[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sat Jan 15 13:05:17 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e63ac987 by Moritz Muehlenhoff at 2022-01-15T14:04:53+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -189,9 +189,13 @@ CVE-2022-23222 (kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows
 	NOTE: https://www.openwall.com/lists/oss-security/2022/01/13/1
 CVE-2022-23219 (The deprecated compatibility function clnt_create in the sunrpc module ...)
 	- glibc <unfixed>
+	[bullseye] - glibc <no-dsa> (Minor issue)
+	[buster] - glibc <no-dsa> (Minor issue)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=22542
 CVE-2022-23218 (The deprecated compatibility function svcunix_create in the sunrpc mod ...)
 	- glibc <unfixed>
+	[bullseye] - glibc <no-dsa> (Minor issue)
+	[buster] - glibc <no-dsa> (Minor issue)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28768
 CVE-2022-23217
 	RESERVED
@@ -3154,9 +3158,9 @@ CVE-2021-46059 (A Pointer Dereference vulnerability exists in Vim 8.2.3883 via t
 	NOTE: https://huntr.dev/bounties/a9b015e2-59e3-4ed9-8812-d9021e40b8f2/
 	NOTE: Fixed by: https://github.com/vim/vim/commit/5937c7505f444dd896f336fa0119a93a55ebe9a2 (v8.2.3883)
 CVE-2021-46058 (AHheap-based Buffer Overflow vulnerabiity exists in GNU inetutils 2.2  ...)
-	- inetutils <unfixed>
+	- inetutils <unfixed> (unimportant)
 	NOTE: https://lists.gnu.org/archive/html/bug-inetutils/2021-12/msg00016.html
-	TODO: check details
+	NOTE: Negligible security impact
 CVE-2021-46057
 	RESERVED
 CVE-2021-46056
@@ -10524,6 +10528,7 @@ CVE-2021-43862 (jQuery Terminal Emulator is a plugin for creating command line i
 	NOT-FOR-US: jQuery Terminal Emulator
 CVE-2021-43861 (Mermaid is a Javascript based diagramming and charting tool that uses  ...)
 	- node-mermaid 8.13.8+~cs10.4.16-1
+	[bullseye] - node-mermaid <no-dsa> (Minor issue)
 	NOTE: https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v
 	NOTE: https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83
 CVE-2021-43860 (Flatpak is a Linux application sandboxing and distribution framework.  ...)
@@ -20893,6 +20898,8 @@ CVE-2021-40875 (Improper Access Control in Gurock TestRail versions < 7.2.0.3
 CVE-2021-40874 [RESTServer pwdConfirm always returns true with Combination + Kerberos]
 	RESERVED
 	- lemonldap-ng <unfixed>
+	[bullseye] - lemonldap-ng <no-dsa> (Minor issue)
+	[buster] - lemonldap-ng <no-dsa> (Minor issue)
 	NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612
 	NOTE: https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/commit/66946e8f754812b375768c2124937137c856fe0c
 CVE-2021-40873 (An issue was discovered in Softing Industrial Automation OPC UA C++ SD ...)
@@ -55319,6 +55326,7 @@ CVE-2021-27022 (A flaw was discovered in bolt-server and ace where running a tas
 	NOTE: https://puppet.com/security/cve/CVE-2021-27022/
 CVE-2021-27021 (A flaw was discovered in Puppet DB, this flaw results in an escalation ...)
 	- puppetdb <unfixed> (bug #990419)
+	[buster] - puppetdb <no-dsa> (Minor issue)
 	NOTE: https://puppet.com/security/cve/cve-2021-27021/
 	NOTE: https://github.com/puppetlabs/puppetdb/commit/c146e624d230f7410fb648d58ae28c0e3cd457a2
 	NOTE: https://github.com/puppetlabs/puppetdb/commit/f8dc81678cf347739838e42cc1c426d96406c266


=====================================
data/dsa-needed.txt
=====================================
@@ -38,8 +38,6 @@ pillow (jmm)
 --
 prosody (jmm)
 --
-puppetdb (jmm)
---
 python-pysaml2 (jmm)
 --
 ruby2.5/oldstable



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e63ac987a26f22356149bae1d84612ca4b1c8e79

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e63ac987a26f22356149bae1d84612ca4b1c8e79
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220115/654a7f42/attachment.htm>


More information about the debian-security-tracker-commits mailing list