[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Mar 23 14:46:07 GMT 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e6100af0 by Moritz Muehlenhoff at 2022-03-23T14:58:16+01:00
buster/bullseye triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -943,6 +943,7 @@ CVE-2022-1020
CVE-2022-27240 (scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a buffer ...)
- glewlwyd 2.6.1-2
[bullseye] - glewlwyd <no-dsa> (Minor issue)
+ [buster] - glewlwyd <no-dsa> (Minor issue)
NOTE: https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a (v2.6.2)
CVE-2022-27239
RESERVED
@@ -4084,18 +4085,28 @@ CVE-2020-36516 (An issue was discovered in the Linux kernel through 5.16.11. The
NOTE: https://dl.acm.org/doi/10.1145/3372297.3417884
CVE-2022-26129 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...)
- frr <unfixed> (bug #1008010)
+ [bullseye] - frr <no-dsa> (Minor issue)
+ [buster] - frr <no-dsa> (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10503
CVE-2022-26128 (A buffer overflow vulnerability exists in FRRouting through 8.1.0 due ...)
- frr <unfixed> (bug #1008010)
+ [bullseye] - frr <no-dsa> (Minor issue)
+ [buster] - frr <no-dsa> (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10502
CVE-2022-26127 (A buffer overflow vulnerability exists in FRRouting through 8.1.0 due ...)
- frr <unfixed> (bug #1008010)
+ [bullseye] - frr <no-dsa> (Minor issue)
+ [buster] - frr <no-dsa> (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10487
CVE-2022-26126 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...)
- frr <unfixed> (bug #1008010)
+ [bullseye] - frr <no-dsa> (Minor issue)
+ [buster] - frr <no-dsa> (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10505
CVE-2022-26125 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...)
- frr <unfixed> (bug #1008010)
+ [bullseye] - frr <no-dsa> (Minor issue)
+ [buster] - frr <no-dsa> (Minor issue)
NOTE: https://github.com/FRRouting/frr/issues/10507
CVE-2022-26122
RESERVED
@@ -6505,8 +6516,10 @@ CVE-2021-4220
CVE-2021-4219
RESERVED
- imagemagick <unfixed>
+ [bullseye] - imagemagick <no-dsa> (Minor issue)
+ [buster] - imagemagick <no-dsa> (Minor issue)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4626
- TODO: check details
+ NOTE: https://github.com/ImageMagick/ImageMagick6/commit/c10351c16b8d2cabd11d2627a02de522570f6ceb
CVE-2022-25212 (A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plu ...)
NOT-FOR-US: Jenkins plugin
CVE-2022-25211 (A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier a ...)
@@ -7611,14 +7624,20 @@ CVE-2022-24774 (CycloneDX BOM Repository Server is a bill of materials (BOM) rep
TODO: check
CVE-2022-24773 (Forge (also called `node-forge`) is a native implementation of Transpo ...)
- node-node-forge <unfixed>
+ [bullseye] - node-node-forge <no-dsa> (Minor issue)
+ [buster] - node-node-forge <no-dsa> (Minor issue)
NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr
NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)
CVE-2022-24772 (Forge (also called `node-forge`) is a native implementation of Transpo ...)
- node-node-forge <unfixed>
+ [bullseye] - node-node-forge <no-dsa> (Minor issue)
+ [buster] - node-node-forge <no-dsa> (Minor issue)
NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g
NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)
CVE-2022-24771 (Forge (also called `node-forge`) is a native implementation of Transpo ...)
- node-node-forge <unfixed>
+ [bullseye] - node-node-forge <no-dsa> (Minor issue)
+ [buster] - node-node-forge <no-dsa> (Minor issue)
NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765
NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)
CVE-2022-24770 (`gradio` is an open source framework for building interactive machine ...)
@@ -7631,6 +7650,8 @@ CVE-2022-24767
RESERVED
CVE-2022-24766 (mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mi ...)
- mitmproxy <unfixed>
+ [bullseye] - mitmproxy <no-dsa> (Minor issue)
+ [buster] - mitmproxy <no-dsa> (Minor issue)
NOTE: https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3
NOTE: https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b (v8.0.0)
CVE-2022-24765
@@ -19956,24 +19977,28 @@ CVE-2021-45089 (Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Acc
CVE-2021-45088 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before ...)
{DSA-5042-1}
- epiphany-browser 41.2-1
+ [buster] - epiphany-browser <no-dsa> (Minor issue)
[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
CVE-2021-45087 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before ...)
{DSA-5042-1}
- epiphany-browser 41.2-1
+ [buster] - epiphany-browser <no-dsa> (Minor issue)
[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
CVE-2021-45086 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before ...)
{DSA-5042-1}
- epiphany-browser 41.2-1
+ [buster] - epiphany-browser <no-dsa> (Minor issue)
[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
CVE-2021-45085 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before ...)
{DSA-5042-1}
- epiphany-browser 41.2-1
+ [buster] - epiphany-browser <no-dsa> (Minor issue)
[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
@@ -99645,6 +99670,8 @@ CVE-2021-0077 (Insecure inherited permissions in the installer for the Intel(R)
NOT-FOR-US: Intel
CVE-2021-0076 (Improper Validation of Specified Index, Position, or Offset in Input i ...)
- firmware-nonfree <unfixed>
+ [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+ [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree
CVE-2021-0075 (Out-of-bounds write in firmware for some Intel(R) PROSet/Wireless WiFi ...)
@@ -99655,6 +99682,8 @@ CVE-2021-0073 (Insufficient control flow management in Intel(R) DSA before versi
NOT-FOR-US: Intel
CVE-2021-0072 (Improper input validation in firmware for some Intel(R) PROSet/Wireles ...)
- firmware-nonfree <unfixed>
+ [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+ [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree
CVE-2021-0071 (Improper input validation in firmware for some Intel(R) PROSet/Wireles ...)
@@ -99669,6 +99698,8 @@ CVE-2021-0067 ( Improper access control in system firmware for some Int
NOT-FOR-US: Intel
CVE-2021-0066 (Improper input validation in firmware for Intel(R) PROSet/Wireless Wi- ...)
- firmware-nonfree <unfixed>
+ [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+ [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree
CVE-2021-0065 (Incorrect default permissions in the Intel(R) PROSet/Wireless WiFi sof ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6100af0249f9e57036c193482686bc45387b8b2
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6100af0249f9e57036c193482686bc45387b8b2
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220323/84e05696/attachment.htm>
More information about the debian-security-tracker-commits
mailing list