[Git][security-tracker-team/security-tracker][master] new chromium issue

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Nov 24 10:23:25 GMT 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0a684ae4 by Moritz Muehlenhoff at 2021-11-24T11:22:45+01:00
new chromium issue
NFUs
resolve some TODOs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18100,7 +18100,8 @@ CVE-2021-38006
 CVE-2021-38005
 	RESERVED
 CVE-2021-38004 (Insufficient policy enforcement in Autofill in Google Chrome prior to  ...)
-	TODO: check
+	- chromium <unfixed>
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-38003 (Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638 ...)
 	- chromium <unfixed>
 	[stretch] - chromium <end-of-life> (see DSA 4562)
@@ -43370,9 +43371,9 @@ CVE-2021-27838
 CVE-2021-27837
 	RESERVED
 CVE-2021-27836 (An issue was discoverered in in function xls_getWorkSheet in xls.c in  ...)
-	- r-cran-readxl <undetermined>
+	- r-cran-readxl <unfixed> (unimportant)
 	NOTE: https://github.com/libxls/libxls/issues/94
-	TODO: check
+	NOTE: Negligible security impact
 CVE-2021-27835
 	RESERVED
 CVE-2021-27834
@@ -46916,7 +46917,6 @@ CVE-2021-26314 (Potential floating point value injection in all supported CPU pr
 	NOTE: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1003
 	NOTE: Claimed to not affect Xen, Cf. https://xenbits.xen.org/xsa/advisory-375.html in
 	NOTE: ("NOTE CONCERNING CVE-2021-0086 / CVE-2021-26314").
-	TODO: check
 CVE-2021-26313 (Potential speculative code store bypass in all supported CPU products, ...)
 	{DSA-4931-1}
 	- xen 4.14.2+25-gb6a8c4f72d-1
@@ -47855,7 +47855,7 @@ CVE-2021-25988
 CVE-2021-25987
 	RESERVED
 CVE-2021-25986 (In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cros ...)
-	TODO: check
+	NOT-FOR-US: Django-wiki
 CVE-2021-25985 (In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improp ...)
 	NOT-FOR-US: Factor (App Framework & Headless CMS)
 CVE-2021-25984 (In Factor (App Framework & Headless CMS) forum plugin, versions v1 ...)
@@ -53891,7 +53891,7 @@ CVE-2021-23434 (This affects the package object-path before 0.11.6. A type confu
 	NOTE: https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453
 	NOTE: https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb
 CVE-2021-23433 (The package algoliasearch-helper before 3.6.2 are vulnerable to Protot ...)
-	TODO: check
+	NOT-FOR-US: Node algoliasearch-helper
 CVE-2021-23432 (This affects all versions of package mootools. This is due to the abil ...)
 	NOT-FOR-US: Node mootools
 CVE-2021-23431 (The package joplin before 2.3.2 are vulnerable to Cross-site Request F ...)
@@ -57082,7 +57082,7 @@ CVE-2021-22055
 CVE-2021-22054
 	RESERVED
 CVE-2021-22053 (Applications using both `spring-cloud-netflix-hystrix-dashboard` and ` ...)
-	TODO: check
+	NOT-FOR-US: spring-cloud-netflix-hystrix-dashboard and spring-boot-starter-thymeleaf
 CVE-2021-22052
 	RESERVED
 CVE-2021-22051 (Applications using Spring Cloud Gateway are vulnerable to specifically ...)
@@ -57128,11 +57128,11 @@ CVE-2021-22032
 CVE-2021-22031
 	RESERVED
 CVE-2021-22030 (In versions of Greenplum database prior to 5.28.14 and 6.17.0, certain ...)
-	TODO: check
+	NOT-FOR-US: Greenplum
 CVE-2021-22029 (VMware Workspace ONE UEM REST API contains a denial of service vulnera ...)
 	NOT-FOR-US: VMware
 CVE-2021-22028 (In versions of Greenplum database prior to 5.28.6 and 6.14.0, greenplu ...)
-	TODO: check
+	NOT-FOR-US: Greenplum
 CVE-2021-22027 (The vRealize Operations Manager API (8.x prior to 8.5) contains a Serv ...)
 	NOT-FOR-US: VMware
 CVE-2021-22026 (The vRealize Operations Manager API (8.x prior to 8.5) contains a Serv ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a684ae47475bbf7827b1e5643d97d570d96bff5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0a684ae47475bbf7827b1e5643d97d570d96bff5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211124/1207692f/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list