[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Jan 9 15:59:47 GMT 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
24493847 by Moritz Muehlenhoff at 2023-01-09T16:59:33+01:00
bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -3368,34 +3368,42 @@ CVE-2022-47664
RESERVED
CVE-2022-47663 (GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2360
NOTE: https://github.com/gpac/gpac/commit/e7e8745f677010a5cb3366d5cbf39df7cffaaa2d (v2.2.0)
CVE-2022-47662 (GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack over ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2359
NOTE: https://github.com/gpac/gpac/commit/080a62728ccd251a7f20eaac3fda21b0716e3c9b (v2.2.0)
CVE-2022-47661 (GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2358
NOTE: https://github.com/gpac/gpac/commit/aa8fbec874b5e040854effff5309aa445c234618 (v2.2.0)
CVE-2022-47660 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in is ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2357
NOTE: https://github.com/gpac/gpac/commit/a8f438d201fb165961ba1d5d3b80daa3637735f4 (v2.2.0)
CVE-2022-47659 (GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2354
NOTE: https://github.com/gpac/gpac/commit/348d7722c1e90c7811b43b0eed5c2aca2cb8a717 (v2.2.0)
CVE-2022-47658 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow ...)
- gpac <unfixed>
+ [bullseye] - gpac <not-affected> (Vulnerable code not present)
NOTE: https://github.com/gpac/gpac/issues/2356
NOTE: https://github.com/gpac/gpac/commit/55c8b3af6f5ef9e51edb41172062ca9b5db4026b (v2.2.0)
CVE-2022-47657 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow ...)
- gpac <unfixed>
+ [bullseye] - gpac <no-dsa> (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2355
NOTE: https://github.com/gpac/gpac/commit/9f1e633184904fffc315bd35ebce76b4b42f9097 (v2.2.0)
CVE-2022-47656 (GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow ...)
- gpac <unfixed>
+ [bullseye] - gpac <not-affected> (Vulnerable code not present)
NOTE: https://github.com/gpac/gpac/issues/2353
NOTE: https://github.com/gpac/gpac/commit/c9a8118965b53d29837b1b82b6a58543efb23baf (v2.2.0)
CVE-2022-47655 (Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_q ...)
@@ -5168,6 +5176,7 @@ CVE-2022-4516
CVE-2022-4515 (A flaw was found in Exuberant Ctags in the way it handles the "-o" opt ...)
{DLA-3254-1}
- exuberant-ctags 1:5.9~svn20110310-18 (bug #1026995)
+ [bullseye] - exuberant-ctags <no-dsa> (Minor issue)
- universal-ctags <not-affected> (Fixed before initial upload to Debian)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2153519
NOTE: Fixed by: https://github.com/universal-ctags/ctags/commit/e00c55d7a0204dc1d0ae316141323959e1e16162
@@ -5681,6 +5690,7 @@ CVE-2022-4442
RESERVED
CVE-2019-25078 (A vulnerability classified as problematic was found in pacparser up to ...)
- pacparser <unfixed> (bug #1026106)
+ [bullseye] - pacparser <no-dsa> (Minor issue)
[buster] - pacparser <no-dsa> (Minor issue)
NOTE: https://github.com/manugarg/pacparser/issues/99
NOTE: https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9 (v1.4.0)
=====================================
data/dsa-needed.txt
=====================================
@@ -66,3 +66,8 @@ sox
--
tiff (aron)
--
+varnish
+--
+xrdp
+ needs some additional clarification, tentatively DSA worthy
+ maybe upgrade to 0.9.21 within bullseye?
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/244938475e37774c5c75690533d9804cd49f61de
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/244938475e37774c5c75690533d9804cd49f61de
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230109/fd4d8009/attachment.htm>
More information about the debian-security-tracker-commits
mailing list