[Git][security-tracker-team/security-tracker][master] Triage CVE of vim/buster
Markus Koschany (@apo)
apo at debian.org
Tue Nov 8 15:19:05 GMT 2022
Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3e24d0f6 by Markus Koschany at 2022-11-08T16:18:04+01:00
Triage CVE of vim/buster
Triage several CVE as not affected because the vulnerable code was introduced
later
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -19890,6 +19890,7 @@ CVE-2022-2863 (The Migration, Backup, Staging WordPress plugin before 0.9.76 doe
NOT-FOR-US: WordPress plugin
CVE-2022-2862 (Use After Free in GitHub repository vim/vim prior to 9.0.0221. ...)
- vim 2:9.0.0229-1
+ [buster] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765
NOTE: https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494 (v9.0.0221)
CVE-2022-2861 (Inappropriate implementation in Extensions API in Google Chrome prior ...)
@@ -20176,6 +20177,7 @@ CVE-2022-2820 (Improper Access Control in GitHub repository namelessmc/nameless
NOT-FOR-US: NamelessMC/Nameless
CVE-2022-2819 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...)
- vim 2:9.0.0229-1
+ [buster] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59
NOTE: https://github.com/vim/vim/commit/d1d8f6bacb489036d0fd479c9dd3c0102c988889 (v9.0.0211)
CVE-2022-2818 (Authentication Bypass by Primary Weakness in GitHub repository cockpit ...)
@@ -20365,6 +20367,7 @@ CVE-2022-38218
RESERVED
CVE-2022-2817 (Use After Free in GitHub repository vim/vim prior to 9.0.0213. ...)
- vim 2:9.0.0229-1 (unimportant)
+ [buster] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f
NOTE: https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20 (v9.0.0213)
NOTE: Crash in CLI tool, no security impact
@@ -23609,6 +23612,7 @@ CVE-2022-2572 (In affected versions of Octopus Server where access is managed by
NOT-FOR-US: Octopus Server
CVE-2022-2571 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...)
- vim 2:9.0.0135-1 (unimportant)
+ [buster] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571/
NOTE: https://github.com/vim/vim/commit/a6f9e300161f4cb54713da22f65b261595e8e614 (v9.0.0102)
NOTE: Crash in CLI tool, no security impact
@@ -60469,8 +60473,8 @@ CVE-2022-0408 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to
CVE-2022-0407 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...)
- vim 2:8.2.4659-1
[bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
- [stretch] - vim <not-affected> (vulnerable code is not present)
+ [buster] - vim <not-affected> (The vulnerable code is not present)
+ [stretch] - vim <not-affected> (The vulnerable code is not present)
NOTE: https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
NOTE: https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e (v8.2.4219)
CVE-2022-24112 (An attacker can abuse the batch-requests plugin to send requests to by ...)
@@ -60628,8 +60632,8 @@ CVE-2022-0394 (Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelpe
CVE-2022-0393 (Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. ...)
- vim 2:8.2.4659-1
[bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
- [stretch] - vim <not-affected> (vulnerable code is not present)
+ [buster] - vim <not-affected> (The vulnerable code is not present)
+ [stretch] - vim <not-affected> (The vulnerable code is not present)
NOTE: https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
NOTE: https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323 (v8.2.4233)
CVE-2022-24069 (An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel ...)
@@ -65442,8 +65446,8 @@ CVE-2022-0159 (orchardcore is vulnerable to Improper Neutralization of Input Dur
CVE-2022-0158 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim 2:8.2.4659-1
[bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
- [stretch] - vim <not-affected> (vulnerable code was introduced later)
+ [buster] - vim <not-affected> (The vulnerable code was introduced later)
+ [stretch] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/
NOTE: https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049)
CVE-2022-0157 (phoronix-test-suite is vulnerable to Improper Neutralization of Input ...)
@@ -74891,8 +74895,8 @@ CVE-2021-3969 (A Time of Check Time of Use (TOCTOU) vulnerability was reported i
CVE-2021-3968 (vim is vulnerable to Heap-based Buffer Overflow ...)
- vim 2:8.2.3995-1 (bug #1001900)
[bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
- [stretch] - vim <not-affected> (Vulnerable code not present)
+ [buster] - vim <not-affected> (The vulnerable code is not present)
+ [stretch] - vim <not-affected> (The vulnerable code is not present)
NOTE: https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528/
NOTE: https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 (v8.2.3610)
CVE-2022-21741 (Tensorflow is an Open Source Machine Learning Framework. ### Impact An ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3e24d0f64c1f632f06dc68f5a4c3725b012d27f3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3e24d0f64c1f632f06dc68f5a4c3725b012d27f3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221108/daa92c67/attachment.htm>
More information about the debian-security-tracker-commits
mailing list