[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Oct 12 13:07:47 BST 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e3d9e484 by Moritz Muehlenhoff at 2022-10-12T14:07:11+02:00
bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5376,9 +5376,9 @@ CVE-2022-40627
 	RESERVED
 CVE-2022-40626 (An unauthenticated user can create a link with reflected Javascript co ...)
 	- zabbix 1:6.0.7+dfsg-2
+	[bullseye] - zabbix <no-dsa> (Minor issue)
 	NOTE: https://support.zabbix.com/browse/ZBX-21350
 	NOTE: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/55eb14d0a394b362d5df00ed9e06a3918472deec (6.0.7rc1)
-	TODO: check, verify it really did not affect versions before 6.0.0
 CVE-2022-40625
 	RESERVED
 CVE-2022-40624
@@ -10656,7 +10656,7 @@ CVE-2022-2925 (Cross-site Scripting (XSS) - Stored in GitHub repository appwrite
 CVE-2022-2924 (Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecomp ...)
 	NOT-FOR-US: yetiforcecrm
 CVE-2022-2923 (NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.024 ...)
-	- vim 2:9.0.0242-1
+	- vim 2:9.0.0242-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2
 	NOTE: https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e (v9.0.0240)
 	NOTE: Crash in CLI tool, no security impact
@@ -11632,9 +11632,10 @@ CVE-2022-2817 (Use After Free in GitHub repository vim/vim prior to 9.0.0213. ..
 	NOTE: https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f
 	NOTE: https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20 (v9.0.0213)
 CVE-2022-2816 (Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212. ...)
-	- vim 2:9.0.0229-1
+	- vim 2:9.0.0229-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58
 	NOTE: https://github.com/vim/vim/commit/dbdd16b62560413abcc3c8e893cc3010ccf31666 (v9.0.0212)
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-38217
 	RESERVED
 CVE-2022-2815
@@ -13130,6 +13131,7 @@ CVE-2022-37617 (Prototype pollution vulnerability in function resolveShims in re
 	NOT-FOR-US: Node browserify-shim
 CVE-2022-37616 (A prototype pollution vulnerability exists in the function copy in dom ...)
 	- node-xmldom <unfixed> (bug #1021618)
+	[bullseye] - node-xmldom <no-dsa> (Minor issue)
 	NOTE: https://github.com/xmldom/xmldom/issues/436
 	NOTE: https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj
 	NOTE: Fixed by: https://github.com/xmldom/xmldom/commit/6956ec406fd4658dfb028a327c7a39238b24c3cd (0.9.0-beta.2)
@@ -77752,6 +77754,7 @@ CVE-2021-3783 (yourls is vulnerable to Improper Neutralization of Input During W
 	NOT-FOR-US: yourls
 CVE-2021-3782 (An internal reference count is held on the buffer pool, incremented ev ...)
 	- wayland 1.21.0-1
+	[bullseye] - wayland <no-dsa> (Minor issue)
 	NOTE: https://gitlab.freedesktop.org/wayland/wayland/-/issues/224
 	NOTE: https://gitlab.freedesktop.org/wayland/wayland/-/commit/b19488c7154b902354cb26a27f11415d7799b0b2 (1.20.91)
 CVE-2021-3781 (A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3d9e4849fe58b368f33fed7567106c64665ae16

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3d9e4849fe58b368f33fed7567106c64665ae16
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221012/59e24740/attachment.htm>


More information about the debian-security-tracker-commits mailing list