[Git][security-tracker-team/security-tracker][master] "new" chromium issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Aug 1 15:22:42 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9dc4f83c by Moritz Mühlenhoff at 2023-08-01T16:22:10+02:00
"new" chromium issues

- - - - -


2 changed files:

- data/CVE/list
- data/DSA/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -26783,21 +26783,44 @@ CVE-2022-48322 (NETGEAR Nighthawk WiFi Mesh systems and routers are affected by
 CVE-2021-4324 (Insufficient policy enforcement in Google Update in Google Chrome prio ...)
 	- chromium <not-affected> (Not applicable to Debian builds)
 CVE-2021-4323 (Insufficient validation of untrusted input in Extensions in Google Chr ...)
-	TODO: check
+	{DSA-4906-1}
+	- chromium 90.0.4430.72-1 (bug #987053)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4322 (Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allo ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4321 (Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed  ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4320 (Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowe ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4319 (Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4318 (Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allo ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4317 (Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2021-4316 (Inappropriate implementation in Cast UI in Google Chrome prior to 96.0 ...)
-	TODO: check
+	{DSA-5046-1}
+	- chromium 97.0.4692.71-0.1
+	[buster] - chromium <end-of-life> (see DSA 5046)
+	[stretch] - chromium <end-of-life> (see DSA 4562)
 CVE-2015-10079 (A vulnerability was found in juju2143 WalrusIRC 0.0.2. It has been rat ...)
 	NOT-FOR-US: juju2143 WalrusIRC
 CVE-2023-25690 (Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 thr ...)


