[Git][security-tracker-team/security-tracker][master] bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Jan 16 12:10:15 GMT 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7ee10f8b by Moritz Muehlenhoff at 2023-01-16T13:09:50+01:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -22,6 +22,7 @@ CVE-2023-0306 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten
 	NOT-FOR-US: phpmyfaq
 CVE-2023-XXXX [Multiple integer overflow and buffer overflow issues in game loading]
 	- sgt-puzzles <unfixed> (bug #1028986)
+	[bullseye] - sgt-puzzles <no-dsa> (Minor issue)
 CVE-2023-0305 (A vulnerability classified as critical was found in SourceCodester Onl ...)
 	NOT-FOR-US: SourceCodester Online Food Ordering System
 CVE-2023-0304 (A vulnerability classified as critical has been found in SourceCodeste ...)
@@ -4529,6 +4530,7 @@ CVE-2022-4744
 	RESERVED
 CVE-2022-4743 (A potential memory leak issue was discovered in SDL2 in GLES_CreateTex ...)
 	- libsdl2 2.26.0+dfsg-1
+	[bullseye] - libsdl2 <no-dsa> (Minor issue)
 	[buster] - libsdl2 <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2156290
 	NOTE: https://github.com/libsdl-org/SDL/pull/6269
@@ -123343,6 +123345,7 @@ CVE-2021-32440 (The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers
 	NOTE: https://github.com/gpac/gpac/issues/1772
 CVE-2021-32439 (Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0. ...)
 	- gpac 2.0.0+dfsg1-2
+	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <not-affected> (Vulnerable code introduced later, in version 0.8.0)
 	[stretch] - gpac <not-affected> (Vulnerable code introduced later, in version 0.8.0)
 	NOTE: https://github.com/gpac/gpac/commit/77ed81c069e10b3861d88f72e1c6be1277ee7eae (v2.0.0)
@@ -190862,6 +190865,7 @@ CVE-2020-17355 (Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before
 CVE-2020-17354
 	RESERVED
 	- lilypond 2.22.1-1
+	[bullseye] - lilypond <ignored> (Unfixable, marked as insecure in later uploads)
 	NOTE: https://phabricator.wikimedia.org/T259210
 	NOTE: https://phabricator.wikimedia.org/T257062
 	NOTE: https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory


=====================================
data/dsa-needed.txt
=====================================
@@ -17,6 +17,8 @@ curl (jmm)
 --
 frr
 --
+jupyter-core
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y versions



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230116/f3d03f57/attachment.htm>


More information about the debian-security-tracker-commits mailing list