[Git][security-tracker-team/security-tracker][master] bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Feb 21 12:29:42 GMT 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e24005dd by Moritz Muehlenhoff at 2023-02-21T10:30:07+01:00
bookworm triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -20278,6 +20278,7 @@ CVE-2022-45749
RESERVED
CVE-2022-45748 (An issue was discovered with assimp 5.1.4, a use after free occurred i ...)
- assimp <unfixed> (bug #1029833)
+ [bookworm] - assimp <no-dsa> (Minor issue)
[bullseye] - assimp <no-dsa> (Minor issue)
[buster] - assimp <no-dsa> (Minor issue)
NOTE: https://github.com/assimp/assimp/issues/4286
@@ -42679,6 +42680,7 @@ CVE-2022-38529 (tinyexr commit 0647fb3 was discovered to contain a heap-buffer o
NOTE: https://github.com/syoyo/tinyexr/commit/82984a37d1dba67000a35b083b26df5e57a2bb72
CVE-2022-38528 (Open Asset Import Library (assimp) commit 3c253ca was discovered to co ...)
- assimp <unfixed> (bug #1021018)
+ [bookworm] - assimp <no-dsa> (Minor issue)
[bullseye] - assimp <no-dsa> (Minor issue)
[buster] - assimp <no-dsa> (Minor issue)
NOTE: https://github.com/assimp/assimp/issues/4662
@@ -93759,6 +93761,7 @@ CVE-2021-45341 (A buffer overflow vulnerability in CDataMoji of the jwwlib compo
NOTE: Fixed by: https://github.com/LibreCAD/LibreCAD/commit/f3502963eaf379a429bc9da73c1224c5db649997
CVE-2021-45340 (In Libsixel prior to and including v1.10.3, a NULL pointer dereference ...)
- libsixel <unfixed> (bug #1004377)
+ [bookworm] - libsixel <no-dsa> (Minor issue)
[bullseye] - libsixel <no-dsa> (Minor issue)
[buster] - libsixel <no-dsa> (Minor issue)
[stretch] - libsixel <no-dsa> (Minor issue)
@@ -131741,6 +131744,7 @@ CVE-2021-32295
RESERVED
CVE-2021-32294 (An issue was discovered in libgig through 20200507. A heap-buffer-over ...)
- libgig <unfixed> (bug #1014777)
+ [bookworm] - libgig <ignored> (Minor issue)
[bullseye] - libgig <ignored> (Minor issue)
[buster] - libgig <ignored> (Minor issue)
[stretch] - libgig <postponed> (Minor issue, revisit when/if fixed upstream)
@@ -159072,11 +159076,13 @@ CVE-2020-36121
RESERVED
CVE-2020-36120 (Buffer Overflow in the "sixel_encoder_encode_bytes" function of Libsix ...)
- libsixel <unfixed> (bug #988159)
- [bullseye] - libsixel <no-dsa> (Minor issue)
+ [bookworm] - libsixel <no-dsa> (Minor issue, fix modifies the API)
+ [bullseye] - libsixel <ignored> (Minor issue, fix modifies the API)
[buster] - libsixel <no-dsa> (Minor issue)
[stretch] - libsixel <postponed> (Minor issue; can be fixed in next update)
- NOTE: https://github.com/saitoha/libsixel/issues/143
+ NOTE: https://github.com/saitoha/libsixel/issues/143 (old/defunct repo)
NOTE: https://github.com/libsixel/libsixel/issues/46
+ NOTE: https://github.com/libsixel/libsixel/pull/47
CVE-2020-36119
RESERVED
CVE-2020-36118
@@ -333036,6 +333042,7 @@ CVE-2017-18227 (TitanHQ WebTitan Gateway has incorrect certificate validation fo
NOT-FOR-US: TitanHQ WebTitan Gateway
CVE-2017-18226 (The Gentoo net-im/jabberd2 package through 2.6.1 sets the ownership of ...)
- jabberd2 <unfixed> (low; bug #902783)
+ [bookworm] - jabberd2 <ignored> (Minor issue, default init system not affected)
[bullseye] - jabberd2 <ignored> (Minor issue, default init system not affected)
[buster] - jabberd2 <ignored> (Minor issue, default init system not affected)
[stretch] - jabberd2 <ignored> (Minor issue, default init system not affected)
@@ -434175,11 +434182,7 @@ CVE-2016-1587 (The Snapweb interface before version 0.21.2 was exposing controls
CVE-2016-1586 (A malicious webview could install long-lived unload handlers that re-u ...)
NOT-FOR-US: Oxide
CVE-2016-1585 (In all versions of AppArmor mount rules are accidentally widened when ...)
- - apparmor <unfixed> (low; bug #929990)
- [bullseye] - apparmor <ignored> (Minor overall security impact)
- [buster] - apparmor <ignored> (Minor overall security impact)
- [stretch] - apparmor <ignored> (Minor overall security impact)
- [jessie] - apparmor <ignored> (Minor overall security impact)
+ - apparmor <unfixed> (unimportant; bug #929990)
NOTE: https://bugs.launchpad.net/apparmor/+bug/1597017
NOTE: https://bugzilla.opensuse.org/show_bug.cgi?id=995594
NOTE: Introduced around AppArmor 2.8 upstream.
@@ -434188,6 +434191,7 @@ CVE-2016-1585 (In all versions of AppArmor mount rules are accidentally widened
NOTE: by default before buster, in particular not with mount rules), 2. libvirtd
NOTE: but the profile is not meant to be a strong security boundary.
NOTE: https://bugs.launchpad.net/apparmor/+bug/1597017/comments/6
+ NOTE: Negligible security impact / known limitation
CVE-2016-1584 (In all versions of Unity8 a running but not active application on a la ...)
- unity <itp> (bug #609278)
CVE-2016-1583 (The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e24005ddd6defa84189f9ba753f4dd0d48820b39
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e24005ddd6defa84189f9ba753f4dd0d48820b39
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230221/49e599a4/attachment.htm>
More information about the debian-security-tracker-commits
mailing list