[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Mar 23 14:46:07 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e6100af0 by Moritz Muehlenhoff at 2022-03-23T14:58:16+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -943,6 +943,7 @@ CVE-2022-1020
 CVE-2022-27240 (scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has a buffer ...)
 	- glewlwyd 2.6.1-2
 	[bullseye] - glewlwyd <no-dsa> (Minor issue)
+	[buster] - glewlwyd <no-dsa> (Minor issue)
 	NOTE: https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a (v2.6.2)
 CVE-2022-27239
 	RESERVED
@@ -4084,18 +4085,28 @@ CVE-2020-36516 (An issue was discovered in the Linux kernel through 5.16.11. The
 	NOTE: https://dl.acm.org/doi/10.1145/3372297.3417884
 CVE-2022-26129 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...)
 	- frr <unfixed> (bug #1008010)
+	[bullseye] - frr <no-dsa> (Minor issue)
+	[buster] - frr <no-dsa> (Minor issue)
 	NOTE: https://github.com/FRRouting/frr/issues/10503
 CVE-2022-26128 (A buffer overflow vulnerability exists in FRRouting through 8.1.0 due  ...)
 	- frr <unfixed> (bug #1008010)
+	[bullseye] - frr <no-dsa> (Minor issue)
+	[buster] - frr <no-dsa> (Minor issue)
 	NOTE: https://github.com/FRRouting/frr/issues/10502
 CVE-2022-26127 (A buffer overflow vulnerability exists in FRRouting through 8.1.0 due  ...)
 	- frr <unfixed> (bug #1008010)
+	[bullseye] - frr <no-dsa> (Minor issue)
+	[buster] - frr <no-dsa> (Minor issue)
 	NOTE: https://github.com/FRRouting/frr/issues/10487
 CVE-2022-26126 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...)
 	- frr <unfixed> (bug #1008010)
+	[bullseye] - frr <no-dsa> (Minor issue)
+	[buster] - frr <no-dsa> (Minor issue)
 	NOTE: https://github.com/FRRouting/frr/issues/10505
 CVE-2022-26125 (Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due t ...)
 	- frr <unfixed> (bug #1008010)
+	[bullseye] - frr <no-dsa> (Minor issue)
+	[buster] - frr <no-dsa> (Minor issue)
 	NOTE: https://github.com/FRRouting/frr/issues/10507
 CVE-2022-26122
 	RESERVED
@@ -6505,8 +6516,10 @@ CVE-2021-4220
 CVE-2021-4219
 	RESERVED
 	- imagemagick <unfixed>
+	[bullseye] - imagemagick <no-dsa> (Minor issue)
+	[buster] - imagemagick <no-dsa> (Minor issue)
 	NOTE: https://github.com/ImageMagick/ImageMagick/issues/4626
-	TODO: check details
+	NOTE: https://github.com/ImageMagick/ImageMagick6/commit/c10351c16b8d2cabd11d2627a02de522570f6ceb
 CVE-2022-25212 (A cross-site request forgery (CSRF) vulnerability in Jenkins SWAMP Plu ...)
 	NOT-FOR-US: Jenkins plugin
 CVE-2022-25211 (A missing permission check in Jenkins SWAMP Plugin 1.2.6 and earlier a ...)
@@ -7611,14 +7624,20 @@ CVE-2022-24774 (CycloneDX BOM Repository Server is a bill of materials (BOM) rep
 	TODO: check
 CVE-2022-24773 (Forge (also called `node-forge`) is a native implementation of Transpo ...)
 	- node-node-forge <unfixed>
+	[bullseye] - node-node-forge <no-dsa> (Minor issue)
+	[buster] - node-node-forge <no-dsa> (Minor issue)
 	NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr
 	NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)
 CVE-2022-24772 (Forge (also called `node-forge`) is a native implementation of Transpo ...)
 	- node-node-forge <unfixed>
+	[bullseye] - node-node-forge <no-dsa> (Minor issue)
+	[buster] - node-node-forge <no-dsa> (Minor issue)
 	NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g
 	NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)
 CVE-2022-24771 (Forge (also called `node-forge`) is a native implementation of Transpo ...)
 	- node-node-forge <unfixed>
+	[bullseye] - node-node-forge <no-dsa> (Minor issue)
+	[buster] - node-node-forge <no-dsa> (Minor issue)
 	NOTE: https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765
 	NOTE: https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1 (v1.3.0)
 CVE-2022-24770 (`gradio` is an open source framework for building interactive machine  ...)
@@ -7631,6 +7650,8 @@ CVE-2022-24767
 	RESERVED
 CVE-2022-24766 (mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mi ...)
 	- mitmproxy <unfixed>
+	[bullseye] - mitmproxy <no-dsa> (Minor issue)
+	[buster] - mitmproxy <no-dsa> (Minor issue)
 	NOTE: https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3
 	NOTE: https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b (v8.0.0)
 CVE-2022-24765
@@ -19956,24 +19977,28 @@ CVE-2021-45089 (Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Acc
 CVE-2021-45088 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before  ...)
 	{DSA-5042-1}
 	- epiphany-browser 41.2-1
+	[buster] - epiphany-browser <no-dsa> (Minor issue)
 	[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
 CVE-2021-45087 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before  ...)
 	{DSA-5042-1}
 	- epiphany-browser 41.2-1
+	[buster] - epiphany-browser <no-dsa> (Minor issue)
 	[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
 CVE-2021-45086 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before  ...)
 	{DSA-5042-1}
 	- epiphany-browser 41.2-1
+	[buster] - epiphany-browser <no-dsa> (Minor issue)
 	[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
 CVE-2021-45085 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before  ...)
 	{DSA-5042-1}
 	- epiphany-browser 41.2-1
+	[buster] - epiphany-browser <no-dsa> (Minor issue)
 	[stretch] - epiphany-browser <ignored> (WebKit browser, not covered by security support in stretch)
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
 	NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
@@ -99645,6 +99670,8 @@ CVE-2021-0077 (Insecure inherited permissions in the installer for the Intel(R)
 	NOT-FOR-US: Intel
 CVE-2021-0076 (Improper Validation of Specified Index, Position, or Offset in Input i ...)
 	- firmware-nonfree <unfixed>
+	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
 	TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree
 CVE-2021-0075 (Out-of-bounds write in firmware for some Intel(R) PROSet/Wireless WiFi ...)
@@ -99655,6 +99682,8 @@ CVE-2021-0073 (Insufficient control flow management in Intel(R) DSA before versi
 	NOT-FOR-US: Intel
 CVE-2021-0072 (Improper input validation in firmware for some Intel(R) PROSet/Wireles ...)
 	- firmware-nonfree <unfixed>
+	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
 	TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree
 CVE-2021-0071 (Improper input validation in firmware for some Intel(R) PROSet/Wireles ...)
@@ -99669,6 +99698,8 @@ CVE-2021-0067 (&nbsp;Improper access control in system firmware for some Int
 	NOT-FOR-US: Intel
 CVE-2021-0066 (Improper input validation in firmware for Intel(R) PROSet/Wireless Wi- ...)
 	- firmware-nonfree <unfixed>
+	[bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+	[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
 	TODO: check, research in kernel-team; unclear in which firmware version fixed for firmware-nonfree
 CVE-2021-0065 (Incorrect default permissions in the Intel(R) PROSet/Wireless WiFi sof ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6100af0249f9e57036c193482686bc45387b8b2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6100af0249f9e57036c193482686bc45387b8b2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220323/84e05696/attachment.htm>


More information about the debian-security-tracker-commits mailing list