[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Jul 1 15:27:33 BST 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7efeedc7 by Moritz Muehlenhoff at 2021-07-01T16:20:49+02:00
bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -401,14 +401,20 @@ CVE-2021-35940
 CVE-2021-35939 [checks for unsafe symlinks are not performed for intermediary directories]
 	RESERVED
 	- rpm <unfixed>
+	[bullseye] - rpm <no-dsa> (Minor issue)
+	[buster] - rpm <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1964129
 CVE-2021-35938 [races with chown/chmod/capabilities calls during installation]
 	RESERVED
 	- rpm <unfixed>
+	[bullseye] - rpm <no-dsa> (Minor issue)
+	[buster] - rpm <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1964114
 CVE-2021-35937 [TOCTOU race in checks for unsafe symlinks]
 	RESERVED
 	- rpm <unfixed>
+	[bullseye] - rpm <no-dsa> (Minor issue)
+	[buster] - rpm <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1964125
 CVE-2021-35936
 	RESERVED
@@ -8985,6 +8991,7 @@ CVE-2021-32063
 CVE-2021-32062 (MapServer before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x  ...)
 	[experimental] - mapserver 7.6.3-1~exp1
 	- mapserver 7.6.2-2 (bug #988208)
+	[bullseye] - mapserver <ignored> (Minor issue; #988224)
 	[buster] - mapserver <no-dsa> (Minor issue; will be fixed via point release)
 	[stretch] - mapserver <postponed> (Minor issue; can be fixed in next update)
 	NOTE: https://github.com/mapserver/mapserver/issues/6313
@@ -9601,6 +9608,7 @@ CVE-2020-36327 (Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes
 	- bundler <removed>
 	[stretch] - bundler <no-dsa> (Invasive change, hard to backport; chances of regression)
 	- rubygems <unfixed>
+	[bullseye] - rubygems <no-dsa> (Minor issue)
 	NOTE: https://github.com/rubygems/rubygems/issues/3982
 CVE-2021-3521
 	RESERVED
@@ -18523,6 +18531,7 @@ CVE-2021-28214
 	RESERVED
 CVE-2021-28213 (Example EDK2 encrypted private key in the IpSecDxe.efi present potenti ...)
 	- edk2 <unfixed> (bug #989988)
+	[bullseye] - edk2 <no-dsa> (Minor issue)
 	[buster] - edk2 <no-dsa> (Minor issue)
 	[stretch] - edk2 <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.tianocore.org/show_bug.cgi?id=1866
@@ -24798,6 +24807,7 @@ CVE-2021-25738
 CVE-2021-25737
 	RESERVED
 	- kubernetes <unfixed>
+	[bullseye] - kubernetes <not-affected> (Kubernetes in Bullseye only ships the client)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/05/18/4
 	NOTE: Server components no longer built since 1.20.5+really1.20.2-1
 CVE-2021-25736
@@ -24806,6 +24816,7 @@ CVE-2021-25736
 CVE-2021-25735 [Validating Admission Webhook does not observe some previous fields]
 	RESERVED
 	- kubernetes <unfixed>
+	[bullseye] - kubernetes <not-affected> (Kubernetes in Bullseye only ships the client)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/04/14/1
 	NOTE: https://github.com/kubernetes/kubernetes/issues/100096
 	NOTE: Server components no longer built since 1.20.5+really1.20.2-1
@@ -31111,6 +31122,7 @@ CVE-2021-22896 (Nextcloud Mail before 1.9.5 suffers from improper access control
 	NOT-FOR-US: Nextcloud Mail
 CVE-2021-22895 (Nextcloud Desktop Client before 3.3.1 is vulnerable to improper certif ...)
 	- nextcloud-desktop <unfixed> (bug #989846)
+	[bullseye] - nextcloud-desktop <no-dsa> (Minor issue)
 	[buster] - nextcloud-desktop <no-dsa> (Minor issue)
 	NOTE: https://github.com/nextcloud/desktop/pull/2926
 	NOTE: https://github.com/nextcloud/desktop/commit/b1ddd0e491b2af0ed040e658d8bcde2a7a61c9fc (stable-3.1)
@@ -97109,6 +97121,7 @@ CVE-2020-8563 (In Kubernetes clusters using VSphere as a cloud provider, with a
 CVE-2020-8562
 	RESERVED
 	- kubernetes <unfixed>
+	[bullseye] - kubernetes <not-affected> (Kubernetes in Bullseye only ships the client)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/05/04/8
 	NOTE: Server components no longer built since 1.20.5+really1.20.2-1
 CVE-2020-8561
@@ -97133,6 +97146,7 @@ CVE-2020-8555 (The Kubernetes kube-controller-manager in versions v1.0-1.14, ver
 	NOTE: https://github.com/kubernetes/kubernetes/issues/91542
 CVE-2020-8554 (Kubernetes API server in all versions allow an attacker who is able to ...)
 	- kubernetes <unfixed>
+	[bullseye] - kubernetes <not-affected> (Kubernetes in Bullseye only ships the client)
 	NOTE: https://www.openwall.com/lists/oss-security/2020/12/07/5
 	NOTE: https://github.com/kubernetes/kubernetes/issues/97076
 	NOTE: Server components no longer built since 1.20.5+really1.20.2-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7efeedc74f2799809b430c8660204800999fd457

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7efeedc74f2799809b430c8660204800999fd457
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210701/da4ff584/attachment.htm>


More information about the debian-security-tracker-commits mailing list