[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Nov 2 09:04:47 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5ab6f8f3 by Moritz Muehlenhoff at 2022-11-02T10:04:12+01:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -6239,6 +6239,7 @@ CVE-2022-3480
 	RESERVED
 CVE-2022-3479 (A vulnerability found in nss. By this security vulnerability, nss clie ...)
 	- nss <unfixed> (bug #1021786)
+	[bullseye] - nss <no-dsa> (Minor issue)
 	[buster] - nss <not-affected> (The vulnerable code was introduced later)
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1774654
 CVE-2022-42907
@@ -6268,6 +6269,7 @@ CVE-2022-3478
 	RESERVED
 CVE-2022-42906 (powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbi ...)
 	- powerline-gitstatus 1.3.2-1
+	[bullseye] - powerline-gitstatus <no-dsa> (Minor issue)
 	NOTE: https://github.com/jaspernbrouwer/powerline-gitstatus/issues/45
 	NOTE: https://github.com/jaspernbrouwer/powerline-gitstatus/pull/46
 CVE-2022-42896
@@ -16052,9 +16054,9 @@ CVE-2022-38858 (Certain The MPlayer Project products are vulnerable to Buffer Ov
 CVE-2022-38857
 	RESERVED
 CVE-2022-38856 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...)
-	- mplayer <unfixed> (bug #1021013)
+	- mplayer <unfixed> (unimportant; bug #1021013)
 	NOTE: https://trac.mplayerhq.hu/ticket/2395
-	TODO: Fixed by other fixes, but not pin pointed upstream, try to isolate revision to fix issue
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-38855 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...)
 	- mplayer <unfixed> (unimportant)
 	NOTE: https://trac.mplayerhq.hu/ticket/2392
@@ -16947,10 +16949,11 @@ CVE-2022-38602
 CVE-2022-38601
 	RESERVED
 CVE-2022-38600 (Mplayer SVN-r38374-13.0.1 is vulnerable to Memory Leak via vf.c and vf ...)
-	- mplayer <unfixed> (bug #1021013)
+	- mplayer <unfixed> (unimportant; bug #1021013)
 	NOTE: https://trac.mplayerhq.hu/ticket/2390#comment:2
 	NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/59792bad144c11b21b27171a93a36e3fbd21eb5e (r38380)
 	NOTE: Followup: https://git.ffmpeg.org/gitweb/mplayer.git/commit/48ca1226397974bb2bc53de878411f88a80fe1f8 (r38392)
+	NOTE: Memory leak in CLI tool, no security impact
 CVE-2022-38599
 	RESERVED
 CVE-2022-38598
@@ -27639,6 +27642,7 @@ CVE-2022-34668 (NVFLARE, versions prior to 2.1.4, contains a vulnerability that
 CVE-2022-34667
 	RESERVED
 	- nvidia-cuda-toolkit <unfixed> (bug #1021625)
+	[bullseye] - nvidia-cuda-toolkit <no-dsa> (Non-free not supported)
 	[buster] - nvidia-cuda-toolkit <no-dsa> (Minor issue)
 	NOTE: https://nvidia.custhelp.com/app/answers/detail/a_id/5373
 CVE-2022-34666
@@ -69432,36 +69436,42 @@ CVE-2021-44928
 	RESERVED
 CVE-2021-44927 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1960
 	NOTE: https://github.com/gpac/gpac/commit/eaea647cc7dec7b452c17e72f4ce46be35348c92 (v2.0.0)
 CVE-2021-44926 (A null pointer dereference vulnerability exists in gpac 1.1.0-DEV in t ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1961
 	NOTE: https://github.com/gpac/gpac/commit/f73da86bf32992f62b9ff2b9c9e853e3c97edf8e (v2.0.0)
 CVE-2021-44925 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1967
 	NOTE: https://github.com/gpac/gpac/commit/a5a8dbcdd95666f763fe59ab65154ae9271a18f2 (v2.0.0)
 CVE-2021-44924 (An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log func ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1959
 	NOTE: https://github.com/gpac/gpac/commit/e2acb1511d1e69115141ea3080afd1cce6a15497 (v2.0.0)
 CVE-2021-44923 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1962
 	NOTE: https://github.com/gpac/gpac/commit/8a3c021109d26894c3cb85c9d7cda5780a3a2229 (v2.0.0)
 CVE-2021-44922 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the B ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1969
@@ -69469,18 +69479,21 @@ CVE-2021-44922 (A null pointer dereference vulnerability exists in gpac 1.1.0 in
 	NOTE: https://github.com/gpac/gpac/commit/75474199cf7187868fa4be4e76377db3c659ee9a (v2.0.0)
 CVE-2021-44921 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1964
 	NOTE: https://github.com/gpac/gpac/commit/5b4a6417a90223f1ef6c0b41b055716f7bfbbca2 (v2.0.0)
 CVE-2021-44920 (An invalid memory address dereference vulnerability exists in gpac 1.1 ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1957
 	NOTE: https://github.com/gpac/gpac/commit/339fe399e7c8eab748bab76e9e6a9da7e117eeb4 (v2.0.0)
 CVE-2021-44919 (A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_a ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1963
@@ -69488,6 +69501,7 @@ CVE-2021-44919 (A Null Pointer Dereference vulnerability exists in the gf_sg_vrm
 	NOTE: https://github.com/gpac/gpac/commit/8a3c021109d26894c3cb85c9d7cda5780a3a2229 (v2.0.0)
 CVE-2021-44918 (A Null Pointer Dereference vulnerability exists in gpac 1.1.0 in the g ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1968


=====================================
data/dsa-needed.txt
=====================================
@@ -37,6 +37,8 @@ multipath-tools
 --
 openexr
 --
+php7.4
+--
 php-horde-mime-viewer
 --
 php-horde-turba
@@ -66,3 +68,5 @@ sofia-sip
 sox
   patch needed for CVE-2021-40426, check with upstream
 --
+xen
+--



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5ab6f8f34abb629753f0ca1fb4e9bf6ba7f66e1e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5ab6f8f34abb629753f0ca1fb4e9bf6ba7f66e1e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221102/b357bef9/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list