[Git][security-tracker-team/security-tracker][updatedocs] 70 commits: Add CVE-2021-45845/freecad
Neil Williams (@codehelp)
codehelp at debian.org
Thu Feb 17 08:08:22 GMT 2022
Neil Williams pushed to branch updatedocs at Debian Security Tracker / security-tracker
Commits:
18b20294 by Salvatore Bonaccorso at 2022-02-15T10:00:09+01:00
Add CVE-2021-45845/freecad
- - - - -
eaeb30e2 by Moritz Muehlenhoff at 2022-02-15T11:06:57+01:00
buster/bullseye triage
- - - - -
0aa4625a by Moritz Muehlenhoff at 2022-02-15T11:16:43+01:00
gerbv updates
- - - - -
2b9c7cd5 by Moritz Muehlenhoff at 2022-02-15T13:11:12+01:00
add and take redis in dsa-needed
- - - - -
a5065f71 by Markus Koschany at 2022-02-15T14:58:49+01:00
Reserve DSA-5076-1 h2database
- - - - -
0833affe by Neil Williams at 2022-02-15T14:18:53+00:00
Add CVE-2021-25939/arangodb as <itp>
- - - - -
001347cd by Neil Williams at 2022-02-15T14:31:42+00:00
Allow merge-cve-files to let RESERVED through
Avoid merge-cve-files stumbling over FlagAnnotations like RESERVED and
REJECTED.
Also add code to tidy up the .xpck files that can be generated by the
merge process.
- - - - -
98967047 by Neil Williams at 2022-02-15T14:54:16+00:00
Process some NFUs
- - - - -
69a0a858 by Neil Williams at 2022-02-15T15:02:00+00:00
CVE-2021-32036/mongodb <removed>
- - - - -
f6d728c8 by Neil Williams at 2022-02-15T15:11:42+00:00
Process some NFUs
- - - - -
e59da219 by Roberto C. Sánchez at 2022-02-15T10:34:08-05:00
LTS: reclaim gpac
- - - - -
7c604aeb by Moritz Muehlenhoff at 2022-02-15T17:13:23+01:00
atheme-services fixed in sid
- - - - -
1caf80a4 by Moritz Muehlenhoff at 2022-02-15T17:17:32+01:00
NFUs
- - - - -
88b2a0ed by Moritz Muehlenhoff at 2022-02-15T18:48:49+01:00
one qemu issue n/a for buster
- - - - -
b6c2dced by Moritz Mühlenhoff at 2022-02-15T20:03:10+01:00
librecad DSA
- - - - -
f8748a52 by security tracker role at 2022-02-15T20:11:23+00:00
automatic update
- - - - -
743587fc by Salvatore Bonaccorso at 2022-02-15T21:15:44+01:00
Reference upcoming TALOS advisories for gerbv issues
- - - - -
151f7195 by Salvatore Bonaccorso at 2022-02-15T21:21:14+01:00
Process some NFUs
- - - - -
1d551301 by Salvatore Bonaccorso at 2022-02-15T21:24:40+01:00
Process some NFUs
- - - - -
bd3cfe04 by Salvatore Bonaccorso at 2022-02-15T21:28:53+01:00
Re-associate four CVEs with pluxml
- - - - -
b46f327d by Salvatore Bonaccorso at 2022-02-15T21:44:53+01:00
Update note for CVE-2022-0563/util-linux
Unfortunately the situation is compliated. util-linux is compiled with
readline support. But additionally it is configured with
--disable-chfn-chsh. The chfn and chsh utilities are until now provided
by src:shadow (and the passwd binary package).
- - - - -
24d6331c by Salvatore Bonaccorso at 2022-02-15T21:57:34+01:00
Process some NFUs
- - - - -
ab2d457f by Salvatore Bonaccorso at 2022-02-15T21:58:05+01:00
Add three new pluxml issues
- - - - -
a25aed1e by Salvatore Bonaccorso at 2022-02-15T22:23:12+01:00
Update information for CVE-2012-4427/gnome-shell
The problem is with GNOME Shell's NPAPI browser extension which is not
shipped anymore since GNOME 3.32. We can mark thus the first version
landing in unstable as fixed, which was 3.34.0-2.
Thanks: Simon McVittie for the update.
- - - - -
def4d7cf by Chris Lamb at 2022-02-15T13:34:09-08:00
Reserve DLA-2924-1 for libxstream-java
- - - - -
dfa0c3b2 by Salvatore Bonaccorso at 2022-02-15T22:39:19+01:00
Add CVE-2022-21698/golang-github-prometheus-client-golang
- - - - -
496c07ff by Salvatore Bonaccorso at 2022-02-16T06:21:46+01:00
chromium issues fixed in unstable
- - - - -
c432594d by Salvatore Bonaccorso at 2022-02-16T06:28:25+01:00
Add CVE-2022-24684/nomad
- - - - -
7d4ef1b1 by Salvatore Bonaccorso at 2022-02-16T06:42:15+01:00
Process some NFUs
- - - - -
e1a4163d by Salvatore Bonaccorso at 2022-02-16T06:51:31+01:00
Add CVE-2021-45005/mujs
- - - - -
ddaa22bd by Salvatore Bonaccorso at 2022-02-16T07:35:49+01:00
Add CVE-2022-0617/linux
- - - - -
f73bc4d0 by Salvatore Bonaccorso at 2022-02-16T07:42:16+01:00
Update information for CVE-2022-0617/linux
- - - - -
fc32fcc4 by Salvatore Bonaccorso at 2022-02-16T07:47:54+01:00
Add CVE-2022-0585/wireshark
- - - - -
8c6d32c7 by Salvatore Bonaccorso at 2022-02-16T08:07:27+01:00
Add CVE-2021-3700/usbredir
- - - - -
b219f6b1 by Salvatore Bonaccorso at 2022-02-16T08:11:38+01:00
Add CVE-2021-3596/imagemagick
- - - - -
fcaba362 by Salvatore Bonaccorso at 2022-02-16T08:35:19+01:00
Add CVE-2021-44960/svgpp
- - - - -
5563b815 by Salvatore Bonaccorso at 2022-02-16T08:38:52+01:00
Process NFUs
- - - - -
89994e6b by security tracker role at 2022-02-16T08:10:21+00:00
automatic update
- - - - -
d714ee56 by Salvatore Bonaccorso at 2022-02-16T09:25:22+01:00
Add CVE-2022-2523{5,6}/expat
- - - - -
9c666082 by Salvatore Bonaccorso at 2022-02-16T09:28:32+01:00
Process NFUs
- - - - -
c0338314 by Moritz Muehlenhoff at 2022-02-16T10:25:13+01:00
node-sanitize-html now in the archive
- - - - -
7aa8e647 by Timo Röhling at 2022-02-16T11:26:06+01:00
Mark rpyc as not affected by CVE-2019-16328
- - - - -
963074a1 by Moritz Muehlenhoff at 2022-02-16T12:36:55+01:00
buster/bullseye triage
- - - - -
c89e2fbc by Salvatore Bonaccorso at 2022-02-16T13:08:24+01:00
Take expat from dsa-needed list
- - - - -
f612229b by Salvatore Bonaccorso at 2022-02-16T13:13:14+01:00
Add reason for not-affected and expand notes covering upstream information
- - - - -
8069dc8a by Salvatore Bonaccorso at 2022-02-16T13:14:04+01:00
Merge branch 'CVE-2019-16328'
!102
- - - - -
07326b5c by Sébastien Delafond at 2022-02-16T14:14:38+01:00
Reserve DSA-5078-1 for zsh
- - - - -
03e1f597 by Gunnar Wolf at 2022-02-16T12:33:43-06:00
Claim drupal7 in dla-needed.txt
- - - - -
50b4a73b by Salvatore Bonaccorso at 2022-02-16T19:40:35+01:00
Add tempoary entry for SA-CORE-2022-003 issue
- - - - -
cc8de46b by Salvatore Bonaccorso at 2022-02-16T19:48:44+01:00
Update status for CVE-2022-0487/linux
- - - - -
2a3cc380 by Salvatore Bonaccorso at 2022-02-16T19:50:07+01:00
Add upstream tag information for CVE-2022-0487
- - - - -
313e9944 by Gunnar Wolf at 2022-02-16T12:54:23-06:00
Reserve DLA-2925-1 for drupal7
- - - - -
bc97dfd0 by Salvatore Bonaccorso at 2022-02-16T20:00:14+01:00
Track fixed version in stretch for drupal7 for SA-CORE-2022-003
- - - - -
3e698483 by Salvatore Bonaccorso at 2022-02-16T20:02:00+01:00
drupal7: Add reference to upstream commit for SA-CORE-2022-003
- - - - -
08ef0d08 by security tracker role at 2022-02-16T20:10:23+00:00
automatic update
- - - - -
ff75bf48 by Salvatore Bonaccorso at 2022-02-16T21:13:43+01:00
Remove notes from CVE-2021-3648 (duplicate of CVE-2021-3530)
- - - - -
da9ccec3 by Salvatore Bonaccorso at 2022-02-16T21:14:53+01:00
Process NFUs
- - - - -
cbfc7950 by Salvatore Bonaccorso at 2022-02-16T21:23:37+01:00
Add CVE-2022-0559/radare2
- - - - -
88ee6a5b by Salvatore Bonaccorso at 2022-02-16T21:24:20+01:00
Process NFUs
- - - - -
ab130388 by Salvatore Bonaccorso at 2022-02-16T21:29:00+01:00
Add note for expat in dsa-needed list
- - - - -
9cfa0562 by Salvatore Bonaccorso at 2022-02-16T21:58:58+01:00
CVE-2022-240{48,50,51,52}/mariadb: Add ZDI references
- - - - -
ebcca1a7 by Salvatore Bonaccorso at 2022-02-16T22:19:10+01:00
Process two NFUs
- - - - -
a18a789b by Salvatore Bonaccorso at 2022-02-16T22:40:41+01:00
Add Debian bug reference for CVE-2022-25235/expat
- - - - -
db093603 by Salvatore Bonaccorso at 2022-02-16T22:41:47+01:00
Add Debian bug reference for CVE-2022-25236/expat
- - - - -
d6693b88 by Moritz Muehlenhoff at 2022-02-16T23:09:30+01:00
mbedtls fixed in sid
- - - - -
12caf0aa by Salvatore Bonaccorso at 2022-02-17T07:53:24+01:00
Add CVE-2022-0646/linux
- - - - -
b651e896 by Salvatore Bonaccorso at 2022-02-17T08:06:01+01:00
Add CVE-2022-0644/linux
- - - - -
05273c90 by Neil Williams at 2022-02-17T08:07:33+00:00
Extend tracker documentation
Include answers to questions that have come up on the mailing list
Include descriptions of the helper scripts in ./bin/
- - - - -
ef78b3df by Neil Williams at 2022-02-17T08:07:33+00:00
Update for review comments
- - - - -
937a3455 by Neil Williams at 2022-02-17T08:07:33+00:00
Extend note on <itp> to include RFP bugs
- - - - -
7 changed files:
- bin/merge-cve-files
- data/CVE/list
- data/DLA/list
- data/DSA/list
- data/dla-needed.txt
- data/dsa-needed.txt
- doc/security-team.d.o/security_tracker
Changes:
=====================================
bin/merge-cve-files
=====================================
@@ -6,7 +6,7 @@
# Copyright © 2020 Emilio Pozuelo Monfort <pochu at debian.org>
# Copyright (c) 2021-2022 Neil Williams <codehelp at debian.org>
-import os.path
+import os
import sys
import setup_paths # noqa
@@ -129,6 +129,8 @@ for extra_bug in extra_data:
notes = {}
new_annotations = bug.annotations
for extra_annotation in extra_bug.annotations:
+ if isinstance(extra_annotation, FlagAnnotation):
+ continue
if isinstance(extra_annotation, StringAnnotation):
cve = f"{extra_bug.header.name}"
note_tag = notes.setdefault(cve, [])
@@ -142,3 +144,8 @@ for extra_bug in extra_data:
with open(main_list, 'w') as f:
writecvelist(data, f)
+
+# check for and erase an .xpck file built from the merge
+xpck = f"{extra_list}.xpck"
+if os.path.exists(xpck):
+ os.unlink(xpck)
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,282 @@
+CVE-2022-25257
+ RESERVED
+CVE-2022-25256
+ RESERVED
+CVE-2022-25255 (In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux ...)
