[Git][security-tracker-team/security-tracker][master] buster triage

Moritz Muehlenhoff jmm at debian.org
Tue Apr 6 18:31:43 BST 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
cfb4f210 by Moritz Muehlenhoff at 2021-04-06T19:31:23+02:00
buster triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -439,6 +439,7 @@ CVE-2021-30002 (An issue was discovered in the Linux kernel before 5.11.3 when a
 CVE-2021-3482 [heap-based buffer overflow in Jp2Image::readMetadata() in jp2image.cpp]
 	RESERVED
 	- exiv2 <unfixed>
+	[buster] - exiv2 <no-dsa> (Minor issue)
 	NOTE: https://github.com/Exiv2/exiv2/issues/1522
 CVE-2021-3481 [Out of bounds read in function QRadialFetchSimd from crafted svg file]
 	RESERVED
@@ -1962,6 +1963,7 @@ CVE-2021-3469
 CVE-2021-3468 [Local DoS by event-busy-loop from writing long lines to /run/avahi-daemon/socket]
 	RESERVED
 	- avahi <unfixed> (bug #984938)
+	[buster] - avahi <no-dsa> (Minor issue)
 	NOTE: https://github.com/lathiat/avahi/pull/330
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1939614#c3
 CVE-2021-29262
@@ -15661,6 +15663,7 @@ CVE-2021-23336 (The package python/cpython from 0 and before 3.6.13, from 3.7.0
 	- python3.5 <removed>
 	- python2.7 <unfixed>
 	[bullseye] - python2.7 <ignored> (Python 2.7 in Bullseye not covered by security support)
+	[buster] - python2.7 <no-dsa> (Minor issue)
 	- pypy3 7.3.3+dfsg-3
 	[buster] - pypy3 <no-dsa> (Minor issue)
 	NOTE: https://github.com/python/cpython/pull/24297
@@ -20130,6 +20133,7 @@ CVE-2020-35922 (An issue was discovered in the mio crate before 0.7.6 for Rust.
 	TODO: check
 CVE-2020-35920 (An issue was discovered in the socket2 crate before 0.3.16 for Rust. I ...)
 	- rust-socket2 0.3.19-1
+	[buster] - rust-socket2 <no-dsa> (Minor issue)
 	NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0079.html
 	NOTE: https://github.com/rust-lang/socket2-rs/issues/119
 CVE-2020-35918 (An issue was discovered in the branca crate before 0.10.0 for Rust. De ...)
@@ -23649,8 +23653,9 @@ CVE-2021-20310
 CVE-2021-20309
 	RESERVED
 CVE-2021-20308 (Integer overflow in the htmldoc 1.9.11 and before may allow attackers  ...)
-	- htmldoc <unfixed>
+	- htmldoc <unfixed> (unimportant)
 	NOTE: https://github.com/michaelrsweet/htmldoc/issues/423
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-20307 (Format string vulnerability in panoFileOutputNamesCreate() in libpano1 ...)
 	- libpano13 2.9.20~rc3+dfsg-1 (bug #985249)
 	[buster] - libpano13 2.9.19+dfsg-3+deb10u1
@@ -23659,6 +23664,7 @@ CVE-2021-20306
 	RESERVED
 CVE-2021-20305 (A flaw was found in Nettle in versions before 3.7.2, where several Net ...)
 	- nettle 3.7.2-1 (bug #985652)
+	[buster] - nettle <no-dsa> (Minor issue)
 	NOTE: https://lists.lysator.liu.se/pipermail/nettle-bugs/2021/009457.html
 	NOTE: New functions ecc_mod_mul_canonical and ecc_mod_sqr_canonical:
 	NOTE: https://git.lysator.liu.se/nettle/nettle/-/commit/a63893791280d441c713293491da97c79c0950fe
@@ -23932,11 +23938,12 @@ CVE-2021-20244 (A flaw was found in ImageMagick in MagickCore/visual-effects.c.
 	NOTE: ImageMagick: https://github.com/ImageMagick/ImageMagick/commit/329dd528ab79531d884c0ba131e97d43f872ab5d
 	NOTE: In IM6 the code seems to be in magick/fx.c
 CVE-2021-20243 (A flaw was found in ImageMagick in MagickCore/resize.c. An attacker wh ...)
