[Git][security-tracker-team/security-tracker][master] new libgrokj2k libsepol kimageformats ndpi tesseract libavif htslib mruby zeromq3 issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Jul 1 09:53:44 BST 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
69ed8513 by Moritz Muehlenhoff at 2021-07-01T10:51:36+02:00
new libgrokj2k libsepol kimageformats ndpi tesseract libavif htslib mruby zeromq3 issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,39 +1,74 @@
 CVE-2021-36089 (Grok 7.6.6 through 9.2.0 has a heap-based buffer overflow in grk::File ...)
-	TODO: check
+	- libgrokj2k <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33544
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/grok/OSV-2021-677.yaml
 CVE-2021-36088 (Fluent Bit (aka fluent-bit) 1.7.0 through 1.7,4 has a double free in f ...)
-	TODO: check
+	NOT-FOR-US: Fluent Bit
 CVE-2021-36087 (The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in e ...)
-	TODO: check
+	- libsepol <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
+	NOTE: https://github.com/SELinuxProject/selinux/commit/bad0a746e9f4cf260dedba5828d9645d50176aac
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
 CVE-2021-36086 (The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_clas ...)
-	TODO: check
+	- libsepol <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
+	NOTE: https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
 CVE-2021-36085 (The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_c ...)
-	TODO: check
+	- libsepol <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124a
+	NOTE: https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
 CVE-2021-36084 (The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_c ...)
-	TODO: check
+	- libsepol <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
+	NOTE: https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
 CVE-2021-36083 (KDE KImageFormats 5.70.0 through 5.81.0 has a stack-based buffer overf ...)
-	TODO: check
+	- kimageformats <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33742
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/kimageformats/OSV-2021-695.yaml
+	NOTE: https://invent.kde.org/frameworks/kimageformats/commit/297ed9a2fe339bfe36916b9fce628c3242e5be0f
 CVE-2021-36082 (ntop nDPI 3.4 has a stack-based buffer overflow in processClientServer ...)
-	TODO: check
+	- ndpi <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30393
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ndpi/OSV-2021-304.yaml
+	NOTE: https://github.com/ntop/nDPI/commit/1ec621c85b9411cc611652fd57a892cfef478af3
 CVE-2021-36081 (Tesseract OCR 5.0.0-alpha-20201231 has a one_ell_conflict use-after-fr ...)
-	TODO: check
+	- tesseract <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29698
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/tesseract-ocr/OSV-2021-211.yaml
+	NOTE: https://github.com/tesseract-ocr/tesseract/commit/e6f15621c2ab2ecbfabf656942d8ef66f03b2d55
 CVE-2021-36080 (GNU LibreDWG 0.12.3.4163 through 0.12.3.4191 has a double-free in bit_ ...)
-	TODO: check
+	- libredwg <itp> (bug #595191)
 CVE-2020-36407 (libavif 0.8.0 and 0.8.1 has an out-of-bounds write in avifDecoderDataF ...)
-	TODO: check
+	- libavif <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24811
+	NOTE: https://github.com/AOMediaCodec/libavif/commit/0a8e7244d494ae98e9756355dfbfb6697ded2ff9
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libavif/OSV-2020-1597.yaml
 CVE-2020-36406 (uWebSockets 18.11.0 and 18.12.0 has a stack-based buffer overflow in u ...)
-	TODO: check
+	NOT-FOR-US: uWebSockets
 CVE-2020-36405 (Keystone Engine 0.9.2 has a use-after-free in llvm_ks::X86Operand::get ...)
-	TODO: check
+	NOT-FOR-US: keystone engine
 CVE-2020-36404 (Keystone Engine 0.9.2 has an invalid free in llvm_ks::SmallVectorImpl& ...)
-	TODO: check
+	NOT-FOR-US: keystone engine
 CVE-2020-36403 (HTSlib 1.10 through 1.10.2 allows out-of-bounds write access in vcf_pa ...)
-	TODO: check
+	- htslib <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24097
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/htslib/OSV-2020-955.yaml
+	NOTE: https://github.com/samtools/htslib/commit/dcd4b7304941a8832fba2d0fc4c1e716e7a4e72c
 CVE-2020-36402 (Solidity 0.7.5 has a stack-use-after-return issue in smtutil::CHCSmtLi ...)
-	TODO: check
+	NOT-FOR-US: Solidity
 CVE-2020-36401 (mruby 2.1.2 has a double free in mrb_default_allocf (called from mrb_f ...)
-	TODO: check
+	- mruby <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23801
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/mruby/OSV-2020-744.yaml
+	NOTE: https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b32589947e1918e3015503
 CVE-2020-36400 (ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read, ...)
-	TODO: check
+	- zeromq3 <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26042
+	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libzmq/OSV-2020-1887.yaml
+	NOTE: https://github.com/zeromq/libzmq/commit/397ac80850bf8d010fae23dd215db0ee2c677306
 CVE-2020-36399
 	RESERVED
 CVE-2020-36398



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/69ed8513639f8dfd02c9fe51aaadc750bd339b10

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/69ed8513639f8dfd02c9fe51aaadc750bd339b10
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210701/dda285a6/attachment.htm>


More information about the debian-security-tracker-commits mailing list