[Git][security-tracker-team/security-tracker][master] 8 commits: mark CVE-2021-39272 as no-dsa for Stretch
Thorsten Alteholz (@alteholz)
alteholz at debian.org
Sun Aug 29 23:00:33 BST 2021
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e4218a6c by Thorsten Alteholz at 2021-08-29T23:30:50+02:00
mark CVE-2021-39272 as no-dsa for Stretch
- - - - -
e419aedf by Thorsten Alteholz at 2021-08-29T23:32:12+02:00
mark CVE-2021-38559 as no-dsa for Stretch
- - - - -
f2e56ad1 by Thorsten Alteholz at 2021-08-29T23:38:25+02:00
mark CVE-2021-32798 as no-dsa for Stretch
- - - - -
90290d61 by Thorsten Alteholz at 2021-08-29T23:40:42+02:00
follow sec team and mark several CVEs of libelfin as no-dsa
- - - - -
15d1e501 by Thorsten Alteholz at 2021-08-29T23:43:11+02:00
follow sec team and mark several CVEs of liblivemedia as ignored
- - - - -
6e9fb5d5 by Thorsten Alteholz at 2021-08-29T23:46:32+02:00
mark CVE-2020-21677 as no-dsa for Stretch
- - - - -
db1b1cf5 by Thorsten Alteholz at 2021-08-29T23:57:16+02:00
mark CVE-2021-32804 and CVE-2021-32803 as not-affected for Stretch
- - - - -
8f581df5 by Thorsten Alteholz at 2021-08-29T23:59:08+02:00
mark CVE-2021-3654 as no-dsa for Stretch
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1916,10 +1916,12 @@ CVE-2021-39284
CVE-2021-39283 (liveMedia/FramedSource.cpp in Live555 through 1.08 allows an assertion ...)
- liblivemedia <removed>
[buster] - liblivemedia <ignored> (Minor issue)
+ [stretch] - liblivemedia <ignored> (Minor issue)
NOTE: http://lists.live555.com/pipermail/live-devel/2021-August/021969.html
CVE-2021-39282 (Live555 through 1.08 has a memory leak in AC3AudioStreamParser for AC3 ...)
- liblivemedia <removed>
[buster] - liblivemedia <ignored> (Minor issue)
+ [stretch] - liblivemedia <ignored> (Minor issue)
NOTE: http://lists.live555.com/pipermail/live-devel/2021-August/021970.html
CVE-2021-39281
RESERVED
@@ -1947,6 +1949,7 @@ CVE-2021-39272 [TLS bypass vulnerabilities ("NO STARTTLS")]
- fetchmail <unfixed> (bug #993163)
[bullseye] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist)
[buster] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist)
+ [stretch] - fetchmail <no-dsa> (Minor issue; safe recommendations exists, implicit TLS, "ssl" mode exist)
NOTE: https://www.fetchmail.info/fetchmail-SA-2021-02.txt
CVE-2021-39271
RESERVED
@@ -3516,6 +3519,7 @@ CVE-2021-38559 (DigitalDruid HotelDruid 3.0.2 has an XSS vulnerability in prenot
- hoteldruid <unfixed>
[bullseye] - hoteldruid <no-dsa> (Minor issue)
[buster] - hoteldruid <no-dsa> (Minor issue)
+ [stretch] - hoteldruid <no-dsa> (Minor issue)
CVE-2021-38558
RESERVED
CVE-2021-38557 (raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as ...)
@@ -7065,6 +7069,7 @@ CVE-2021-3654 [novnc allows open redirection]
- nova 2:23.0.2-3 (bug #991441)
[bullseye] - nova <no-dsa> (Minor issue)
[buster] - nova <no-dsa> (Minor issue)
+ [stretch] - nova <no-dsa> (Minor issue)
NOTE: https://bugs.launchpad.net/nova/+bug/1927677
CVE-2021-26263
RESERVED
@@ -16772,12 +16777,14 @@ CVE-2021-32804 (The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.
- node-tar 6.1.7+~cs11.3.10-1 (bug #992111)
[bullseye] - node-tar <no-dsa> (Minor issue)
[buster] - node-tar <no-dsa> (Minor issue)
+ [stretch] - node-tar <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
NOTE: https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
CVE-2021-32803 (The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4 ...)
- node-tar 6.1.7+~cs11.3.10-1 (bug #992110)
[bullseye] - node-tar <no-dsa> (Minor issue)
[buster] - node-tar <no-dsa> (Minor issue)
+ [stretch] - node-tar <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
NOTE: https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
CVE-2021-32802
@@ -16792,6 +16799,7 @@ CVE-2021-32798 (The Jupyter notebook is a web-based notebook environment for int
- jupyter-notebook <unfixed> (bug #992704)
[bullseye] - jupyter-notebook <no-dsa> (Minor issue)
[buster] - jupyter-notebook <no-dsa> (Minor issue)
+ [stretch] - jupyter-notebook <no-dsa> (Minor issue)
NOTE: https://github.com/jupyter/notebook/security/advisories/GHSA-hwvq-6gjx-j797
NOTE: https://github.com/jupyter/notebook/commit/79fc76e890a8ec42f73a3d009e44ef84c14ef0d5
CVE-2021-32797 (JupyterLab is a user interface for Project Jupyter which will eventual ...)
@@ -67833,42 +67841,49 @@ CVE-2020-24827 (A vulnerability in the dwarf::cursor::skip_form function of Libe
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/47
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc181
CVE-2020-24826 (A vulnerability in the elf::section::as_strtab function of Libelfin v0 ...)
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/49
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-elfsectionas_strtab-at-elfelfcc284
CVE-2020-24825 (A vulnerability in the line_table::line_table function of Libelfin v0. ...)
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/46
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-line_tableline_table-at-dwarflinecc104
CVE-2020-24824 (A global buffer overflow issue in the dwarf::line_table::line_table fu ...)
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/48
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#global-buffer-overflow-in-function-dwarfline_tableline_table-at-dwarflinecc107
CVE-2020-24823 (A vulnerability in the dwarf::to_string function of Libelfin v0.3 allo ...)
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/51
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfto_string-at-dwarfvaluecc300
CVE-2020-24822 (A vulnerability in the dwarf::cursor::uleb function of Libelfin v0.3 a ...)
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/50
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursoruleb128-at-dwarfinternalhh154
CVE-2020-24821 (A vulnerability in the dwarf::cursor::skip_form function of Libelfin v ...)
- libelfin <unfixed>
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
+ [stretch] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/52
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc191
CVE-2020-24820
@@ -74641,6 +74656,7 @@ CVE-2020-21678 (A global buffer overflow in the genmp_writefontmacro_latex compo
CVE-2020-21677 (A heap-based buffer overflow in the sixel_encoder_output_without_macro ...)
- libsixel 1.8.6-1
[buster] - libsixel <no-dsa> (Minor issue)
+ [stretch] - libsixel <no-dsa> (Minor issue)
NOTE: https://github.com/saitoha/libsixel/issues/123
NOTE: https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d
CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component in genp ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/44a195a9d117d7013626f0d594a22d5e02d6bde6...8f581df5eb6b841801b57aa2d50c0d092117ca51
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/44a195a9d117d7013626f0d594a22d5e02d6bde6...8f581df5eb6b841801b57aa2d50c0d092117ca51
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210829/e57e9a95/attachment.htm>
More information about the debian-security-tracker-commits
mailing list