[Git][security-tracker-team/security-tracker][master] 7 commits: Triage isc-dhcp for stretch

Emilio Pozuelo Monfort (@pochu) pochu at debian.org
Thu Jun 3 10:50:16 BST 2021



Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker


Commits:
54f15c20 by Emilio Pozuelo Monfort at 2021-06-03T11:49:16+02:00
Triage isc-dhcp for stretch

- - - - -
06f7386f by Emilio Pozuelo Monfort at 2021-06-03T11:49:16+02:00
Triage lasso for stretch

- - - - -
990f138f by Emilio Pozuelo Monfort at 2021-06-03T11:49:16+02:00
Triage sogo for stretch

- - - - -
b23b93fa by Emilio Pozuelo Monfort at 2021-06-03T11:49:16+02:00
Triage libxstream-java for stretch

- - - - -
7b3bfb83 by Emilio Pozuelo Monfort at 2021-06-03T11:49:18+02:00
CVE-2021-3567/caribou n/a on stretch

The security issue is in combination with cinnamon-screensaver >= 4.2,
as with that the caribou crash can be used to bypass the screensaver.

- - - - -
b6841cca by Emilio Pozuelo Monfort at 2021-06-03T11:49:18+02:00
Triage caribou for stretch

- - - - -
2ce4ab29 by Emilio Pozuelo Monfort at 2021-06-03T11:49:18+02:00
Triage python-django for stretch

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -198,6 +198,7 @@ CVE-2021-3568
 CVE-2021-3567
 	RESERVED
 	- caribou 0.4.21-7.1 (bug #980061)
+	[stretch] - caribou <not-affected> (Security impact only with cinnamon-screensaver >= 4.2)
 	NOTE: https://bugs.launchpad.net/ubuntu/+source/caribou/+bug/1912060
 	NOTE: https://gitlab.gnome.org/GNOME/caribou/-/merge_requests/3
 	NOTE: https://gitlab.gnome.org/GNOME/caribou/-/commit/d41c8e44b12222a290eaca16703406b113a630c6


=====================================
data/dla-needed.txt
=====================================
@@ -18,6 +18,9 @@ ansible
   NOTE: 20210411: after that LTS. (apo)
   NOTE: 20210426: https://people.debian.org/~apo/lts/ansible/
 --
+caribou
+  NOTE: 20210603: no security impact, but important a11y impact introduced by DLA-2486-1 (pochu)
+--
 ceph (Emilio)
   NOTE: 20200707: Vulnerable to at least CVE-2018-14662. (lamby)
   NOTE: 20200707: Some discussion regarding removal <https://lists.debian.org/debian-lts/2020/04/msg00019.html> (lamby)
@@ -42,10 +45,20 @@ eterm (Utkarsh)
 gpac (Thorsten Alteholz)
   NOTE: 20210524: WIP
 --
+isc-dhcp
+--
+lasso
+--
 libwebp (Anton Gladky)
   NOTE: 20210516: WIP
   NOTE: 20210530: DLA will be released CW23/2021
 --
+libxstream-java
+  NOTE: 20210603: upstream changed the default security framework to a whitelist,
+  NOTE: 20210603: we should consider checking rdeps and doing the same and announce
+  NOTE: 20210603: that the blocklist is no longer supported, see
+  NOTE: 20210603: https://lists.debian.org/debian-lts/2021/06/msg00001.html (pochu)
+--
 linux (Ben Hutchings)
 --
 linux-4.19 (Ben Hutchings)
@@ -61,6 +74,8 @@ prosody (Anton Gladky)
   NOTE: 20210519: at least the 10MB limit mentioned in CVE-2021-32918 is present 
   NOTE: 20210530: WIP
 --
+python-django
+--
 rxvt (Utkarsh)
 --
 ruby-actionpack-page-caching
@@ -111,6 +126,10 @@ shiro (Roberto C. Sánchez)
 --
 slapi-nis (Thorsten Alteholz)
 --
+sogo
+  NOTE: 20210603: maybe mention in announcement the recommendation to invalidate user
+  NOTE: 20210603: sessions (see upstream blog). (pochu)
+--
 squid3 (Abhijith PA)
   NOTE: 20210523:  not sure whether all CVEs realy affect Stretch
   NOTE: 20210528: Looks like all CVEs affect stretch. (Ola)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1ef4bbbdea4c24b2d499b224226320f3a15a14ad...2ce4ab29a45343dc870f3ccc98ffa3e947e8fc46

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1ef4bbbdea4c24b2d499b224226320f3a15a14ad...2ce4ab29a45343dc870f3ccc98ffa3e947e8fc46
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210603/4c01f6b0/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list