[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Dec 6 11:52:35 GMT 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7e85cbf2 by Moritz Muehlenhoff at 2021-12-06T12:52:16+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1125,6 +1125,7 @@ CVE-2021-4024 [podman: podman machine spawns gvproxy with port binded to all IPs
 	NOTE: Fixed by: https://github.com/containers/podman/commit/295d87bb0b028e57dc2739791dee4820fe5fcc48
 CVE-2021-44227 (In GNU Mailman before 2.1.38, a list member or moderator can get a CSR ...)
 	- mailman <removed>
+	[buster] - mailman <no-dsa> (Minor issue)
 	[stretch] - mailman <no-dsa> (Minor issue; can be fixed with the next DLA)
 	NOTE: https://bugs.launchpad.net/mailman/+bug/1952384
 	NOTE: Patch: https://launchpadlibrarian.net/570827498/patch.txt
@@ -9086,6 +9087,8 @@ CVE-2021-42261 (Revisor Video Management System (VMS) before 2.0.0 has a directo
 	NOT-FOR-US: Revisor Video Management System (VMS)
 CVE-2021-42260 (TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp  ...)
 	- tinyxml <unfixed>
+	[bullseye] - tinyxml <no-dsa> (Minor issue)
+	[buster] - tinyxml <no-dsa> (Minor issue)
 	[stretch] - tinyxml <no-dsa> (Minor issue; can be fixed with the next DLA)
 	NOTE: https://sourceforge.net/p/tinyxml/bugs/141/
 	NOTE: https://sourceforge.net/p/tinyxml/git/merge-requests/1/
@@ -10306,6 +10309,7 @@ CVE-2021-41771 (ImportedSymbols in debug/macho (for Open or OpenFat) in Go befor
 	- golang-1.15 <unfixed>
 	[bullseye] - golang-1.15 <no-dsa> (Minor issue; will be fixed via point release)
 	- golang-1.11 <removed>
+	[buster] - golang-1.11 <no-dsa> (Minor issue)
 	- golang-1.8 <removed>
 	- golang-1.7 <removed>
 	[stretch] - golang-1.7 <no-dsa> (Minor issue; can be fixed with the next DLA)
@@ -13730,6 +13734,8 @@ CVE-2021-40331
 	RESERVED
 CVE-2021-3756 (libmysofa is vulnerable to Heap-based Buffer Overflow ...)
 	- libmysofa 1.2.1~dfsg0-1
+	[bullseye] - libmysofa <no-dsa> (Minor issue)
+	[buster] - libmysofa <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1/
 	NOTE: https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 (v1.2.1)
 CVE-2021-3755
@@ -42499,7 +42505,6 @@ CVE-2021-28703
 	NOTE: https://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=c65ea16dbcafbe4fe21693b18f8c2a3c5d14600e (4.14.0-rc1)
 CVE-2021-28702 (PCI devices with RMRRs not deassigned correctly Certain PCI devices in ...)
 	- xen 4.14.3+32-g9de3671772-1
-	[bullseye] - xen <postponed> (Minor issue, fix along with next DSA)
 	[buster] - xen <not-affected> (Vulnerable code introduced later)
 	[stretch] - xen <not-affected> (Vulnerable code introduced later)
 	NOTE: https://xenbits.xen.org/xsa/advisory-386.html
@@ -56328,6 +56333,7 @@ CVE-2021-22943 (A vulnerability found in UniFi Protect application V1.18.1 and e
 CVE-2021-22942 (A possible open redirect vulnerability in the Host Authorization middl ...)
 	[experimental] - rails 2:6.1.4.1+dfsg-1
 	- rails <unfixed> (bug #992586)
+	[bullseye] - rails <no-dsa> (Minor issue)
 	[buster] - rails <not-affected> (Vulnerable code not present)
 	[stretch] - rails <not-affected> (Vulnerable code not present)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/08/20/1
@@ -61686,6 +61692,7 @@ CVE-2021-21306 (Marked is an open-source markdown parser and compiler (npm packa
 	NOTE: https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd
 CVE-2021-21305 (CarrierWave is an open-source RubyGem which provides a simple and flex ...)
 	- ruby-carrierwave <unfixed> (bug #982551)
+	[buster] - ruby-carrierwave <no-dsa> (Minor issue)
 	[stretch] - ruby-carrierwave <ignored> (No reverse dependencies)
 	NOTE: https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4
 	NOTE: https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7
@@ -61741,6 +61748,7 @@ CVE-2021-21289 (Mechanize is an open-source ruby library that makes automated we
 	NOTE: Test warnings fixup: https://github.com/sparklemotion/mechanize/commit/5b30aed33cbac9825e8978f8e36dd221cbd4c093 (v2.7.7)
 CVE-2021-21288 (CarrierWave is an open-source RubyGem which provides a simple and flex ...)
 	- ruby-carrierwave 1.3.2-1 (bug #982552)
+	[buster] - ruby-carrierwave <no-dsa> (Minor issue)
 	[stretch] - ruby-carrierwave <ignored> (No reverse dependencies)
 	NOTE: https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5
 	NOTE: https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0


=====================================
data/dsa-needed.txt
=====================================
@@ -17,16 +17,15 @@ asterisk/oldstable
 condor
 --
 chromium
+  inactive, removal from stable likely
 --
 djvulibre
 --
 faad2/oldstable (jmm)
 --
-firefox-esr
+firefox-esr (jmm)
   Rust toolchain updates needed
 --
-gpac (jmm)
---
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v4.19.y versions.
@@ -43,6 +42,8 @@ openjdk-11/oldstable (jmm)
 --
 puppetdb (jmm)
 --
+python-babel/oldstable (jmm)
+--
 python-pysaml2 (jmm)
 --
 rabbitmq-server



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e85cbf2c82599c4ffcee262d85cf8345000131c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e85cbf2c82599c4ffcee262d85cf8345000131c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211206/3fb2ea01/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list