+ TODO: check
+CVE-2022-25254
+ RESERVED
+CVE-2022-25253
+ RESERVED
+CVE-2022-25252
+ RESERVED
+CVE-2022-25251
+ RESERVED
+CVE-2022-25250
+ RESERVED
+CVE-2022-25249
+ RESERVED
+CVE-2022-25248
+ RESERVED
+CVE-2022-25247
+ RESERVED
+CVE-2022-25246
+ RESERVED
+CVE-2022-24374
+ RESERVED
+CVE-2022-23916
+ RESERVED
+CVE-2022-23810
+ RESERVED
+CVE-2022-21142
+ RESERVED
+CVE-2022-0648
+ RESERVED
+CVE-2022-0647
+ RESERVED
+CVE-2022-0646 [mctp: serial: Cancel pending work from ndo_uninit handler]
+ RESERVED
+ - linux <unfixed>
+ NOTE: https://lore.kernel.org/all/20220211011552.1861886-1-jk@codeconstruct.com.au/T/
+CVE-2022-0645
+ RESERVED
+CVE-2022-0644 [vfs: check fd has read access in kernel_read_file_from_fd()]
+ RESERVED
+ - linux 5.14.16-1
+ [bullseye] - linux 5.10.84-1
+ [stretch] - linux 4.9.290-1
+ NOTE: https://git.kernel.org/linus/032146cda85566abcd1c4884d9d23e4e30a07e9a (5.15-rc7)
+CVE-2022-0643
+ RESERVED
+CVE-2022-0642
+ RESERVED
+CVE-2022-0641
+ RESERVED
+CVE-2022-0640
+ RESERVED
+CVE-2022-0639
+ RESERVED
+CVE-2022-0638
+ RESERVED
+CVE-2022-0637
+ RESERVED
+CVE-2022-0636
+ RESERVED
+CVE-2022-0635
+ RESERVED
+CVE-2022-0634
+ RESERVED
+CVE-2022-0633
+ RESERVED
+CVE-2022-0632
+ RESERVED
+CVE-2022-0631
+ RESERVED
+CVE-2022-0630
+ RESERVED
+CVE-2022-0629
+ RESERVED
+CVE-2022-0628
+ RESERVED
+CVE-2022-0627
+ RESERVED
+CVE-2022-0626
+ RESERVED
+CVE-2022-0625
+ RESERVED
+CVE-2022-0624
+ RESERVED
+CVE-2022-XXXX [Improper input validation - SA-CORE-2022-003]
+ - drupal7 <removed>
+ [stretch] - drupal7 7.52-2+deb9u18
+ NOTE: https://www.drupal.org/sa-core-2022-003
+ NOTE: https://git.drupalcode.org/project/drupal/-/commit/43c757167380643b5f73287a63a8739731a5b712
+CVE-2022-25245
+ RESERVED
+CVE-2022-25244
+ RESERVED
+CVE-2022-25243
+ RESERVED
+CVE-2022-25242 (In FileCloud before 21.3, file upload is not protected against Cross-S ...)
+ NOT-FOR-US: FileCloud
+CVE-2022-25241 (In FileCloud before 21.3, the CSV user import functionality is vulnera ...)
+ NOT-FOR-US: FileCloud
+CVE-2022-25240
+ RESERVED
+CVE-2022-25239
+ RESERVED
+CVE-2022-25238
+ RESERVED
+CVE-2022-25237
+ RESERVED
+CVE-2022-25236 (xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to in ...)
+ - expat <unfixed> (bug #1005895)
+ NOTE: https://github.com/libexpat/libexpat/pull/561
+CVE-2022-25235 (xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain valid ...)
+ - expat <unfixed> (bug #1005894)
+ NOTE: https://github.com/libexpat/libexpat/pull/562
+CVE-2022-25229
+ RESERVED
+CVE-2022-25228
+ RESERVED
+CVE-2022-25227
+ RESERVED
+CVE-2022-25226
+ RESERVED
+CVE-2022-25225
+ RESERVED
+CVE-2022-25224
+ RESERVED
+CVE-2022-25223
+ RESERVED
+CVE-2022-25222
+ RESERVED
+CVE-2022-25221
+ RESERVED
+CVE-2022-25220
+ RESERVED
+CVE-2022-25219
+ RESERVED
+CVE-2022-25218
+ RESERVED
+CVE-2022-25217
+ RESERVED
+CVE-2022-25216
+ RESERVED
+CVE-2022-25215
+ RESERVED
+CVE-2022-25214
+ RESERVED
+CVE-2022-25213
+ RESERVED
+CVE-2022-24915
+ RESERVED
+CVE-2022-24432
+ RESERVED
+CVE-2022-22985
+ RESERVED
+CVE-2022-21146
+ RESERVED
+CVE-2022-0623
+ RESERVED
+CVE-2022-0622
+ RESERVED
+CVE-2022-0621
+ RESERVED
+CVE-2022-0620
+ RESERVED
+CVE-2022-0619
+ RESERVED
+CVE-2022-25209 (Jenkins Chef Sinatra Plugin 1.20 and earlier does not configure its XM ...)
+ NOT-FOR-US: Jenkins Chef Sinatra Plugin
+CVE-2022-25175 (Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier use ...)
+ NOT-FOR-US: Jenkins Pipeline: Multibranch Plugin
+CVE-2022-25169
+ RESERVED
+CVE-2022-25168
+ RESERVED
+CVE-2022-25167
+ RESERVED
+CVE-2022-24435
+ RESERVED
+CVE-2022-23986
+ RESERVED
+CVE-2022-21159
+ RESERVED
+CVE-2022-0618
+ RESERVED
+CVE-2022-0617 (A flaw null pointer dereference in the Linux kernel UDF file system fu ...)
+ - linux 5.16.7-1
+ NOTE: https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
+ NOTE: https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
+CVE-2022-0616
+ RESERVED
+CVE-2022-0615
+ RESERVED
+CVE-2022-0614 (Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2. ...)
+ TODO: check
+CVE-2022-0613 (Authorization Bypass Through User-Controlled Key in NPM urijs prior to ...)
+ TODO: check
+CVE-2021-4220
+ REJECTED
+CVE-2021-4219
+ RESERVED
+CVE-2022-25212 (A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plu ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25211 (A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier a ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25210 (Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25208 (A missing permission check in Jenkins Chef Sinatra Plugin 1.20 and ear ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25207 (A cross-site request forgery (CSRF) vulnerability in Jenkins Chef Sina ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25206 (A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows at ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25205 (A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25204 (Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25203 (Jenkins Team Views Plugin 0.9.0 and earlier does not escape team names ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25202 (Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escap ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25201 (Missing permission checks in Jenkins Checkmarx Plugin 2022.1.2 and ear ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25200 (A cross-site request forgery (CSRF) vulnerability in Jenkins Checkmarx ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25199 (A missing permission check in Jenkins SCP publisher Plugin 1.8 and ear ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25198 (A cross-site request forgery (CSRF) vulnerability in Jenkins SCP publi ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25197 (Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implement ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25196 (Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25195 (A missing permission check in Jenkins autonomiq Plugin 1.15 and earlie ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25194 (A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25193 (Missing permission checks in Jenkins Snow Commander Plugin 2.0 and ear ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25192 (A cross-site request forgery (CSRF) vulnerability in Jenkins Snow Comm ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25191 (Jenkins Agent Server Parameter Plugin 1.0 and earlier does not escape ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25190 (A missing permission check in Jenkins Conjur Secrets Plugin 1.0.11 and ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25189 (Jenkins Custom Checkbox Parameter Plugin 1.1 and earlier does not esca ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25188 (Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appNa ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25187 (Jenkins Support Core Plugin 2.79 and earlier does not redact some sens ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25186 (Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functional ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25185 (Jenkins Generic Webhook Trigger Plugin 1.81 and earlier does not escap ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25184 (Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25183 (Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25182 (A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libr ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25181 (A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libr ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25180 (Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier include ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25179 (Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier fol ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25178 (Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25177 (Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25176 (Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25174 (Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and ...)
+ NOT-FOR-US: Jenkins plugin
+CVE-2022-25173 (Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier uses th ...)
+ NOT-FOR-US: Jenkins plugin
CVE-2022-25166
RESERVED
CVE-2022-25165
@@ -36,59 +315,59 @@ CVE-2022-25149
RESERVED
CVE-2022-25148
RESERVED
-CVE-2022-0612
- RESERVED
-CVE-2022-0611
- RESERVED
+CVE-2022-0612 (Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat ...)
+ NOT-FOR-US: livehelperchat
+CVE-2022-0611 (Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3 ...)
+ NOT-FOR-US: snipe-it
CVE-2019-25057 (In Corda before 4.1, the meaning of serialized data can be modified vi ...)
NOT-FOR-US: Corda
CVE-2022-25147
RESERVED
CVE-2022-0610
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0609
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0608
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0607
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0606
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0605
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0604
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
CVE-2022-0603
RESERVED
- - chromium <unfixed>
+ - chromium 98.0.4758.102-1
[buster] - chromium <end-of-life> (see DSA 5046)
[stretch] - chromium <end-of-life> (see DSA 4562)
NOTE: https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
@@ -102,10 +381,10 @@ CVE-2022-0599
RESERVED
CVE-2022-0598
RESERVED
-CVE-2022-0597
- RESERVED
-CVE-2022-0596
- RESERVED
+CVE-2022-0597 (Open Redirect in Packagist microweber/microweber prior to 1.2.11. ...)
+ NOT-FOR-US: microweber
+CVE-2022-0596 (Business Logic Errors in Packagist microweber/microweber prior to 1.2. ...)
+ NOT-FOR-US: microweber
CVE-2022-0595
RESERVED
CVE-2022-0594
@@ -118,12 +397,12 @@ CVE-2022-0591
RESERVED
CVE-2022-0590
RESERVED
-CVE-2022-0589
- RESERVED
-CVE-2022-0588
- RESERVED
-CVE-2022-0587
- RESERVED
+CVE-2022-0589 (Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms pri ...)
+ NOT-FOR-US: LibreNMS
+CVE-2022-0588 (Exposure of Sensitive Information to an Unauthorized Actor in Packagis ...)
+ NOT-FOR-US: LibreNMS
+CVE-2022-0587 (Improper Authorization in Packagist librenms/librenms prior to 22.2.0. ...)
+ NOT-FOR-US: LibreNMS
CVE-2021-46687
RESERVED
CVE-2021-46270
@@ -153,7 +432,7 @@ CVE-2022-25141
CVE-2022-25140
RESERVED
CVE-2022-25139 (njs through 0.7.0, used in NGINX, was discovered to contain a heap use ...)
- TODO: check
+ NOT-FOR-US: njs
CVE-2022-25138
RESERVED
CVE-2022-25137
@@ -455,7 +734,7 @@ CVE-2022-24990
CVE-2022-24989
RESERVED
CVE-2022-24988 (In galois_2p8 before 0.1.2, PrimitivePolynomialField::new has an off-b ...)
- TODO: check
+ NOT-FOR-US: galois_2p8
CVE-2022-24987
RESERVED
CVE-2022-24986
@@ -472,22 +751,45 @@ CVE-2022-24981
RESERVED
CVE-2022-0586 (Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 ...)
- wireshark <unfixed>
+ [bullseye] - wireshark <no-dsa> (Minor issue)
+ [buster] - wireshark <no-dsa> (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17813
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-01.html
CVE-2022-0585
RESERVED
+ - wireshark <unfixed>
+ [bullseye] - wireshark <no-dsa> (Minor issue)
+ [buster] - wireshark <no-dsa> (Minor issue)
+ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2054049
+ NOTE: https://www.wireshark.org/security/wnpa-sec-2022-02.html
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17829
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17842
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17847
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17855
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17891
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17925
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17926
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17931
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17932
+ NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17933
CVE-2022-0584
RESERVED
CVE-2022-0583 (Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3 ...)
- wireshark <unfixed>
+ [bullseye] - wireshark <no-dsa> (Minor issue)
+ [buster] - wireshark <no-dsa> (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17840
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-03.html
CVE-2022-0582 (Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to ...)
- wireshark <unfixed>
+ [bullseye] - wireshark <no-dsa> (Minor issue)
+ [buster] - wireshark <no-dsa> (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17882
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-04.html
CVE-2022-0581 (Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3. ...)
- wireshark <unfixed>
+ [bullseye] - wireshark <no-dsa> (Minor issue)
+ [buster] - wireshark <no-dsa> (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/17935
NOTE: https://www.wireshark.org/security/wnpa-sec-2022-05.html
CVE-2022-0580 (Improper Access Control in Packagist librenms/librenms prior to 22.2.0 ...)
@@ -505,7 +807,7 @@ CVE-2022-0579 (Improper Privilege Management in Packagist snipe/snipe-it prior t
CVE-2022-0578
RESERVED
CVE-2022-24976 (Atheme IRC Services before 7.2.12, when used in conjunction with InspI ...)
- - atheme-services <unfixed>
+ - atheme-services 7.2.12-1
[bullseye] - atheme-services <no-dsa> (Minor issue; can be fixed via point release)
[buster] - atheme-services <no-dsa> (Minor issue; can be fixed via point release)
[stretch] - atheme-services <postponed> (Minor issue)
@@ -1084,19 +1386,21 @@ CVE-2022-24707
CVE-2022-24706
RESERVED
CVE-2022-24705 (The rad_packet_recv function in radius/packet.c suffers from a memcpy ...)
- TODO: check
+ NOT-FOR-US: ACCEL-PPP
CVE-2022-24704 (The rad_packet_recv function in opt/src/accel-pppd/radius/packet.c suf ...)
- TODO: check
+ NOT-FOR-US: ACCEL-PPP
CVE-2022-23922
RESERVED
CVE-2022-23104
RESERVED
CVE-2022-0563 [partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline]
RESERVED
- - util-linux <unfixed>
+ - util-linux <unfixed> (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2053151
NOTE: https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
NOTE: https://github.com/util-linux/util-linux/commit/faa5a3a83ad0cb5e2c303edbfd8cd823c9d94c17
+ NOTE: util-linux in Debian does build with readline support but chfn and chsh are provided
+ NOTE: by src:shadow and util-linux is configured with --disable-chfn-chsh
CVE-2022-0562 (Null source pointer passed as an argument to memcpy() function within ...)
- tiff 4.3.0-4
[bullseye] - tiff <no-dsa> (Minor issue)
@@ -1111,8 +1415,10 @@ CVE-2022-0561 (Null source pointer passed as an argument to memcpy() function wi
NOTE: Fixed by: https://gitlab.com/libtiff/libtiff/-/commit/eecb0712f4c3a5b449f70c57988260a667ddbdef
CVE-2022-0560 (Open Redirect in Packagist microweber/microweber prior to 1.2.11. ...)
NOT-FOR-US: microweber
-CVE-2022-0559
- RESERVED
+CVE-2022-0559 (Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. ...)
