[Git][security-tracker-team/security-tracker][master] 4 commits: Triage CVE-2022-21658 in rustc for stretch LTS.
Chris Lamb (@lamby)
lamby at debian.org
Tue Feb 8 17:02:41 GMT 2022
Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker
Commits:
cd61c630 by Chris Lamb at 2022-02-08T08:59:07-08:00
Triage CVE-2022-21658 in rustc for stretch LTS.
- - - - -
949a1a0d by Chris Lamb at 2022-02-08T09:00:13-08:00
Triage CVE-2022-23451 & CVE-2022-23452 in barbican for stretch LTS.
- - - - -
3b0e5db6 by Chris Lamb at 2022-02-08T09:01:01-08:00
Triage CVE-2021-23520 & CVE-2021-23521 in juce for stretch LTS.
- - - - -
d230a67d by Chris Lamb at 2022-02-08T09:02:15-08:00
Triage CVE-2021-36408, CVE-2021-36409, CVE-2021-36410 & CVE-2021-36411 in libde265 for stretch LTS.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3789,6 +3789,7 @@ CVE-2022-23452
- barbican <unfixed>
[bullseye] - barbican <no-dsa> (Minor issue)
[buster] - barbican <no-dsa> (Minor issue)
+ [stretch] - barbican <no-dsa> (Minor issue)
NOTE: https://storyboard.openstack.org/#!/story/2009297
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2025090
CVE-2022-23451
@@ -3796,6 +3797,7 @@ CVE-2022-23451
- barbican <unfixed>
[bullseye] - barbican <no-dsa> (Minor issue)
[buster] - barbican <no-dsa> (Minor issue)
+ [stretch] - barbican <no-dsa> (Minor issue)
NOTE: https://storyboard.openstack.org/#!/story/2009253
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2025089
CVE-2022-23450
@@ -15354,6 +15356,7 @@ CVE-2022-21658 (Rust is a multi-paradigm, general-purpose programming language d
- rustc <unfixed>
[bullseye] - rustc <no-dsa> (Minor issue)
[buster] - rustc <no-dsa> (Minor issue)
+ [stretch] - rustc <no-dsa> (Minor issue)
NOTE: https://github.com/rust-lang/wg-security-response/tree/master/patches/CVE-2022-21658
NOTE: https://www.openwall.com/lists/oss-security/2022/01/20/1
CVE-2022-21657
@@ -37154,11 +37157,13 @@ CVE-2021-36411 (An issue has been found in libde265 v1.0.8 due to incorrect acce
- libde265 <unfixed>
[bullseye] - libde265 <no-dsa> (Minor issue)
[buster] - libde265 <no-dsa> (Minor issue)
+ [stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/302
CVE-2021-36410 (A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ...)
- libde265 <unfixed>
[bullseye] - libde265 <no-dsa> (Minor issue)
[buster] - libde265 <no-dsa> (Minor issue)
+ [stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/301
CVE-2021-3641 (Improper Link Resolution Before File Access ('Link Following') vulnera ...)
NOT-FOR-US: Bitdefender
@@ -37166,11 +37171,13 @@ CVE-2021-36409 (There is an Assertion `scaling_list_pred_matrix_id_delta==1' fai
- libde265 <unfixed>
[bullseye] - libde265 <no-dsa> (Minor issue)
[buster] - libde265 <no-dsa> (Minor issue)
+ [stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/300
CVE-2021-36408 (An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ...)
- libde265 <unfixed>
[bullseye] - libde265 <no-dsa> (Minor issue)
[buster] - libde265 <no-dsa> (Minor issue)
+ [stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/299
CVE-2021-36407
RESERVED
@@ -69350,12 +69357,14 @@ CVE-2021-23521 (This affects the package juce-framework/JUCE before 6.1.5. This
- juce 6.1.5~ds0-1
[bullseye] - juce <no-dsa> (Minor issue)
[buster] - juce <no-dsa> (Minor issue)
+ [stretch] - juce <no-dsa> (Minor issue)
NOTE: https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f
NOTE: https://security.snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388608
CVE-2021-23520 (The package juce-framework/juce before 6.1.5 are vulnerable to Arbitra ...)
- juce 6.1.5~ds0-1
[bullseye] - juce <no-dsa> (Minor issue)
[buster] - juce <no-dsa> (Minor issue)
+ [stretch] - juce <no-dsa> (Minor issue)
NOTE: https://github.com/juce-framework/JUCE/commit/2e874e80cba0152201aff6a4d0dc407997d10a7f
NOTE: https://snyk.io/vuln/SNYK-UNMANAGED-JUCEFRAMEWORKJUCE-2388607
NOTE: https://snyk.io/research/zip-slip-vulnerability
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/292b762852c9e8acd9fbb8ebd993407495f48a61...d230a67d925237756648d945ed9c6c09d39626b3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/292b762852c9e8acd9fbb8ebd993407495f48a61...d230a67d925237756648d945ed9c6c09d39626b3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220208/a7bf1edc/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list