[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Jan 31 17:59:03 GMT 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
bc12ea8c by Moritz Muehlenhoff at 2022-01-31T18:58:31+01:00
buster/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -3146,11 +3146,13 @@ CVE-2021-46350 (There is an Assertion 'ecma_is_value_object (value)' failed at j
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4936
CVE-2021-46349 (There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECM ...)
- iotjs <unfixed> (bug #1004288)
+ [bullseye] - iotjs <no-dsa> (Minor issue)
[buster] - iotjs <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4954
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4937
CVE-2021-46348 (There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' fa ...)
- iotjs <unfixed> (bug #1004288)
+ [bullseye] - iotjs <no-dsa> (Minor issue)
[buster] - iotjs <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4961
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4941
@@ -3160,6 +3162,8 @@ CVE-2021-46347 (There is an Assertion 'ecma_object_check_class_name_is_object (o
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4938
CVE-2021-46346 (There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustme ...)
- iotjs <unfixed> (bug #1004288)
+ [bullseye] - iotjs <no-dsa> (Minor issue)
+ [buster] - iotjs <no-dsa> (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4955
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4939
CVE-2021-46345 (There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry ...)
@@ -3182,6 +3186,7 @@ CVE-2021-46341
RESERVED
CVE-2021-46340 (There is an Assertion 'context_p->stack_top_uint8 == SCAN_STACK_TRY ...)
- iotjs <unfixed> (bug #1004288)
+ [bullseye] - iotjs <no-dsa> (Minor issue)
[buster] - iotjs <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4964
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4924
@@ -3190,6 +3195,8 @@ CVE-2021-46339 (There is an Assertion 'lit_is_valid_cesu8_string (string_p, stri
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4935
CVE-2021-46338 (There is an Assertion 'ecma_is_lexical_environment (object_p)' failed ...)
- iotjs <unfixed> (bug #1004288)
+ [bullseye] - iotjs <no-dsa> (Minor issue)
+ [buster] - iotjs <no-dsa> (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4943
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4933
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4900
@@ -3295,6 +3302,8 @@ CVE-2022-0262 (Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore
NOT-FOR-US: pimcore
CVE-2022-0261 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...)
- vim <unfixed>
+ [bullseye] - vim <no-dsa> (Minor issue)
+ [buster] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
NOTE: https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc (v8.2.4120)
CVE-2022-0260 (Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimco ...)
@@ -4848,6 +4857,8 @@ CVE-2021-46171 (Modex v2.11 was discovered to contain a NULL pointer dereference
NOT-FOR-US: Modex
CVE-2021-46170 (An issue was discovered in JerryScript commit a6ab5e9. There is an Use ...)
- iotjs <unfixed>
+ [bullseye] - iotjs <no-dsa> (Minor issue)
+ [buster] - iotjs <no-dsa> (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4917
NOTE: https://github.com/jerryscript-project/jerryscript/pull/4942/commits/5e1fdd1d1e75105b43392b4bb3996099cdc50f3d
CVE-2021-46169 (Modex v2.11 was discovered to contain an Use-After-Free vulnerability ...)
@@ -5323,6 +5334,8 @@ CVE-2022-22731
RESERVED
CVE-2022-0144 (shelljs is vulnerable to Improper Privilege Management ...)
- node-shelljs 0.8.5+~cs0.8.10-1
+ [bullseye] - node-shelljs <no-dsa> (Minor issue)
+ [buster] - node-shelljs <no-dsa> (Minor issue)
[stretch] - node-shelljs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/
NOTE: https://github.com/shelljs/shelljs/issues/1058
@@ -12939,6 +12952,8 @@ CVE-2021-4020 (janus-gateway is vulnerable to Improper Neutralization of Input D
NOTE: Issues only in janus-demos built from src:janus
CVE-2021-4019 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim 2:8.2.3995-1
+ [bullseye] - vim <no-dsa> (Minor issue)
+ [buster] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
NOTE: https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669)
CVE-2021-44220
@@ -41403,6 +41418,7 @@ CVE-2021-33967
RESERVED
CVE-2021-33966 (Cross site scripting (XSS) vulnerability in spotweb 1.4.9, allows auth ...)
- spotweb <removed>
+ [buster] - spotweb <no-dsa> (Minor issue)
NOTE: https://packetstormsecurity.com/files/162731/Spotweb-Develop-1.4.9-Cross-Site-Scripting.html
CVE-2021-33965 (China Mobile An Lianbao WF-1 V1.0.1 router provides a web interface /a ...)
NOT-FOR-US: China Mobile An Lianbao WF-1 router
@@ -52963,7 +52979,7 @@ CVE-2021-29634
CVE-2021-29633
RESERVED
CVE-2021-29632 (In FreeBSD 13.0-STABLE before n247428-9352de39c3dc, 12.2-STABLE before ...)
- - kfreebsd-10 <unfixed>
+ - kfreebsd-10 <unfixed> (unimportant)
NOTE: https://www.freebsd.org/security/advisories/FreeBSD-SA-22:01.vt.asc
CVE-2021-29631 (In FreeBSD 13.0-STABLE before n246941-20f96f215562, 12.2-STABLE before ...)
NOT-FOR-US: FreeBSD
@@ -107078,9 +107094,13 @@ CVE-2020-19862
RESERVED
CVE-2020-19861 (When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt ...)
- ldns <unfixed>
+ [bullseye] - ldns <no-dsa> (Minor issue)
+ [buster] - ldns <no-dsa> (Minor issue)
NOTE: https://github.com/NLnetLabs/ldns/issues/51
CVE-2020-19860 (When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_ ...)
- ldns <unfixed>
+ [bullseye] - ldns <no-dsa> (Minor issue)
+ [buster] - ldns <no-dsa> (Minor issue)
NOTE: https://github.com/NLnetLabs/ldns/issues/50
NOTE: https://github.com/NLnetLabs/ldns/commit/15d96206996bea969fbc918eb0a4a346f514b9f3
CVE-2020-19859
=====================================
data/dsa-needed.txt
=====================================
@@ -52,6 +52,8 @@ ruby2.7/stable
--
runc
--
+samba
+--
trafficserver (jmm)
wait until status for CVE-2021-38161 is clarified (upstream patch got reverted)
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc12ea8c6b9fdd613efc7d36e170e5c1bc419ced
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc12ea8c6b9fdd613efc7d36e170e5c1bc419ced
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220131/55563f4b/attachment.htm>
More information about the debian-security-tracker-commits
mailing list