Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e6100af0 by Moritz Muehlenhoff at 2022-03-23T14:58:16+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -943,6 +943,7 @@ CVE-2022-1020
 CVE-2022-27240 (scheme/webauthn.c in Glewlwyd SSO server 2.x before 2.6.2 has 
a buffer ...)
        - glewlwyd 2.6.1-2
        [bullseye] - glewlwyd <no-dsa> (Minor issue)
+       [buster] - glewlwyd <no-dsa> (Minor issue)
        NOTE: 
https://github.com/babelouest/glewlwyd/commit/4c5597c155bfbaf6491cf6b83479d241ae66940a
 (v2.6.2)
 CVE-2022-27239
        RESERVED
@@ -4084,18 +4085,28 @@ CVE-2020-36516 (An issue was discovered in the Linux 
kernel through 5.16.11. The
        NOTE: https://dl.acm.org/doi/10.1145/3372297.3417884
 CVE-2022-26129 (Buffer overflow vulnerabilities exist in FRRouting through 
8.1.0 due t ...)
        - frr <unfixed> (bug #1008010)
+       [bullseye] - frr <no-dsa> (Minor issue)
+       [buster] - frr <no-dsa> (Minor issue)
        NOTE: https://github.com/FRRouting/frr/issues/10503
 CVE-2022-26128 (A buffer overflow vulnerability exists in FRRouting through 
8.1.0 due  ...)
        - frr <unfixed> (bug #1008010)
+       [bullseye] - frr <no-dsa> (Minor issue)
+       [buster] - frr <no-dsa> (Minor issue)
        NOTE: https://github.com/FRRouting/frr/issues/10502
 CVE-2022-26127 (A buffer overflow vulnerability exists in FRRouting through 
8.1.0 due  ...)
        - frr <unfixed> (bug #1008010)
+       [bullseye] - frr <no-dsa> (Minor issue)
+       [buster] - frr <no-dsa> (Minor issue)
        NOTE: https://github.com/FRRouting/frr/issues/10487
 CVE-2022-26126 (Buffer overflow vulnerabilities exist in FRRouting through 
8.1.0 due t ...)
        - frr <unfixed> (bug #1008010)
+       [bullseye] - frr <no-dsa> (Minor issue)
+       [buster] - frr <no-dsa> (Minor issue)
        NOTE: https://github.com/FRRouting/frr/issues/10505
 CVE-2022-26125 (Buffer overflow vulnerabilities exist in FRRouting through 
8.1.0 due t ...)
        - frr <unfixed> (bug #1008010)
+       [bullseye] - frr <no-dsa> (Minor issue)
+       [buster] - frr <no-dsa> (Minor issue)
        NOTE: https://github.com/FRRouting/frr/issues/10507
 CVE-2022-26122
        RESERVED
@@ -6505,8 +6516,10 @@ CVE-2021-4220
 CVE-2021-4219
        RESERVED
        - imagemagick <unfixed>
+       [bullseye] - imagemagick <no-dsa> (Minor issue)
+       [buster] - imagemagick <no-dsa> (Minor issue)
        NOTE: https://github.com/ImageMagick/ImageMagick/issues/4626
-       TODO: check details
+       NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/c10351c16b8d2cabd11d2627a02de522570f6ceb
 CVE-2022-25212 (A cross-site request forgery (CSRF) vulnerability in Jenkins 
SWAMP Plu ...)
        NOT-FOR-US: Jenkins plugin
 CVE-2022-25211 (A missing permission check in Jenkins SWAMP Plugin 1.2.6 and 
earlier a ...)
@@ -7611,14 +7624,20 @@ CVE-2022-24774 (CycloneDX BOM Repository Server is a 
bill of materials (BOM) rep
        TODO: check
 CVE-2022-24773 (Forge (also called `node-forge`) is a native implementation of 
Transpo ...)
        - node-node-forge <unfixed>
+       [bullseye] - node-node-forge <no-dsa> (Minor issue)
+       [buster] - node-node-forge <no-dsa> (Minor issue)
        NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr
        NOTE: 
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1
 (v1.3.0)
 CVE-2022-24772 (Forge (also called `node-forge`) is a native implementation of 
Transpo ...)
