Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
05391524 by Moritz Muehlenhoff at 2021-07-05T18:31:54+02:00
buster triage

- - - - -


3 changed files:

- data/CVE/list
- data/DSA/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -157,21 +157,25 @@ CVE-2021-36088 (Fluent Bit (aka fluent-bit) 1.7.0 through 
1.7,4 has a double fre
        NOT-FOR-US: Fluent Bit
 CVE-2021-36087 (The CIL compiler in SELinux 3.2 has a heap-based buffer 
over-read in e ...)
        - libsepol <unfixed> (bug #990526)
+       [buster] - libsepol <no-dsa> (Minor issue)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
        NOTE: 
https://github.com/SELinuxProject/selinux/commit/bad0a746e9f4cf260dedba5828d9645d50176aac
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
 CVE-2021-36086 (The CIL compiler in SELinux 3.2 has a use-after-free in 
cil_reset_clas ...)
        - libsepol <unfixed> (bug #990526)
+       [buster] - libsepol <no-dsa> (Minor issue)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
        NOTE: 
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
 CVE-2021-36085 (The CIL compiler in SELinux 3.2 has a use-after-free in 
__cil_verify_c ...)
        - libsepol <unfixed> (bug #990526)
+       [buster] - libsepol <no-dsa> (Minor issue)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
        NOTE: 
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
 CVE-2021-36084 (The CIL compiler in SELinux 3.2 has a use-after-free in 
__cil_verify_c ...)
        - libsepol <unfixed> (bug #990526)
+       [buster] - libsepol <no-dsa> (Minor issue)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
        NOTE: 
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
@@ -211,6 +215,7 @@ CVE-2020-36404 (Keystone Engine 0.9.2 has an invalid free 
in llvm_ks::SmallVecto
        NOT-FOR-US: keystone engine
 CVE-2020-36403 (HTSlib 1.10 through 1.10.2 allows out-of-bounds write access 
in vcf_pa ...)
        - htslib 1.11-1
+       [buster] - htslib <no-dsa> (Minor issue)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24097
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/htslib/OSV-2020-955.yaml
        NOTE: 
https://github.com/samtools/htslib/commit/dcd4b7304941a8832fba2d0fc4c1e716e7a4e72c
@@ -243,6 +248,7 @@ CVE-2019-25048 (LibreSSL 2.9.1 through 3.2.1 has a 
heap-based buffer over-read i
        - libressl <itp> (bug #754513)
 CVE-2018-25018 (UnRAR 5.6.1.7 through 5.7.4 and 6.0.3 has an out-of-bounds 
write durin ...)
        - unrar-nonfree <unfixed> (bug #990541)
+       [buster] - unrar-nonfree <no-dsa> (Non-free not supported)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9845
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unrar/OSV-2018-204.yaml
 CVE-2018-25017 (RawSpeed (aka librawspeed) 3.1 has a heap-based buffer 
overflow in Tab ...)
@@ -1413,6 +1419,8 @@ CVE-2021-35526
 CVE-2021-3624 [buffer-overflow caused by integer-overflow in 
foveon_load_camf()]
        RESERVED
        - dcraw <unfixed> (bug #984761)
+       [bullseye] - dcraw <no-dsa> (Minor issue)
+       [buster] - dcraw <no-dsa> (Minor issue)
 CVE-2021-3623 [out-of-bounds access when trying to resume the state of the 
vTPM]
        RESERVED
        - libtpms <unfixed> (bug #990522)
@@ -2905,11 +2913,13 @@ CVE-2021-34827
 CVE-2021-3608 [pvrdma: uninitialized memory unmap in pvrdma_ring_init()]
        RESERVED
        - qemu <unfixed> (bug #990563)
+       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1973383
 CVE-2021-3607 [pvrdma: unchecked malloc size due to integer overflow in 
init_dev_ring()]
        RESERVED
        - qemu <unfixed> (bug #990564)
+       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1973349
 CVE-2021-3606 (OpenVPN before version 2.5.3 on Windows allows local users to 
load arb ...)
@@ -2918,6 +2928,7 @@ CVE-2021-34826
        RESERVED
 CVE-2021-34825 (Quassel through 0.13.1, when --require-ssl is enabled, 
launches withou ...)
        - quassel <unfixed> (bug #990567)
+       [buster] - quassel <no-dsa> (Minor issue)
        NOTE: https://github.com/quassel/quassel/pull/581
        NOTE: https://bugs.quassel-irc.org/issues/1728
        NOTE: '--require-ssl' flag added in 
https://github.com/quassel/quassel/pull/43
@@ -4944,6 +4955,7 @@ CVE-2021-3587 [nfc: fix NULL ptr dereference in 
llcp_sock_getname() after failed
 CVE-2021-3582 [hw/rdma: Fix possible mremap overflow in the pvrdma device]
        RESERVED
        - qemu <unfixed> (bug #990565)
+       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-06/msg04148.html
 CVE-2021-33907
@@ -5249,6 +5261,7 @@ CVE-2021-33792
 CVE-2021-3572 [Don't split git references on unicode separators #9827]
        RESERVED
        - python-pip 20.3.4-2
+       [buster] - python-pip <no-dsa> (Minor issue)
        [stretch] - python-pip <postponed> (Minor issue. Fix along with next 
DLA)
        NOTE: https://bugs.launchpad.net/ubuntu/+source/python-pip/+bug/1926957
