[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Oct 18 17:46:21 BST 2021
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
42c8f4cd by Moritz Muehlenhoff at 2021-10-18T18:46:07+02:00
buster/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -2148,6 +2148,8 @@ CVE-2021-3876
RESERVED
CVE-2021-3875 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim <unfixed> (bug #996593)
+ [bullseye] - vim <no-dsa> (Minor issue)
+ [buster] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53/
NOTE: https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f (v8.2.3489)
CVE-2021-42133
@@ -12653,6 +12655,8 @@ CVE-2021-3670
RESERVED
CVE-2021-37714 (jsoup is a Java library for working with HTML. Those using jsoup versi ...)
- jsoup 1.14.2-1 (bug #992590)
+ [bullseye] - jsoup <no-dsa> (Minor issue)
+ [buster] - jsoup <no-dsa> (Minor issue)
NOTE: https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c
CVE-2021-37713 (The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, a ...)
- node-tar <not-affected> (Only affects node-tar on Windows)
@@ -14692,6 +14696,7 @@ CVE-2019-25051 (objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow i
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
CVE-2019-25050 (netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow i ...)
- gdal 3.1.0+dfsg-1
+ [buster] - gdal <no-dsa> (Minor issue)
[stretch] - gdal <not-affected> (Vulnerable code not present)
NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-420.yaml
NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2020-392.yaml
@@ -24295,9 +24300,11 @@ CVE-2021-32766 (Nextcloud Text is an open source plaintext editing application w
NOT-FOR-US: Nextcloud Text
CVE-2021-32765 (Hiredis is a minimalistic C client library for the Redis database. In ...)
{DLA-2783-1}
- - hiredis 0.14.1-2
+ - hiredis 0.14.1-2 (unimportant)
NOTE: https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2
NOTE: https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e (v1.0.1)
+ NOTE: Only a hardening for insecure libcs:
+ NOTE: https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e#commitcomment-57544143
CVE-2021-32764 (Discourse is an open-source discussion platform. In Discourse versions ...)
NOT-FOR-US: Discourse
CVE-2021-32763 (OpenProject is open-source, web-based project management software. In ...)
@@ -109107,6 +109114,7 @@ CVE-2020-11081 (osquery before version 4.4.0 enables a privilege escalation vuln
CVE-2020-11080 (In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra ...)
{DSA-4696-1 DLA-2786-1}
- nghttp2 1.41.0-1
+ [buster] - nghttp2 <no-dsa> (Minor issue)
- nodejs 10.21.0~dfsg-1 (bug #962145)
[stretch] - nodejs <ignored> (Nodejs in stretch not covered by security support)
[jessie] - nodejs <end-of-life> (Nodejs in jessie not covered by security support)
=====================================
data/dsa-needed.txt
=====================================
@@ -26,6 +26,8 @@ faad2/oldstable (jmm)
ffmpeg/oldstable (jmm)
4.1.7 fixes a number of bugs, but several further one in the 4.1 branch, reaching out for a 4.1.8 release date
--
+gpac (jmm)
+--
icu
--
linux (carnil)
@@ -42,10 +44,16 @@ python-pysaml2 (jmm)
--
rabbitmq-server
--
+redis
+--
runc
--
salt
--
+strongswan (corsac)
+--
+tiff/oldstable
+--
thunderbird (jmm)
--
tomcat9
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42c8f4cdc231eaca1c1ec02cfeeda6aebaa94c50
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/42c8f4cdc231eaca1c1ec02cfeeda6aebaa94c50
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211018/d2ef169f/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list