[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Oct 18 17:46:21 BST 2021



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
42c8f4cd by Moritz Muehlenhoff at 2021-10-18T18:46:07+02:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -2148,6 +2148,8 @@ CVE-2021-3876
 	RESERVED
 CVE-2021-3875 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	- vim <unfixed> (bug #996593)
+	[bullseye] - vim <no-dsa> (Minor issue)
+	[buster] - vim <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53/
 	NOTE: https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f (v8.2.3489)
 CVE-2021-42133
@@ -12653,6 +12655,8 @@ CVE-2021-3670
 	RESERVED
 CVE-2021-37714 (jsoup is a Java library for working with HTML. Those using jsoup versi ...)
 	- jsoup 1.14.2-1 (bug #992590)
+	[bullseye] - jsoup <no-dsa> (Minor issue)
+	[buster] - jsoup <no-dsa> (Minor issue)
 	NOTE: https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c
 CVE-2021-37713 (The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, a ...)
 	- node-tar <not-affected> (Only affects node-tar on Windows)
@@ -14692,6 +14696,7 @@ CVE-2019-25051 (objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow i
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
 CVE-2019-25050 (netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow i ...)
 	- gdal 3.1.0+dfsg-1
+	[buster] - gdal <no-dsa> (Minor issue)
 	[stretch] - gdal <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-420.yaml
 	NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-392.yaml
@@ -24295,9 +24300,11 @@ CVE-2021-32766 (Nextcloud Text is an open source plaintext editing application w
 	NOT-FOR-US: Nextcloud Text
 CVE-2021-32765 (Hiredis is a minimalistic C client library for the Redis database. In  ...)
 	{DLA-2783-1}
-	- hiredis 0.14.1-2
+	- hiredis 0.14.1-2 (unimportant)
 	NOTE: https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2
 	NOTE: https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e (v1.0.1)
+	NOTE: Only a hardening for insecure libcs:
+	NOTE: https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e#commitcomment-57544143
 CVE-2021-32764 (Discourse is an open-source discussion platform. In Discourse versions ...)
 	NOT-FOR-US: Discourse
 CVE-2021-32763 (OpenProject is open-source, web-based project management software. In  ...)
@@ -109107,6 +109114,7 @@ CVE-2020-11081 (osquery before version 4.4.0 enables a privilege escalation vuln
 CVE-2020-11080 (In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...)
 	{DSA-4696-1 DLA-2786-1}
 	- nghttp2 1.41.0-1
+	[buster] - nghttp2 <no-dsa> (Minor issue)
 	- nodejs 10.21.0~dfsg-1 (bug #962145)
 	[stretch] - nodejs <ignored> (Nodejs in stretch not covered by security support)
 	[jessie] - nodejs <end-of-life> (Nodejs in jessie not covered by security support)


=====================================
data/dsa-needed.txt
=====================================
@@ -26,6 +26,8 @@ faad2/oldstable (jmm)
 ffmpeg/oldstable (jmm)
   4.1.7 fixes a number of bugs, but several further one in the 4.1 branch, reaching out for a 4.1.8 release date
 --
+gpac (jmm)
+--
 icu
 --
 linux (carnil)
@@ -42,10 +44,16 @@ python-pysaml2 (jmm)
 --
 rabbitmq-server
 --
+redis
+--
 runc
 --
 salt
 --
+strongswan (corsac)
+--
+tiff/oldstable
+--
 thunderbird (jmm)
 --
 tomcat9



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42c8f4cdc231eaca1c1ec02cfeeda6aebaa94c50

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42c8f4cdc231eaca1c1ec02cfeeda6aebaa94c50
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211018/d2ef169f/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list