+ - radare2 <unfixed>
+ NOTE: https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e
+ NOTE: https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e
CVE-2022-0558 (Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber ...)
NOT-FOR-US: microweber
CVE-2022-0557 (OS Command Injection in Packagist microweber/microweber prior to 1.2.1 ...)
@@ -1178,8 +1484,9 @@ CVE-2022-24686 (HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.1
NOTE: https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-condition/35559
CVE-2022-24685
RESERVED
-CVE-2022-24684
- RESERVED
+CVE-2022-24684 (HashiCorp Nomad and Nomad Enterprise before 1.0.17, 1.1.x before 1.1.1 ...)
+ - nomad <undetermined>
+ NOTE: https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/35562
CVE-2022-24683
RESERVED
CVE-2022-24682 (An issue was discovered in the Calendar feature in Zimbra Collaboratio ...)
@@ -1329,12 +1636,12 @@ CVE-2022-0516 [KVM: s390: Return error on SIDA memop on normal guest]
[stretch] - linux <not-affected> (Vulnerable code not present)
NOTE: Fixed by: https://git.kernel.org/linus/2c212e1baedcd782b2535a3f86bc491977677c0e
NOTE: https://www.openwall.com/lists/oss-security/2022/02/11/2
-CVE-2022-24665
- RESERVED
-CVE-2022-24664
- RESERVED
-CVE-2022-24663
- RESERVED
+CVE-2022-24665 (PHP Everywhere <= 2.0.3 included functionality that allowed executi ...)
+ NOT-FOR-US: PHP Everywhere
+CVE-2022-24664 (PHP Everywhere <= 2.0.3 included functionality that allowed executi ...)
+ NOT-FOR-US: PHP Everywhere
+CVE-2022-24663 (PHP Everywhere <= 2.0.3 included functionality that allowed executi ...)
+ NOT-FOR-US: PHP Everywhere
CVE-2022-24662
RESERVED
CVE-2022-24661
@@ -1479,18 +1786,24 @@ CVE-2022-24592
RESERVED
CVE-2022-24591
RESERVED
-CVE-2022-24590
- RESERVED
-CVE-2022-24589
- RESERVED
-CVE-2022-24588
- RESERVED
-CVE-2022-24587
- RESERVED
-CVE-2022-24586
- RESERVED
-CVE-2022-24585
- RESERVED
+CVE-2022-24590 (A stored cross-site scripting (XSS) vulnerability in the Add Link func ...)
+ NOT-FOR-US: BackdropCMS
+CVE-2022-24589 (Burden v3.0 was discovered to contain a stored cross-site scripting (X ...)
+ NOT-FOR-US: Burden
+CVE-2022-24588 (Flatpress v1.2.1 was discovered to contain a cross-site scripting (XSS ...)
+ NOT-FOR-US: Flatpress
+CVE-2022-24587 (A stored cross-site scripting (XSS) vulnerability in the component cor ...)
+ - pluxml <undetermined>
+ NOTE: https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24587/CVE-2022-24587.pdf
+ TODO: check if reported upstream
+CVE-2022-24586 (A stored cross-site scripting (XSS) vulnerability in the component /co ...)
+ - pluxml <undetermined>
+ NOTE: https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24586/CVE-2022-24586.pdf
+ TODO: check if reported upstream
+CVE-2022-24585 (A stored cross-site scripting (XSS) vulnerability in the component /co ...)
+ - pluxml <undetermined>
+ NOTE: https://github.com/Nguyen-Trung-Kien/CVE/blob/main/CVE-2022-24585/CVE-2022-24585.pdf
+ TODO: check if reported upstream
CVE-2022-24584
RESERVED
CVE-2022-24583
@@ -1828,8 +2141,8 @@ CVE-2022-0515
RESERVED
CVE-2022-0514
RESERVED
-CVE-2022-0513
- RESERVED
+CVE-2022-0513 (The WP Statistics WordPress plugin is vulnerable to SQL Injection due ...)
+ NOT-FOR-US: WordPress plugin
CVE-2022-0512 (Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...)
TODO: check
CVE-2022-0511
@@ -1982,9 +2295,11 @@ CVE-2022-24384
CVE-2022-21241 (Cross-site scripting vulnerability in CSV+ prior to 0.8.1 allows a rem ...)
NOT-FOR-US: CSV+
CVE-2022-0487 (A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in ...)
- - linux <unfixed>
+ - linux <unfixed> (unimportant)
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1194516
NOTE: https://lore.kernel.org/all/20220114075934.302464-1-gregkh@linuxfoundation.org/
+ NOTE: https://git.kernel.org/linus/bd2db32e7c3e35bd4d9b8bbff689434a50893546 (5.17-rc4)
+ NOTE: CONFIG_MMC_MOXART is not set in Debian.
CVE-2022-0486
RESERVED
CVE-2022-0485 [nbdcopy: missing error handling may create corrupted destination image]
@@ -2593,10 +2908,10 @@ CVE-2022-24229
RESERVED
CVE-2022-24228
RESERVED
-CVE-2022-24227
- RESERVED
-CVE-2022-24226
- RESERVED
+CVE-2022-24227 (A cross-site scripting (XSS) vulnerability in BoltWire v7.10 allows at ...)
+ NOT-FOR-US: BoltWire
+CVE-2022-24226 (Hospital Management System v4.0 was discovered to contain a blind SQL ...)
+ NOT-FOR-US: Hospital Management System
CVE-2022-24225
RESERVED
CVE-2022-24224
@@ -3006,8 +3321,8 @@ CVE-2022-24088
RESERVED
CVE-2022-24087
RESERVED
-CVE-2022-24086
- RESERVED
+CVE-2022-24086 (Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earli ...)
+ NOT-FOR-US: Adobe
CVE-2022-24085
RESERVED
CVE-2022-24084
@@ -3084,6 +3399,7 @@ CVE-2022-24052
- mariadb-10.5 <removed>
- mariadb-10.3 <removed>
NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
+ NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-366/
CVE-2022-24051
RESERVED
- mariadb-10.6 <unfixed>
@@ -3091,12 +3407,14 @@ CVE-2022-24051
- mariadb-10.3 <removed>
NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-318/
+ NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-365/
CVE-2022-24050
RESERVED
- mariadb-10.6 <unfixed>
- mariadb-10.5 <removed>
- mariadb-10.3 <removed>
NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
+ NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-364/
CVE-2022-24049
RESERVED
CVE-2022-24048
@@ -3105,6 +3423,7 @@ CVE-2022-24048
- mariadb-10.5 <removed>
- mariadb-10.3 <removed>
NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
+ NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-363/
CVE-2022-24047
RESERVED
CVE-2022-24046
@@ -3647,6 +3966,7 @@ CVE-2022-0359 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to
CVE-2022-0358
RESERVED
- qemu <unfixed>
+ [buster] - qemu <not-affected> (Vulnerable code not present)
[stretch] - qemu <not-affected> (virtiofsd added in 5.0)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2044863
NOTE: https://gitlab.com/qemu-project/qemu/-/commit/449e8171f96a6a944d1f3b7d3627ae059eae21ca
@@ -3856,10 +4176,10 @@ CVE-2022-0343
RESERVED
CVE-2022-0342
RESERVED
-CVE-2021-46558
- RESERVED
-CVE-2021-46557
- RESERVED
+CVE-2021-46558 (Multiple cross-site scripting (XSS) vulnerabilities in the Add User mo ...)
+ NOT-FOR-US: Issabel
+CVE-2021-46557 (Vicidial 2.14-783a was discovered to contain a cross-site scripting (X ...)
+ NOT-FOR-US: Vicidial
CVE-2021-46556 (Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ...)
NOT-FOR-US: Cesanta MJS
CVE-2021-46555
@@ -4047,11 +4367,11 @@ CVE-2021-46465
CVE-2021-46464
RESERVED
CVE-2021-46463 (njs through 0.7.1, used in NGINX, was discovered to contain a control ...)
- TODO: check
+ NOT-FOR-US: njs
CVE-2021-46462 (njs through 0.7.1, used in NGINX, was discovered to contain a segmenta ...)
- TODO: check
+ NOT-FOR-US: njs
CVE-2021-46461 (njs through 0.7.0, used in NGINX, was discovered to contain an out-of- ...)
- TODO: check
+ NOT-FOR-US: njs
CVE-2021-46460
RESERVED
CVE-2021-46459 (Victor CMS v1.0 was discovered to contain multiple SQL injection vulne ...)
@@ -4400,10 +4720,10 @@ CVE-2022-23806 (Curve.IsOnCurve in crypto/elliptic in Go before 1.16.14 and 1.17
NOTE: https://github.com/golang/go/commit/e16331902340c02bdf1831b5508df2307b871ef6 (go1.17.7)
CVE-2022-23805 (A security out-of-bounds read information disclosure vulnerability in ...)
NOT-FOR-US: Trend Micro
-CVE-2022-23804
- RESERVED
-CVE-2022-23803
- RESERVED
+CVE-2022-23804 (A stack-based buffer overflow vulnerability exists in the Gerber Viewe ...)
+ TODO: check
+CVE-2022-23803 (A stack-based buffer overflow vulnerability exists in the Gerber Viewe ...)
+ TODO: check
CVE-2022-23802
RESERVED
CVE-2022-23801
@@ -4782,22 +5102,22 @@ CVE-2022-23646
RESERVED
CVE-2022-23645
RESERVED
-CVE-2022-23644
- RESERVED
-CVE-2022-23643
- RESERVED
+CVE-2022-23644 (BookWyrm is a decentralized social network for tracking reading habits ...)
+ NOT-FOR-US: BookWyrm
+CVE-2022-23643 (Sourcegraph is a code search and navigation engine. Sourcegraph versio ...)
+ TODO: check
CVE-2022-23642
RESERVED
-CVE-2022-23641
- RESERVED
+CVE-2022-23641 (Discourse is an open source discussion platform. In versions prior to ...)
+ NOT-FOR-US: Discourse
CVE-2022-23640
RESERVED
-CVE-2022-23639
- RESERVED
+CVE-2022-23639 (crossbeam-utils provides atomics, synchronization primitives, scoped t ...)
+ TODO: check
CVE-2022-23638 (svg-sanitizer is a SVG/XML sanitizer written in PHP. A cross-site scri ...)
TODO: check
CVE-2022-23637 (K-Box is a web-based application to manage documents, images, videos a ...)
- TODO: check
+ NOT-FOR-US: K-Box
CVE-2022-23636
RESERVED
CVE-2022-23635
@@ -4885,8 +5205,8 @@ CVE-2022-23606
RESERVED
CVE-2022-23605 (Wire webapp is a web client for the wire messaging protocol. In versio ...)
NOT-FOR-US: Wire webapp
-CVE-2022-23604
- RESERVED
+CVE-2022-23604 (x26-Cogs is a repository of cogs made by Twentysix for the Red Discord ...)
+ NOT-FOR-US: x26-Cogs
CVE-2022-23603 (iTunesRPC-Remastered is a discord rich presence application for use wi ...)
NOT-FOR-US: iTunesRPC-Remastered
CVE-2022-23602 (Nimforum is a lightweight alternative to Discourse written in Nim. In ...)
@@ -5495,8 +5815,8 @@ CVE-2022-23386
RESERVED
CVE-2022-23385
RESERVED
-CVE-2022-23384
- RESERVED
+CVE-2022-23384 (YzmCMS v6.3 is affected by Cross Site Request Forgery (CSRF) in /admin ...)
+ NOT-FOR-US: YzmCMS
CVE-2022-23383
RESERVED
CVE-2022-23382
@@ -5547,8 +5867,8 @@ CVE-2022-23360
RESERVED
CVE-2022-23359
RESERVED
-CVE-2022-23358
- RESERVED
+CVE-2022-23358 (EasyCMS v1.6 allows for SQL injection via ArticlemAction.class.php. In ...)
+ NOT-FOR-US: EasyCMS
CVE-2022-23357 (mozilo2.0 was discovered to be vulnerable to directory traversal attac ...)
TODO: check
CVE-2022-23356
@@ -5629,8 +5949,8 @@ CVE-2022-23319
RESERVED
CVE-2022-23318
RESERVED
-CVE-2022-23317
- RESERVED
+CVE-2022-23317 (CobaltStrike <=4.5 HTTP(S) listener does not determine whether the ...)
+ NOT-FOR-US: CobaltStrike
CVE-2022-23316 (An issue was discovered in taoCMS v3.0.2. There is an arbitrary file r ...)
NOT-FOR-US: taocms
CVE-2022-23315 (MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnera ...)
@@ -5683,8 +6003,8 @@ CVE-2021-46390
RESERVED
CVE-2021-46389 (IIPImage High Resolution Streaming Image Server prior to commit 882925 ...)
NOT-FOR-US: IIPImage High Resolution Streaming Image Server
-CVE-2021-46388
- RESERVED
+CVE-2021-46388 (WAGO 750-8212 PFC200 G2 2ETH RS Firmware version 03.05.10(17) is affec ...)
+ NOT-FOR-US: WAGO
CVE-2021-46387
RESERVED
CVE-2021-46386 (https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: File U ...)
@@ -5857,8 +6177,8 @@ CVE-2021-46323 (Espruino 2v11.251 was discovered to contain a SEGV vulnerability
NOT-FOR-US: Espruino
CVE-2021-46322 (Duktape v2.99.99 was discovered to contain a SEGV vulnerability via th ...)
NOT-FOR-US: Duktape
-CVE-2021-46321
- RESERVED
+CVE-2021-46321 (Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain ...)
+ NOT-FOR-US: Tenda
CVE-2021-46320 (In OpenZeppelin <=v4.4.0, initializer functions that are invoked se ...)
