[Git][security-tracker-team/security-tracker][master] 4 commits: Expand one note for CVE-2022-2211
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Jul 10 21:11:20 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a8eb2366 by Salvatore Bonaccorso at 2022-07-10T22:10:53+02:00
Expand one note for CVE-2022-2211
- - - - -
ed83f0f0 by Salvatore Bonaccorso at 2022-07-10T22:10:55+02:00
Process some NFUs
- - - - -
67e0bd82 by Salvatore Bonaccorso at 2022-07-10T22:10:56+02:00
Update todo for CVE-2022-2191
- - - - -
1187e1af by Salvatore Bonaccorso at 2022-07-10T22:10:58+02:00
Add CVE-2022-204{7,8}/jetty9
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -288,7 +288,7 @@ CVE-2022-2343 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to
NOTE: https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853 (v9.0.0045)
NOTE: Crash in CLI tool, no security impact
CVE-2022-2342 (Cross-site Scripting (XSS) - Stored in GitHub repository outline/outli ...)
- TODO: check
+ NOT-FOR-US: outline
CVE-2022-2341
RESERVED
CVE-2022-2340
@@ -1169,7 +1169,7 @@ CVE-2022-2291
CVE-2022-34915
RESERVED
CVE-2022-34914 (Webswing before 22.1.3 allows X-Forwarded-For header injection. The cl ...)
- TODO: check
+ NOT-FOR-US: Webswing
CVE-2022-34913 (** DISPUTED ** md2roff 1.7 has a stack-based buffer overflow via a Mar ...)
TODO: check
CVE-2022-34912 (An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1 ...)
@@ -2336,8 +2336,8 @@ CVE-2022-2211 [Buffer overflow in get_keys leads to Dos]
NOTE: In 1:1.46.2-1 of src:libguestfs the tools were split out to src:guestfs-tools, marking that as fixed version
NOTE: https://listman.redhat.com/archives/libguestfs/2022-June/029274.html
NOTE: https://listman.redhat.com/archives/libguestfs/2022-June/029277.html
- NOTE: https://github.com/libguestfs/libguestfs-common/commit/35467027f657
- NOTE: https://github.com/libguestfs/libguestfs/commit/99844660b48e
+ NOTE: https://github.com/libguestfs/libguestfs-common/commit/35467027f657de76aca34b48a6f23e9608b23a57
+ NOTE: Documentation: https://github.com/libguestfs/libguestfs/commit/99844660b48ed809e37378262c65d63df6ce4a53
CVE-2022-2210 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...)
- vim <unfixed> (unimportant)
NOTE: https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
@@ -2751,7 +2751,7 @@ CVE-2022-2193
CVE-2022-2192
RESERVED
CVE-2022-2191 (In Eclipse Jetty versions 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 v ...)
- TODO: check
+ TODO: check, claims to affect only 10.x and 11.x series, check for jetty9
CVE-2022-34362
RESERVED
CVE-2022-34361
@@ -3652,7 +3652,7 @@ CVE-2022-34009
CVE-2022-34008 (Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privile ...)
NOT-FOR-US: Comodo Antivirus
CVE-2022-34007 (EQS Integrity Line through 2022-07-01 allows a stored XSS via a crafte ...)
- TODO: check
+ NOT-FOR-US: EQS Integrity Line
CVE-2022-34006 (An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2 ...)
NOT-FOR-US: TitanFTP
CVE-2022-34005 (An issue was discovered in TitanFTP (aka Titan FTP) NextGen before 1.2 ...)
@@ -6637,9 +6637,11 @@ CVE-2022-26842
CVE-2022-2049
RESERVED
CVE-2022-2048 (In Eclipse Jetty HTTP/2 server implementation, when encountering an in ...)
- TODO: check
+ - jetty9 <unfixed>
+ NOTE: https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j
CVE-2022-2047 (In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, a ...)
- TODO: check
+ - jetty9 <unfixed>
+ NOTE: https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q
CVE-2022-2046
RESERVED
CVE-2022-2045
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2dc69a91ee68a180a9614e2e8d90f468bd687614...1187e1af6914c33d80a6bae706d2930be4658535
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2dc69a91ee68a180a9614e2e8d90f468bd687614...1187e1af6914c33d80a6bae706d2930be4658535
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220710/6edbfe9f/attachment.htm>
More information about the debian-security-tracker-commits
mailing list