        NOTE: https://github.com/pypa/pip/pull/9827
@@ -6583,6 +6596,7 @@ CVE-2021-3556
        REJECTED
 CVE-2021-33204 (In the pg_partman (aka PG Partition Manager) extension before 
4.5.1 fo ...)
        - pg-partman 4.5.1-1 (bug #988917)
+       [buster] - pg-partman <no-dsa> (Minor issue)
        [stretch] - pg-partman <no-dsa> (Minor issue)
        NOTE: 
https://github.com/pgpartman/pg_partman/commit/0b6565ad378c358f8a6cd1d48ddc482eb7f854d3
 CVE-2021-33203 (Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 
3.2.4 has a  ...)
@@ -6605,45 +6619,52 @@ CVE-2021-33199
        RESERVED
 CVE-2021-33198
        RESERVED
-       - golang-1.16 1.16.5-1
-       - golang-1.15 1.15.9-5
-       - golang-1.11 <removed>
-       - golang-1.8 <removed>
+       - golang-1.16 1.16.5-1 (unimportant)
+       - golang-1.15 1.15.9-5 (unimportant)
+       - golang-1.11 <removed> (unimportant)
+       - golang-1.8 <removed> (unimportant)
        [stretch] - golang-1.8 <no-dsa> (Limited support in stretch)
-       - golang-1.7 <removed>
+       - golang-1.7 <removed> (unimportant)
        NOTE: https://github.com/golang/go/issues/44910
        NOTE: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
+       NOTE: This appears to only update the documentation/example
 CVE-2021-33197
        RESERVED
        - golang-1.16 1.16.5-1
        - golang-1.15 1.15.9-5
        - golang-1.11 <removed>
+       [buster] - golang-1.11 <no-dsa> (Minor issue)
        - golang-1.8 <removed>
        [stretch] - golang-1.8 <no-dsa> (Limited support in stretch)
        - golang-1.7 <removed>
        NOTE: https://github.com/golang/go/issues/46313
        NOTE: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
+       NOTE: 
https://github.com/golang/go/commit/cbd1ca84453fecf3825a6bb9f985823e8bc32b76 
(1.15)
 CVE-2021-33196 [archive/zip: malformed archive may cause panic or memory 
exhaustion]
        RESERVED
        - golang-1.16 1.16.5-1 (bug #989492)
        - golang-1.15 1.15.9-4
        - golang-1.11 <removed>
+       [buster] - golang-1.11 <no-dsa> (Minor issue)
        - golang-1.8 <removed>
        [stretch] - golang-1.8 <no-dsa> (Limited support in stretch)
        - golang-1.7 <removed>
        NOTE: https://github.com/golang/go/issues/46242
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33912
        NOTE: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
+       NOTE: 
https://github.com/golang/go/commit/c92adf420a3d9a5510f9aea382d826f0c9216a10 
(1.15)
 CVE-2021-33195
        RESERVED
        - golang-1.16 1.16.5-1
        - golang-1.15 1.15.9-5
        - golang-1.11 <removed>
+       [buster] - golang-1.11 <no-dsa> (Minor issue)
        - golang-1.8 <removed>
        [stretch] - golang-1.8 <no-dsa> (Limited support in stretch)
        - golang-1.7 <removed>
        NOTE: https://github.com/golang/go/issues/46241
        NOTE: https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI
+       NOTE: 
https://github.com/golang/go/commit/31d60cda1f58b7558fc5725d2b9e4531655d980e 
(1.15)
 CVE-2021-33194 (golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 
allows atta ...)
        - golang-golang-x-net 1:0.0+git20210119.5f4716e+dfsg-4
        - golang-golang-x-net-dev <removed>
@@ -58162,6 +58183,7 @@ CVE-2020-24588 (The 802.11 standard that underpins 
Wi-Fi Protected Access (WPA,
        - linux 5.10.46-1
        [buster] - linux 4.19.194-1
        - firmware-nonfree <unfixed>
+       [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
        NOTE: https://www.fragattacks.com/
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -58178,6 +58200,7 @@ CVE-2020-24587 (The 802.11 standard that underpins 
Wi-Fi Protected Access (WPA,
        - linux 5.10.46-1
        [buster] - linux 4.19.194-1
        - firmware-nonfree <unfixed>
+       [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
        NOTE: https://www.fragattacks.com/
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -58191,6 +58214,7 @@ CVE-2020-24586 (The 802.11 standard that underpins 
Wi-Fi Protected Access (WPA,
        - linux 5.10.46-1
        [buster] - linux 4.19.194-1
        - firmware-nonfree <unfixed>
+       [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: https://papers.mathyvanhoef.com/usenix2021.pdf
        NOTE: https://www.fragattacks.com/
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
@@ -77512,6 +77536,7 @@ CVE-2020-15523 (In Python 3.6 through 3.6.10, 3.7 
through 3.7.8, 3.8 through 3.8
        - python2.7 <not-affected> (Python on Windows)
 CVE-2020-15522 (Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, 
BC-FJA bef ...)
        - bouncycastle 1.68-1
+       [buster] - bouncycastle <no-dsa> (Minor issue)
        [stretch] - bouncycastle <no-dsa> (Minor issue)
        NOTE: https://github.com/bcgit/bc-java/wiki/CVE-2020-15522
 CVE-2020-15521 (Zoho ManageEngine Applications Manager before 14 build 14730 
has no pr ...)