NOT-FOR-US: OpenZeppelin
CVE-2021-46319
@@ -6177,7 +6497,7 @@ CVE-2022-23224
CVE-2022-23223 (The HTTP response will disclose the user password. This issue affected ...)
NOT-FOR-US: Apache ShenYu Admin
CVE-2022-23221 (H2 Console before 2.1.210 allows remote attackers to execute arbitrary ...)
- {DLA-2923-1}
+ {DSA-5076-1 DLA-2923-1}
- h2database 2.1.210-1
NOTE: https://github.com/h2database/h2database/releases/tag/version-2.1.210
NOTE: Fixed by https://github.com/h2database/h2database/commit/eb75633d0dfa86341e6ef77a861665c4a0f16ab8
@@ -6362,44 +6682,44 @@ CVE-2022-23206 (In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, a
NOT-FOR-US: Apache Traffic Control
CVE-2022-23205
RESERVED
-CVE-2022-23204
- RESERVED
-CVE-2022-23203
- RESERVED
-CVE-2022-23202
- RESERVED
+CVE-2022-23204 (Adobe Premiere Rush versions 2.0 and earlier are affected by an out-of ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23203 (Adobe Photoshop versions 22.5.4 (and earlier) and 23.1 (and earlier) a ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23202 (Adobe Creative Cloud Desktop version 2.7.0.13 (and earlier) is affecte ...)
+ NOT-FOR-US: Adobe
CVE-2022-23201
RESERVED
-CVE-2022-23200
- RESERVED
-CVE-2022-23199
- RESERVED
-CVE-2022-23198
- RESERVED
-CVE-2022-23197
- RESERVED
-CVE-2022-23196
- RESERVED
-CVE-2022-23195
- RESERVED
-CVE-2022-23194
- RESERVED
-CVE-2022-23193
- RESERVED
-CVE-2022-23192
- RESERVED
-CVE-2022-23191
- RESERVED
-CVE-2022-23190
- RESERVED
-CVE-2022-23189
- RESERVED
-CVE-2022-23188
- RESERVED
+CVE-2022-23200 (Adobe After Effects versions 22.1.1 (and earlier) and 18.4.3 (and earl ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23199 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23198 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23197 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23196 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23195 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23194 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23193 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23192 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23191 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23190 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23189 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
+CVE-2022-23188 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
CVE-2022-23187
RESERVED
-CVE-2022-23186
- RESERVED
+CVE-2022-23186 (Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlie ...)
+ NOT-FOR-US: Adobe
CVE-2022-23185
RESERVED
CVE-2022-23184 (In affected Octopus Server versions when the server HTTP and HTTPS bin ...)
@@ -7044,8 +7364,8 @@ CVE-2022-22947
RESERVED
CVE-2022-22946
RESERVED
-CVE-2022-22945
- RESERVED
+CVE-2022-22945 (VMware NSX Edge contains a CLI shell injection vulnerability. A malici ...)
+ NOT-FOR-US: VMware
CVE-2022-22944
RESERVED
CVE-2022-22943
@@ -7261,8 +7581,8 @@ CVE-2022-22855
RESERVED
CVE-2022-22854 (An access control issue in hprms/admin/?page=user/list of Hospital Pat ...)
NOT-FOR-US: Hospital Patient Record Management System
-CVE-2022-22853
- RESERVED
+CVE-2022-22853 (A stored cross-site scripting (XSS) vulnerability in Hospital Patient ...)
+ NOT-FOR-US: Hospital Patient Record Management System
CVE-2022-22852 (A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodt ...)
NOT-FOR-US: Sourcecodtester
CVE-2022-22851 (A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodt ...)
@@ -7323,14 +7643,14 @@ CVE-2021-46267
RESERVED
CVE-2021-46266
RESERVED
-CVE-2021-46265
- RESERVED
-CVE-2021-46264
- RESERVED
-CVE-2021-46263
- RESERVED
-CVE-2021-46262
- RESERVED
+CVE-2021-46265 (Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain ...)
+ NOT-FOR-US: Tenda
+CVE-2021-46264 (Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain ...)
+ NOT-FOR-US: Tenda
+CVE-2021-46263 (Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain ...)
+ NOT-FOR-US: Tenda
+CVE-2021-46262 (Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain ...)
+ NOT-FOR-US: Tenda
CVE-2021-46261
RESERVED
CVE-2021-46260
@@ -7349,14 +7669,14 @@ CVE-2021-46254
RESERVED
CVE-2021-46253 (A cross-site scripting (XSS) vulnerability in the Create Post function ...)
NOT-FOR-US: Anchor CMS
-CVE-2021-46252
- RESERVED
-CVE-2021-46251
- RESERVED
-CVE-2021-46250
- RESERVED
-CVE-2021-46249
- RESERVED
+CVE-2021-46252 (A Cross-Site Request Forgery (CSRF) in RequirementsBypassPage.php of S ...)
+ TODO: check
+CVE-2021-46251 (A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit ...)
+ TODO: check
+CVE-2021-46250 (An issue in SOA2Login::commented of ScratchOAuth2 before commit a91879 ...)
+ TODO: check
+CVE-2021-46249 (An authorization bypass exploited by a user-controlled key in Specific ...)
+ TODO: check
CVE-2021-46248
RESERVED
CVE-2021-46247
@@ -7764,8 +8084,8 @@ CVE-2022-22794
RESERVED
CVE-2022-22793
RESERVED
-CVE-2022-22792
- RESERVED
+CVE-2022-22792 (MobiSoft - MobiPlus User Take Over and Improper Handling of url Parame ...)
+ NOT-FOR-US: MobiSoft
CVE-2022-22791 (SYNEL - eharmony Authenticated Blind & Stored XSS. Inject JS code ...)
NOT-FOR-US: SYNEL
CVE-2022-22790 (SYNEL - eharmony Directory Traversal. Directory Traversal - is an atta ...)
@@ -7808,8 +8128,8 @@ CVE-2022-22772
RESERVED
CVE-2022-22771
RESERVED
-CVE-2022-22770
- RESERVED
+CVE-2022-22770 (The Web Server component of TIBCO Software Inc.'s TIBCO AuditSafe cont ...)
+ NOT-FOR-US: TIBCO
CVE-2022-22769 (The Web server component of TIBCO Software Inc.'s TIBCO EBX, TIBCO EBX ...)
NOT-FOR-US: TIBCO
CVE-2022-22768
@@ -10327,7 +10647,10 @@ CVE-2021-45846 (A flaw in the AMF parser of Slic3r libslic3r 1.3.0 allows an att
- slic3r <unfixed>
NOTE: https://github.com/slic3r/Slic3r/issues/5117
CVE-2021-45845 (The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS comma ...)
- TODO: check
+ - freecad <unfixed>
+ NOTE: https://github.com/FreeCAD/FreeCAD/pull/5306
+ NOTE: Fixed by: https://github.com/FreeCAD/FreeCAD/commit/169eb655f30180b95e5923be2eb3bc4de6e02406
+ NOTE: https://tracker.freecad.org/view.php?id=4810
CVE-2021-45844 (Improper sanitization in the invocation of ODA File Converter from Fre ...)
- freecad <unfixed> (bug #1005747)
NOTE: https://github.com/FreeCAD/FreeCAD/commit/1742d7ff82af1653253c4a4183c262c9af3b26d6 (0.20)
@@ -11778,6 +12101,7 @@ CVE-2021-45446
CVE-2021-45445 (Unisys ClearPath MCP TCP/IP Networking Services 59.1, 60.0, and 62.0 h ...)
NOT-FOR-US: Unisys
CVE-2021-45444 (In zsh before 5.8.1, an attacker can achieve code execution if they co ...)
+ {DSA-5078-1}
- zsh 5.8.1-1
NOTE: https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/
NOTE: https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/
@@ -11908,8 +12232,8 @@ CVE-2021-45393
RESERVED
CVE-2021-45392 (A Buffer Overflow vulnerability exists in Tenda Router AX12 V22.03.01. ...)
NOT-FOR-US: Tenda
-CVE-2021-45391
- RESERVED
+CVE-2021-45391 (A Buffer Overflow vulnerability exists in Tenda Router AX12 V22.03.01. ...)
+ NOT-FOR-US: Tenda
CVE-2021-45390
RESERVED
CVE-2021-45389 (StarWind SAN & NAS build 1578 and StarWind Command Center Build 68 ...)
@@ -12009,19 +12333,19 @@ CVE-2021-45345
CVE-2021-45344
RESERVED
CVE-2021-45343 (In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of ...)
- {DLA-2908-1}
+ {DSA-5077-1 DLA-2908-1}
- librecad 2.1.3-3 (bug #1004518)
NOTE: https://github.com/LibreCAD/LibreCAD/issues/1468
NOTE: https://github.com/LibreCAD/LibreCAD/pull/1469
NOTE: Fixed by: https://github.com/LibreCAD/LibreCAD/commit/5771425808bd16e78e1c6f28728c0712c47316f7
CVE-2021-45342 (A buffer overflow vulnerability in CDataList of the jwwlib component o ...)
- {DLA-2908-1}
+ {DSA-5077-1 DLA-2908-1}
- librecad 2.1.3-3 (bug #1004518)
NOTE: https://github.com/LibreCAD/LibreCAD/issues/1464
NOTE: https://github.com/LibreCAD/LibreCAD/pull/1465
NOTE: Fixed by: https://github.com/LibreCAD/LibreCAD/commit/4edcbe72679f95cb60979c77a348c1522a20b0f4
CVE-2021-45341 (A buffer overflow vulnerability in CDataMoji of the jwwlib component o ...)
- {DLA-2908-1}
+ {DSA-5077-1 DLA-2908-1}
- librecad 2.1.3-3 (bug #1004518)
NOTE: https://github.com/LibreCAD/LibreCAD/issues/1462
NOTE: https://github.com/LibreCAD/LibreCAD/pull/1463
@@ -12782,8 +13106,8 @@ CVE-2021-4135
[stretch] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6)
NOTE: CONFIG_NETDEVSIM is not set in Debian
-CVE-2021-4134
- RESERVED
+CVE-2021-4134 (The Fancy Product Designer WordPress plugin is vulnerable to SQL Injec ...)
+ NOT-FOR-US: WordPress plugin
CVE-2021-4133 (A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 ...)
NOT-FOR-US: Keycloak
CVE-2021-4132 (livehelperchat is vulnerable to Improper Neutralization of Input Durin ...)
@@ -13084,6 +13408,7 @@ CVE-2021-4116 (yetiforcecrm is vulnerable to Improper Neutralization of Input Du
CVE-2021-4115 [file descriptor leak allows an unprivileged user to cause a crash]
RESERVED
- policykit-1 <unfixed> (bug #1005784)
+ [bullseye] - policykit-1 <no-dsa> (Minor issue)
[buster] - policykit-1 <not-affected> (Vulnerable code not present, patch introducing issue not backported)
[stretch] - policykit-1 <not-affected> (Vulnerable code not present, patch introducing issue not backported)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2007534
@@ -13399,7 +13724,9 @@ CVE-2021-45007
CVE-2021-45006
RESERVED
CVE-2021-45005 (Artifex MuJS v1.1.3 was discovered to contain a heap buffer overflow w ...)
- TODO: check
+ - mujs <unfixed>
+ NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=704749 (not public)
+ NOTE: http://git.ghostscript.com/?p=mujs.git;h=df8559e7bdbc6065276e786217eeee70f28fce66 (1.2.0)
CVE-2021-45004
RESERVED
CVE-2021-45003 (Laundry Booking Management System 1.0 (Latest) and previous versions a ...)
@@ -13498,8 +13825,11 @@ CVE-2021-44962
RESERVED
CVE-2021-44961
RESERVED
-CVE-2021-44960
- RESERVED
+CVE-2021-44960 (In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the ...)
+ - svgpp <unfixed>
+ [bullseye] - svgpp <no-dsa> (Minor issue)
+ [buster] - svgpp <no-dsa> (Minor issue)
+ NOTE: https://github.com/svgpp/svgpp/issues/101
CVE-2021-44959
RESERVED
CVE-2021-44958
@@ -13818,8 +14148,8 @@ CVE-2021-44834
RESERVED
CVE-2021-4107 (yetiforcecrm is vulnerable to Improper Neutralization of Input During ...)
NOT-FOR-US: yetiforcecrm
-CVE-2021-4106
- RESERVED
+CVE-2021-4106 (A vulnerability in Snow Inventory Java Scanner allows an attacker to r ...)
+ TODO: check
CVE-2021-4105
RESERVED
CVE-2018-25022 (The Onion module in toxcore before 0.2.2 doesn't restrict which packet ...)
@@ -14256,7 +14586,7 @@ CVE-2021-44733 (A use-after-free exists in drivers/tee/tee_shm.c in the TEE subs
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2030747
CVE-2021-44732 (Mbed TLS before 3.0.1 has a double free in certain out-of-memory condi ...)
[experimental] - mbedtls 2.28.0-0.1
- - mbedtls <unfixed> (bug #1002631)
+ - mbedtls 2.28.0-0.3 (bug #1002631)
NOTE: https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
NOTE: https://github.com/ARMmbed/mbedtls/commit/eb490aabf6a9f47c074ec476d0d4997c2362cdbc (mbedtls-2.16.12)
CVE-2021-44731
@@ -16702,8 +17032,11 @@ CVE-2022-21699 (IPython (Interactive Python) is a command shell for interactive
NOTE: Fixed by: https://github.com/ipython/ipython/commit/1ec91ebf328bdf3450130de4b4604c79dc1e19d9
NOTE: Testcase: https://github.com/ipython/ipython/commit/56665dfcf7df8690da46aab1278df8e47b14fe3b
NOTE: https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699
-CVE-2022-21698
- RESERVED
+CVE-2022-21698 (client_golang is the instrumentation library for Go applications in Pr ...)
