[Git][security-tracker-team/security-tracker][master] buster/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri May 27 18:23:33 BST 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0ffdcddf by Moritz Muehlenhoff at 2022-05-27T19:22:07+02:00
buster/bullseye triage
add one more patch needed for pcre issue

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2317,12 +2317,13 @@ CVE-2022-25932
 	RESERVED
 CVE-2022-1736
 	RESERVED
-	- gnome-remote-desktop 42.1.1-2
+	- gnome-remote-desktop 42.1.1-2 (unimportant)
 	NOTE: https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1973028/comments/3
 	NOTE: The CVE is assigned based on the Ubuntu policy strongly discouraging open ports by
 	NOTE: default (https://wiki.ubuntu.com/Security/Features#ports) and the fact that the user
 	NOTE: service was enabled by default (and not automatically enabled anymore since 42.1.1-2)
-	TODO: check, if we want to threat this as unimportant severity issue
+	NOTE: Not treated as a security issue in Debian, whether to start the daemon or not is ultimately
+	NOTE: up to the local admin
 CVE-2022-1735 (Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969 ...)
 	- vim <unfixed> (unimportant)
 	NOTE: https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
@@ -4047,6 +4048,8 @@ CVE-2022-30285
 	RESERVED
 CVE-2022-30284 (In the python-libnmap package through 0.7.2 for Python, remote command ...)
 	- python-libnmap <unfixed>
+	[bullseye] - python-libnmap <no-dsa> (Minor issue)
+	[buster] - python-libnmap <no-dsa> (Minor issue)
 	NOTE: https://www.swascan.com/security-advisory-libnmap-2/
 CVE-2022-30283
 	RESERVED
@@ -4104,6 +4107,7 @@ CVE-2022-1587 (An out-of-bounds read vulnerability was discovered in the PCRE2 l
 CVE-2022-1586 (An out-of-bounds read vulnerability was discovered in the PCRE2 librar ...)
 	- pcre2 10.40-1
 	NOTE: https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a (pcre2-10.40)
+	NOTE: https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
 CVE-2022-1585
 	RESERVED
 CVE-2022-30259
@@ -7995,6 +7999,8 @@ CVE-2022-28920 (Tieba-Cloud-Sign v4.9 was discovered to contain a cross-site scr
 	NOT-FOR-US: Baidu Tieba
 CVE-2022-28919 (HTMLCreator release_stable_2020-07-29 was discovered to contain a cros ...)
 	- dokuwiki <unfixed> (bug #1011056)
+	[bullseye] - dokuwiki <no-dsa> (Minor issue)
+	[buster] - dokuwiki <no-dsa> (Minor issue)
 	NOTE: https://github.com/splitbrain/dokuwiki/issues/3651
 	NOTE: https://github.com/splitbrain/dokuwiki/commit/d3233986baa7dfe44490b805ae2e4296fad59401
 CVE-2022-28918 (GreenCMS v2.3.0603 was discovered to contain an arbitrary file deletio ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ffdcddf525cecac62c1e2e1b5d1d8cdf35b741f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ffdcddf525cecac62c1e2e1b5d1d8cdf35b741f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220527/2dc1bc47/attachment.htm>


More information about the debian-security-tracker-commits mailing list