[Git][security-tracker-team/security-tracker][master] 8 commits: mark CVE-2021-44225 as no-dsa for Jessie

Thorsten Alteholz (@alteholz) alteholz at debian.org
Sun Nov 28 23:04:20 GMT 2021



Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker


Commits:
f6889515 by Thorsten Alteholz at 2021-11-28T23:35:52+01:00
mark CVE-2021-44225 as no-dsa for Jessie

- - - - -
4e9c0229 by Thorsten Alteholz at 2021-11-28T23:37:36+01:00
add pgbouncer

- - - - -
4e41a00c by Thorsten Alteholz at 2021-11-28T23:38:55+01:00
mark CVE-2020-23904 and CVE-2020-23903 as no-dsa for Stretch

- - - - -
f4ddcd4e by Thorsten Alteholz at 2021-11-28T23:46:29+01:00
mark CVE-2021-41165 and CVE-2021-41164 as no-dsa for Stretch

- - - - -
13384b5b by Thorsten Alteholz at 2021-11-28T23:55:05+01:00
mark CVE-2021-3968 as not-affected for Stretch

- - - - -
0d1f4a42 by Thorsten Alteholz at 2021-11-28T23:58:13+01:00
mark CVE-2021-3928 as no-dsa for Stretch

- - - - -
acd30c5f by Thorsten Alteholz at 2021-11-29T00:00:13+01:00
mark CVE-2021-3927 as no-dsa for Stretch

- - - - -
dd7c1e17 by Thorsten Alteholz at 2021-11-29T00:03:15+01:00
mark CVE-2021-3903 as no-dsa for Stretch

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -133,6 +133,7 @@ CVE-2021-44225 (In Keepalived through 2.2.4, the D-Bus policy does not sufficien
 	- keepalived 1:2.2.4-0.2
 	[bullseye] - keepalived <no-dsa> (Minor issue)
 	[buster] - keepalived <no-dsa> (Minor issue)
+	[stretch] - keepalived <no-dsa> (Minor issue)
 	NOTE: https://github.com/acassen/keepalived/pull/2063
 	NOTE: https://github.com/acassen/keepalived/commit/7977fec0be89ae6fe87405b3f8da2f0b5e415e3d
 CVE-2021-44224
@@ -833,6 +834,7 @@ CVE-2021-3969
 	RESERVED
 CVE-2021-3968 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	- vim <unfixed>
+	[stretch] - vim <not-affected> (Vulnerable code not present)
 	NOTE: https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528/
 	NOTE: https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 (v8.2.3610)
 CVE-2022-21741
@@ -3253,10 +3255,12 @@ CVE-2021-43358
 	RESERVED
 CVE-2021-3928 (vim is vulnerable to Stack-based Buffer Overflow ...)
 	- vim <unfixed>
+	[stretch] - vim <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
 	NOTE: Fixed by: https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 (v8.2.3582)
 CVE-2021-3927 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	- vim <unfixed>
+	[stretch] - vim <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
 	NOTE: Fixed by: https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e (v8.2.3581)
 CVE-2021-43357
@@ -5099,6 +5103,7 @@ CVE-2021-3904 (grav is vulnerable to Improper Neutralization of Input During Web
 	NOT-FOR-US: Grav CMS
 CVE-2021-3903 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	- vim 2:8.2.3565-1
+	[stretch] - vim <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
 	NOTE: https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
 	NOTE: PoC crashes starting with https://github.com/vim/vim/commit/8a7d6542b33e5d2b352262305c3bfdb2d14e1cf8 (v8.2.0149)
@@ -10627,9 +10632,11 @@ CVE-2021-41166
 	RESERVED
 CVE-2021-41165 (CKEditor4 is an open source WYSIWYG HTML editor. In affected version a ...)
 	- ckeditor <unfixed> (bug #999909)
+	[stretch] - ckeditor <no-dsa> (Minor issue)
 	NOTE: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2 (v4.17.0)
 CVE-2021-41164 (CKEditor4 is an open source WYSIWYG HTML editor. In affected versions  ...)
 	- ckeditor <unfixed> (bug #999909)
+	[stretch] - ckeditor <no-dsa> (Minor issue)
 	NOTE: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj (v4.17.0)
 CVE-2021-41163 (Discourse is an open source platform for community discussion. In affe ...)
 	NOT-FOR-US: Discourse
@@ -84469,11 +84476,13 @@ CVE-2020-23904 (A stack buffer overflow in speexenc.c of Speex v1.2 allows attac
 	- speex <unfixed>
 	[bullseye] - speex <no-dsa> (Minor issue)
 	[buster] - speex <no-dsa> (Minor issue)
+	[stretch] - speex <no-dsa> (Minor issue)
 	NOTE: https://github.com/xiph/speex/issues/14
 CVE-2020-23903 (A Divide by Zero vulnerability in the function static int read_samples ...)
 	- speex <unfixed>
 	[bullseye] - speex <no-dsa> (Minor issue)
 	[buster] - speex <no-dsa> (Minor issue)
+	[stretch] - speex <no-dsa> (Minor issue)
 	NOTE: https://github.com/xiph/speex/issues/13
 CVE-2020-23902 (A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a d ...)
 	NOT-FOR-US: WildBit Viewer


=====================================
data/dla-needed.txt
=====================================
@@ -76,6 +76,9 @@ nvidia-graphics-drivers
 --
 opensc (Adrian Bunk)
 --
+pgbouncer (Thorsten Alteholz)
+  NOTE: 20211128: also help with other releases
+--
 roundcube (Markus Koschany)
 --
 rustc (Roberto C. Sánchez)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5c2ba80642481650c1acb9986b0f925bf39f2854...dd7c1e17bc9aa175d39c2ff155b00640c714deb8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/5c2ba80642481650c1acb9986b0f925bf39f2854...dd7c1e17bc9aa175d39c2ff155b00640c714deb8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211128/213ccab0/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list