[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Jun 3 11:25:12 BST 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6bd5cc0b by Moritz Muehlenhoff at 2022-06-03T12:24:37+02:00
buster/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -4377,7 +4377,9 @@ CVE-2022-30629
- golang-1.18 1.18.3-1
- golang-1.17 <unfixed>
- golang-1.15 <removed>
+ [bullseye] - golang-1.15 <no-dsa> (Minor issue)
- golang-1.11 <removed>
+ [buster] - golang-1.11 <no-dsa> (Minor issue)
- golang-1.8 <removed>
- golang-1.7 <removed>
NOTE: https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg
@@ -8544,6 +8546,8 @@ CVE-2022-29243 (Nextcloud Server is the file server software for Nextcloud, a se
- nextcloud-server <itp> (bug #941708)
CVE-2022-29242 (GOST engine is a reference implementation of the Russian GOST crypto a ...)
- libengine-gost-openssl1.1 <unfixed>
+ [bullseye] - libengine-gost-openssl1.1 <no-dsa> (Minor issue)
+ [buster] - libengine-gost-openssl1.1 <no-dsa> (Minor issue)
NOTE: https://github.com/gost-engine/engine/security/advisories/GHSA-2rmw-8wpg-vgw5
NOTE: https://github.com/gost-engine/engine/commit/7df766124f87768b43b9e8947c5a01e17545772c (v3.0.1)
NOTE: https://github.com/gost-engine/engine/commit/b2b4d629f100eaee9f5942a106b1ccefe85b8808 (v3.0.1)
@@ -10088,6 +10092,8 @@ CVE-2022-1254 (A URL redirection vulnerability in Skyhigh SWG in main releases 1
NOT-FOR-US: Skyhigh SWG
CVE-2022-1253 (Heap-based Buffer Overflow in GitHub repository strukturag/libde265 pr ...)
- libde265 <unfixed>
+ [bullseye] - libde265 <no-dsa> (Minor issue)
+ [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/1-other-strukturag/libde265/
NOTE: https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8
@@ -43284,24 +43290,24 @@ CVE-2021-42706 (This vulnerability could allow an attacker to disclose informati
CVE-2021-42705 (PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buf ...)
NOT-FOR-US: PLC Editor
CVE-2021-42704 (Inkscape version 0.91 is vulnerable to an out-of-bounds write, which m ...)
- - inkscape 1.0-1
+ - inkscape 1.0-1 (unimportant)
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating possible patches)
- TODO: Unclear if this is really fixed in 1.0+
+ NOTE: oob read/crash in GUI tool, no security impact
CVE-2021-42703 (This vulnerability could allow an attacker to send malicious Javascrip ...)
NOT-FOR-US: Advantech
CVE-2021-42702 (Inkscape version 0.91 can access an uninitialized pointer, which may a ...)
- - inkscape 1.0-1
+ - inkscape 1.0-1 (unimportant)
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating possible patches)
- TODO: Unclear if this is really fixed in 1.0+
+ NOTE: oob read/crash in GUI tool, no security impact
CVE-2021-42701 (An attacker could prepare a specially crafted project file that, if op ...)
NOT-FOR-US: AzeoTech
CVE-2021-42700 (Inkscape 0.91 is vulnerable to an out-of-bounds read, which may allow ...)
- - inkscape 1.0-1
+ - inkscape 1.0-1 (unimportant)
NOTE: https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-03
NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1199774#c1 (locating possible patches)
- TODO: Unclear if this is really fixed in 1.0+
+ NOTE: oob read/crash in GUI tool, no security impact
CVE-2021-42699 (The affected product is vulnerable to cookie information being transmi ...)
NOT-FOR-US: AzeoTech
CVE-2021-42698 (Project files are stored memory objects in the form of binary serializ ...)
@@ -62728,6 +62734,8 @@ CVE-2021-35453
RESERVED
CVE-2021-35452 (An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ...)
- libde265 <unfixed>
+ [bullseye] - libde265 <no-dsa> (Minor issue)
+ [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <postponed> (Minor issue, revisit when fixed upstream)
NOTE: https://github.com/strukturag/libde265/issues/298
CVE-2021-35451 (In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenti ...)
=====================================
data/dsa-needed.txt
=====================================
@@ -22,6 +22,8 @@ epiphany-browser
--
freecad (aron)
--
+kicad
+--
libpgjava (apo)
--
linux (carnil)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6bd5cc0ba63af33abf50981d733988468b0430ca
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6bd5cc0ba63af33abf50981d733988468b0430ca
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220603/55763487/attachment.htm>
More information about the debian-security-tracker-commits
mailing list