[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Nov 30 21:47:55 GMT 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d6f78138 by Moritz Muehlenhoff at 2022-11-30T22:46:30+01:00
bullseye triage
mplayer spu
- - - - -
2 changed files:
- data/CVE/list
- data/next-point-update.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1486,6 +1486,7 @@ CVE-2022-45786
CVE-2022-4121 [Null pointer dereference in mailimap_mailbox_data_status_free in low-level/imap/mailimap_types.c]
RESERVED
- libetpan <unfixed> (bug #1025120)
+ [bullseye] - libetpan <no-dsa> (Minor issue)
NOTE: https://github.com/dinhvh/libetpan/issues/420
CVE-2022-4120
RESERVED
@@ -2959,6 +2960,7 @@ CVE-2022-45344
RESERVED
CVE-2022-45343 (GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a hea ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2315
NOTE: https://github.com/gpac/gpac/commit/1016912db5408b6f38e8eb715279493ae380d1c4
@@ -3341,6 +3343,7 @@ CVE-2022-3964 (A vulnerability classified as problematic has been found in ffmpe
CVE-2022-45197 [missing certificate hostname validation]
RESERVED
- slixmpp 1.8.3-1
+ [bullseye] - slixmpp <no-dsa> (Minor issue)
NOTE: https://lab.louiz.org/poezio/slixmpp/-/commit/b60b1b985db928532f97c4f61d6fbc801f0aa7fa (slix-1.8.3)
CVE-2022-45196 (Hyperledger Fabric 2.3 allows attackers to cause a denial of service ( ...)
NOT-FOR-US: Hyperledger Fabric
@@ -22221,6 +22224,7 @@ CVE-2022-38865 (Certain The MPlayer Project products are vulnerable to Divide By
NOTE: Crash in CLI tool, no security impact
CVE-2022-38864 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...)
- mplayer <unfixed> (bug #1021013)
+ [bullseye] - mplayer <no-dsa> (Minor issue, will be fixed via spu)
NOTE: https://trac.mplayerhq.hu/ticket/2406
NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/36546389ef9fb6b0e0540c5c3f212534c34b0e94 (r38391)
CVE-2022-38863 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...)
@@ -22234,6 +22238,7 @@ CVE-2022-38862 (Certain The MPlayer Project products are vulnerable to Buffer Ov
NOTE: https://trac.mplayerhq.hu/ticket/2404
CVE-2022-38861 (The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory ...)
- mplayer <unfixed> (bug #1021013)
+ [bullseye] - mplayer <no-dsa> (Minor issue, will be fixed via spu)
NOTE: https://trac.mplayerhq.hu/ticket/2407
NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/2622e7fbe3605a2f3b4f74900197fefeedc0d2e1 (r38402)
CVE-2022-38860 (Certain The MPlayer Project products are vulnerable to Divide By Zero ...)
@@ -29726,9 +29731,11 @@ CVE-2022-36181
RESERVED
CVE-2022-36180 (Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /f ...)
- fusiondirectory <removed>
+ [bullseye] - fusiondirectory <no-dsa> (Minor issue)
NOTE: https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
CVE-2022-36179 (Fusiondirectory 1.3 suffers from Improper Session Handling. ...)
- fusiondirectory <removed>
+ [bullseye] - fusiondirectory <no-dsa> (Minor issue)
NOTE: https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/
CVE-2022-36178
RESERVED
=====================================
data/next-point-update.txt
=====================================
@@ -68,3 +68,23 @@ CVE-2020-29260
[bullseye] - libvncserver 0.9.13+dfsg-2+deb11u1
CVE-2022-39353
[bullseye] - node-xmldom 0.5.0-1+deb11u2
+CVE-2022-38866
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38865
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38864
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38863
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38861
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38860
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38858
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38855
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38851
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
+CVE-2022-38850
+ [bullseye] - mplayer 2:1.4+ds1-1+deb11u1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6f78138c9925551da9bf1698da03dbd1876e772
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6f78138c9925551da9bf1698da03dbd1876e772
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221130/7648c513/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list