=====================================
data/DSA/list
=====================================
@@ -11,7 +11,7 @@
        {CVE-2021-0089 CVE-2021-26313 CVE-2021-28690 CVE-2021-28692}
        [buster] - xen 4.11.4+107-gef32c7afa2-1
 [10 Jun 2021] DSA-4930-1 libwebp - security update
-       {CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25013 
CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 CVE-2020-36331 
CVE-2020-36332}
+       {CVE-2018-25009 CVE-2018-25010 CVE-2018-25011 CVE-2018-25012 
CVE-2018-25013 CVE-2018-25014 CVE-2020-36328 CVE-2020-36329 CVE-2020-36330 
CVE-2020-36331 CVE-2020-36332 }
        [buster] - libwebp 0.6.1-2+deb10u1
 [09 Jun 2021] DSA-4929-1 rails - security update
        {CVE-2021-22880 CVE-2021-22885 CVE-2021-22904}


=====================================
data/dsa-needed.txt
=====================================
@@ -12,7 +12,7 @@ To pick an issue, simply add your uid behind it.
 If needed, specify the release by adding a slash after the name of the source 
package.
 
 --
-apache2
+apache2 (jmm)
   Maintainer (yadd) is working on updates
 --
 condor
@@ -21,7 +21,9 @@ chromium
 --
 djvulibre
 --
-libuv1
+icu
+--
+libuv1 (jmm)
   jmm asked maintainers to prepare update, pending
 --
 linux (carnil)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0539152487f369f60aa45ddc9601aa7ce88b5d86

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0539152487f369f60aa45ddc9601aa7ce88b5d86
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to