[Git][security-tracker-team/security-tracker][master] buster/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Thu May 26 23:41:33 BST 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
84d2c879 by Moritz Muehlenhoff at 2022-05-27T00:41:10+02:00
buster/bullseye triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -293,11 +293,10 @@ CVE-2022-31619
CVE-2022-1887
RESERVED
CVE-2022-1886 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...)
- - vim <unfixed>
- [bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
+ - vim <unfixed> (unimportant)
NOTE: https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a
NOTE: https://github.com/vim/vim/commit/2a585c85013be22f59f184d49612074fd9b115d7 (v8.2.5016)
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-1885
RESERVED
CVE-2022-1884
@@ -13610,6 +13609,8 @@ CVE-2022-26968
RESERVED
CVE-2022-26967 (GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It c ...)
- gpac <unfixed> (bug #1007224)
+ [bullseye] - gpac <no-dsa> (Minor issue)
+ [buster] - gpac <no-dsa> (Minor issue)
[stretch] - gpac <end-of-life> (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2138
NOTE: https://github.com/gpac/gpac/commit/ea1eca00fd92fa17f0e25ac25652622924a9a6a0
@@ -25452,6 +25453,8 @@ CVE-2022-0218 (The WP HTML Mail WordPress plugin is vulnerable to unauthorized a
CVE-2022-0216
RESERVED
- qemu <unfixed>
+ [bullseye] - qemu <no-dsa> (Minor issue)
+ [buster] - qemu <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2036953
NOTE: https://starlabs.sg/advisories/22-0216
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/972
@@ -159323,6 +159326,8 @@ CVE-2020-8860 (This vulnerability allows remote attackers to execute arbitrary c
CVE-2020-8859 (This vulnerability allows remote attackers to create a denial-of-servi ...)
{DLA-3014-1}
- elog <removed>
+ [bullseye] - elog <ignored> (Minor issue)
+ [buster] - elog <ignored> (Minor issue)
NOTE: https://elog.psi.ch/elogs/Forum/69114
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-20-252/
NOTE: https://bitbucket.org/ritt/elog/commits/033e292301fa569738b20768b8d1f1d7d0bc1ca7
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d2c8799b55ec27c1facad007ec940b85875c73
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84d2c8799b55ec27c1facad007ec940b85875c73
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220526/21658f2a/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list