+ - golang-github-prometheus-client-golang <unfixed>
+ NOTE: https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p
+ NOTE: https://github.com/prometheus/client_golang/pull/962
+ NOTE: https://github.com/prometheus/client_golang/pull/987
CVE-2022-21697 (Jupyter Server Proxy is a Jupyter notebook server extension to proxy w ...)
TODO: check
CVE-2022-21696 (OnionShare is an open source tool that lets you securely and anonymous ...)
@@ -16899,17 +17232,17 @@ CVE-2021-43955
CVE-2021-43954
RESERVED
CVE-2021-43953 (Affected versions of Atlassian Jira Server and Data Center allow unaut ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2021-43952 (Affected versions of Atlassian Jira Server and Data Center allow unaut ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2021-43951 (Affected versions of Atlassian Jira Service Management Server and Data ...)
NOT-FOR-US: Atlassian
CVE-2021-43950 (Affected versions of Atlassian Jira Service Management Server and Data ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2021-43949 (Affected versions of Atlassian Jira Service Management Server and Data ...)
NOT-FOR-US: Atlassian
CVE-2021-43948 (Affected versions of Atlassian Jira Service Management Server and Data ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2021-43947 (Affected versions of Atlassian Jira Server and Data Center allow remot ...)
NOT-FOR-US: Atlassian
CVE-2021-43946 (Affected versions of Atlassian Jira Server and Data Center allow authe ...)
@@ -16923,9 +17256,9 @@ CVE-2021-43943
CVE-2021-43942 (Affected versions of Atlassian Jira Server and Data Center allow remot ...)
NOT-FOR-US: Atlassian
CVE-2021-43941 (Affected versions of Atlassian Jira Server and Data Center allow remot ...)
- TODO: check
+ NOT-FOR-US: Atlassian
CVE-2021-43940 (Affected versions of Atlassian Confluence Server and Data Center allow ...)
- TODO: check
+ NOT-FOR-US: Atlassian Confluence
CVE-2021-43939
RESERVED
CVE-2021-43938
@@ -17098,6 +17431,7 @@ CVE-2021-43860 (Flatpak is a Linux application sandboxing and distribution frame
NOTE: https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
NOTE: https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
CVE-2021-43859 (XStream is an open source java library to serialize objects to XML and ...)
+ {DLA-2924-1}
- libxstream-java <unfixed>
NOTE: https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf
NOTE: https://x-stream.github.io/CVE-2021-43859.html
@@ -18286,8 +18620,8 @@ CVE-2021-43736
RESERVED
CVE-2021-43735
RESERVED
-CVE-2021-43734
- RESERVED
+CVE-2021-43734 (kkFileview v4.0.0 has arbitrary file read through a directory traversa ...)
+ NOT-FOR-US: kkFileview
CVE-2021-43733
RESERVED
CVE-2021-43732
@@ -20922,7 +21256,7 @@ CVE-2021-43108
CVE-2021-43107
RESERVED
CVE-2021-43106 (A Header Injection vulnerability exists in Compass Plus TranzWare Onli ...)
- TODO: check
+ NOT-FOR-US: Compass Plus TranzWare
CVE-2021-43105
RESERVED
CVE-2021-43104
@@ -21075,10 +21409,10 @@ CVE-2021-43052 (The Realm Server component of TIBCO Software Inc.'s TIBCO FTL -
NOT-FOR-US: TIBCO
CVE-2021-43051 (The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire ...)
NOT-FOR-US: Spotfire Server component of TIBCO
-CVE-2021-43050
- RESERVED
-CVE-2021-43049
- RESERVED
+CVE-2021-43050 (The Auth Server component of TIBCO Software Inc.'s TIBCO BusinessConne ...)
+ NOT-FOR-US: TIBCO
+CVE-2021-43049 (The Database component of TIBCO Software Inc.'s TIBCO BusinessConnect ...)
+ NOT-FOR-US: TIBCO
CVE-2021-43048 (The Interior Server and Gateway Server components of TIBCO Software In ...)
NOT-FOR-US: TIBCO
CVE-2021-43047 (The Interior Server and Gateway Server components of TIBCO Software In ...)
@@ -21214,6 +21548,8 @@ CVE-2021-3904 (grav is vulnerable to Improper Neutralization of Input During Web
NOT-FOR-US: Grav CMS
CVE-2021-3903 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim 2:8.2.3565-1
+ [bullseye] - vim <no-dsa> (Minor issue)
+ [buster] - vim <no-dsa> (Minor issue)
[stretch] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
NOTE: https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
@@ -21909,12 +22245,12 @@ CVE-2021-42715 (An issue was discovered in stb stb_image.h 1.33 through 2.27. Th
[buster] - libstb <no-dsa> (Minor issue)
NOTE: https://github.com/nothings/stb/issues/1224
NOTE: https://github.com/nothings/stb/pull/1223
-CVE-2021-42714
- RESERVED
-CVE-2021-42713
- RESERVED
-CVE-2021-42712
- RESERVED
+CVE-2021-42714 (Splashtop Remote Client (Business Edition) through 3.4.8.3 creates a T ...)
+ NOT-FOR-US: Splashtop Remote Client
+CVE-2021-42713 (Splashtop Remote Client (Personal Edition) through 3.4.6.1 creates a T ...)
+ NOT-FOR-US: Splashtop Remote Client
+CVE-2021-42712 (Splashtop Streamer through 3.4.8.3 creates a Temporary File in a Direc ...)
+ NOT-FOR-US: Splashtop Streamer
CVE-2021-42711 (Barracuda Network Access Client before 5.2.2 creates a Temporary File ...)
NOT-FOR-US: Barracuda Network Access Client
CVE-2021-42710
@@ -23605,7 +23941,7 @@ CVE-2020-36487
CVE-2020-36486 (Swift File Transfer Mobile v1.1.2 and below was discovered to contain ...)
NOT-FOR-US: Swift File Transfer Mobile
CVE-2021-42392 (The org.h2.util.JdbcUtils.getConnection method of the H2 database take ...)
- {DLA-2923-1}
+ {DSA-5076-1 DLA-2923-1}
- h2database 2.1.210-1 (bug #1003894)
NOTE: https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6
NOTE: https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/
@@ -25930,8 +26266,8 @@ CVE-2021-41554 (** UNSUPPORTED WHEN ASSIGNED ** ARCHIBUS Web Central 21.3.3.815
NOT-FOR-US: ARCHIBUS Web Central
CVE-2021-41553 (** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a ...)
NOT-FOR-US: ARCHIBUS Web Central
-CVE-2021-41552
- RESERVED
+CVE-2021-41552 (CommScope URFboard SBG6950AC2 9.1.103AA23 devices allow Command Inject ...)
+ NOT-FOR-US: CommScope
CVE-2021-41551 (Leostream Connection Broker 9.0.40.17 allows administrators to conduct ...)
NOT-FOR-US: Leostream Connection Broker
CVE-2021-41550 (Leostream Connection Broker 9.0.40.17 allows administrator to upload a ...)
@@ -27756,8 +28092,7 @@ CVE-2021-3783 (yourls is vulnerable to Improper Neutralization of Input During W
NOT-FOR-US: yourls
CVE-2021-3782
RESERVED
-CVE-2021-3781 [Include device specifier strings in access validation]
- RESERVED
+CVE-2021-3781 (A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was ...)
{DSA-4972-1}
- ghostscript 9.53.3~dfsg-8 (bug #994011)
[buster] - ghostscript <not-affected> (Vulnerable code introduced later)
@@ -28462,8 +28797,7 @@ CVE-2021-3775 (showdoc is vulnerable to Cross-Site Request Forgery (CSRF) ...)
NOT-FOR-US: ShowDoc
CVE-2021-3774 (Meross Smart Wi-Fi 2 Way Wall Switch (MSS550X), on its 3.1.3 version a ...)
NOT-FOR-US: Meross Smart Wi-Fi 2 Way Wall Switch
-CVE-2021-3773
- RESERVED
+CVE-2021-3773 (A flaw in netfilter could allow a network-connected attacker to infer ...)
NOTE: https://www.openwall.com/lists/oss-security/2021/09/08/3
NOTE: https://breakpointingbad.com/2021/09/08/Port-Shadows-via-Network-Alchemy.html
TODO: fill in tracking details
@@ -28774,17 +29108,25 @@ CVE-2021-40405
CVE-2021-40404 (An authentication bypass vulnerability exists in the cgiserver.cgi Log ...)
NOT-FOR-US: Reolink
CVE-2021-40403 (An information disclosure vulnerability exists in the pick-and-place r ...)
- - gerbv <undetermined>
+ - gerbv <unfixed>
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417
- TODO: check details
+ NOTE: https://github.com/gerbv/gerbv/issues/82
+ NOTE: Proposed patch: https://github.com/gerbv/gerbv/commit/387f07b163cc30cd95e9bedf53bc07e7b38cc318
CVE-2021-40402
RESERVED
+ - gerbv <unfixed>
+ NOTE: https://github.com/gerbv/gerbv/issues/80
+ NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416
CVE-2021-40401 (A use-after-free vulnerability exists in the RS-274X aperture definiti ...)
- - gerbv <undetermined>
+ - gerbv <unfixed>
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415
- TODO: check details
+ NOTE: https://github.com/gerbv/gerbv/commit/68ee18945bcf68ff964c42f12af79c5c0e2f4069
+ NOTE: https://github.com/gerbv/gerbv/issues/81
CVE-2021-40400
RESERVED
+ - gerbv <unfixed>
+ NOTE: https://github.com/gerbv/gerbv/issues/79
+ NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413
CVE-2021-40399
RESERVED
CVE-2021-40398
@@ -28900,8 +29242,7 @@ CVE-2021-3761 (Any CA issuer in the RPKI can trick OctoRPKI prior to 1.3.0 into
- cfrpki 1.3.0-1 (bug #994572)
NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9
NOTE: https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422
-CVE-2021-3760
- RESERVED
+CVE-2021-3760 (A flaw was found in the Linux kernel. A use-after-free vulnerability i ...)
{DLA-2843-1}
- linux 5.14.16-1 (unimportant)
[bullseye] - linux 5.10.84-1
@@ -28981,14 +29322,12 @@ CVE-2021-3755
REJECTED
CVE-2021-3754
RESERVED
-CVE-2021-3753
- RESERVED
+CVE-2021-3753 (A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c ...)
{DSA-4978-1 DLA-2843-1 DLA-2785-1}
- linux 5.14.6-1
[buster] - linux 4.19.208-1
NOTE: https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
-CVE-2021-3752
- RESERVED
+CVE-2021-3752 (A use-after-free flaw was found in the Linux kernel’s Bluetooth ...)
- linux 5.15.3-1
[bullseye] - linux 5.10.84-1
NOTE: https://www.openwall.com/lists/oss-security/2021/09/15/4
@@ -31246,7 +31585,7 @@ CVE-2020-36478 (An issue was discovered in Mbed TLS before 2.25.0 (and before 2.
NOTE: https://github.com/ARMmbed/mbedtls/commit/ca17ebfbc02b57e2bcb42efe64a5f2002c756ea8 (development)
CVE-2020-36477 (An issue was discovered in Mbed TLS before 2.24.0. The verification of ...)
[experimental] - mbedtls 2.28.0-0.1
- - mbedtls <unfixed>
+ - mbedtls 2.28.0-0.3
[stretch] - mbedtls <not-affected> (2.4 not affected)
NOTE: https://github.com/ARMmbed/mbedtls/issues/3498
NOTE: https://github.com/ARMmbed/mbedtls/commit/f3e4bd8632b71dc491e52e6df87dc3e409d2b869 (development)
@@ -31413,16 +31752,16 @@ CVE-2021-39303 (The server in Jamf Pro before 10.32.0 has an SSRF vulnerability,
NOT-FOR-US: Jamf Pro
CVE-2021-39302 (MISP 2.4.148, in certain configurations, allows SQL injection via the ...)
NOT-FOR-US: MISP
-CVE-2021-39301
- RESERVED
-CVE-2021-39300
- RESERVED
-CVE-2021-39299
- RESERVED
-CVE-2021-39298
- RESERVED
-CVE-2021-39297
- RESERVED
+CVE-2021-39301 (Potential vulnerabilities have been identified in UEFI firmware (BIOS) ...)
+ NOT-FOR-US: HP
+CVE-2021-39300 (Potential vulnerabilities have been identified in UEFI firmware (BIOS) ...)
+ NOT-FOR-US: HP
+CVE-2021-39299 (Potential vulnerabilities have been identified in UEFI firmware (BIOS) ...)
+ NOT-FOR-US: HP
+CVE-2021-39298 (Potential vulnerabilities have been identified in UEFI firmware (BIOS) ...)
+ NOT-FOR-US: HP
+CVE-2021-39297 (Potential vulnerabilities have been identified in UEFI firmware (BIOS) ...)
+ NOT-FOR-US: HP
CVE-2021-39296 (In OpenBMC 2.9, crafted IPMI messages allow an attacker to bypass auth ...)
NOT-FOR-US: OpenBMC
CVE-2021-39295
@@ -33231,6 +33570,10 @@ CVE-2021-3701
NOTE: https://github.com/ansible/ansible-runner/pull/742/commits/60b059f00409224acae1e417153a241c8591ad89
CVE-2021-3700
RESERVED
+ - usbredir 0.11.0-1
+ [bullseye] - usbredir <no-dsa> (Minor issue)
+ [buster] - usbredir <no-dsa> (Minor issue)
+ NOTE: https://gitlab.freedesktop.org/spice/usbredir/-/commit/03c519ff5831ba75120e00ebebbf1d5a1f7220ab (usbredir-0.11.0)
CVE-2021-38562 (Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4. ...)
