[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Jun 17 16:16:34 BST 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7d2c0910 by Moritz Muehlenhoff at 2022-06-17T17:16:22+02:00
buster/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -2032,9 +2032,10 @@ CVE-2022-32767
CVE-2022-32979
RESERVED
CVE-2022-32978 (There is an assertion failure in SingleComponentLSScan::ParseMCU in si ...)
- - libjpeg <unfixed>
+ - libjpeg <unfixed> (unimportant)
NOTE: https://github.com/thorfdbg/libjpeg/issues/75
NOTE: https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-32977
RESERVED
CVE-2022-32976
@@ -2476,11 +2477,10 @@ CVE-2022-2044
CVE-2022-2043
RESERVED
CVE-2022-2042 (Use After Free in GitHub repository vim/vim prior to 8.2. ...)
- - vim <unfixed>
- [bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
+ - vim <unfixed> (unimportant)
NOTE: https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba
NOTE: https://github.com/vim/vim/commit/2813f38e021c6e6581c0c88fcf107e41788bc835 (v8.2.5072)
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-2041
RESERVED
CVE-2022-2040
@@ -2974,6 +2974,8 @@ CVE-2022-32548
RESERVED
CVE-2022-32547 (In ImageMagick, there is load of misaligned address for type 'double', ...)
- imagemagick <unfixed>
+ [bullseye] - imagemagick <ignored> (Minor issue)
+ [buster] - imagemagick <ignored> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091813
NOTE: https://github.com/ImageMagick/ImageMagick/issues/5033
NOTE: https://github.com/ImageMagick/ImageMagick/pull/5034
@@ -2981,6 +2983,8 @@ CVE-2022-32547 (In ImageMagick, there is load of misaligned address for type 'do
NOTE: https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45)
CVE-2022-32546 (A vulnerability was found in ImageMagick, causing an outside the range ...)
- imagemagick <unfixed>
+ [bullseye] - imagemagick <ignored> (Minor issue)
+ [buster] - imagemagick <ignored> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091812
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4985
NOTE: https://github.com/ImageMagick/ImageMagick/pull/4986
@@ -2988,6 +2992,8 @@ CVE-2022-32546 (A vulnerability was found in ImageMagick, causing an outside the
NOTE: https://github.com/ImageMagick/ImageMagick6/commit/29c8abce0da56b536542f76a9ddfebdaab5b2943 (6.9.12-44)
CVE-2022-32545 (A vulnerability was found in ImageMagick, causing an outside the range ...)
- imagemagick <unfixed>
+ [bullseye] - imagemagick <ignored> (Minor issue)
+ [buster] - imagemagick <ignored> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091811
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4962
NOTE: https://github.com/ImageMagick/ImageMagick/pull/4963
@@ -6449,6 +6455,8 @@ CVE-2022-31292
RESERVED
CVE-2022-31291 (An issue in dlt_config_file_parser.c of dlt-daemon v2.18.8 allows atta ...)
- dlt-daemon <unfixed>
+ [bullseye] - dlt-daemon <no-dsa> (Minor issue)
+ [buster] - dlt-daemon <no-dsa> (Minor issue)
NOTE: https://github.com/COVESA/dlt-daemon/pull/376
NOTE: https://github.com/COVESA/dlt-daemon/commit/6a3bd901d825c7206797e36ea98e10a218f5aad2
CVE-2022-31290
@@ -19998,6 +20006,8 @@ CVE-2022-26636
RESERVED
CVE-2022-26635 (PHP-Memcached v2.2.0 and below contains an improper NULL termination w ...)
- php-memcached <unfixed> (bug #1009328)
+ [bullseye] - php-memcached <no-dsa> (Minor issue)
+ [buster] - php-memcached <no-dsa> (Minor issue)
[stretch] - php-memcached <no-dsa> (Minor issue)
NOTE: https://xhzeem.me/posts/Php5-memcached-Injection-Bypass/read/
CVE-2022-26634 (HMA VPN v5.3.5913.0 contains an unquoted service path which allows att ...)
