[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Nov 9 10:54:40 GMT 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1e1b50cb by Moritz Muehlenhoff at 2022-11-09T11:54:20+01:00
bullseye triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2177,6 +2177,7 @@ CVE-2022-3822
RESERVED
CVE-2022-3821 (An off-by-one Error issue was discovered in Systemd in format_timespan ...)
- systemd 251.3-1
+ [bullseye] - systemd <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2139327
NOTE: https://github.com/systemd/systemd/issues/23928
NOTE: https://github.com/systemd/systemd/pull/23933
@@ -19868,9 +19869,10 @@ CVE-2022-2891 (The WP 2FA WordPress plugin before 2.3.0 uses comparison operator
CVE-2022-2890 (Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecomp ...)
NOT-FOR-US: yetiforcecrm
CVE-2022-2889 (Use After Free in GitHub repository vim/vim prior to 9.0.0225. ...)
- - vim 2:9.0.0229-1
+ - vim 2:9.0.0229-1 (unimportant)
NOTE: https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa
NOTE: https://github.com/vim/vim/commit/91c7cbfe31bbef57d5fcf7d76989fc159f73ef15 (v9.0.0225)
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-2888 (If an attacker comes into the possession of a victim's OctoPrint sessi ...)
- octoprint <itp> (bug #718591)
CVE-2022-2887 (The WP Server Health Stats WordPress plugin before 1.7.0 does not esca ...)
@@ -20003,10 +20005,11 @@ CVE-2022-2864 (The demon image annotation plugin for WordPress is vulnerable to
CVE-2022-2863 (The Migration, Backup, Staging WordPress plugin before 0.9.76 does not ...)
NOT-FOR-US: WordPress plugin
CVE-2022-2862 (Use After Free in GitHub repository vim/vim prior to 9.0.0221. ...)
- - vim 2:9.0.0229-1
+ - vim 2:9.0.0229-1 (unimportant)
[buster] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765
NOTE: https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494 (v9.0.0221)
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-2861 (Inappropriate implementation in Extensions API in Google Chrome prior ...)
{DSA-5212-1}
- chromium 104.0.5112.101-1
@@ -20290,10 +20293,11 @@ CVE-2022-2821 (Missing Critical Step in Authentication in GitHub repository name
CVE-2022-2820 (Improper Access Control in GitHub repository namelessmc/nameless prior ...)
NOT-FOR-US: NamelessMC/Nameless
CVE-2022-2819 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...)
- - vim 2:9.0.0229-1
+ - vim 2:9.0.0229-1 (unimportant)
[buster] - vim <not-affected> (The vulnerable code was introduced later)
NOTE: https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59
NOTE: https://github.com/vim/vim/commit/d1d8f6bacb489036d0fd479c9dd3c0102c988889 (v9.0.0211)
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-2818 (Authentication Bypass by Primary Weakness in GitHub repository cockpit ...)
NOT-FOR-US: Cockpit-HQ/Cockpit
CVE-2022-38305 (AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vuln ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e1b50cbbbf564362adeec21bc0cdf185cbcef3e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e1b50cbbbf564362adeec21bc0cdf185cbcef3e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221109/9841b7df/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list