[Git][security-tracker-team/security-tracker][master] vim fixed in sid

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Dec 28 17:47:21 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
cfbae1f7 by Moritz Mühlenhoff at 2022-12-28T18:46:13+01:00
vim fixed in sid
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -6003,7 +6003,7 @@ CVE-2022-4293 (Floating Point Comparison with Incorrect Operator in GitHub repos
 	NOTE: https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b (v9.0.0804)
 	NOTE: Crash in CLI tool, no security impact
 CVE-2022-4292 (Use After Free in GitHub repository vim/vim prior to 9.0.0882. ...)
-	- vim <unfixed> (unimportant)
+	- vim 2:9.0.1000-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
 	NOTE: https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 (v9.0.0882)
 	NOTE: Crash in CLI tool, no security impact
@@ -7705,7 +7705,7 @@ CVE-2022-4143
 CVE-2022-4142
 	RESERVED
 CVE-2022-4141 (Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing a ...)
-	- vim <unfixed> (bug #1027146)
+	- vim 2:9.0.1000-1 (bug #1027146)
 	[bullseye] - vim <no-dsa> (Minor issue)
 	[buster] - vim <postponed> (Minor issue)
 	NOTE: https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f
@@ -78447,7 +78447,7 @@ CVE-2021-46090
 CVE-2021-46089 (In JeecgBoot 3.0, there is a SQL injection vulnerability that can oper ...)
 	NOT-FOR-US: JeecgBoot
 CVE-2021-46088 (Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Exe ...)
-	- zabbix <undetermined>
+	NOTE: Zabbix security feature, not a vulnerability per se
 	NOTE: closed upstream as a "feature", then changed in 5.4 to make the attack less likely
 	NOTE: https://github.com/paalbra/zabbix-zbxsec-7
 	NOTE: https://www.zabbix.com/documentation/3.0/en/manual/config/notifications/action/operation/remote_command
@@ -239533,7 +239533,7 @@ CVE-2019-16935 (The documentation XML-RPC server in Python through 2.7.16, 3.x t
 	- python2.7 2.7.17~rc1-1
 	[buster] - python2.7 2.7.16-2+deb10u1
 	[jessie] - python2.7 <ignored> (Minor Issue, XSS in an unlikely use-case)
-	- jython <unfixed>
+	- jython <unfixed> (bug #1027149)
 	[bullseye] - jython <ignored> (Minor Issue)
 	[buster] - jython <ignored> (Minor Issue)
 	[stretch] - jython <ignored> (Minor Issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfbae1f76e4271509ca9b6b332f12d75e73eb5d9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cfbae1f76e4271509ca9b6b332f12d75e73eb5d9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221228/e2145d8f/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list