- request-tracker5 <unfixed> (bug #995167)
- request-tracker4 4.4.4+dfsg-3 (bug #995175)
@@ -36462,8 +36805,8 @@ CVE-2021-37356
RESERVED
CVE-2021-37355
RESERVED
-CVE-2021-37354
- RESERVED
+CVE-2021-37354 (Xerox Phaser 4622 v35.013.01.000 was discovered to contain a buffer ov ...)
+ NOT-FOR-US: Xerox
CVE-2021-37353 (Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due ...)
NOT-FOR-US: Nagios XI
CVE-2021-37352 (An open redirect vulnerability exists in Nagios XI before version 5.8. ...)
@@ -37950,11 +38293,7 @@ CVE-2021-36742 (A improper input validation vulnerability in Trend Micro Apex On
CVE-2021-36741 (An improper input validation vulnerability in Trend Micro Apex One, Ap ...)
NOT-FOR-US: Trend Micro
CVE-2021-3648
- RESERVED
- - binutils <unfixed> (unimportant)
- NOTE: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100968
- NOTE: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99935
- NOTE: binutils not covered by security support
+ REJECTED
CVE-2021-3647 (URI.js is vulnerable to URL Redirection to Untrusted Site ...)
NOT-FOR-US: URI.js
CVE-2021-3646 (btcpayserver is vulnerable to Improper Neutralization of Input During ...)
@@ -41203,8 +41542,8 @@ CVE-2021-35382
RESERVED
CVE-2021-35381
RESERVED
-CVE-2021-35380
- RESERVED
+CVE-2021-35380 (A Directory Traversal vulnerability exists in Solari di Udine TermTalk ...)
+ NOT-FOR-US: Solari di Udine TermTalk Server (TTServer)
CVE-2021-35379
RESERVED
CVE-2021-35378
@@ -43043,8 +43382,11 @@ CVE-2021-34560 (In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contain
NOT-FOR-US: PEPPERL+FUCHS WirelessHART-Gateway
CVE-2021-34559 (In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may ...)
NOT-FOR-US: PEPPERL+FUCHS WirelessHART-Gateway
-CVE-2021-3596
+CVE-2021-3596 [NULL pointer dereference in ReadSVGImage() in coders/svg.c]
RESERVED
+ - imagemagick <not-affected> (Specific to IM7)
+ NOTE: https://github.com/ImageMagick/ImageMagick/issues/2624
+ NOTE: https://github.com/ImageMagick/ImageMagick/commit/43dfb1894761c4929d5d5c98dc80ba4e59a0d114
CVE-2021-3595 (An invalid pointer initialization issue was found in the SLiRP network ...)
{DLA-2753-1}
- libslirp 4.6.1-1 (bug #989996)
@@ -43621,11 +43963,15 @@ CVE-2021-34336
RESERVED
CVE-2021-34335 (Exiv2 is a command-line utility and C++ library for reading, writing, ...)
- exiv2 0.27.5-1 (bug #992707)
+ [bullseye] - exiv2 <ignored> (Minor issue)
+ [buster] - exiv2 <ignored> (Minor issue)
[stretch] - exiv2 <no-dsa> (Minor issue)
NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984
NOTE: https://github.com/Exiv2/exiv2/pull/1750
CVE-2021-34334 (Exiv2 is a command-line utility and C++ library for reading, writing, ...)
- exiv2 0.27.5-1 (bug #992706)
+ [bullseye] - exiv2 <ignored> (Minor issue)
+ [buster] - exiv2 <ignored> (Minor issue)
[stretch] - exiv2 <no-dsa> (Minor issue)
NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p
NOTE: https://github.com/Exiv2/exiv2/pull/1766
@@ -44427,8 +44773,8 @@ CVE-2021-33947
RESERVED
CVE-2021-33946
RESERVED
-CVE-2021-33945
- RESERVED
+CVE-2021-33945 (RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN ...)
+ NOT-FOR-US: RICOH
CVE-2021-33944
RESERVED
CVE-2021-33943
@@ -44817,8 +45163,7 @@ CVE-2021-33807 (Cartadis Gespage through 8.2.1 allows Directory Traversal in ges
NOT-FOR-US: Cartadis Gespage
CVE-2021-3579 (Incorrect Default Permissions vulnerability in the bdservicehost.exe a ...)
NOT-FOR-US: Bitdefender
-CVE-2021-3578 [possible remote code execution in isync/mbsync]
- RESERVED
+CVE-2021-3578 (A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecke ...)
- isync 1.3.0-2.2 (bug #989564)
[buster] - isync 1.3.0-2.2~deb10u1
[stretch] - isync <no-dsa> (Minor issue)
@@ -45681,8 +46026,7 @@ CVE-2021-3561 (An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed
NOTE: https://sourceforge.net/p/mcj/tickets/116/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/
NOTE: Depends on CVE-2019-19797 fix
-CVE-2021-3560 [local privilege escalation using polkit_system_bus_name_get_creds_sync()]
- RESERVED
+CVE-2021-3560 (It was found that polkit could be tricked into bypassing the credentia ...)
- policykit-1 0.105-31 (bug #989429)
[buster] - policykit-1 <not-affected> (Vulnerable code introduced later)
[stretch] - policykit-1 <not-affected> (Vulnerable code introduced later)
@@ -46295,8 +46639,7 @@ CVE-2021-3559 (A flaw was found in libvirt in the virConnectListAllNodeDevices A
CVE-2021-3558
RESERVED
- moodle <removed>
-CVE-2021-3557
- RESERVED
+CVE-2021-3557 (A flaw was found in argocd. Any unprivileged user is able to deploy ar ...)
NOT-FOR-US: Argo CD
CVE-2021-3556
REJECTED
@@ -47001,8 +47344,7 @@ CVE-2021-32927
RESERVED
CVE-2021-32926 (When an authenticated password change request takes place, this vulner ...)
NOT-FOR-US: Rockwell Automation
-CVE-2021-3551
- RESERVED
+CVE-2021-3551 (A flaw was found in the PKI-server, where the spkispawn command, when ...)
- dogtag-pki 10.10.6-1 (bug #991665)
[bullseye] - dogtag-pki <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1959971
@@ -47289,6 +47631,8 @@ CVE-2021-32816 (ProtonMail Web Client is the official AngularJS web client for t
NOT-FOR-US: ProtonMail Web Client
CVE-2021-32815 (Exiv2 is a command-line utility and C++ library for reading, writing, ...)
- exiv2 0.27.5-1 (bug #992705)
+ [bullseye] - exiv2 <ignored> (Minor issue)
+ [buster] - exiv2 <ignored> (Minor issue)
[stretch] - exiv2 <no-dsa> (Minor issue)
NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m
NOTE: https://github.com/Exiv2/exiv2/pull/1739
@@ -49317,7 +49661,9 @@ CVE-2021-32037 (An authorized user may trigger an invariant which may result in
[stretch] - mongodb <end-of-life> (https://lists.debian.org/debian-lts/2020/11/msg00058.html)
NOTE: https://jira.mongodb.org/browse/SERVER-59071
CVE-2021-32036 (An authenticated user without any specific authorizations may be able ...)
- TODO: check
+ - mongodb <removed>
+ [stretch] - mongodb <end-of-life> (https://lists.debian.org/debian-lts/2020/11/msg00058.html)
+ NOTE: https://jira.mongodb.org/browse/SERVER-59294
CVE-2021-32035
RESERVED
CVE-2021-32034
@@ -54103,15 +54449,15 @@ CVE-2021-30328
CVE-2021-30327
RESERVED
CVE-2021-30326 (Possible assertion due to improper size validation while processing th ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30325 (Possible out of bound access of DCI resources due to lack of validatio ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30324 (Possible out of bound write due to lack of boundary check for the maxi ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30323 (Improper validation of maximum size of data write to EFS file can lead ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30322 (Possible out of bounds write due to improper validation of number of G ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30321 (Possible buffer overflow due to lack of parameter length check during ...)
NOT-FOR-US: Snapdragon
CVE-2021-30320
@@ -54119,9 +54465,9 @@ CVE-2021-30320
CVE-2021-30319 (Possible integer overflow due to improper validation of command length ...)
NOT-FOR-US: Qualcomm
CVE-2021-30318 (Improper validation of input when provisioning the HDCP key can lead t ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30317 (Improper validation of program headers containing ELF metadata can lea ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30316 (Possible out of bound memory access due to improper boundary check whi ...)
NOT-FOR-US: Snapdragon
CVE-2021-30315 (Improper handling of sensor HAL structure in absence of sensor can lea ...)
@@ -54137,7 +54483,7 @@ CVE-2021-30311 (Possible heap overflow due to lack of index validation before al
CVE-2021-30310 (Possible buffer overflow due to Improper validation of received CF-ACK ...)
NOT-FOR-US: Qualcomm components for Android
CVE-2021-30309 (Improper size validation of QXDM commands can lead to memory corruptio ...)
- TODO: check
+ NOT-FOR-US: Qualcomm
CVE-2021-30308 (Possible buffer overflow while printing the HARQ memory partition deta ...)
NOT-FOR-US: Qualcomm
CVE-2021-30307 (Possible denial of service due to improper validation of DNS response ...)
@@ -63055,8 +63401,8 @@ CVE-2021-26728
RESERVED
CVE-2021-26727
RESERVED
-CVE-2021-26726
- RESERVED
+CVE-2021-26726 (A remote code execution vulnerability affecting a Valmet DNA service l ...)
+ TODO: check
CVE-2021-26725 (Path Traversal vulnerability when changing timezone using web GUI of N ...)
NOT-FOR-US: Nozomi Networks Guardian
CVE-2021-26724 (OS Command Injection vulnerability when changing date settings or host ...)
@@ -63330,13 +63676,13 @@ CVE-2021-26618
CVE-2021-26617
RESERVED
CVE-2021-26616 (An OS command injection was found in SecuwaySSL, when special characte ...)
- TODO: check
+ NOT-FOR-US: SecuwaySSL client for MacOS
CVE-2021-26615 (ARK library allows attackers to execute remote code via the parameter( ...)
NOT-FOR-US: ARK library
CVE-2021-26614 (ius_get.cgi in IpTime C200 camera allows remote code execution. A remo ...)
NOT-FOR-US: IpTime C200 camera
CVE-2021-26613 (improper input validation vulnerability in nexacro permits copying fil ...)
- TODO: check
+ NOT-FOR-US: Tobesoft Nexacro
CVE-2021-26612 (An improper input validation leading to arbitrary file creation was di ...)
NOT-FOR-US: Tobesoft Nexacro
CVE-2021-26611 (HejHome GKW-IC052 IP Camera contained a hard-coded credentials vulnera ...)
@@ -63528,9 +63874,9 @@ CVE-2021-26542
CVE-2021-26541 (The gitlog function in src/index.ts in gitlog before 4.0.4 has a comma ...)
NOT-FOR-US: Node gitlog
CVE-2021-26540 (Apostrophe Technologies sanitize-html before 2.3.2 does not properly v ...)
- NOT-FOR-US: sanitize-html
+ - node-sanitize-html <not-affected> (Fixed before initial upload)
CVE-2021-26539 (Apostrophe Technologies sanitize-html before 2.3.1 does not properly h ...)
- NOT-FOR-US: sanitize-html
+ - node-sanitize-html <not-affected> (Fixed before initial upload)
CVE-2021-3379
RESERVED
CVE-2021-3378 (FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a ...)
@@ -64981,7 +65327,7 @@ CVE-2021-25994 (In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Hos
CVE-2021-25993 (In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected b ...)
NOT-FOR-US: Requarks wiki.js
CVE-2021-25992 (In Ifme, versions 1.0.0 to v.7.33.2 don’t properly invalidate a ...)
- TODO: check
+ NOT-FOR-US: Ifme
CVE-2021-25991 (In Ifme, versions v5.0.0 to v7.32 are vulnerable against an improper a ...)
NOT-FOR-US: Ifme
CVE-2021-25990 (In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable agai ...)
@@ -65090,7 +65436,7 @@ CVE-2021-25941 (Prototype pollution vulnerability in 'deep-override' versions 1.
CVE-2021-25940 (In ArangoDB, versions v3.7.6 through v3.8.3 are vulnerable to Insuffic ...)
- arangodb <itp> (bug #761817)
CVE-2021-25939 (In ArangoDB, versions v3.7.0 through v3.9.0-alpha.1 have a feature whi ...)
- TODO: check
+ - arangodb <itp> (bug #761817)
CVE-2021-25938 (In ArangoDB, versions v2.2.6.2 through v3.7.10 are vulnerable to Cross ...)
- arangodb <itp> (bug #761817)
CVE-2021-25937
@@ -67436,7 +67782,7 @@ CVE-2021-25086
RESERVED
CVE-2021-25085 (The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape ...)
NOT-FOR-US: WordPress plugin
-CVE-2021-25084 (The Advanced Cron Manager WordPress plugin before 2.4.2, advanced-cron ...)
+CVE-2021-25084 (The Advanced Cron Manager WordPress plugin before 2.4.2 and Advanced C ...)
NOT-FOR-US: WordPress plugin
CVE-2021-25083 (The Registrations for the Events Calendar WordPress plugin before 2.7. ...)
NOT-FOR-US: WordPress plugin
@@ -70547,8 +70893,8 @@ CVE-2021-23684
RESERVED
CVE-2021-23683
RESERVED
-CVE-2021-23682
- RESERVED
+CVE-2021-23682 (This affects the package litespeed.js before 0.3.12; the package appwr ...)
