Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8017c166 by security tracker role at 2021-12-19T20:10:16+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1427,6 +1427,7 @@ CVE-2021-4077
        RESERVED
 CVE-2021-4076 [keys: move signing part out of find_by_thp() and to find_jws()]
        RESERVED
+       {DSA-5025-1}
        - tang 11-1
        [buster] - tang <not-affected> (Vulnerable code introduced later)
        NOTE: https://github.com/latchset/tang/pull/81
@@ -5478,6 +5479,7 @@ CVE-2021-43548
 CVE-2021-43547
        RESERVED
 CVE-2021-43546 (It was possible to recreate previous cursor spoofing attacks 
against u ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5485,6 +5487,7 @@ CVE-2021-43546 (It was possible to recreate previous 
cursor spoofing attacks aga
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43546
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43546
 CVE-2021-43545 (Using the Location API in a loop could have caused severe 
application  ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5495,6 +5498,7 @@ CVE-2021-43544 (When receiving a URL through a SEND 
intent, Firefox would have s
        - firefox <not-affected> (Only affects Android)
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-52/#CVE-2021-43544
 CVE-2021-43543 (Documents loaded with the CSP sandbox directive could have 
escaped the ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5502,6 +5506,7 @@ CVE-2021-43543 (Documents loaded with the CSP sandbox 
directive could have escap
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43543
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43543
 CVE-2021-43542 (Using XMLHttpRequest, an attacker could have identified 
installed appl ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5509,6 +5514,7 @@ CVE-2021-43542 (Using XMLHttpRequest, an attacker could 
have identified installe
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43542
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43542
 CVE-2021-43541 (When invoking protocol handlers for external protocols, a 
supplied par ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5519,6 +5525,7 @@ CVE-2021-43540 (WebExtensions with the correct 
permissions were able to create a
        - firefox 95.0-1
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-52/#CVE-2021-43540
 CVE-2021-43539 (Failure to correctly record the location of live pointers 
across wasm  ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5526,6 +5533,7 @@ CVE-2021-43539 (Failure to correctly record the location 
of live pointers across
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43539
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43539
 CVE-2021-43538 (By misusing a race in our notification code, an attacker could 
have fo ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5533,6 +5541,7 @@ CVE-2021-43538 (By misusing a race in our notification 
code, an attacker could h
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43538
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43538
 CVE-2021-43537 (An incorrect type conversion of sizes from 64bit to 32bit 
integers all ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5540,6 +5549,7 @@ CVE-2021-43537 (An incorrect type conversion of sizes 
from 64bit to 32bit intege
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43537
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43537
 CVE-2021-43536 (Under certain circumstances, asynchronous functions could have 
caused  ...)
+       {DSA-5026-1}
        - firefox 95.0-1
        - firefox-esr 91.4.0esr-1
        - thunderbird 1:91.4.0-1
@@ -5547,6 +5557,7 @@ CVE-2021-43536 (Under certain circumstances, asynchronous 
functions could have c
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-53/#CVE-2021-43536
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-54/#CVE-2021-43536
 CVE-2021-43535 (A use-after-free could have occured when an HTTP2 session 
object was r ...)
+       {DSA-5026-1}
        - firefox 93.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -5554,6 +5565,7 @@ CVE-2021-43535 (A use-after-free could have occured when 
an HTTP2 session object
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-43535
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-43535
 CVE-2021-43534 (Mozilla developers and community members reported memory 
safety bugs p ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -19856,6 +19868,7 @@ CVE-2021-38510 (The executable file warning was not 
presented when downloading .
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-38510
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-38510
 CVE-2021-38509 (Due to an unusual sequence of attacker-controlled events, a 
Javascript ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -19863,6 +19876,7 @@ CVE-2021-38509 (Due to an unusual sequence of 
attacker-controlled events, a Java
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-38509
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-38509
 CVE-2021-38508 (By displaying a form validity message in the correct location 
at the s ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -19870,6 +19884,7 @@ CVE-2021-38508 (By displaying a form validity message 
in the correct location at
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-38508
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-38508
 CVE-2021-38507 (The Opportunistic Encryption feature of HTTP2 (RFC 8164) 
allows a conn ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -19877,6 +19892,7 @@ CVE-2021-38507 (The Opportunistic Encryption feature of 
HTTP2 (RFC 8164) allows
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-38507
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-38507
 CVE-2021-38506 (Through a series of navigations, Firefox could have entered 
fullscreen ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -19891,6 +19907,7 @@ CVE-2021-38505 (Microsoft introduced a new feature in 
Windows 10 known as Cloud
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-38505
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-38505
 CVE-2021-38504 (When interacting with an HTML input element's file picker 
dialog with  ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1
@@ -19898,6 +19915,7 @@ CVE-2021-38504 (When interacting with an HTML input 
element's file picker dialog
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-49/#CVE-2021-38504
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2021-50/#CVE-2021-38504
 CVE-2021-38503 (The iframe sandbox rules were not correctly applied to XSLT 
stylesheet ...)
+       {DSA-5026-1}
        - firefox 94.0-1
        - firefox-esr 91.3.0esr-1
        - thunderbird 1:91.3.0-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8017c1669d19f802d790954017c04ba9c7d72e79

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8017c1669d19f802d790954017c04ba9c7d72e79
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to