@@ -20314,6 +20324,8 @@ CVE-2022-26492
CVE-2022-26491 (An issue was discovered in Pidgin before 2.14.9. A remote attacker who ...)
{DLA-3043-1}
- pidgin 2.14.9-1
+ [bullseye] - pidgin <no-dsa> (Minor issue)
+ [buster] - pidgin <no-dsa> (Minor issue)
NOTE: https://pidgin.im/about/security/advisories/cve-2022-26491/
NOTE: https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc
CVE-2022-26489
@@ -25435,6 +25447,8 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended version of the C reference implem
- python-cmarkgfm 0.7.0-1 (bug #1006758)
- ruby-commonmarker <unfixed> (bug #1006759)
- r-cran-commonmark 1.8.0-1 (bug #1006760)
+ [bullseye] - r-cran-commonmark <no-dsa> (Minor issue)
+ [buster] - r-cran-commonmark <no-dsa> (Minor issue)
NOTE: https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x
NOTE: https://github.com/github/cmark-gfm/releases/tag/0.29.0.gfm.3
NOTE: https://github.com/github/cmark-gfm/commit/ac80f7b56522ffa158e1f0c14a611ffccacd4027 (0.29.0.gfm.3)
@@ -35031,12 +35045,18 @@ CVE-2021-4187 (vim is vulnerable to Use After Free ...)
CVE-2021-45911 (An issue was discovered in gif2apng 1.9. There is a heap-based buffer ...)
{DLA-2937-1}
- gif2apng <removed> (bug #1002687)
+ [bullseye] - gif2apng <no-dsa> (Minor issue)
+ [buster] - gif2apng <no-dsa> (Minor issue)
CVE-2021-45910 (An issue was discovered in gif2apng 1.9. There is a heap-based buffer ...)
{DLA-2937-1}
- gif2apng <removed> (bug #1002667)
+ [bullseye] - gif2apng <no-dsa> (Minor issue)
+ [buster] - gif2apng <no-dsa> (Minor issue)
CVE-2021-45909 (An issue was discovered in gif2apng 1.9. There is a heap-based buffer ...)
{DLA-2937-1}
- gif2apng <removed> (bug #1002668)
+ [bullseye] - gif2apng <no-dsa> (Minor issue)
+ [buster] - gif2apng <no-dsa> (Minor issue)
CVE-2021-45908 (An issue was discovered in gif2apng 1.9. There is a stack-based buffer ...)
- gif2apng <removed> (bug #1002669; unimportant)
NOTE: Negligible security impact
@@ -53748,6 +53768,8 @@ CVE-2021-40634
RESERVED
CVE-2021-40633 (A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5 ...)
- giflib <unfixed>
+ [bullseye] - giflib <no-dsa> (Minor issue)
+ [buster] - giflib <no-dsa> (Minor issue)
NOTE: https://sourceforge.net/p/giflib/bugs/157/
CVE-2021-40632
RESERVED
@@ -53839,8 +53861,9 @@ CVE-2021-40591
CVE-2021-40590
RESERVED
CVE-2021-40589 (ZAngband zangband-data 2.7.5 is affected by an integer underflow vulne ...)
- - zangband <unfixed>
+ - zangband <unfixed> (unimportant)
NOTE: https://sourceforge.net/p/zangband/bugs/671/
+ NOTE: Negligible security impact
CVE-2021-40588
RESERVED
CVE-2021-40587
=====================================
data/dsa-needed.txt
=====================================
@@ -20,7 +20,7 @@ curl
--
epiphany-browser
--
-firejail
+firejail (jmm)
--
freecad (aron)
--
@@ -53,7 +53,7 @@ salt
--
slurm-llnl/oldstable
--
-slurm-wlm/stable
+slurm-wlm/stable (jmm)
Maintainer proposed an update for bullseye-security
--
sox
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d2c09103b65a0d8bd455a44398c269ad53c0719
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7d2c09103b65a0d8bd455a44398c269ad53c0719
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220617/5f02e2c9/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list