        - node-node-forge <unfixed>
+       [bullseye] - node-node-forge <no-dsa> (Minor issue)
+       [buster] - node-node-forge <no-dsa> (Minor issue)
        NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g
        NOTE: 
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1
 (v1.3.0)
 CVE-2022-24771 (Forge (also called `node-forge`) is a native implementation of 
Transpo ...)
        - node-node-forge <unfixed>
+       [bullseye] - node-node-forge <no-dsa> (Minor issue)
+       [buster] - node-node-forge <no-dsa> (Minor issue)
        NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765
        NOTE: 
https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1
 (v1.3.0)
 CVE-2022-24770 (`gradio` is an open source framework for building interactive 
machine  ...)
@@ -7631,6 +7650,8 @@ CVE-2022-24767
        RESERVED
 CVE-2022-24766 (mitmproxy is an interactive, SSL/TLS-capable intercepting 
proxy. In mi ...)
        - mitmproxy <unfixed>
+       [bullseye] - mitmproxy <no-dsa> (Minor issue)
+       [buster] - mitmproxy <no-dsa> (Minor issue)
        NOTE: 
https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3
        NOTE: 
https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b
 (v8.0.0)
 CVE-2022-24765
@@ -19956,24 +19977,28 @@ CVE-2021-45089 (Stormshield Endpoint Security 2.x 
before 2.1.2 has Incorrect Acc
 CVE-2021-45088 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x 
before  ...)
        {DSA-5042-1}
        - epiphany-browser 41.2-1
+       [buster] - epiphany-browser <no-dsa> (Minor issue)
        [stretch] - epiphany-browser <ignored> (WebKit browser, not covered by 
security support in stretch)
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
 CVE-2021-45087 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x 
before  ...)
        {DSA-5042-1}
        - epiphany-browser 41.2-1
+       [buster] - epiphany-browser <no-dsa> (Minor issue)
        [stretch] - epiphany-browser <ignored> (WebKit browser, not covered by 
security support in stretch)
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
 CVE-2021-45086 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x 
before  ...)
        {DSA-5042-1}
        - epiphany-browser 41.2-1
+       [buster] - epiphany-browser <no-dsa> (Minor issue)
        [stretch] - epiphany-browser <ignored> (WebKit browser, not covered by 
security support in stretch)
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
 CVE-2021-45085 (XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x 
before  ...)
        {DSA-5042-1}
        - epiphany-browser 41.2-1
+       [buster] - epiphany-browser <no-dsa> (Minor issue)
        [stretch] - epiphany-browser <ignored> (WebKit browser, not covered by 
security support in stretch)
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
        NOTE: https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
@@ -99645,6 +99670,8 @@ CVE-2021-0077 (Insecure inherited permissions in the 
installer for the Intel(R)
        NOT-FOR-US: Intel
 CVE-2021-0076 (Improper Validation of Specified Index, Position, or Offset in 
Input i ...)
        - firmware-nonfree <unfixed>
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
        TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0075 (Out-of-bounds write in firmware for some Intel(R) 
PROSet/Wireless WiFi ...)
@@ -99655,6 +99682,8 @@ CVE-2021-0073 (Insufficient control flow management in 
Intel(R) DSA before versi
        NOT-FOR-US: Intel
 CVE-2021-0072 (Improper input validation in firmware for some Intel(R) 
PROSet/Wireles ...)
        - firmware-nonfree <unfixed>
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
        TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0071 (Improper input validation in firmware for some Intel(R) 
PROSet/Wireles ...)
@@ -99669,6 +99698,8 @@ CVE-2021-0067 (&amp;nbsp;Improper access control in 
system firmware for some Int
        NOT-FOR-US: Intel
 CVE-2021-0066 (Improper input validation in firmware for Intel(R) 
PROSet/Wireless Wi- ...)
        - firmware-nonfree <unfixed>
+       [bullseye] - firmware-nonfree <no-dsa> (Non-free not supported)
+       [buster] - firmware-nonfree <no-dsa> (Non-free not supported)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00539.html
        TODO: check, research in kernel-team; unclear in which firmware version 
fixed for firmware-nonfree
 CVE-2021-0065 (Incorrect default permissions in the Intel(R) PROSet/Wireless 
WiFi sof ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6100af0249f9e57036c193482686bc45387b8b2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6100af0249f9e57036c193482686bc45387b8b2
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to