=====================================
data/DSA/list
=====================================
@@ -1376,7 +1376,7 @@
 	[buster] - prosody 0.11.2-1+deb10u3
 	[bullseye] - prosody 0.11.9-2+deb11u1
 [14 Jan 2022] DSA-5046-1 chromium - security update
-	{CVE-2021-4052 CVE-2021-4053 CVE-2021-4054 CVE-2021-4055 CVE-2021-4056 CVE-2021-4057 CVE-2021-4058 CVE-2021-4059 CVE-2021-4061 CVE-2021-4062 CVE-2021-4063 CVE-2021-4064 CVE-2021-4065 CVE-2021-4066 CVE-2021-4067 CVE-2021-4068 CVE-2021-4078 CVE-2021-4079 CVE-2021-4098 CVE-2021-4099 CVE-2021-4100 CVE-2021-4101 CVE-2021-4102 CVE-2021-37956 CVE-2021-37957 CVE-2021-37958 CVE-2021-37959 CVE-2021-37961 CVE-2021-37962 CVE-2021-37963 CVE-2021-37964 CVE-2021-37965 CVE-2021-37966 CVE-2021-37967 CVE-2021-37968 CVE-2021-37969 CVE-2021-37970 CVE-2021-37971 CVE-2021-37972 CVE-2021-37973 CVE-2021-37974 CVE-2021-37975 CVE-2021-37976 CVE-2021-37977 CVE-2021-37978 CVE-2021-37979 CVE-2021-37980 CVE-2021-37981 CVE-2021-37982 CVE-2021-37983 CVE-2021-37984 CVE-2021-37985 CVE-2021-37986 CVE-2021-37987 CVE-2021-37988 CVE-2021-37989 CVE-2021-37990 CVE-2021-37991 CVE-2021-37992 CVE-2021-37993 CVE-2021-37994 CVE-2021-37995 CVE-2021-37996 CVE-2021-37997 CVE-2021-37998 CVE-2021-37999 CVE-2021-38000 CVE-2021-38001 CVE-2021-38002 CVE-2021-38003 CVE-2021-38004 CVE-2021-38005 CVE-2021-38006 CVE-2021-38007 CVE-2021-38008 CVE-2021-38009 CVE-2021-38010 CVE-2021-38011 CVE-2021-38012 CVE-2021-38013 CVE-2021-38014 CVE-2021-38015 CVE-2021-38016 CVE-2021-38017 CVE-2021-38018 CVE-2021-38019 CVE-2021-38020 CVE-2021-38021 CVE-2021-38022 CVE-2022-0096 CVE-2022-0097 CVE-2022-0098 CVE-2022-0099 CVE-2022-0100 CVE-2022-0101 CVE-2022-0102 CVE-2022-0103 CVE-2022-0104 CVE-2022-0105 CVE-2022-0106 CVE-2022-0107 CVE-2022-0108 CVE-2022-0109 CVE-2022-0110 CVE-2022-0111 CVE-2022-0112 CVE-2022-0113 CVE-2022-0114 CVE-2022-0115 CVE-2022-0116 CVE-2022-0117 CVE-2022-0118 CVE-2022-0120 CVE-2021-30558 CVE-2022-4924 CVE-2022-4925}
+	{CVE-2021-4052 CVE-2021-4053 CVE-2021-4054 CVE-2021-4055 CVE-2021-4056 CVE-2021-4057 CVE-2021-4058 CVE-2021-4059 CVE-2021-4061 CVE-2021-4062 CVE-2021-4063 CVE-2021-4064 CVE-2021-4065 CVE-2021-4066 CVE-2021-4067 CVE-2021-4068 CVE-2021-4078 CVE-2021-4079 CVE-2021-4098 CVE-2021-4099 CVE-2021-4100 CVE-2021-4101 CVE-2021-4102 CVE-2021-37956 CVE-2021-37957 CVE-2021-37958 CVE-2021-37959 CVE-2021-37961 CVE-2021-37962 CVE-2021-37963 CVE-2021-37964 CVE-2021-37965 CVE-2021-37966 CVE-2021-37967 CVE-2021-37968 CVE-2021-37969 CVE-2021-37970 CVE-2021-37971 CVE-2021-37972 CVE-2021-37973 CVE-2021-37974 CVE-2021-37975 CVE-2021-37976 CVE-2021-37977 CVE-2021-37978 CVE-2021-37979 CVE-2021-37980 CVE-2021-37981 CVE-2021-37982 CVE-2021-37983 CVE-2021-37984 CVE-2021-37985 CVE-2021-37986 CVE-2021-37987 CVE-2021-37988 CVE-2021-37989 CVE-2021-37990 CVE-2021-37991 CVE-2021-37992 CVE-2021-37993 CVE-2021-37994 CVE-2021-37995 CVE-2021-37996 CVE-2021-37997 CVE-2021-37998 CVE-2021-37999 CVE-2021-38000 CVE-2021-38001 CVE-2021-38002 CVE-2021-38003 CVE-2021-38004 CVE-2021-38005 CVE-2021-38006 CVE-2021-38007 CVE-2021-38008 CVE-2021-38009 CVE-2021-38010 CVE-2021-38011 CVE-2021-38012 CVE-2021-38013 CVE-2021-38014 CVE-2021-38015 CVE-2021-38016 CVE-2021-38017 CVE-2021-38018 CVE-2021-38019 CVE-2021-38020 CVE-2021-38021 CVE-2021-38022 CVE-2022-0096 CVE-2022-0097 CVE-2022-0098 CVE-2022-0099 CVE-2022-0100 CVE-2022-0101 CVE-2022-0102 CVE-2022-0103 CVE-2022-0104 CVE-2022-0105 CVE-2022-0106 CVE-2022-0107 CVE-2022-0108 CVE-2022-0109 CVE-2022-0110 CVE-2022-0111 CVE-2022-0112 CVE-2022-0113 CVE-2022-0114 CVE-2022-0115 CVE-2022-0116 CVE-2022-0117 CVE-2022-0118 CVE-2022-0120 CVE-2021-30558 CVE-2022-4924 CVE-2022-4925 CVE-2021-4322 CVE-2021-4321 CVE-2021-4320 CVE-2021-4319 CVE-2021-4318 CVE-2021-4317 CVE-2021-4316}
 	[bullseye] - chromium 97.0.4692.71-0.1~deb11u1
 [14 Jan 2022] DSA-5045-1 thunderbird - security update
 	{CVE-2021-4140 CVE-2022-22737 CVE-2022-22738 CVE-2022-22739 CVE-2022-22740 CVE-2022-22741 CVE-2022-22742 CVE-2022-22743 CVE-2022-22745 CVE-2022-22747 CVE-2022-22748 CVE-2022-22751}
@@ -1850,7 +1850,7 @@
 	{CVE-2021-29472}
 	[buster] - composer 1.8.4-1+deb10u1
 [27 Apr 2021] DSA-4906-1 chromium - security update
-	{CVE-2021-21201 CVE-2021-21202 CVE-2021-21203 CVE-2021-21204 CVE-2021-21205 CVE-2021-21207 CVE-2021-21208 CVE-2021-21209 CVE-2021-21210 CVE-2021-21211 CVE-2021-21212 CVE-2021-21213 CVE-2021-21214 CVE-2021-21215 CVE-2021-21216 CVE-2021-21217 CVE-2021-21218 CVE-2021-21219 CVE-2021-21221 CVE-2021-21222 CVE-2021-21223 CVE-2021-21224 CVE-2021-21225 CVE-2021-21226}
+	{CVE-2021-21201 CVE-2021-21202 CVE-2021-21203 CVE-2021-21204 CVE-2021-21205 CVE-2021-21207 CVE-2021-21208 CVE-2021-21209 CVE-2021-21210 CVE-2021-21211 CVE-2021-21212 CVE-2021-21213 CVE-2021-21214 CVE-2021-21215 CVE-2021-21216 CVE-2021-21217 CVE-2021-21218 CVE-2021-21219 CVE-2021-21221 CVE-2021-21222 CVE-2021-21223 CVE-2021-21224 CVE-2021-21225 CVE-2021-21226 CVE-2021-4323}
 	[buster] - chromium 90.0.4430.85-1~deb10u1
 [27 Apr 2021] DSA-4905-1 shibboleth-sp - security update
 	{CVE-2021-31826}



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9dc4f83c72b83256c6eece22daf5ca66947748bd

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9dc4f83c72b83256c6eece22daf5ca66947748bd
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230801/91c18c0d/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list