-	- imagemagick <undetermined>
+	- imagemagick <unfixed>
+	[bullseye] - imagemagick <ignored> (Minor issue)
 	[buster] - imagemagick <ignored> (Minor issue)
 	NOTE: https://github.com/ImageMagick/ImageMagick/pull/3193
 	NOTE: ImageMagick: https://github.com/ImageMagick/ImageMagick/commit/9751bd619872c8e58609fbed56c4827afa083b40
-	TODO: check
+	NOTE: ImageMagick6: https://github.com/ImageMagick/ImageMagick6/commit/53cb91b3e7bf95d0e372cbc745e0055ac6054745	 (resize.c hunk)
 CVE-2021-20242
 	REJECTED
 CVE-2021-20241 (A flaw was found in ImageMagick in coders/jp2.c. An attacker who submi ...)
@@ -40200,6 +40207,7 @@ CVE-2020-25694 (A flaw was found in PostgreSQL versions before 13.1, before 12.5
 CVE-2020-25693 (A flaw was found in CImg in versions prior to 2.9.3. Integer overflows ...)
 	{DLA-2462-1}
 	- cimg 2.9.4+dfsg-2 (bug #973770)
+	[buster] - cimg <no-dsa> (Minor issue)
 	NOTE: https://github.com/dtschump/CImg/pull/295
 	NOTE: https://bugs.launchpad.net/ubuntu/+source/cimg/+bug/1900983
 	NOTE: Fixed by: https://github.com/dtschump/CImg/commit/4f184f89f9ab6785a6c90fd238dbaa6d901d3505
@@ -70559,6 +70567,7 @@ CVE-2020-12365 (Untrusted pointer dereference in some Intel(R) Graphics Drivers
 CVE-2020-12364 (Null pointer reference in some Intel(R) Graphics Drivers for Windows*  ...)
 	- linux <unfixed>
 	- firmware-nonfree 20210208-1
+	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: Short of details: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 	NOTE: Per Intel, this was fixed by a firmware update. v49.0.1 of the
 	NOTE: firmware is required. The new firmware requires a kernel patch
@@ -70567,6 +70576,7 @@ CVE-2020-12364 (Null pointer reference in some Intel(R) Graphics Drivers for Win
 CVE-2020-12363 (Improper input validation in some Intel(R) Graphics Drivers for Window ...)
 	- linux <unfixed>
 	- firmware-nonfree 20210208-1
+	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: Short of details: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 	NOTE: Per Intel, this was fixed by a firmware update. v49.0.1 of the
 	NOTE: firmware is required. The new firmware requires a kernel patch
@@ -70575,6 +70585,7 @@ CVE-2020-12363 (Improper input validation in some Intel(R) Graphics Drivers for
 CVE-2020-12362 (Integer overflow in the firmware for some Intel(R) Graphics Drivers fo ...)
 	- linux <unfixed>
 	- firmware-nonfree 20210208-1
+	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: Short of details: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
 	NOTE: Per Intel, this was fixed by a firmware update. v49.0.1 of the
 	NOTE: firmware is required. The new firmware requires a kernel patch


=====================================
data/dsa-needed.txt
=====================================
@@ -25,6 +25,8 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.
 --
+netty9
+--
 python-bleach
 --
 python-pysaml2 (jmm)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfb4f210fec4c71a5d80b21d6a014d8cf77b270a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfb4f210fec4c71a5d80b21d6a014d8cf77b270a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210406/f399fef9/attachment.htm>


More information about the debian-security-tracker-commits mailing list