Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits: e4218a6c by Thorsten Alteholz at 2021-08-29T23:30:50+02:00 mark CVE-2021-39272 as no-dsa for Stretch - - - - - e419aedf by Thorsten Alteholz at 2021-08-29T23:32:12+02:00 mark CVE-2021-38559 as no-dsa for Stretch - - - - - f2e56ad1 by Thorsten Alteholz at 2021-08-29T23:38:25+02:00 mark CVE-2021-32798 as no-dsa for Stretch - - - - - 90290d61 by Thorsten Alteholz at 2021-08-29T23:40:42+02:00 follow sec team and mark several CVEs of libelfin as no-dsa - - - - - 15d1e501 by Thorsten Alteholz at 2021-08-29T23:43:11+02:00 follow sec team and mark several CVEs of liblivemedia as ignored - - - - - 6e9fb5d5 by Thorsten Alteholz at 2021-08-29T23:46:32+02:00 mark CVE-2020-21677 as no-dsa for Stretch - - - - - db1b1cf5 by Thorsten Alteholz at 2021-08-29T23:57:16+02:00 mark CVE-2021-32804 and CVE-2021-32803 as not-affected for Stretch - - - - - 8f581df5 by Thorsten Alteholz at 2021-08-29T23:59:08+02:00 mark CVE-2021-3654 as no-dsa for Stretch - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1916,10 +1916,12 @@ CVE-2021-39284 CVE-2021-39283 (liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion ...) - liblivemedia <removed> [buster] - liblivemedia <ignored> (Minor issue) + [stretch] - liblivemedia <ignored> (Minor issue) NOTE: http://lists.live555.com/pipermail/live-devel/2021-August/021969.html CVE-2021-39282 (Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 ...) - liblivemedia <removed> [buster] - liblivemedia <ignored> (Minor issue) + [stretch] - liblivemedia <ignored> (Minor issue) NOTE: http://lists.live555.com/pipermail/live-devel/2021-August/021970.html CVE-2021-39281 RESERVED @@ -1947,6 +1949,7 @@ CVE-2021-39272 [TLS bypass vulnerabilities ("NO STARTTLS")] - fetchmail <unfixed> (bug #993163) [bullseye] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist) [buster] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist) + [stretch] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist) NOTE: https://www.fetchmail.info/fetchmail-SA-2021-02.txt CVE-2021-39271 RESERVED @@ -3516,6 +3519,7 @@ CVE-2021-38559 (DigitalDruid HotelDruid 3.0.2 has an XSS vulnerability in prenot - hoteldruid <unfixed> [bullseye] - hoteldruid <no-dsa> (Minor issue) [buster] - hoteldruid <no-dsa> (Minor issue) + [stretch] - hoteldruid <no-dsa> (Minor issue) CVE-2021-38558 RESERVED CVE-2021-38557 (raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as ...) @@ -7065,6 +7069,7 @@ CVE-2021-3654 [novnc allows open redirection] - nova 2:23.0.2-3 (bug #991441) [bullseye] - nova <no-dsa> (Minor issue) [buster] - nova <no-dsa> (Minor issue) + [stretch] - nova <no-dsa> (Minor issue) NOTE: https://bugs.launchpad.net/nova/+bug/1927677 CVE-2021-26263 RESERVED @@ -16772,12 +16777,14 @@ CVE-2021-32804 (The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0. - node-tar 6.1.7+~cs11.3.10-1 (bug #992111) [bullseye] - node-tar <no-dsa> (Minor issue) [buster] - node-tar <no-dsa> (Minor issue) + [stretch] - node-tar <not-affected> (Vulnerable code introduced later) NOTE: https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9 NOTE: https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4 CVE-2021-32803 (The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4 ...) - node-tar 6.1.7+~cs11.3.10-1 (bug #992110) [bullseye] - node-tar <no-dsa> (Minor issue) [buster] - node-tar <no-dsa> (Minor issue) + [stretch] - node-tar <not-affected> (Vulnerable code introduced later) NOTE: https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw NOTE: https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20 CVE-2021-32802 @@ -16792,6 +16799,7 @@ CVE-2021-32798 (The Jupyter notebook is a web-based notebook environment for int - jupyter-notebook <unfixed> (bug #992704) [bullseye] - jupyter-notebook <no-dsa> (Minor issue) [buster] - jupyter-notebook <no-dsa> (Minor issue) + [stretch] - jupyter-notebook <no-dsa> (Minor issue) NOTE: https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797 NOTE: https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5 CVE-2021-32797 (JupyterLab is a user interface for Project Jupyter which will eventual ...) @@ -67833,42 +67841,49 @@ CVE-2020-24827 (A vulnerability in the dwarf::cursor::skip_form function of Libe - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/47 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc181 CVE-2020-24826 (A vulnerability in the elf::section::as_strtab function of Libelfin v0 ...) - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/49 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-elfsectionas_strtab-at-elfelfcc284 CVE-2020-24825 (A vulnerability in the line_table::line_table function of Libelfin v0. ...) - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/46 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-line_tableline_table-at-dwarflinecc104 CVE-2020-24824 (A global buffer overflow issue in the dwarf::line_table::line_table fu ...) - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/48 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#global-buffer-overflow-in-function-dwarfline_tableline_table-at-dwarflinecc107 CVE-2020-24823 (A vulnerability in the dwarf::to_string function of Libelfin v0.3 allo ...) - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/51 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfto_string-at-dwarfvaluecc300 CVE-2020-24822 (A vulnerability in the dwarf::cursor::uleb function of Libelfin v0.3 a ...) - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/50 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursoruleb128-at-dwarfinternalhh154 CVE-2020-24821 (A vulnerability in the dwarf::cursor::skip_form function of Libelfin v ...) - libelfin <unfixed> [bullseye] - libelfin <no-dsa> (Minor issue) [buster] - libelfin <no-dsa> (Minor issue) + [stretch] - libelfin <no-dsa> (Minor issue) NOTE: https://github.com/aclements/libelfin/issues/52 NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc191 CVE-2020-24820 @@ -74641,6 +74656,7 @@ CVE-2020-21678 (A global buffer overflow in the genmp_writefontmacro_latex compo CVE-2020-21677 (A heap-based buffer overflow in the sixel_encoder_output_without_macro ...) - libsixel 1.8.6-1 [buster] - libsixel <no-dsa> (Minor issue) + [stretch] - libsixel <no-dsa> (Minor issue) NOTE: https://github.com/saitoha/libsixel/issues/123 NOTE: https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component in genp ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/44a195a9d117d7013626f0d594a22d5e02d6bde6...8f581df5eb6b841801b57aa2d50c0d092117ca51 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/44a195a9d117d7013626f0d594a22d5e02d6bde6...8f581df5eb6b841801b57aa2d50c0d092117ca51 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits