[Git][security-tracker-team/security-tracker][master] new puppet issue (needs a closer look)

Moritz Muehlenhoff jmm at debian.org
Tue Feb 16 11:01:50 GMT 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
20b5ba76 by Moritz Muehlenhoff at 2021-02-16T12:01:06+01:00
new puppet issue (needs a closer look)
new python issue
NFU
concludes external check

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -462,6 +462,8 @@ CVE-2021-27018
 	RESERVED
 CVE-2021-27017
 	RESERVED
+	- puppet <unfixed>
+	NOTE: https://puppet.com/security/cve/CVE-2021-27017/
 CVE-2021-27016
 	RESERVED
 CVE-2021-27015
@@ -8867,7 +8869,16 @@ CVE-2021-23337 (All versions of package lodash; all versions of package org.fuji
 	- node-lodash <unfixed>
 	NOTE: https://snyk.io/vuln/SNYK-JS-LODASH-1040724
 CVE-2021-23336 (The package python/cpython from 0 and before 3.6.13, from 3.7.0 and be ...)
-	TODO: check
+	- python3.9 <unfixed>
+	- python3.8 <removed>
+	- python3.7 <removed>
+	- python3.5 <removed>
+	NOTE: https://github.com/python/cpython/pull/24297
+	NOTE: https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
+	NOTE: https://github.com/python/cpython/commit/c9f07813ab8e664d8c34413c4fc2d4f86c061a92 (3.9)
+	NOTE: https://github.com/python/cpython/commit/d0d4d30882fe3ab9b1badbecf5d15d94326fd13e (3.7)
+	NOTE: https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
+	TODO: check Py2 status
 CVE-2021-23335 (All versions of package is-user-valid are vulnerable to LDAP Injection ...)
 	NOT-FOR-US: Node is-user-valid
 CVE-2021-23334 (All versions of package static-eval are vulnerable to Arbitrary Code E ...)
@@ -20561,6 +20572,7 @@ CVE-2021-1722
 	RESERVED
 CVE-2021-1721
 	RESERVED
+	NOT-FOR-US: Microsoft .NET
 CVE-2021-1720
 	RESERVED
 CVE-2021-1719 (Microsoft SharePoint Elevation of Privilege Vulnerability This CVE ID  ...)
@@ -34900,10 +34912,10 @@ CVE-2020-24871
 CVE-2020-24870
 	RESERVED
 	- libraw 0.20.2-1
+	[buster] - libraw <not-affected> (Vulnerable code not present)
 	[stretch] - libraw <not-affected> (vulnerable code not present)
 	NOTE: https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d
 	NOTE: https://github.com/LibRaw/LibRaw/issues/330
-	TODO: check older versions
 CVE-2020-24869
 	RESERVED
 CVE-2020-24868



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20b5ba76940cd43497f3d45e7d61de9877a1aeec

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/20b5ba76940cd43497f3d45e7d61de9877a1aeec
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210216/96c37c47/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list