[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon May 24 16:23:34 BST 2021
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
24881ced by Moritz Mühlenhoff at 2021-05-24T17:23:01+02:00
bullseye triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2006,13 +2006,17 @@ CVE-2021-32606 (In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net
NOTE: https://www.openwall.com/lists/oss-security/2021/05/11/16
CVE-2021-3545 [vhost-user-gpu: information disclosure due to uninitialized memory read]
RESERVED
- - qemu <unfixed>
+ - qemu <unfixed> (bug #989042)
+ [bullseye] - qemu <no-dsa> (Minor issue)
+ [buster] - qemu <no-dsa> (Minor issue)
[stretch] - qemu <postponed> (Minor issue; can be fixed in next update)
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01153.html
CVE-2021-3544 [vhost-user-gpu: multiple memory leaks]
RESERVED
- - qemu <unfixed>
+ - qemu <unfixed> (bug #989042)
+ [bullseye] - qemu <no-dsa> (Minor issue)
+ [buster] - qemu <no-dsa> (Minor issue)
[stretch] - qemu <postponed> (Minor issue; can be fixed in next update)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1958935
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html
@@ -2223,7 +2227,9 @@ CVE-2021-32563 (An issue was discovered in Thunar before 4.16.7 and 4.17.x befor
NOTE: Regression: https://gitlab.xfce.org/xfce/thunar/-/issues/575
CVE-2021-3546
RESERVED
- - qemu <unfixed>
+ - qemu <unfixed> (bug #989042)
+ [bullseye] - qemu <no-dsa> (Minor issue)
+ [buster] - qemu <no-dsa> (Minor issue)
[stretch] - qemu <postponed> (Minor issue; can be fixed in next update)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1958978
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01155.html
@@ -3647,6 +3653,8 @@ CVE-2021-31880
RESERVED
CVE-2021-31879 (GNU Wget through 1.21.1 does not omit the Authorization header upon a ...)
- wget <unfixed> (bug #988209)
+ [bullseye] - wget <no-dsa> (Minor issue)
+ [buster] - wget <no-dsa> (Minor issue)
[stretch] - wget <postponed> (Minor issue; can be fixed in next update)
NOTE: https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
CVE-2021-31878
@@ -39625,7 +39633,7 @@ CVE-2020-28591 (An out-of-bounds read vulnerability exists in the AMF File AMFPa
NOTE: https://github.com/slic3r/Slic3r/pull/5063
NOTE: Crash in enduser application, no security impact
CVE-2020-28590 (An out-of-bounds read vulnerability exists in the Obj File TriangleMes ...)
- - slic3r <unfixed>
+ - slic3r <unfixed> (unimportant)
[stretch] - slic3r <not-affected> (Vulnerable code not present)
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1213
NOTE: https://github.com/slic3r/Slic3r/issues/5074
@@ -43801,6 +43809,7 @@ CVE-2020-27735 (An XSS issue was discovered in Wing FTP 6.4.4. An arbitrary IFRA
NOT-FOR-US: Wing FTP
CVE-2018-21269 (checkpath in OpenRC through 0.42.1 might allow local users to take own ...)
- openrc <unfixed> (bug #973245)
+ [bullseye] - openrc <no-dsa> (Minor issue)
[buster] - openrc <no-dsa> (Minor issue)
[stretch] - openrc <no-dsa> (Minor issue)
NOTE: https://github.com/OpenRC/openrc/issues/201
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24881ced9db10854fa98953406a9e87535347d08
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24881ced9db10854fa98953406a9e87535347d08
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210524/b0ea5a30/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list