[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Jan 31 16:15:25 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ad0538b7 by Moritz Muehlenhoff at 2022-01-31T17:13:55+01:00
buster/bullseye triage

- - - - -


3 changed files:

- data/CVE/list
- data/DSA/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -12658,6 +12658,8 @@ CVE-2021-44274
 	RESERVED
 CVE-2021-44273 (e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate ...)
 	- e2guardian 5.3.5-3 (bug #1003125)
+	[bullseye] - e2guardian <no-dsa> (Minor issue)
+	[buster] - e2guardian <no-dsa> (Minor issue)
 	[stretch] - e2guardian <no-dsa> (Minor issue; can be fixed later)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/12/23/2
 	NOTE: https://github.com/e2guardian/e2guardian/issues/707
@@ -70156,15 +70158,19 @@ CVE-2021-22571
 CVE-2021-22570 (Nullptr dereference when a null char is present in a proto symbol. The ...)
 	[experimental] - protobuf 3.17.1-1
 	- protobuf <unfixed>
+	[bullseye] - protobuf <no-dsa> (Minor issue)
+	[buster] - protobuf <no-dsa> (Minor issue)
 	NOTE: Fixed upstream in v3.15.0: https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0
-	TODO: check details
 CVE-2021-22569 (An issue in protobuf-java allowed the interleaving of com.google.proto ...)
 	[experimental] - protobuf 3.19.3-1
 	- protobuf <unfixed>
+	[bullseye] - protobuf <no-dsa> (Minor issue)
+	[buster] - protobuf <no-dsa> (Minor issue)
 	[stretch] - protobuf <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2022/01/12/4
 	NOTE: https://cloud.google.com/support/bulletins#gcp-2022-001
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330 (unclear, might be bogus)
+	NOTE: https://github.com/protocolbuffers/protobuf/pull/9371/commits/5ea2bdf6d7483d64a6b02fcf00ee51fbfb80e847
 CVE-2021-22568 (When using the dart pub publish command to publish a package to a thir ...)
 	NOT-FOR-US: Dart language
 CVE-2021-22567 (Bidirectional Unicode text can be interpreted and compiled differently ...)


=====================================
data/DSA/list
=====================================
@@ -134,7 +134,7 @@
 	[buster] - sogo 4.0.7-1+deb10u2
 	[bullseye] - sogo 5.0.1-4+deb11u1
 [22 Dec 2021] DSA-5028-1 spip - security update
-	{CVE-2021-44120 CVE-2021-44122}
+	{CVE-2021-44120 CVE-2021-44122 CVE-2021-44123 CVE-2021-44118}
 	[buster] - spip 3.2.4-1+deb10u5
 	[bullseye] - spip 3.2.11-3+deb11u1
 [21 Dec 2021] DSA-5027-1 xorg-server - security update


=====================================
data/dsa-needed.txt
=====================================
@@ -52,8 +52,6 @@ ruby2.7/stable
 --
 runc
 --
-spip
---
 trafficserver (jmm)
   wait until status for CVE-2021-38161 is clarified (upstream patch got reverted)
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad0538b7ee90fa8096bac3ccc31a61b54f4a3c9e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ad0538b7ee90fa8096bac3ccc31a61b54f4a3c9e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220131/c350fcb6/attachment.htm>


More information about the debian-security-tracker-commits mailing list