[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff jmm at debian.org
Sat Jan 9 23:09:10 GMT 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ee0a1682 by Moritz Mühlenhoff at 2021-01-10T00:07:00+01:00
bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -9117,24 +9117,28 @@ CVE-2020-35507 (There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in b
 CVE-2020-35506 [use after free vulnerability in esp_do_dma() in hw/scsi/esp.c]
 	RESERVED
 	- qemu <unfixed>
+	[bullseye] - qemu <postponed> (Minor issue)
 	[buster] - qemu <postponed> (Fix along in future DSA)
 	[stretch] - qemu <postponed> (Fix along in future DLA)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1909996
 CVE-2020-35505 [NULL pointer dereference in do_busid_cmd() in hw/scsi/esp.c]
 	RESERVED
 	- qemu <unfixed>
+	[bullseye] - qemu <postponed> (Minor issue)
 	[buster] - qemu <postponed> (Fix along in future DSA)
 	[stretch] - qemu <postponed> (Fix along in future DLA)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1909769
 CVE-2020-35504 [NULL pointer dereference in scsi_req_continue() in hw/scsi/scsi-bus.c]
 	RESERVED
-	- qemu <unfixed>
+	- qemu <unfixed> (bug #979679)
+	[bullseye] - qemu <postponed> (Minor issue)
 	[buster] - qemu <postponed> (Fix along in future DSA)
 	[stretch] - qemu <postponed> (Fix along in future DLA)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1909766
 CVE-2020-35503 [QEMU: NULL pointer dereference issue in megasas-gen2 host bus adapter]
 	RESERVED
-	- qemu <unfixed>
+	- qemu <unfixed> (bug #979678)
+	[bullseye] - qemu <postponed> (Minor issue)
 	[buster] - qemu <postponed> (Fix along in future DSA)
 	[stretch] - qemu <postponed> (Fix along in future DLA)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1910346
@@ -22119,7 +22123,8 @@ CVE-2020-26666
 CVE-2020-26665
 	RESERVED
 CVE-2020-26664 (A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media play ...)
-	- vlc <unfixed>
+	- vlc <unfixed> (low; bug #979676)
+	[buster] - vlc <postponed> (Minor issue, wait for 3.0.12 release)
 	NOTE: https://code.videolan.org/videolan/vlc-3.0/-/commit/ec1f55ee9ace5cc675395a1bc9700d99679e7e8c (3.0.12)
 	NOTE: https://gist.githubusercontent.com/henices/db11664dd45b9f322f8514d182aef5ea/raw/d56940c8bf211992bf4f3309a85bb2b69383e511/CVE-2020-26664.txt
 CVE-2020-26663
@@ -49050,7 +49055,9 @@ CVE-2020-14395
 	RESERVED
 CVE-2020-14394 [infinite loop in xhci_ring_chain_length() in hw/usb/hcd-xhci.c]
 	RESERVED
-	- qemu <unfixed>
+	- qemu <unfixed> (bug #979677)
+	[bullseye] - qemu <postponed> (Minor issue)
+	[buster] - qemu <postponed> (Minor issue)
 	[stretch] - qemu <postponed> (Fix along in future DLA)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1908004
 CVE-2020-14393 (A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local  ...)
@@ -63537,12 +63544,13 @@ CVE-2020-9447 (There is an XSS (cross-site scripting) vulnerability in GwtUpload
 CVE-2020-9446
 	RESERVED
 CVE-2018-21035 (In Qt through 5.14.1, the WebSocket implementation accepts up to 2GB f ...)
-	- qtwebsockets-opensource-src <unfixed> (low; bug #953049)
-	[buster] - qtwebsockets-opensource-src <ignored> (Minor issue)
+	- qtwebsockets-opensource-src 5.15.1-2 (low; bug #953049)
+	[buster] - qtwebsockets-opensource-src <ignored> (Minor issue, fix adds new API only)
 	[stretch] - qtwebsockets-opensource-src <ignored> (Minor issue)
 	[jessie] - qtwebsockets-opensource-src <no-dsa> (Minor issue)
 	NOTE: https://bugreports.qt.io/browse/QTBUG-70693
 	NOTE: https://codereview.qt-project.org/c/qt/qtwebsockets/+/284735
+	NOTE: https://github.com/qt/qtwebsockets/commit/ed93680f34e92ad0383aa4e610bb65689118ca93
 CVE-2020-9445 (Zulip Server before 2.1.3 allows XSS via the modal_link feature in the ...)
 	- zulip-server <itp> (bug #800052)
 CVE-2020-9444 (Zulip Server before 2.1.3 allows reverse tabnabbing via the Markdown f ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ee0a1682750b81519fa67845ee8101e807fd4a48

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ee0a1682750b81519fa67845ee8101e807fd4a48
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210109/81092cfb/attachment.html>


More information about the debian-security-tracker-commits mailing list