[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Feb 9 10:59:26 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
48e50b1a by Moritz Muehlenhoff at 2022-02-09T11:58:58+01:00
buster/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -934,6 +934,8 @@ CVE-2022-21177
 	RESERVED
 CVE-2022-0481 (NULL Pointer Dereference in Homebrew mruby prior to 3.2. ...)
 	- mruby <unfixed>
+	[bullseye] - mruby <no-dsa> (Minor issue)
+	[buster] - mruby <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/54725c8c-87f4-41b6-878c-01d8e0ee7027
 	NOTE: https://github.com/mruby/mruby/commit/ae3c99767a27f5c6c584162e2adc6a5d0eb2c54e
 	TODO: check, possibly only introduced with dccd66f9efecd0a974b735c62836fe566015cf37 in 3.1.0-rc
@@ -1348,6 +1350,8 @@ CVE-2022-24250
 	RESERVED
 CVE-2022-24249 (A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the  ...)
 	- gpac <unfixed>
+	[bullseye] - gpac <no-dsa> (Minor issue)
+	[buster] - gpac <no-dsa> (Minor issue)
 	NOTE: https://github.com/gpac/gpac/issues/2081
 	NOTE: https://github.com/gpac/gpac/commit/71f9871fc210e60df041b58c84572782b4849de9
 CVE-2022-24248
@@ -4747,6 +4751,8 @@ CVE-2022-0241
 	RESERVED
 CVE-2022-0240 (mruby is vulnerable to NULL Pointer Dereference ...)
 	- mruby <unfixed>
+	[bullseye] - mruby <no-dsa> (Minor issue)
+	[buster] - mruby <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb/
 	NOTE: https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca
 CVE-2022-0239 (corenlp is vulnerable to Improper Restriction of XML External Entity R ...)
@@ -13632,6 +13638,8 @@ CVE-2021-4044 (Internally libssl in OpenSSL calls X509_verify_cert() on the clie
 	NOTE: https://www.openssl.org/news/secadv/20211214.txt
 CVE-2021-4043 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0 ...)
 	- gpac <unfixed>
+	[bullseye] - gpac <no-dsa> (Minor issue)
+	[buster] - gpac <no-dsa> (Minor issue)
 	NOTE: https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47
 	NOTE: https://github.com/gpac/gpac/issues/2092
 	NOTE: https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/48e50b1aff15f1ee6357862a7624d6320a8cc9a9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/48e50b1aff15f1ee6357862a7624d6320a8cc9a9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220209/80cf3ca3/attachment.htm>


More information about the debian-security-tracker-commits mailing list