[Git][security-tracker-team/security-tracker][master] 6 commits: add apache-log4j1.2
Thorsten Alteholz (@alteholz)
alteholz at debian.org
Sun Jan 23 23:25:36 GMT 2022
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
16441a89 by Thorsten Alteholz at 2022-01-23T23:58:31+01:00
add apache-log4j1.2
- - - - -
bb3c1dfd by Thorsten Alteholz at 2022-01-24T00:05:57+01:00
mark CVE-2022-0204 as no-dsa for Stretch
- - - - -
3dbae0dc by Thorsten Alteholz at 2022-01-24T00:11:05+01:00
mark CVE-2021-3979 as no-dsa for Stretch
- - - - -
b62e32b1 by Thorsten Alteholz at 2022-01-24T00:13:38+01:00
mark CVE-2021-45942 as no-dsa for Stretch
- - - - -
39901946 by Thorsten Alteholz at 2022-01-24T00:18:51+01:00
mark CVE-2022-23303 as not-affected for Stretch
- - - - -
1bcc23e6 by Thorsten Alteholz at 2022-01-24T00:23:58+01:00
add wpa
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1607,6 +1607,7 @@ CVE-2022-23304 (The implementations of EAP-pwd in hostapd before 2.10 and wpa_su
NOTE: Issue exists because of an incomplete fix for CVE-2019-9495
CVE-2022-23303 (The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...)
- wpa 2:2.10-1
+ [stretch] - wpa <not-affected> (CVE-2019-9494 was not applied and is marked as ignored)
NOTE: https://w1.fi/security/2022-1/
NOTE: Issue exists because of an incomplete fix for CVE-2019-9494
CVE-2022-0264 [bpf: Fix kernel address leakage in atomic fetch]
@@ -2058,6 +2059,7 @@ CVE-2022-0205
CVE-2022-0204 [Heap overflow vulnerability in the implementation of the gatt protocol]
RESERVED
- bluez <unfixed> (bug #1003712)
+ [stretch] - bluez <no-dsa> (Minor issue)
NOTE: https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
NOTE: Fixed by: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=591c546c536b42bef696d027f64aa22434f8c3f0 (5.63)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2039807
@@ -5221,6 +5223,7 @@ CVE-2021-45943 (GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCI
NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/gdal/OSV-2021-1651.yaml
CVE-2021-45942 (OpenEXR 3.1.0 through 3.1.3 has a heap-based buffer overflow in Imf_3_ ...)
- openexr <unfixed>
+ [buster] - openexr <no-dsa> (Minor issue)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=41416
NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1209
CVE-2021-45941 (libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in _ ...)
@@ -11637,6 +11640,7 @@ CVE-2021-3980 (elgg is vulnerable to Exposure of Private Personal Information to
CVE-2021-3979 [ceph: Ceph volume does not honour osd_dmcrypt_key_size]
RESERVED
- ceph <unfixed>
+ [stretch] - ceph <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2022/01/11/5
CVE-2021-44034
RESERVED
=====================================
data/dla-needed.txt
=====================================
@@ -21,6 +21,8 @@ ansible
apache2 (Anton)
NOTE: 20220109: WIP https://salsa.debian.org/lts-team/packages/apache2 (Anton)
--
+apache-log4j1.2
+--
apng2gif
NOTE: 20211229: CVE-2017-6960 was fixed in DLAs for wheezy and jessie
NOTE: 20211229: but is unfixed in stretch, plus 2 additional CVEs (bunk)
@@ -112,5 +114,7 @@ ujson
--
vim (Emilio)
--
+wpa
+ NOTE: 20220124: CVE-2018-9495 has been applied
zabbix
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/39ddba5bd08dd748d9b4f2dac2207e63a6ce90f2...1bcc23e6e5eaf733893375a0c5b844b1acc1320f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/39ddba5bd08dd748d9b4f2dac2207e63a6ce90f2...1bcc23e6e5eaf733893375a0c5b844b1acc1320f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220123/d7349698/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list