[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Thu Jun 9 07:58:15 BST 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
cb1b4183 by Moritz Muehlenhoff at 2022-06-09T08:57:46+02:00
buster/bullseye triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4918,8 +4918,10 @@ CVE-2022-30793
RESERVED
CVE-2022-30790 (Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2 ...)
- u-boot <unfixed>
+ [bullseye] - u-boot <no-dsa> (Minor issue)
+ [buster] - u-boot <no-dsa> (Minor issue)
NOTE: https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
- TODO: check details
+ NOTE: https://source.denx.de/u-boot/u-boot/-/commit/b85d130ea0cac152c21ec38ac9417b31d41b5552
CVE-2022-30789 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_ch ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
@@ -5012,6 +5014,7 @@ CVE-2022-30767 (nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and
NOTE: https://lists.denx.de/pipermail/u-boot/2022-May/483952.html
NOTE: https://securitylab.github.com/research/uboot-rce-nfs-vulnerability/
NOTE: Issue exists because of an incorrect fix for CVE-2019-14196.
+ NOTE: Patch: https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80
CVE-2022-30766
RESERVED
CVE-2022-30765 (Calibre-Web before 0.6.18 allows user table SQL Injection. ...)
@@ -5506,8 +5509,10 @@ CVE-2022-30553
RESERVED
CVE-2022-30552 (Das U-Boot 2022.01 has a Buffer Overflow. ...)
- u-boot <unfixed>
+ [bullseye] - u-boot <no-dsa> (Minor issue)
+ [buster] - u-boot <no-dsa> (Minor issue)
NOTE: https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552/
- TODO: check details
+ NOTE: Patch: https://source.denx.de/u-boot/u-boot/-/commit/b85d130ea0cac152c21ec38ac9417b31d41b5552
CVE-2022-30551 (OPC UA Legacy Java Stack 2022-04-01 allows a remote attacker to cause ...)
TODO: check
CVE-2022-30550
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb1b4183f73c5599b0bc16b02ad2dcd71aa5f941
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb1b4183f73c5599b0bc16b02ad2dcd71aa5f941
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220609/6bdb2d26/attachment.htm>
More information about the debian-security-tracker-commits
mailing list