+ TODO: check
CVE-2021-23681
RESERVED
CVE-2021-23680
@@ -70804,7 +71150,7 @@ CVE-2021-23557
CVE-2021-23556
RESERVED
CVE-2021-23555 (The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via dire ...)
- TODO: check
+ NOT-FOR-US: Node vm2
CVE-2021-23554
RESERVED
CVE-2021-23553
@@ -74320,8 +74666,8 @@ CVE-2021-22052
RESERVED
CVE-2021-22051 (Applications using Spring Cloud Gateway are vulnerable to specifically ...)
NOT-FOR-US: Spring Cloud Gateway
-CVE-2021-22050
- RESERVED
+CVE-2021-22050 (ESXi contains a slow HTTP POST denial-of-service vulnerability in rhtt ...)
+ NOT-FOR-US: VMware
CVE-2021-22049 (The vSphere Web Client (FLEX/Flash) contains an SSRF (Server Side Requ ...)
NOT-FOR-US: VMware
CVE-2021-22048 (The vCenter Server contains a privilege escalation vulnerability in th ...)
@@ -74334,14 +74680,14 @@ CVE-2021-22045 (VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before
NOT-FOR-US: VMware
CVE-2021-22044 (In Spring Cloud OpenFeign 3.0.0 to 3.0.4, 2.2.0.RELEASE to 2.2.9.RELEA ...)
NOT-FOR-US: Spring Cloud OpenFeign
-CVE-2021-22043
- RESERVED
-CVE-2021-22042
- RESERVED
-CVE-2021-22041
- RESERVED
-CVE-2021-22040
- RESERVED
+CVE-2021-22043 (VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerabilit ...)
+ NOT-FOR-US: VMware
+CVE-2021-22042 (VMware ESXi contains an unauthorized access vulnerability due to VMX h ...)
+ NOT-FOR-US: VMware
+CVE-2021-22041 (VMware ESXi, Workstation, and Fusion contain a double-fetch vulnerabil ...)
+ NOT-FOR-US: VMware
+CVE-2021-22040 (VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerab ...)
+ NOT-FOR-US: VMware
CVE-2021-22039
RESERVED
CVE-2021-22038 (On Windows, the uninstaller binary copies itself to a fixed temporary ...)
@@ -74510,8 +74856,8 @@ CVE-2021-21968 (A file write vulnerability exists in the OTA update task functio
NOT-FOR-US: Sealevel Systems
CVE-2021-21967
RESERVED
-CVE-2021-21966
- RESERVED
+CVE-2021-21966 (An information disclosure vulnerability exists in the HTTP Server /pin ...)
+ NOT-FOR-US: Texas Instruments
CVE-2021-21965 (A denial of service vulnerability exists in the SeaMax remote configur ...)
NOT-FOR-US: Sealevel Systems
CVE-2021-21964 (A denial of service vulnerability exists in the Modbus configuration f ...)
@@ -74526,8 +74872,8 @@ CVE-2021-21960 (A stack-based buffer overflow vulnerability exists in both the L
NOT-FOR-US: Sealevel Systems
CVE-2021-21959 (A misconfiguration exists in the MQTTS functionality of Sealevel Syste ...)
NOT-FOR-US: Sealevel Systems
-CVE-2021-21958
- RESERVED
+CVE-2021-21958 (A heap-based buffer overflow vulnerability exists in the Hword HwordAp ...)
+ NOT-FOR-US: Hancom Office 2020
CVE-2021-21957 (A privilege escalation vulnerability exists in the Remote Server funct ...)
NOT-FOR-US: Dream Report ODS Remote Connector
CVE-2021-21956
@@ -74643,19 +74989,19 @@ CVE-2021-21902 (An authentication bypass vulnerability exists in the CMA run_ser
CVE-2021-21901 (A stack-based buffer overflow vulnerability exists in the CMA check_ud ...)
NOT-FOR-US: Garrett Metal Detectors iC Module CMA
CVE-2021-21900 (A code execution vulnerability exists in the dxfRW::processLType() fun ...)
- {DLA-2838-1}
+ {DSA-5077-1 DLA-2838-1}
- librecad 2.1.3-2
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351
NOTE: librecad bundles libdxfrw
NOTE: https://github.com/LibreCAD/libdxfrw/commit/fcd977cc7f8f6cc7f012e5b72d33cf7d77b3fa69
CVE-2021-21899 (A code execution vulnerability exists in the dwgCompressor::copyCompBy ...)
- {DLA-2838-1}
+ {DSA-5077-1 DLA-2838-1}
- librecad 2.1.3-2
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350
NOTE: librecad bundles libdxfrw
NOTE: https://github.com/LibreCAD/libdxfrw/commit/6417118874333309aa10c4e59f954c3905a6e8b5
CVE-2021-21898 (A code execution vulnerability exists in the dwgCompressor::decompress ...)
- {DLA-2838-1}
+ {DSA-5077-1 DLA-2838-1}
- librecad 2.1.3-2
NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349
NOTE: librecad bundles libdxfrw
@@ -92153,7 +92499,7 @@ CVE-2021-0149
CVE-2021-0148 (Insertion of information into log file in firmware for some Intel(R) S ...)
NOT-FOR-US: Intel
CVE-2021-0147 (Improper locking in the Power Management Controller (PMC) for some Int ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2021-0146 (Hardware allows activation of test or debug logic at runtime for some ...)
- intel-microcode <unfixed>
[bullseye] - intel-microcode <postponed> (Wait until exposed in unstable; tendency to point release)
@@ -92352,7 +92698,7 @@ CVE-2021-0062 (Improper input validation in some Intel(R) Graphics Drivers befor
CVE-2021-0061 (Improper initialization in some Intel(R) Graphics Driver before versio ...)
NOT-FOR-US: Intel drivers for Windows
CVE-2021-0060 (Insufficient compartmentalization in HECI subsystem for the Intel(R) S ...)
- TODO: check
+ NOT-FOR-US: Intel
CVE-2021-0059
RESERVED
CVE-2021-0058 (Incorrect default permissions in the Intel(R) NUC M15 Laptop Kit Drive ...)
@@ -143781,18 +144127,18 @@ CVE-2020-6924
RESERVED
CVE-2020-6923
RESERVED
-CVE-2020-6922
- RESERVED
-CVE-2020-6921
- RESERVED
-CVE-2020-6920
- RESERVED
-CVE-2020-6919
- RESERVED
-CVE-2020-6918
- RESERVED
-CVE-2020-6917
- RESERVED
+CVE-2020-6922 (Potential security vulnerabilities including compromise of integrity, ...)
+ NOT-FOR-US: HP
+CVE-2020-6921 (Potential security vulnerabilities including compromise of integrity, ...)
+ NOT-FOR-US: HP
+CVE-2020-6920 (Potential security vulnerabilities including compromise of integrity, ...)
+ NOT-FOR-US: HP
+CVE-2020-6919 (Potential security vulnerabilities including compromise of integrity, ...)
+ NOT-FOR-US: HP
+CVE-2020-6918 (Potential security vulnerabilities including compromise of integrity, ...)
+ NOT-FOR-US: HP
+CVE-2020-6917 (Potential security vulnerabilities including compromise of integrity, ...)
+ NOT-FOR-US: HP
CVE-2020-6916
RESERVED
CVE-2020-6915
@@ -168874,7 +169220,7 @@ CVE-2019-16865 (An issue was discovered in Pillow before 6.2.0. When reading spe
NOTE: https://github.com/python-pillow/Pillow/commit/b9693a51c99c260bd66d1affeeab4a226cf7e5a5
NOTE: https://github.com/python-pillow/Pillow/commit/cc16025e234b7a7a4dd3a86d2fdc0980698db9cc
CVE-2019-16864 (CompleteFTPService.exe in the server in EnterpriseDT CompleteFTP befor ...)
- TODO: check
+ NOT-FOR-US: EnterpriseDT CompleteFTP
CVE-2019-16863 (STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow a ...)
NOT-FOR-US: STMicroelectronics
CVE-2019-16862 (Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x befor ...)
@@ -170272,7 +170618,9 @@ CVE-2019-16330 (In NCH Express Accounts Accounting v7.02, persistent cross site
CVE-2019-16329
RESERVED
CVE-2019-16328 (In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify ...)
- - rpyc <removed>
+ - rpyc <not-affected> (Vulnerable code newer in a released Debian version)
+ NOTE: Issue only affected 4.1.0 and 4.1.1 upstream and fixed in 4.1.2
+ NOTE: https://rpyc.readthedocs.io/en/latest/docs/security.html#security
CVE-2019-16327 (D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypa ...)
NOT-FOR-US: D-Link
CVE-2019-16326 (D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token ...)
@@ -206054,10 +206402,10 @@ CVE-2019-4354
RESERVED
CVE-2019-4353
RESERVED
-CVE-2019-4352
- RESERVED
-CVE-2019-4351
- RESERVED
+CVE-2019-4352 (IBM Maximo Anywhere 7.6.4.0 applications could allow obfuscation of th ...)
+ NOT-FOR-US: IBM
+CVE-2019-4351 (IBM Maximo Anywhere 7.6.4.0 applications could disclose sensitive info ...)
+ NOT-FOR-US: IBM
CVE-2019-4350
RESERVED
CVE-2019-4349 (IBM Maximo Anywhere 7.6.2.0, 7.6.2.1, 7.6.3.0, and 7.6.3.1 application ...)
@@ -206176,8 +206524,8 @@ CVE-2019-4293 (IBM Storwize V7000 Unified (2073) 1.6 configuration may allow an
NOT-FOR-US: IBM
CVE-2019-4292 (IBM Security Guardium 10.5 could allow a remote attacker to upload arb ...)
NOT-FOR-US: IBM
-CVE-2019-4291
- RESERVED
+CVE-2019-4291 (IBM Maximo Anywhere 7.6.4.0 could allow an attacker to reverse enginee ...)
+ NOT-FOR-US: IBM
CVE-2019-4290
RESERVED
CVE-2019-4289
@@ -276800,9 +277148,9 @@ CVE-2017-16019 (GitBook is a command line tool (and Node.js library) for buildin
CVE-2017-16018 (Restify is a framework for building REST APIs. Restify >=2.0.0 < ...)
NOT-FOR-US: Restify
CVE-2017-16017 (sanitize-html is a library for scrubbing html input for malicious valu ...)
- NOT-FOR-US: sanitize-html
+ - node-sanitize-html <not-affected> (Fixed before initial upload)
CVE-2017-16016 (Sanitize-html is a library for scrubbing html input of malicious value ...)
- NOT-FOR-US: sanitize-html
+ - node-sanitize-html <not-affected> (Fixed before initial upload)
CVE-2017-16015 (Forms is a library for easily creating HTML forms. Versions before 1.3 ...)
NOT-FOR-US: Forms
CVE-2017-16014 (Http-proxy is a proxying library. Because of the way errors are handle ...)
@@ -328286,7 +328634,7 @@ CVE-2016-1000239
CVE-2016-1000238
RESERVED
CVE-2016-1000237 (sanitize-html before 1.4.3 has XSS. ...)
- NOT-FOR-US: sanitize-html
+ - node-sanitize-html <not-affected> (Fixed before initial upload)
CVE-2016-1000236 (Node-cookie-signature before 1.0.6 is affected by a timing attack due ...)
- node-cookie-signature 1.1.0-1 (unimportant; bug #838618)
NOTE: https://nodesecurity.io/advisories/134
@@ -430316,9 +430664,9 @@ CVE-2012-4677 (Tunnelblick 3.3beta20 and earlier allows local users to gain priv
CVE-2012-4676 (The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and e ...)
NOT-FOR-US: Tunnelblick
CVE-2012-4675 (Cross-site scripting (XSS) vulnerability in PluXml 5.1.6 allows remote ...)
- NOT-FOR-US: PluXml
+ - pluxml <undetermined>
CVE-2012-4674 (PluXml before 5.1.6 allows remote attackers to obtain the installation ...)
- NOT-FOR-US: PluXml
+ - pluxml <undetermined>
CVE-2012-4673 (SQL injection vulnerability in application/controllers/invoice.php in ...)
NOT-FOR-US: Neoinvoice
CVE-2012-4672 (Apple iChat Server does not verify that a request was made for an XMPP ...)
@@ -431140,10 +431488,11 @@ CVE-2012-4428 (openslp: SLPIntersectStringList()' Function has a DoS vulnerabili
[squeeze] - openslp-dfsg <no-dsa> (Minor issue)
[wheezy] - openslp-dfsg <no-dsa> (Minor issue)
CVE-2012-4427 (The gnome-shell plugin 3.4.1 in GNOME allows remote attackers to force ...)
- - gnome-shell <unfixed> (unimportant)
+ - gnome-shell 3.34.0-2 (unimportant)
NOTE: I don't see much of a problem here, if you install from a repo, you need to trust it
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=684215
- NOTE: As far as I can see there is still a yes/no prompt for the user. I suggest unfixed unimportant. -- helmut
+ NOTE: Problem with GNOME Shell's NPAPI browser extension which is not shipped
+ NOTE: anymore since GNOME 3.32.
CVE-2012-4426 (Multiple format string vulnerabilities in mcrypt 2.6.8 and earlier mig ...)
- mcrypt 2.6.8-1.1
[squeeze] - mcrypt <no-dsa> (minor issue, it doesn't affect libmcrypt)
@@ -508872,7 +509221,7 @@ CVE-2007-3543 (Unrestricted file upload vulnerability in WordPress before 2.2.1
- wordpress 2.2.1-1
[etch] - wordpress <not-affected> (Vulnerable code not present)
CVE-2007-3542 (Cross-site scripting (XSS) vulnerability in admin/auth.php in Pluxml 0 ...)
