Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2205981b by Moritz Muehlenhoff at 2022-03-14T12:04:15+01:00
buster/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -3409,7 +3409,7 @@ CVE-2022-0742 [ipv6: fix skb drops in igmp6_event_query() 
and igmp6_event_report
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)
        [stretch] - linux <not-affected> (Vulnerable code not present)
-       NOTE: 
https://git.kernel/org/linus/2d3916f3189172d5c69d33065c3c21119fe539fc (5.17-rc7)
+       NOTE: 
https://git.kernel.org/linus/2d3916f3189172d5c69d33065c3c21119fe539fc (5.17-rc7)
 CVE-2022-0741
        RESERVED
        [experimental] - gitlab 14.6.5+ds1-1
@@ -7713,23 +7713,27 @@ CVE-2022-0436
 CVE-2021-46669 (MariaDB through 10.5.9 allows attackers to trigger a 
convert_const_to_ ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25638
 CVE-2021-46668 (MariaDB through 10.5.9 allows an application crash via certain 
long SE ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25787
        NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46667 (MariaDB before 10.6.5 has a sql_lex.cc integer overflow, 
leading to an ...)
        - mariadb-10.6 1:10.6.5-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-26350
        NOTE: Fixed in MariaDB: 10.2.41, 10.3.32, 10.4.22, 10.5.13, 10.6.5
 CVE-2021-46666 (MariaDB before 10.6.2 allows an application crash because of 
mishandli ...)
        - mariadb-10.6 <not-affected> (Fixed before initial upload to Debian)
        - mariadb-10.5 1:10.5.11-1
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        [buster] - mariadb-10.3 1:10.3.31-0+deb10u1
        NOTE: https://jira.mariadb.org/browse/MDEV-25635
@@ -7737,24 +7741,28 @@ CVE-2021-46666 (MariaDB before 10.6.2 allows an 
application crash because of mis
 CVE-2021-46665 (MariaDB through 10.5.9 allows a sql_parse.cc application crash 
because ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25636
        NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46664 (MariaDB through 10.5.9 allows an application crash in 
sub_select_postj ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25761
        NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46663 (MariaDB through 10.5.13 allows a ha_maria::extra application 
crash via ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-26351
        NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
 CVE-2021-46662 (MariaDB through 10.5.9 allows a set_var.cc application crash 
via certa ...)
        - mariadb-10.6 1:10.6.5-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25637
        NOTE: https://jira.mariadb.org/browse/MDEV-22464
@@ -7762,6 +7770,7 @@ CVE-2021-46662 (MariaDB through 10.5.9 allows a 
set_var.cc application crash via
 CVE-2021-46661 (MariaDB through 10.5.9 allows an application crash in 
find_field_in_ta ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25766
        NOTE: Fixed in MariaDB: 10.7.3, 10.6.7, 10.5.15, 10.4.24, 10.3.34, 
10.2.43
@@ -8164,12 +8173,14 @@ CVE-2021-46660 (Signiant Manager+Agents before 15.1 
allows XML External Entity (
 CVE-2021-46659 (MariaDB before 10.7.2 allows an application crash because it 
does not  ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: https://jira.mariadb.org/browse/MDEV-25631
        NOTE: Fixed in MariaDB: 10.2.42, 10.3.33, 10.4.23, 10.5.14, 10.6.6, 
10.7.2
 CVE-2021-46658 (save_window_function_values in MariaDB before 10.6.3 allows an 
applica ...)
        - mariadb-10.6 <not-affected> (Fixed before initial upload to Debian)
        - mariadb-10.5 1:10.5.11-1
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        [buster] - mariadb-10.3 1:10.3.31-0+deb10u1
        NOTE: https://jira.mariadb.org/browse/MDEV-25630
@@ -8177,6 +8188,7 @@ CVE-2021-46658 (save_window_function_values in MariaDB 
before 10.6.3 allows an a
 CVE-2021-46657 (get_sort_by_table in MariaDB before 10.6.2 allows an 
application crash ...)
        - mariadb-10.6 <not-affected> (Fixed before initial upload to Debian)
        - mariadb-10.5 1:10.5.11-1
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        [buster] - mariadb-10.3 1:10.3.31-0+deb10u1
        NOTE: https://jira.mariadb.org/browse/MDEV-25629
@@ -8414,12 +8426,14 @@ CVE-2022-24053
 CVE-2022-24052 (MariaDB CONNECT Storage Engine Heap-based Buffer Overflow 
Privilege Es ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-366/
 CVE-2022-24051 (MariaDB CONNECT Storage Engine Format String Privilege 
Escalation Vuln ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-318/
@@ -8427,6 +8441,7 @@ CVE-2022-24051 (MariaDB CONNECT Storage Engine Format 
String Privilege Escalatio
 CVE-2022-24050 (MariaDB CONNECT Storage Engine Use-After-Free Privilege 
Escalation Vul ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-364/
@@ -8435,6 +8450,7 @@ CVE-2022-24049 (This vulnerability allows remote 
attackers to execute arbitrary
 CVE-2022-24048 (MariaDB CONNECT Storage Engine Stack-based Buffer Overflow 
Privilege E ...)
