[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Nov 11 15:05:59 GMT 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a89b938c by Moritz Muehlenhoff at 2022-11-11T16:05:36+01:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -367,6 +367,7 @@ CVE-2022-3873 (Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/draw
 	NOT-FOR-US: jgraph/drawio
 CVE-2022-3872 (An off-by-one read/write issue was found in the SDHCI device of QEMU.  ...)
 	- qemu <unfixed>
+	[bullseye] - qemu <no-dsa> (Minor issue)
 	[buster] - qemu <postponed> (Minor issue, DoS, waiting for sanctioned patch)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2140567
 	NOTE: patch proposal 1: https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html
@@ -8623,6 +8624,7 @@ CVE-2022-42919 (Python 3.9.x and 3.10.x through 3.10.8 on Linux allows local pri
 	- python3.11 3.11.0-2
 	- python3.10 3.10.8-2
 	- python3.9 <unfixed>
+	[bullseye] - python3.9 <no-dsa> (Minor issue)
 	- python3.7 <removed>
 	[buster] - python3.7 <not-affected> (Vulnerable functionality backported later in 3.7.8)
 	NOTE: https://github.com/python/cpython/issues/97514
@@ -17202,6 +17204,7 @@ CVE-2022-39378 (Discourse is a platform for community discussion. Under certain
 	NOT-FOR-US: Discourse
 CVE-2022-39377 (sysstat is a set of system performance tools for the Linux operating s ...)
 	- sysstat <unfixed> (bug #1023832)
+	[bullseye] - sysstat <no-dsa> (Minor issue)
 	NOTE: https://github.com/sysstat/sysstat/security/advisories/GHSA-q8r6-g56f-9w7x
 	NOTE: https://github.com/sysstat/sysstat/commit/9c4eaf150662ad40607923389d4519bc83b93540 (v12.7.1)
 CVE-2022-39376 (GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Fre ...)
@@ -68232,16 +68235,16 @@ CVE-2021-4194 (bookstack is vulnerable to Improper Access Control ...)
 	NOT-FOR-US: bookstack
 CVE-2021-4193 (vim is vulnerable to Out-of-bounds Read ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
 	NOTE: Fixed by: https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b (v8.2.3950)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-4192 (vim is vulnerable to Use After Free ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
 	NOTE: Fixed by: https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952 (v8.2.3949)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-4191 (An issue has been discovered in GitLab CE/EE affecting versions 13.0 t ...)
 	[experimental] - gitlab 14.6.5+ds1
 	- gitlab <unfixed>
@@ -69568,12 +69571,10 @@ CVE-2021-45476 (Yordam Library Information Document Automation product before ve
 CVE-2021-45475 (Yordam Library Information Document Automation product before version  ...)
 	NOT-FOR-US: Yordam Library Information Document Automation
 CVE-2021-4166 (vim is vulnerable to Out-of-bounds Read ...)
-	- vim 2:8.2.3995-1
-	[bullseye] - vim <no-dsa> (Minor issue)
-	[buster] - vim <no-dsa> (Minor issue)
-	[stretch] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
 	NOTE: https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-4165
 	RESERVED
 CVE-2021-4164 (calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) ...)
@@ -71185,13 +71186,13 @@ CVE-2021-44462 (This vulnerability can be exploited by parsing maliciously craft
 CVE-2021-4137
 	RESERVED
 CVE-2021-4136 (vim is vulnerable to Heap-based Buffer Overflow ...)
-	- vim 2:8.2.3995-1 (bug #1002534)
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (bug #1002534; unimportant)
 	[buster] - vim <not-affected> (Vulnerable code introduced later)
 	[stretch] - vim <not-affected> (Vulnerable code introduced later)
 	NOTE: https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
 	NOTE: Introduced by: https://github.com/vim/vim/commit/2949cfdbe4335b9abcfeda1be4dfc52090ee1df6 (v8.2.2257)
 	NOTE: Fixed by: https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264 (v8.2.3847)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-4135 (A memory leak vulnerability was found in the Linux kernel's eBPF for t ...)
 	{DSA-5096-1 DLA-2941-1}
 	- linux 5.15.15-1 (unimportant)
@@ -73239,10 +73240,10 @@ CVE-2021-44549 (Apache Sling Commons Messaging Mail provides a simple layer on t
 	NOT-FOR-US: Apache Sling
 CVE-2021-4069 (vim is vulnerable to Use After Free ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74/
 	NOTE: https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 (v8.2.3741)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-44548 (An Improper Input Validation vulnerability in DataImportHandler of Apa ...)
 	- lucene-solr <not-affected> (Issue only affects Windows)
 	NOTE: https://issues.apache.org/jira/browse/SOLR-15826
@@ -75008,10 +75009,10 @@ CVE-2021-3985 (kimai2 is vulnerable to Improper Neutralization of Input During W
 	NOT-FOR-US: kimai2
 CVE-2021-3984 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1 (bug #1001896)
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (bug #1001896; unimportant)
 	NOTE: https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
 	NOTE: https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-3983 (kimai2 is vulnerable to Improper Neutralization of Input During Web Pa ...)
 	NOT-FOR-US: kimai2
 CVE-2022-21742 (Realtek USB driver has a buffer overflow vulnerability due to insuffic ...)
@@ -75246,17 +75247,16 @@ CVE-2021-43960 (** DISPUTED ** Lorensbergs Connect2 3.13.7647.20190 is affected
 	NOT-FOR-US: Lorensbergs Connect2
 CVE-2021-3974 (vim is vulnerable to Use After Free ...)
 	{DLA-3182-1 DLA-2947-1}
-	- vim 2:8.2.3995-1 (bug #1001897)
-	[bullseye] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (bug #1001897; unimportant)
 	NOTE: https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
 	NOTE: https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-3973 (vim is vulnerable to Heap-based Buffer Overflow ...)
 	{DLA-2947-1}
-	- vim 2:8.2.3995-1 (bug #1001899)
-	[bullseye] - vim <no-dsa> (Minor issue)
-	[buster] - vim <no-dsa> (Minor issue)
+	- vim 2:8.2.3995-1 (unimportant; bug #1001899)
 	NOTE: https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
 	NOTE: https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 (v8.2.3611)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2021-3972 (A potential vulnerability by a driver used during manufacturing proces ...)
 	NOT-FOR-US: Lenovo
 CVE-2021-3971 (A potential vulnerability by a driver used during older manufacturing  ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -27,7 +27,7 @@ linux (carnil)
 netatalk
   open regression with MacOS, tentative patch not yet merged upstream
 --
-nginx
+nginx (jmm)
 --
 nodejs
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a89b938c049a35447c6e1ba6b0f5989ebd2e05f0

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a89b938c049a35447c6e1ba6b0f5989ebd2e05f0
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221111/ed887191/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list