[Git][security-tracker-team/security-tracker][master] 2 commits: openexr: add commit reference for 2.5

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Jul 8 21:19:05 BST 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
89778b99 by Moritz Muehlenhoff at 2021-07-08T22:15:13+02:00
openexr: add commit reference for 2.5

- - - - -
d4701e73 by Moritz Muehlenhoff at 2021-07-08T22:18:46+02:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3500,7 +3500,8 @@ CVE-2021-3598 (There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionalit
 	[buster] - openexr <no-dsa> (Minor issue)
 	NOTE: https://github.com/AcademySoftwareFoundation/openexr/issues/1033
 	NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1037
-	NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/566f5241edd87445373885d5f7a904dc81e866c1
+	NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/566f5241edd87445373885d5f7a904dc81e866c1 (master)
+	NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/e2667ae1a3ff8a9fce730e61129868b326abb3f5 (2.5)
 	NOTE: Introduced by https://github.com/AcademySoftwareFoundation/openexr/commit/9f011ae9ce9b1ca03521ff76e7659d34ee830344 (v2.0.0)
 CVE-2021-3597
 	RESERVED
@@ -3627,17 +3628,17 @@ CVE-2021-34616
 CVE-2021-34615
 	RESERVED
 CVE-2021-34614 (A remote arbitrary command execution vulnerability was discovered in A ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-34613
 	RESERVED
 CVE-2021-34612
 	RESERVED
 CVE-2021-34611 (A remote arbitrary command execution vulnerability was discovered in A ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-34610 (A remote arbitrary command execution vulnerability was discovered in A ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-34609 (A remote SQL injection vulnerability was discovered in Aruba ClearPass ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-34608
 	RESERVED
 CVE-2021-34607
@@ -4054,7 +4055,7 @@ CVE-2021-34432
 CVE-2021-34431
 	RESERVED
 CVE-2021-34430 (Eclipse TinyDTLS through 0.9-rc1 relies on the rand function in the C  ...)
-	TODO: check
+	NOT-FOR-US: Eclipse TinyDTLS
 CVE-2021-34429
 	RESERVED
 CVE-2021-34428 (For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, i ...)
@@ -4738,7 +4739,7 @@ CVE-2021-34112
 CVE-2021-34111
 	RESERVED
 CVE-2021-34110 (WinWaste.NET version 1.0.6183.16475 has incorrect permissions, allowin ...)
-	TODO: check
+	NOT-FOR-US: WinWaste.NET
 CVE-2021-34109
 	RESERVED
 CVE-2021-34108
@@ -8406,7 +8407,7 @@ CVE-2021-32539 (Add event in calendar function in the 101EIP system does not fil
 CVE-2021-32538 (ARTWARE CMS parameter of image upload function does not filter the typ ...)
 	NOT-FOR-US: ARTWARE CMS
 CVE-2021-32537 (Realtek HAD contains a driver crashed vulnerability which allows local ...)
-	TODO: check
+	NOT-FOR-US: Realtek
 CVE-2021-32536 (The login page in the MCUsystem does not filter with special character ...)
 	NOT-FOR-US: MCUsystem
 CVE-2021-32535 (The vulnerability of hard-coded default credentials in QSAN SANOS allo ...)
@@ -8599,9 +8600,9 @@ CVE-2021-32464
 CVE-2021-32463
 	RESERVED
 CVE-2021-32462 (Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below i ...)
-	TODO: check
+	NOT-FOR-US: Trend Micro
 CVE-2021-32461 (Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below i ...)
-	TODO: check
+	NOT-FOR-US: Trend Micro
 CVE-2021-32460 (The Trend Micro Maximum Security 2021 (v17) consumer product is vulner ...)
 	NOT-FOR-US: Trend Micro
 CVE-2021-32459 (Trend Micro Home Network Security version 6.6.604 and earlier contains ...)
@@ -10210,9 +10211,9 @@ CVE-2021-31819
 CVE-2021-31818 (Affected versions of Octopus Server are prone to an authenticated SQL  ...)
 	NOT-FOR-US: Octopus Server
 CVE-2021-31817 (When configuring Octopus Server if it is configured with an external S ...)
-	TODO: check
+	NOT-FOR-US: Octopus Server
 CVE-2021-31816 (When configuring Octopus Server if it is configured with an external S ...)
-	TODO: check
+	NOT-FOR-US: Octopus Server
 CVE-2019-25042 (** DISPUTED ** Unbound before 1.9.5 allows an out-of-bounds write via  ...)
 	{DLA-2652-1}
 	- unbound 1.9.6-1
@@ -15366,7 +15367,7 @@ CVE-2021-29713
 CVE-2021-29712
 	RESERVED
 CVE-2021-29711 (IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 6.2.7.8 , 6.2.7.9, 7.0.3. ...)
-	TODO: check
+	NOT-FOR-US: IBM
 CVE-2021-29710
 	RESERVED
 CVE-2021-29709
@@ -16825,11 +16826,11 @@ CVE-2021-3465
 CVE-2021-29153
 	RESERVED
 CVE-2021-29152 (A remote denial of service (DoS) vulnerability was discovered in Aruba ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-29151 (A remote authentication bypass vulnerability was discovered in Aruba C ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-29150 (A remote insecure deserialization vulnerability was discovered in Arub ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2021-29149
 	RESERVED
 CVE-2021-29148
@@ -17650,7 +17651,7 @@ CVE-2021-28811 (If exploited, this command injection vulnerability could allow r
 CVE-2021-28810 (If exploited, this vulnerability allows an attacker to access resource ...)
 	NOT-FOR-US: QNAP
 CVE-2021-28809 (An improper access control vulnerability has been reported to affect c ...)
-	TODO: check
+	NOT-FOR-US: QNAP
 CVE-2021-28808
 	RESERVED
 CVE-2021-28807 (A post-authentication reflected XSS vulnerability has been reported to ...)
@@ -33135,7 +33136,7 @@ CVE-2021-22235
 CVE-2021-22234
 	RESERVED
 CVE-2021-22233 (An information disclosure vulnerability in GitLab EE versions 13.10 an ...)
-	TODO: check
+	- gitlab <not-affected> (Specific to EE)
 CVE-2021-22232 (HTML injection was possible via the full name field before versions 13 ...)
 	- gitlab <unfixed>
 CVE-2021-22231 (A denial of service in user's profile page is found starting with GitL ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d15a2c1d8ab1ef0f09b648572c827bf617b50932...d4701e73b6524274b03e755215e6a02254220c55

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d15a2c1d8ab1ef0f09b648572c827bf617b50932...d4701e73b6524274b03e755215e6a02254220c55
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210708/bfbd85ec/attachment.htm>


More information about the debian-security-tracker-commits mailing list