        - mariadb-10.6 1:10.6.7-1
        - mariadb-10.5 <removed>
+       [bullseye] - mariadb-10.5 <no-dsa> (Minor issue, will be fixed in next 
point release)
        - mariadb-10.3 <removed>
        NOTE: Fixed in MariaDB: 10.6.6, 10.5.14, 10.4.23, 10.3.33, 10.2.42
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-22-363/
@@ -9579,6 +9595,8 @@ CVE-2022-0340
 CVE-2021-4209
        RESERVED
        - gnutls28 3.7.3-2
+       [bullseye] - gnutls28 <no-dsa> (Minor issue)
+       [buster] - gnutls28 <no-dsa> (Minor issue)
        [stretch] - gnutls28 <postponed> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2044156
        NOTE: https://gitlab.com/gnutls/gnutls/-/issues/1306
@@ -53988,17 +54006,21 @@ CVE-2021-32437 (The gf_hinter_finalize function in 
GPAC 1.0.1 allows attackers t
        NOTE: 
https://github.com/gpac/gpac/commit/1653f31cf874eb6df964bea88d58d8e9b98b485e 
(v2.0.0)
        NOTE: https://github.com/gpac/gpac/issues/1770
 CVE-2021-32436 (An out-of-bounds read in the function write_title() in subs.c 
of abcm2 ...)
-       - abcm2ps 8.14.13-1
+       - abcm2ps 8.14.13-1 (unimportant)
        NOTE: 
https://github.com/lewdlime/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3
 (v8.14.12)
        NOTE: https://github.com/lewdlime/abcm2ps/issues/85
+       NOTE: Crash in CLI tool, no security impact
 CVE-2021-32435 (Stack-based buffer overflow in the function get_key in parse.c 
of abcm ...)
        - abcm2ps 8.14.13-1
+       [bullseye] - abcm2ps <no-dsa> (Minor issue)
+       [buster] - abcm2ps <no-dsa> (Minor issue)
        NOTE: 
https://github.com/lewdlime/abcm2ps/commit/3169ace6d63f6f517a64e8df0298f44a490c4a15
 (v8.14.12)
        NOTE: https://github.com/lewdlime/abcm2ps/issues/84
 CVE-2021-32434 (abcm2ps v8.14.11 was discovered to contain an out-of-bounds 
read in th ...)
-       - abcm2ps 8.14.13-1
+       - abcm2ps 8.14.13-1 (unimportant)
        NOTE: 
https://github.com/lewdlime/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3
 (v8.14.12)
        NOTE: https://github.com/lewdlime/abcm2ps/issues/83
+       NOTE: Crash in CLI tool, no security impact
 CVE-2021-32433
        RESERVED
 CVE-2021-32432
@@ -95151,6 +95173,8 @@ CVE-2021-0562 (In RasterIntraUpdate of motion_est.cpp, 
there is a possible out o
        NOT-FOR-US: Android media framework
 CVE-2021-0561 (In append_to_verify_fifo_interleaved_ of stream_encoder.c, 
there is a  ...)
        - flac 1.3.4-1 (bug #1006339)
+       [bullseye] - flac <no-dsa> (Minor issue)
+       [buster] - flac <no-dsa> (Minor issue)
        NOTE: 
https://github.com/xiph/flac/commit/e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be 
(1.3.4)
        NOTE: https://xiph.org/flac/changelog.html#flac_1.3.4
        NOTE: 
https://android.googlesource.com/platform/external/flac/+/368eb3f5bec249a197c95a95583ff8153aa6a87f
@@ -100772,12 +100796,16 @@ CVE-2020-26561 (** UNSUPPORTED WHEN ASSIGNED ** 
Belkin LINKSYS WRT160NL 1.0.04.0
        NOT-FOR-US: Belkin
 CVE-2020-26560 (Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 
and 1.0. ...)
        - bluez <unfixed> (bug #1006406)
+       [bullseye] - bluez <no-dsa> (Minor issue)
+       [buster] - bluez <no-dsa> (Minor issue)
        [stretch] - bluez <not-affected> (Mesh support introduced later)
        NOTE: https://kb.cert.org/vuls/id/799380
        NOTE: 
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-mesh/
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1959994
 CVE-2020-26559 (Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 
and 1.0. ...)
        - bluez <unfixed> (bug #1006406)
+       [bullseye] - bluez <no-dsa> (Minor issue)
+       [buster] - bluez <no-dsa> (Minor issue)
        [stretch] - bluez <not-affected> (Mesh support introduced later)
        NOTE: https://kb.cert.org/vuls/id/799380
        NOTE: 
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/authvalue-leak/
@@ -100795,12 +100823,16 @@ CVE-2020-26558 (Bluetooth LE and BR/EDR secure 
pairing in Bluetooth Core Specifi
        NOTE: 
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
 CVE-2020-26557 (Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 
may perm ...)
        - bluez <unfixed> (bug #1006406)
+       [bullseye] - bluez <no-dsa> (Minor issue)
+       [buster] - bluez <no-dsa> (Minor issue)
        [stretch] - bluez <not-affected> (Mesh support introduced later)
        NOTE: https://kb.cert.org/vuls/id/799380
        NOTE: 
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/predicatable-authvalue/
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1960009
 CVE-2020-26556 (Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 
may perm ...)
        - bluez <unfixed>
+       [bullseye] - bluez <no-dsa> (Minor issue)
+       [buster] - bluez <no-dsa> (Minor issue)
        [stretch] - bluez <not-affected> (Mesh support introduced later)
        NOTE: https://kb.cert.org/vuls/id/799380
        NOTE: 
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/malleable/


=====================================
data/dsa-needed.txt
=====================================
@@ -37,7 +37,9 @@ rpki-client/stable
 --
 runc
 --
-thundebird (jmm)
+thunderbird (jmm)
+--
+tiff (jmm)
 --
 trafficserver (jmm)
   wait until status for CVE-2021-38161 is clarified (upstream patch got 
reverted)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2205981bfe41f7e65718594d72a080f4fbeab6f3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2205981bfe41f7e65718594d72a080f4fbeab6f3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to