[Git][security-tracker-team/security-tracker][master] buster triage
Moritz Muehlenhoff
jmm at debian.org
Tue Nov 3 19:59:24 GMT 2020
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a12e5d69 by Moritz Muehlenhoff at 2020-11-03T20:59:06+01:00
buster triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -364,6 +364,7 @@ CVE-2020-28031 (eramba through c2.8.1 allows HTTP Host header injection with (fo
NOT-FOR-US: eramba
CVE-2020-28030 (In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was ...)
- wireshark <unfixed>
+ [buster] - wireshark <postponed> (Minor issue, can be fixed along in next DSA)
NOTE: https://gitlab.com/wireshark/wireshark/-/commit/b287e7165e8aa89cde6ae37e7c257c5d87d16b9b
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/16887
NOTE: https://www.wireshark.org/security/wnpa-sec-2020-15.html
@@ -1146,8 +1147,7 @@ CVE-2020-27745
CVE-2020-27744 (An issue was discovered on Western Digital My Cloud NAS devices before ...)
NOT-FOR-US: Western Digital My Cloud NAS devices
CVE-2020-27743 (libtac in pam_tacplus through 1.5.1 lacks a check for a failure of RAN ...)
- - libpam-tacplus <unfixed> (bug #973250)
- [stretch] - libpam-tacplus <not-affected> (support for RAND_pseudo_bytes added later)
+ - libpam-tacplus <not-affected> (Vulnerable code added later)
NOTE: https://github.com/kravietz/pam_tacplus/pull/163
NOTE: https://github.com/kravietz/pam_tacplus/security/advisories/GHSA-rp3p-jm35-jv76
CVE-2020-27742 (An Insecure Direct Object Reference vulnerability in Citadel WebCit th ...)
@@ -1168,6 +1168,7 @@ CVE-2020-27735
RESERVED
CVE-2018-21269 (checkpath in OpenRC through 0.42.1 might allow local users to take own ...)
- openrc <unfixed> (bug #973245)
+ [buster] - openrc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenRC/openrc/issues/201
NOTE: http://michael.orlitzky.com/cves/cve-2018-21269.xhtml
CVE-2020-27734
@@ -1813,6 +1814,7 @@ CVE-2020-27618 [iconv when processing invalid multi-byte input sequences fails t
CVE-2020-27617 [net: an assert failure via eth_get_gso_type]
RESERVED
- qemu <unfixed> (bug #973324)
+ [buster] - qemu <postponed> (Fix along in future DSA)
[stretch] - qemu <postponed> (Minor issue, fix along in future DLA)
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06023.html
CVE-2020-27616 [ati-vga: potential crash via invalid x y parameter values]
@@ -6119,6 +6121,7 @@ CVE-2020-25634
CVE-2020-25633 (A flaw was found in RESTEasy client in all versions of RESTEasy up to ...)
- resteasy <unfixed> (bug #970585)
- resteasy3.0 <unfixed>
+ [buster] - resteasy3.0 <ignored> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1879042
CVE-2020-25632
RESERVED
@@ -27926,6 +27929,7 @@ CVE-2020-15251 (In the Channelmgnt plug-in for Sopel (a Python IRC bot) before v
CVE-2020-15250 (In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryF ...)
{DLA-2426-1}
- junit4 4.13.1-1 (bug #972231)
+ [buster] - junit4 <no-dsa> (Minor issue)
NOTE: https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
NOTE: https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae
CVE-2020-15249
=====================================
data/dsa-needed.txt
=====================================
@@ -25,6 +25,8 @@ linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
releases to more recent v4.19.y versions.
--
+mupdf
+--
netty
--
pdns-recursor
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a12e5d6953fad1bf60da05d606cfc8969bae885e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a12e5d6953fad1bf60da05d606cfc8969bae885e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201103/31944426/attachment.html>
More information about the debian-security-tracker-commits
mailing list