[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Jan 16 12:10:15 GMT 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7ee10f8b by Moritz Muehlenhoff at 2023-01-16T13:09:50+01:00
bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -22,6 +22,7 @@ CVE-2023-0306 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten
NOT-FOR-US: phpmyfaq
CVE-2023-XXXX [Multiple integer overflow and buffer overflow issues in game loading]
- sgt-puzzles <unfixed> (bug #1028986)
+ [bullseye] - sgt-puzzles <no-dsa> (Minor issue)
CVE-2023-0305 (A vulnerability classified as critical was found in SourceCodester Onl ...)
NOT-FOR-US: SourceCodester Online Food Ordering System
CVE-2023-0304 (A vulnerability classified as critical has been found in SourceCodeste ...)
@@ -4529,6 +4530,7 @@ CVE-2022-4744
RESERVED
CVE-2022-4743 (A potential memory leak issue was discovered in SDL2 in GLES_CreateTex ...)
- libsdl2 2.26.0+dfsg-1
+ [bullseye] - libsdl2 <no-dsa> (Minor issue)
[buster] - libsdl2 <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2156290
NOTE: https://github.com/libsdl-org/SDL/pull/6269
@@ -123343,6 +123345,7 @@ CVE-2021-32440 (The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers
NOTE: https://github.com/gpac/gpac/issues/1772
CVE-2021-32439 (Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0. ...)
- gpac 2.0.0+dfsg1-2
+ [bullseye] - gpac <no-dsa> (Minor issue)
[buster] - gpac <not-affected> (Vulnerable code introduced later, in version 0.8.0)
[stretch] - gpac <not-affected> (Vulnerable code introduced later, in version 0.8.0)
NOTE: https://github.com/gpac/gpac/commit/77ed81c069e10b3861d88f72e1c6be1277ee7eae (v2.0.0)
@@ -190862,6 +190865,7 @@ CVE-2020-17355 (Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before
CVE-2020-17354
RESERVED
- lilypond 2.22.1-1
+ [bullseye] - lilypond <ignored> (Unfixable, marked as insecure in later uploads)
NOTE: https://phabricator.wikimedia.org/T259210
NOTE: https://phabricator.wikimedia.org/T257062
NOTE: https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory
=====================================
data/dsa-needed.txt
=====================================
@@ -17,6 +17,8 @@ curl (jmm)
--
frr
--
+jupyter-core
+--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
releases to more recent v5.10.y versions
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230116/f3d03f57/attachment.htm>
More information about the debian-security-tracker-commits
mailing list