[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Oct 3 21:10:36 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f487d2e2 by security tracker role at 2021-10-03T20:10:27+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,5 @@
+CVE-2021-3853
+ RESERVED
CVE-2021-3852
RESERVED
CVE-2021-41865
@@ -3536,6 +3538,7 @@ CVE-2021-3749 (axios is vulnerable to Inefficient Regular Expression Complexity
NOTE: https://github.com/axios/axios/pull/3980
CVE-2021-3748 [virtio-net: heap use-after-free in virtio_net_receive_rcu]
RESERVED
+ {DSA-4980-1}
- qemu 1:6.1+dfsg-6 (bug #993401)
[stretch] - qemu <postponed> (Fix along with a future DLA)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1998514
@@ -6089,7 +6092,7 @@ CVE-2021-39232
CVE-2021-39231
RESERVED
CVE-2021-3713 (An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) d ...)
- {DLA-2753-1}
+ {DSA-4980-1 DLA-2753-1}
- qemu 1:6.1+dfsg-2 (bug #992727)
[buster] - qemu <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1994640
@@ -8835,7 +8838,7 @@ CVE-2021-38089
NOTE: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/0749082eb93ea02fa4b770da86597450cec84054
NOTE: https://trac.ffmpeg.org/ticket/8262
CVE-2021-3682 (A flaw was found in the USB redirector device emulation of QEMU in ver ...)
- {DLA-2753-1}
+ {DSA-4980-1 DLA-2753-1}
- qemu 1:6.0+dfsg-3 (bug #991911)
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/491
NOTE: Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/b2d1fe67d09d2b6c7da647fbcea6ca0148c206d3 (v1.4.0-rc0)
@@ -13017,6 +13020,7 @@ CVE-2020-36417
RESERVED
CVE-2021-3638 [ati-vga: inconsistent check in ati_2d_blt() may lead to out-of-bounds write]
RESERVED
+ {DSA-4980-1}
- qemu 1:6.1+dfsg-6 (bug #992726)
[buster] - qemu <not-affected> (Vulnerable code introduced in ATI VGA device emulation added later)
[stretch] - qemu <not-affected> (Vulnerable code introduced in ATI VGA device emulation added later)
@@ -21771,6 +21775,7 @@ CVE-2021-32606 (In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net
- linux <not-affected> (Vulnerable code introduced later)
NOTE: https://www.openwall.com/lists/oss-security/2021/05/11/16
CVE-2021-3545 (An information disclosure vulnerability was found in the virtio vhost- ...)
+ {DSA-4980-1}
- qemu 1:6.1+dfsg-1 (bug #989042)
[buster] - qemu <no-dsa> (Minor issue)
[stretch] - qemu <not-affected> (The vulnerable code was introduced later)
@@ -21778,6 +21783,7 @@ CVE-2021-3545 (An information disclosure vulnerability was found in the virtio v
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01153.html
NOTE: https://gitlab.com/qemu-project/qemu/-/commit/121841b2
CVE-2021-3544 (Several memory leaks were found in the virtio vhost-user GPU device (v ...)
+ {DSA-4980-1}
- qemu 1:6.1+dfsg-1 (bug #989042)
[buster] - qemu <no-dsa> (Minor issue)
[stretch] - qemu <not-affected> (The vulnerable code was introduced later)
@@ -22016,6 +22022,7 @@ CVE-2021-32563 (An issue was discovered in Thunar before 4.16.7 and 4.17.x befor
NOTE: Regression fix: https://gitlab.xfce.org/xfce/thunar/-/commit/3b54d9d7dbd7fd16235e2141c43a7f18718f5664
NOTE: Regression: https://gitlab.xfce.org/xfce/thunar/-/issues/575
CVE-2021-3546 (A flaw was found in vhost-user-gpu of QEMU in versions up to and inclu ...)
+ {DSA-4980-1}
- qemu 1:6.1+dfsg-1 (bug #989042)
[buster] - qemu <no-dsa> (Minor issue)
[stretch] - qemu <not-affected> (The vulnerable code was introduced later)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f487d2e240c1acd2616fea5f775666467131a824
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f487d2e240c1acd2616fea5f775666467131a824
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211003/b74378ce/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list