Minor issue) [buster] - lua5.3 (Minor issue) @@ -3152,6 +3153,8 @@ CVE-2021-3931 (snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) ...) CVE-2021-3930 [off-by-one error in mode_sense_page() in hw/scsi/scsi-disk.c] RESERVED - qemu + [bullseye] - qemu (Minor issue) + [buster] - qemu (Minor issue) [stretch] - qemu (Fix along with a future DLA) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2020588 NOTE: https://gitlab.com/qemu-project/qemu/-/issues/546 @@ -3182,12 +3185,11 @@ CVE-2021-43393 CVE-2021-43392 RESERVED CVE-2021-43396 (** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka ...) - - glibc (bug #998622) - [buster] - glibc (Vulnerable code not present) - [stretch] - glibc (Vulnerable code not present) + - glibc (unimportant; bug #998622) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28524 NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=ff012870b2c02a62598c04daa1e54632e020fd7d NOTE: Introduced by the fix for CVE-2021-3326 / BZ#27256: https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888 + NOTE: No security impact per upstream assessment CVE-2021-43391 (An Out-of-Bounds Read vulnerability exists when reading a DXF file usi ...) NOT-FOR-US: Open Design Alliance Drawings SDK CVE-2021-43390 (An Out-of-Bounds Write vulnerability exists when reading a DGN file us ...) @@ -8680,6 +8682,7 @@ CVE-2021-42007 RESERVED CVE-2021-42006 (An out-of-bounds access in GffLine::GffLine in gff.cpp in GCLib 0.12.7 ...) - libgclib 0.12.7+ds-2 (bug #996591) + [bullseye] - libgclib (Minor issue) NOTE: https://github.com/gpertea/gclib/issues/11 CVE-2021-42005 RESERVED @@ -17883,6 +17886,7 @@ CVE-2020-36466 (An issue was discovered in the cgc crate through 2020-12-10 for NOT-FOR-US: Rust crate cgc CVE-2020-36465 (An issue was discovered in the generic-array crate before 0.13.3 for R ...) - rust-generic-array 0.14.4-1 + [buster] - rust-generic-array (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0146.html CVE-2020-36464 (An issue was discovered in the heapless crate before 0.6.1 for Rust. T ...) NOT-FOR-US: Rust crate heapless @@ -32563,8 +32567,8 @@ CVE-2021-32066 (An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7 {DLA-2780-1} - ruby2.7 2.7.4-1 (bug #990815) - ruby2.5 + [buster] - ruby2.5 (Minor issue) - ruby2.3 - [buster] - ruby2.3 (Minor issue) - jruby [buster] - jruby (Minor issue) [stretch] - jruby (Minor issue) @@ -58284,7 +58288,9 @@ CVE-2021-21707 (In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x - php8.1 8.1.0-1 - php8.0 - php7.4 + [bullseye] - php7.4 (Minor issue, fix along with next DSA) - php7.3 + [buster] - php7.3 (Minor issue, fix along with next DSA) - php7.0 NOTE: Fixed in 8.1.0, 8.0.13, 7.4.26, 7.3.33 NOTE: PHP Bug: https://bugs.php.net/79971 @@ -73350,6 +73356,7 @@ CVE-2020-28201 RESERVED CVE-2020-28200 (The Sieve engine in Dovecot before 2.3.15 allows Uncontrolled Resource ...) - dovecot 1:2.3.16+dfsg1-1 (bug #990566; bug #991323) + [bullseye] - dovecot (Minor issue, fix along with next update) [buster] - dovecot (Minor issue, fix along with next update) [stretch] - dovecot (Minor issue) NOTE: https://dovecot.org/pipermail/dovecot-news/2021-June/000460.html @@ -84524,6 +84531,7 @@ CVE-2020-23885 RESERVED CVE-2020-23884 (A buffer overflow in Nomacs v3.15.0 allows attackers to cause a denial ...) - nomacs + [buster] - nomacs (Minor issue) [stretch] - nomacs (Minor issue) NOTE: https://github.com/nomacs/nomacs/issues/516 CVE-2020-23883 = data/dsa-needed.txt = @@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +asterisk/oldstable -- condor -- @@ -33,6 +35,9 @@ ndpi/oldstable -- nodejs (jmm) --
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 91b14bd7 by Moritz Muehlenhoff at 2021-11-24T13:48:44+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -100581,16 +100581,22 @@ CVE-2020-16157 (A Stored XSS vulnerability exists in Nagios Log Server before 2. CVE-2020-16156 [Signature Verification Bypass] RESERVED - perl + [bullseye] - perl (Minor issue) + [buster] - perl (Minor issue) NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html CVE-2020-16155 [does not uniquely define signed data] RESERVED - libcpan-checksums-perl + [bullseye] - libcpan-checksums-perl (Minor issue) + [buster] - libcpan-checksums-perl (Minor issue) NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html CVE-2020-16154 [Signature Verification Bypass] RESERVED - cpanminus + [bullseye] - cpanminus (Minor issue) + [buster] - cpanminus (Minor issue) NOTE: https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ NOTE: