[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Nov 9 13:15:35 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
237bccab by Moritz Muehlenhoff at 2022-11-09T14:13:56+01:00
bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -9,6 +9,7 @@ CVE-2022-45061 (An issue was discovered in Python before 3.11.1. An unnecessary
 	- python3.11 <unfixed>
 	- python3.10 <unfixed>
 	- python3.9 <unfixed>
+	[bullseye] - python3.9 <no-dsa> (Minor issue)
 	- python3.7 <removed>
 	NOTE: https://github.com/python/cpython/issues/98433
 	NOTE: https://github.com/python/cpython/pull/99092
@@ -70366,6 +70367,7 @@ CVE-2021-45267 (An invalid memory address dereference vulnerability exists in gp
 	NOTE: https://github.com/gpac/gpac/commit/29f31f431b18278b94c659452562e8a027436487 (v2.0.0)
 CVE-2021-45266 (A null pointer dereference vulnerability exists in gpac 1.1.0 via the  ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1985
@@ -70376,12 +70378,14 @@ CVE-2021-45264
 	RESERVED
 CVE-2021-45263 (An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_dele ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1975
 	NOTE: https://github.com/gpac/gpac/commit/b232648da3b111a0efe500501ee8ca8f32b616e9 (v2.0.0)
 CVE-2021-45262 (An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_comma ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	[stretch] - gpac <end-of-life> (No longer supported in LTS)
 	NOTE: https://github.com/gpac/gpac/issues/1980
@@ -75022,12 +75026,12 @@ CVE-2021-3970 (A potential vulnerability in LenovoVariable SMI Handler due to in
 CVE-2021-3969 (A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMC ...)
 	NOT-FOR-US: Lenovo
 CVE-2021-3968 (vim is vulnerable to Heap-based Buffer Overflow ...)
-	- vim 2:8.2.3995-1 (bug #1001900)
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant; bug #1001900)
 	[buster] - vim <not-affected> (The vulnerable code is not present)
 	[stretch] - vim <not-affected> (The vulnerable code is not present)
 	NOTE: https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528/
 	NOTE: https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 (v8.2.3610)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-21741 (Tensorflow is an Open Source Machine Learning Framework. ### Impact An ...)
 	- tensorflow <itp> (bug #804612)
 CVE-2022-21740 (Tensorflow is an Open Source Machine Learning Framework. The implement ...)
@@ -77963,16 +77967,16 @@ CVE-2021-43358 (Sunnet eHRD has inadequate filtering for special characters in U
 	NOT-FOR-US: Sunnet eHRD
 CVE-2021-3928 (vim is vulnerable to Use of Uninitialized Variable ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
 	NOTE: Fixed by: https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 (v8.2.3582)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-3927 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
 	NOTE: Fixed by: https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e (v8.2.3581)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-43357
 	RESERVED
 CVE-2021-43350 (An unauthenticated Apache Traffic Control Traffic Ops user can send a  ...)
@@ -79915,12 +79919,11 @@ CVE-2021-3904 (grav is vulnerable to Improper Neutralization of Input During Web
 	NOT-FOR-US: Grav CMS
 CVE-2021-3903 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	{DLA-3053-1}
-	- vim 2:8.2.3565-1
-	[bullseye] - vim <no-dsa> (Minor issue)
-	[buster] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3565-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
 	NOTE: https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
 	NOTE: PoC crashes starting with https://github.com/vim/vim/commit/8a7d6542b33e5d2b352262305c3bfdb2d14e1cf8 (v8.2.0149)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2020-36503 (The Connections Business Directory WordPress plugin before 9.7 does no ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2021-43010 (In Safedog Apache v4.0.30255, attackers can bypass this product for SQ ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/237bccabc56a947264a896c3149525543048dd75

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/237bccabc56a947264a896c3149525543048dd75
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221109/58d5bac8/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list