- NOT-FOR-US: Pluxml
+ - pluxml <undetermined>
CVE-2007-3541 (Cross-site scripting (XSS) vulnerability in Kurinton sHTTPd 20070408 a ...)
NOT-FOR-US: Kurinton sHTTPd
CVE-2007-3540 (Multiple cross-site scripting (XSS) vulnerabilities in search.asp in r ...)
@@ -509209,7 +509558,7 @@ CVE-2007-3434 (index.php in Pharmacy System 2 and earlier allows remote attacker
CVE-2007-3433 (SQL injection vulnerability in index.php in Pharmacy System 2 and earl ...)
NOT-FOR-US: Pharmacy System
CVE-2007-3432 (Unrestricted file upload vulnerability in admin/images.php in Pluxml 0 ...)
- NOT-FOR-US: Pluxml
+ - pluxml <undetermined>
CVE-2007-3431 (PHP remote file inclusion vulnerability in cal.func.php in Valerio Cap ...)
NOT-FOR-US: Dagger
CVE-2007-3430 (SQL injection vulnerability in index.php in Simple Invoices 2007 05 25 ...)
=====================================
data/DLA/list
=====================================
@@ -1,3 +1,8 @@
+[16 Feb 2022] DLA-2925-1 drupal7 - security update
+ [stretch] - drupal7 7.52-2+deb9u18
+[15 Feb 2022] DLA-2924-1 libxstream-java - security update
+ {CVE-2021-43859}
+ [stretch] - libxstream-java 1.4.11.1-1+deb9u5
[15 Feb 2022] DLA-2923-1 h2database - security update
{CVE-2021-42392 CVE-2022-23221}
[stretch] - h2database 1.4.193-1+deb9u1
=====================================
data/DSA/list
=====================================
@@ -1,3 +1,15 @@
+[16 Feb 2022] DSA-5078-1 zsh - security update
+ {CVE-2021-45444}
+ [buster] - zsh 5.7.1-1+deb10u1
+ [bullseye] - zsh 5.8-6+deb11u1
+[15 Feb 2022] DSA-5077-1 librecad - security update
+ {CVE-2021-21898 CVE-2021-21899 CVE-2021-21900 CVE-2021-45341 CVE-2021-45342 CVE-2021-45343}
+ [buster] - librecad 2.1.3-1.2+deb10u1
+ [bullseye] - librecad 2.1.3-1.3+deb11u1
+[15 Feb 2022] DSA-5076-1 h2database - security update
+ {CVE-2021-42392 CVE-2022-23221}
+ [buster] - h2database 1.4.197-4+deb10u1
+ [bullseye] - h2database 1.4.197-4+deb11u1
[13 Feb 2022] DSA-5075-1 minetest - security update
{CVE-2022-24300 CVE-2022-24301}
[buster] - minetest 0.4.17.1+repack-1+deb10u1
=====================================
data/dla-needed.txt
=====================================
@@ -36,7 +36,7 @@ gif2apng (Anton)
NOTE: 20220114: orphaned package with inactive upstream, maybe coordinate with Debian QA to write our own patches (Beuc)
NOTE: 20220114: CVEs unrelated to apng2gif's (Beuc)
--
-gpac
+gpac (Roberto C. Sánchez)
NOTE: 20211101: coordinating with secteam for s-p-u since stretch/buster versions match (roberto)
NOTE: 20211120: received OK from secteam for buster update, working on stretch/buster in parallel (roberto)
NOTE: 20211228: Returning to active work on this now that llvm/rustc update is complete (roberto)
@@ -52,8 +52,6 @@ libarchive (Thorsten Alteholz)
libgit2 (Utkarsh)
NOTE: 20220208: got clearance. will upload this week. (utkarsh)
--
-libxstream-java (Chris Lamb)
---
linux (Ben Hutchings)
--
linux-4.19 (Ben Hutchings)
=====================================
data/dsa-needed.txt
=====================================
@@ -18,12 +18,12 @@ chromium
--
condor
--
-faad2/oldstable (jmm)
+expat (carnil)
+ Waiting for final fix upstream and first exposure in unstable
--
-h2database (apo)
+faad2/oldstable (jmm)
--
-librecad
- Aron Xu proposed update for {bullseye,buster}-security for review
+freecad (aron)
--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
@@ -35,6 +35,8 @@ nodejs (jmm)
--
python-pysaml2 (jmm)
--
+redis (jmm)
+--
rpki-client/stable
new 7.6 release required libretls, which isn't in Bullseye
--
@@ -49,5 +51,3 @@ webkit2gtk (berto)
--
wpewebkit (berto)
--
-zsh (seb)
---
=====================================
doc/security-team.d.o/security_tracker
=====================================
@@ -16,6 +16,18 @@ online. Everything is designed to be very simple to use, transparent and
easy to see what other people are working on so you can work on other
things.
+The Debian Security Tracker is only concerned with how specific vulnerabilities affect
+Debian. Many vulnerabilities are triaged as NFU (`NOT-FOR-US`) simply because the
+vulnerable software is not (yet) packaged for Debian. Triage comments on any specific
+vulnerability only reflect the possible impact on a system running Debian.
+
+For example, systems with some additional or modified packages compared to Debian need
+a separate triage process for every NFU to find ones which are relevant to what has
+been added as well as a triage on packages which differ from Debian.
+
+Entries in the Debian Security Tracker do not imply anything about how a vulnerability
+may affect systems other than Debian.
+
Gentle Introduction
-------------------
@@ -421,6 +433,11 @@ assess these levels.
Certain packages may get higher or lower rating than usual, based on
their importance.
+Assessments of severity are made against the binaries as provided by Debian. For each
+vulnerability, the severity assigned within the Debian Security Tracker only relates to
+how Debian views that vulnerability and how quickly the fix may need to be applied to
+the specified package(s) within Debian.
+
### Vulnerabilities without an assigned CVE id
If you learn of a vulnerability to which no CVE id has been assigned yet, you can
@@ -541,22 +558,65 @@ cross-reference will be added automatically by the cron job. However,
you do need to add `[lenny]` or `[squeeze]` entries to `CVE/list` when there
is a `no-dsa` or `not-affected` condition.
+Summary of tracker syntax
+-------------------------
+
+For a vulnerability in a package in Debian or proposed for introduction into Debian,
+the syntax should contain at least the `PKG_NAME` tabbed line and a `NOTE:` providing a
+URL to useful references, like commit references, bug tracker entries and advisories.
+Other lines are added, where relevant, within the general syntax.
+
+ CVE-YYYY-NNNNNN [(description)]
+ \t RESERVED
+ \t - PKG_NAME [PKG_TAG | PKG_FIX_VERSION] SEVERITY_LEVEL (free text comment)
+ \t [codename] PKG_NAME [PKG_TAG | PKG_FIX_VERSION] (free text comment)
+ \t NOTE:
+ \t TODO:
+
+- Each tabbed line, except `RESERVED`, can be repeated, e.g. for code embedded in
+ multiple packages and/or to cover multiple suites. Codenames are listed in order of
+ the release date.
+- PKG_NAME is the source package name in the archive.
+- PKG_TAG : `<no-dsa>` | `<unfixed>` | `<undetermined>` | `<not-affected>` | `<itp>`
+- SEVERITY_LEVEL : `(unimportant)` | `(low)` | `(medium)` | `(high)`
+- The pre-commit hook will check the syntax of each entry.
+
+The description of the CVE is not edited in the security tracker but it will be
+shortened in the tracker page for the vulnerability. A temporary description can be
+added with the `[description]` syntax, for example for clarification. This will not be
+overridden by an automatic update unless there is a change in the description of the
+CVE in the MITRE feed
+
+For `<itp>`, the comment needs to include the bug number as `(bug #NNNNNNNNNN)`. (The
+`<itp>` package tag is used for both ITP and RFP bugs -
+see [ITP/RFP packages](#issues-in-itp-andor-rfp-packages))
+
+`NOTE:` annotations are often used for URLs for more information but can also be
+used for descriptive comments.
+
Checking in your changes
------------------------
After thoroughly researching each issue (as described above) and editing
the relevant files, commit your changes. Peer review is (hopefully) done via the
mailing list and IRC notifications (see [Automatic issue updates](#automatic-issue-updates) above).
-However, changes to the tracker website itself (e.g., the files in lib/*
-and bin/tracker_service.py) should be vetted and approved before being
+However, changes to the tracker website itself (e.g., the files in `lib/*`
+and `bin/tracker_service.py`) should be vetted and approved before being
committed. The preferred way to do this is to send a patch to the
-debian-security-tracker at lists.debian.org mailing list.
+`debian-security-tracker at lists.debian.org` mailing list or a merge request in Salsa.
+
+- [Salsa](https://salsa.debian.org/security-tracker-team/security-tracker/)
+- [https://lists.debian.org/debian-security-tracker/](https://lists.debian.org/debian-security-tracker/)
Commits are checked for syntax errors before they are actually committed,
and you'll receive an error and your commit is aborted if it is in error..
To check your changes yourself beforehand, use `make check-syntax` from
the root of the Git directory.
+Note: It can be useful to use `git worktree` support for merging changes to master and
+ease issues that can occur when someone else has committed in between. See [git
+worktree (1)](https://manpages.debian.org/unstable/git-man/git-worktree.1.en.html).
+
Following up on security issues
-------------------------------
@@ -573,7 +633,7 @@ Tracking of security bugs in the BTS and linking them to a user tag by CVE
--------------------------------------------------------------------------
There's an automated tagging of security-related bugs to CVE IDs through
-the user tag security for the user debian-security at lists.debian.org.
+the user tag security for the user `debian-security at lists.debian.org`.
All bugs added to the tracker are automatically tagged. You can use
the search
@@ -594,11 +654,93 @@ with the following content:
Contributing with the security tracker code
-------------------------------------------
-Either fill a bug against the security-tracker pseudo-package attaching the patch
-to be reviewed or create a merge request for the security-tracker project.
+Either file a bug against the `security-tracker` pseudo-package attaching the patch
+to be reviewed or create a merge request for the security-tracker project in Salsa.
+
+### Helper scripts for one-off updates
+
+On success, scripts output a snippet of the main CVE list showing the new CVE
+information. Make sure to check for warnings and errors reported by the script. The
+output file needs to be manually reviewed and can then be merged using
+`./bin/merge-cve-files` or sent for review by the security team by email..
+
+##### Updating a vulnerability
+
+* Mark a given released suite as not affected for a specific CVE and source package:
+
+ `./bin/update-vuln --cve CVE --src SRC --suite SUITE`
+
+* Add a bug number to an existing CVE entry
+
+ `./bin/update-vuln --cve CVE --number 1000000`
+
+* Add a note to a specific CVE entry
+
+ `./bin/update-vuln --cve CVE --note "quoted note string"`
+
+Example workflow:
+
+ ./bin/update-vuln --cve CVE-YYYY-NNNNN ...
+
+check for error and warning messages & merge into the main CVE list:
+
+ ./bin/merge-cve-files ./CVE-YYYY-NNNNN.list
+
+review change to data/CVE/list
+
+ git diff data/CVE/list
+ rm ./CVE-YYYY-NNNNN.list
+
+.. repeat for additional entries to this or other CVEs.
+
+ git add data/CVE/list
+ git commit
+
+#### Retrieve fixes in uploads to unstable
+
+`./bin/grab-cve-in-fix` supports different ways to retrieve one or more CVEs as fixed in unstable:
+
+- Using information directly from the upload into unstable:
+
+ `cat changes | ./bin/grab-cve-in-fix --input`
+
+- Using information in the lists.debian.org archive:
+
+ `./bin/grab-cve-in-fix --archive https://lists.debian.org/debian-devel-changes/2021/12/msg01280.html`
+
+- Using information in the package tracker:
+
+ `./bin/grab-cve-in-fix --tracker https://tracker.debian.org/news/1285227/accepted-freerdp2-241dfsg1-1-source-into-unstable/`
+
+- Using local caches in the security-tracker:
+
+ `./bin/grab-cve-in-fix --src SRC --cves [CVES...]`
+
+Note: to use `STDIN` with the --input option, the changes content must be signed - i.e.
+as it would appear in notifications after the upload. This can be used to double-check
+your CVE list before uploading to ftp-master. `./bin/grab-cve-in-fix` will report if a
+CVE does not exist or if the CVE is attributed to a different package.
**TODO** (further details)
+### Contributing ongoing triage work
+
+Some familiarity with the tooling and syntax will be needed for this, as with any development
+project.
+
+* `./bin/check-new-issues` - use the -h option to see the help output.
+
+* `./bin/report-vuln` - generate the correct email body to report a bug against a source package
+ relating to an unfixed CVE(s).
+
+### Useful search support for checking new CVEs
+
+- [https://www.debian.org/distrib/packages#search_packages](https://www.debian.org/distrib/packages#search_packages)
+- [https://wnpp.debian.net/](https://wnpp.debian.net/) (Be aware, forwarded ITPs might
+ not be found, so check the [WNPP bug list](https://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=wnpp;dist=unstable) also)
+- [https://tracker.debian.org/](https://tracker.debian.org/)
+- [https://codesearch.debian.net/](https://codesearch.debian.net/)
+
Setting up a local testing instance
-----------------------------------
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d188babe55290bc94a7f28c6ba2e031816ceacf7...937a3455c65746544fb3d1e8e2bf90f0628277fa
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d188babe55290bc94a7f28c6ba2e031816ceacf7...937a3455c65746544fb3d1e8e2bf90f0628277fa
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220217/e70c398a/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list