http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html CVE-2020-16153 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91b14bd7f23100923b81874367b749e50546aa16 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91b14bd7f23100923b81874367b749e50546aa16 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0b4ea1d4 by Moritz Muehlenhoff at 2021-11-24T09:36:30+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2929,6 +2929,8 @@ CVE-2021-43399 RESERVED CVE-2021-43398 (Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in ...) - libcrypto++ (bug #1000227) + [bullseye] - libcrypto++ (Minor issue) + [buster] - libcrypto++ (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/1080 CVE-2021-43397 (LiquidFiles before 3.6.3 allows remote attackers to elevate their priv ...) NOT-FOR-US: LiquidFiles @@ -19126,6 +19128,8 @@ CVE-2021-37593 (PEEL Shopping version 9.4.0 allows remote SQL injection. A publi NOT-FOR-US: PEEL Shopping CVE-2021-37592 (Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a cl ...) - suricata 1:6.0.4-1 + [bullseye] - suricata (Minor issue) + [buster] - suricata (Minor issue) NOTE: https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 NOTE: https://redmine.openinfosecfoundation.org/issues/4569 (not public) CVE-2021-37591 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b4ea1d4c378f2c21103bd762c5e3c60b692d046 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0b4ea1d4c378f2c21103bd762c5e3c60b692d046 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: c72c97f8 by Moritz Muehlenhoff at 2021-11-22T12:02:05+01:00 buster/bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2065,6 +2065,8 @@ CVE-2021-3957 (kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) ...) NOT-FOR-US: kimai2 CVE-2021-43616 (The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an i ...) - npm + [bullseye] - npm (Minor issue) + [buster] - npm (Minor issue) NOTE: https://github.com/npm/cli/issues/2701 CVE-2021-43615 RESERVED @@ -4158,6 +4160,8 @@ CVE-2021-43175 RESERVED CVE-2021-3918 (json-schema is vulnerable to Improperly Controlled Modification of Obj ...) - node-json-schema 0.4.0+~7.0.9-1 (bug #999765) + [bullseye] - node-json-schema (Minor issue) + [buster] - node-json-schema (Minor issue) NOTE: https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741 (v0.4.0) CVE-2021-43174 (NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, suppo ...) - routinator (bug #929024) @@ -5190,6 +5194,8 @@ CVE-2020-36490 (DedeCMS v7.5 SP2 was discovered to contain multiple cross-site s NOT-FOR-US: DedeCMS CVE-2021- [RUSTSEC-2020-0159: Potential segfault in localtime_r invocations] - rust-chrono (bug #996913) + [bullseye] - rust-chrono (Minor issue) + [buster] - rust-chrono (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0159.html NOTE: https://github.com/chronotope/chrono/issues/499 CVE-2021-42742 @@ -28404,6 +28410,7 @@ CVE-2021-33516 (An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2. NOTE: https://gitlab.gnome.org/GNOME/gupnp/-/commit/ca6ec9dcb26fd7a2a630eb6a68118659b589afac (master) CVE-2021-33515 (The submission service in Dovecot before 2.3.15 allows STARTTLS comman ...) - dovecot 1:2.3.13+dfsg1-2 (bug #990566) + [bullseye] - dovecot (Minor issue, fix along with next update) [buster] - dovecot (Minor issue, fix along with next update) [stretch] - dovecot (Vulnerable code (smtp_server_command queue) introduced later) NOTE: https://dovecot.org/pipermail/dovecot-news/2021-June/000462.html @@ -83872,9 +83879,13 @@ CVE-2020-23905 RESERVED CVE-2020-23904 (A stack buffer overflow in speexenc.c of Speex v1.2 allows attackers t ...) - speex + [bullseye] - speex (Minor issue) + [buster] - speex (Minor issue) NOTE: https://github.com/xiph/speex/issues/14 CVE-2020-23903 (A Divide by Zero vulnerability in the function static int read_samples ...) - speex + [bullseye] - speex (Minor issue) + [buster] - speex (Minor issue) NOTE: https://github.com/xiph/speex/issues/13 CVE-2020-23902 (A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a d ...) NOT-FOR-US: WildBit Viewer View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c72c97f8af266b80bb36db2848903881fd1f894d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c72c97f8af266b80bb36db2848903881fd1f894d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ca0a644c by Moritz Muehlenhoff at 2021-11-19T17:33:25+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -75,6 +75,8 @@ CVE-2021-3976 CVE-2021-3975 [segmentation fault during VM shutdown can lead to vdsm hung] RESERVED - libvirt 7.6.0-1 + [bullseye] - libvirt (Minor issue) + [buster] - libvirt (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2024326 NOTE: Fixed by: https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7 (v7.1.0-rc2) CVE-2021-44025 (Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in han ...) @@ -2234,8 +2236,14 @@ CVE-2021-43520 CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 a ...) - lua5.4 - lua5.3 + [bullseye] - lua5.3 (Minor issue) + [buster] - lua5.3 (Minor issue) - lua5.2 + [bullseye] - lua5.2 (Minor issue) + [buster] - lua5.2 (Minor issue) - lua5.1 + [bullseye] - lua5.1 (Minor issue) + [buster] - lua5.1 (Minor issue) NOTE: http://lua-users.org/lists/lua-l/2021-10/msg00123.html NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00015.html NOTE: Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868 @@ -5096,11 +5104,15 @@ CVE-2021-42717 RESERVED CVE-2021-42716 (An issue was discovered in stb stb_image.h 2.27. The PNM loader incorr ...) - libstb + [bullseye] - libstb (Minor issue) + [buster] - libstb (Minor issue) NOTE: https://github.com/nothings/stb/issues/1166 NOTE: https://github.com/nothings/stb/issues/1225 NOTE: https://github.com/nothings/stb/pull/1223 CVE-2021-42715 (An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR ...) - libstb + [bullseye] - libstb (Minor issue) + [buster] - libstb (Minor issue) NOTE: https://github.com/nothings/stb/issues/1224 NOTE: https://github.com/nothings/stb/pull/1223 CVE-2021-42714 = data/dsa-needed.txt = @@ -55,3 +55,5 @@ trafficserver (jmm) -- varnish -- +wireshark +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ca0a644cbf14fd2ef7bde52692ef572a4de15ce4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ca0a644cbf14fd2ef7bde52692ef572a4de15ce4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 4211c616 by Moritz Muehlenhoff at 2021-11-03T16:11:26+01:00 buster/bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -7234,18 +7234,23 @@ CVE-2021-41093 (Wire is an open source secure messenger. In affected versions if NOT-FOR-US: Wire iOS CVE-2021-41092 (Docker CLI is the command line interface for the docker container runt ...) - docker.io (bug #998292) + [bullseye] - docker.io (Minor issue) + [buster] - docker.io (Minor issue) NOTE: https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v NOTE: https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b CVE-2021-41091 (Moby is an open-source project created by Docker to enable software co ...) - docker.io + [bullseye] - docker.io (Minor issue) + [buster] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-3fwx-pjgw-3558 NOTE: https://github.com/moby/moby/commit/f0ab919f518c47240ea0e72d0999576bb8008e64 CVE-2021-41090 RESERVED CVE-2021-41089 (Moby is an open-source project created by Docker to enable software co ...) - docker.io + [bullseye] - docker.io (Minor issue) + [buster] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-v994-f8vw-g7j4 - TODO: check details CVE-2021-41088 (Elvish is a programming language and interactive shell, combined into ...) - elvish 0.14.0-1 [buster] - elvish (Minor issue) @@ -15619,25 +15624,35 @@ CVE-2021-37624 (FreeSWITCH is a Software Defined Telecom Stack enabling the digi NOTE: https://github.com/signalwire/freeswitch/security/advisories/GHSA-mjcm-q9h8-9xv3 CVE-2021-37623 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq NOTE: https://github.com/Exiv2/exiv2/pull/1790 CVE-2021-37622 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv NOTE: https://github.com/Exiv2/exiv2/pull/1788 CVE-2021-37621 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg NOTE: https://github.com/Exiv2/exiv2/pull/1778 CVE-2021-37620 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728 NOTE: https://github.com/Exiv2/exiv2/pull/1769 CVE-2021-37619 (Exiv2 is a command-line utility and C++ library for reading, writing, ...) - exiv2 + [bullseye] - exiv2 (Minor issue) + [buster] - exiv2 (Minor issue) [stretch] - exiv2 (Minor issue) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v NOTE: https://github.com/Exiv2/exiv2/pull/1752 = data/dsa-needed.txt = @@ -56,5 +56,8 @@ tomcat9 from previous CVE-2021-30640 and another non-security fix for #987179, might need a SRM ack. -- +trafficserver (jmm) + wait until status for CVE-2021-38161 is clarified (upstream patch got reverted) +-- varnish -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4211c616563795a774305ffa87f9435ab6adbe76 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4211c616563795a774305ffa87f9435ab6adbe76 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits