[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Aug 22 15:44:13 BST 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b4819afe by Moritz Muehlenhoff at 2022-08-22T16:43:21+02:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -316,6 +316,7 @@ CVE-2022-38494
 	RESERVED
 CVE-2022-38493 (Rhonabwy 0.9.99 through 1.1.x before 1.1.7 doesn't check the RSA priva ...)
 	- rhonabwy 1.1.7-1
+	[bullseye] - rhonabwy <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/babelouest/rhonabwy/commit/dd528b3aabd13863f855a68e76966e4e019fc399
 CVE-2022-38492
 	RESERVED
@@ -6423,28 +6424,36 @@ CVE-2022-36148 (fdkaac commit 53fe239 was discovered to contain a floating point
 CVE-2022-36147
 	RESERVED
 CVE-2022-36146 (SWFMill commit 53d7690 was discovered to contain a memory allocation i ...)
-	- swfmill <unfixed>
+	- swfmill <unfixed> (unimportant)
 	NOTE: https://github.com/djcsdy/swfmill/issues/65
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-36145 (SWFMill commit 53d7690 was discovered to contain a segmentation violat ...)
-	- swfmill <unfixed>
+	- swfmill <unfixed> (unimportant)
 	NOTE: https://github.com/djcsdy/swfmill/issues/64
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-36144 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...)
 	- swfmill <unfixed>
+	[bullseye] - swfmill <no-dsa> (Minor issue)
 	NOTE: https://github.com/djcsdy/swfmill/issues/63
 CVE-2022-36143 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...)
-	- swfmill <unfixed>
+	- swfmill <unfixed> (unimportant)
 	NOTE: https://github.com/djcsdy/swfmill/issues/62
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-36142 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...)
-	- swfmill <unfixed>
+	- swfmill <unfixed> (unimportant)
 	NOTE: https://github.com/djcsdy/swfmill/issues/61
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-36141 (SWFMill commit 53d7690 was discovered to contain a segmentation violat ...)
-	- swfmill <unfixed>
+	- swfmill <unfixed> (unimportant)
 	NOTE: https://github.com/djcsdy/swfmill/issues/58
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-36140 (SWFMill commit 53d7690 was discovered to contain a segmentation violat ...)
-	- swfmill <unfixed>
+	- swfmill <unfixed> (unimportant)
 	NOTE: https://github.com/djcsdy/swfmill/issues/57
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-36139 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...)
 	- swfmill <unfixed>
+	[bullseye] - swfmill <no-dsa> (Minor issue)
 	NOTE: https://github.com/djcsdy/swfmill/issues/56
 CVE-2022-36138
 	RESERVED
@@ -34931,6 +34940,7 @@ CVE-2022-25758 (All versions of package scss-tokenizer are vulnerable to Regular
 	- node-scss-tokenizer <itp> (bug #885456)
 CVE-2022-25648 (The package git before 1.11.0 are vulnerable to Command Injection via  ...)
 	- ruby-git <unfixed> (bug #1009926)
+	[bullseye] - ruby-git <no-dsa> (Minor issue)
 	NOTE: https://github.com/ruby-git/ruby-git/pull/569
 	NOTE: Fixed by: https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159 (v1.11.0)
 	NOTE: https://security.snyk.io/vuln/SNYK-RUBY-GIT-2421270
@@ -35647,6 +35657,7 @@ CVE-2022-0719 (Cross-site Scripting (XSS) - Reflected in GitHub repository micro
 CVE-2022-0718
 	RESERVED
 	- python-oslo.utils 4.10.1-1
+	[bullseye] - python-oslo.utils <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2056850
 	NOTE: https://bugs.launchpad.net/oslo.utils/+bug/1949623
 	NOTE: Fixed by: https://opendev.org/openstack/oslo.utils/commit/6e17ae1f7959c64dfd20a5f67edf422e702426aa (4.12.1)
@@ -57174,6 +57185,7 @@ CVE-2021-43557 (The uri-block plugin in Apache APISIX before 2.10.2 uses $reques
 CVE-2021-3941 (In ImfChromaticities.cpp routine RGBtoXYZ(), there are some division o ...)
 	[experimental] - openexr 3.1.3-1
 	- openexr 3.1.5-2 (bug #1014828)
+	[bullseye] - openexr <no-dsa> (Minor issue)
 	[stretch] - openexr <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2019789
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39084
@@ -57361,6 +57373,7 @@ CVE-2021-3934 (ohmyzsh is vulnerable to Improper Neutralization of Special Eleme
 CVE-2021-3933 (An integer overflow could occur when OpenEXR processes a crafted file  ...)
 	[experimental] - openexr 3.1.3-1
 	- openexr 3.1.5-2 (bug #1014828)
+	[bullseye] - openexr <no-dsa> (Minor issue)
 	[stretch] - openexr <not-affected> (Vulnerable code not present)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2019783
 	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38912


=====================================
data/dsa-needed.txt
=====================================
@@ -24,6 +24,8 @@ linux (carnil)
 --
 maven-shared-utils
 --
+minetest
+--
 netatalk
   open regression with MacOS, tentative patch not yet merged upstream
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b4819afe1e521bc33b9ab2494ddabb3ff04b5e94

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b4819afe1e521bc33b9ab2494ddabb3ff04b5e94
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220822/359dcbb6/attachment.htm>


More information about the debian-security-tracker-commits mailing list