[Git][security-tracker-team/security-tracker][master] 4 commits: mark CVE-2021-45423 as not-affected for Buster

Thorsten Alteholz (@alteholz) alteholz at debian.org
Sun May 7 00:21:33 BST 2023



Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker


Commits:
de96f629 by Thorsten Alteholz at 2023-05-07T01:15:15+02:00
mark CVE-2021-45423 as not-affected for Buster

- - - - -
b103816e by Thorsten Alteholz at 2023-05-07T01:17:40+02:00
mark CVE-2023-29323 as no-dsa for Buster

- - - - -
2d7c953d by Thorsten Alteholz at 2023-05-07T01:18:59+02:00
mark CVE-2022-48468 as no-dsa for Buster

- - - - -
2c4bc770 by Thorsten Alteholz at 2023-05-07T01:20:03+02:00
mark CVE-2023-31485 as no-dsa for Buster

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -163,6 +163,7 @@ CVE-2023-2426 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim p
 CVE-2023-31485 (GitLab::API::v4 through 0.26 does not verify TLS certificates when con ...)
 	- libgitlab-api-v4-perl <unfixed> (bug #954051)
 	[bullseye] - libgitlab-api-v4-perl <no-dsa> (Minor issue)
+	[buster] - libgitlab-api-v4-perl <no-dsa> (Minor issue)
 	NOTE: https://github.com/bluefeet/GitLab-API-v4/pull/57
 CVE-2023-31484 (CPAN.pm before 2.35 does not verify TLS certificates when downloading  ...)
 	- perl <unfixed> (bug #1035109)
@@ -2566,6 +2567,7 @@ CVE-2022-48468 (protobuf-c before 1.4.1 has an unsigned integer overflow in pars
 	[buster] - protobuf-c <no-dsa> (Minor issue)
 	- libsignal-protocol-c 2.3.3-3
 	[bullseye] - libsignal-protocol-c <no-dsa> (Minor issue)
+	[buster] - libsignal-protocol-c <no-dsa> (Minor issue)
 	NOTE: https://github.com/protobuf-c/protobuf-c/commit/289f5c18b195aa43d46a619d1188709abbfa9c82 (v1.4.1)
 	NOTE: https://github.com/protobuf-c/protobuf-c/commit/0d1fd124a4e0a07b524989f6e64410ff648fba61 (v1.4.1)
 	NOTE: https://github.com/protobuf-c/protobuf-c/pull/513
@@ -5792,6 +5794,7 @@ CVE-2023-29323 (ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 an
 	- opensmtpd <unfixed> (bug #1034178)
 	[bookworm] - opensmtpd <no-dsa> (Minor issue)
 	[bullseye] - opensmtpd <no-dsa> (Minor issue)
+	[buster] - opensmtpd <no-dsa> (Minor issue)
 	NOTE: https://ftp.openbsd.org/pub/OpenBSD/patches/7.1/common/024_smtpd.patch.sig
 CVE-2023-29322
 	RESERVED
@@ -109787,6 +109790,7 @@ CVE-2021-45424
 CVE-2021-45423 (A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports f ...)
 	- pev 0.81-9 (bug #1034725)
 	[bullseye] - pev <no-dsa> (Minor issue, will be fixed in next point release)
+	[buster] - pev <not-affected> (Vulnerable code introduced later)
 	NOTE: https://github.com/merces/libpe/issues/35
 	NOTE: https://github.com/merces/libpe/commit/9b5fedc37ccbcd23695a0e97c0fe46c999e26100
 	NOTE: https://github.com/merces/libpe/commit/8960f7d710c4d1a43badd2bbf273721248b864f8



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/a459575c659cf74601dc47911e34c88ae8f11eea...2c4bc770633c72d44f4e45a27a3462ca28ee7784

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/a459575c659cf74601dc47911e34c88ae8f11eea...2c4bc770633c72d44f4e45a27a3462ca28ee7784
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230506/de86e2d1/attachment.htm>


More information about the debian-security-tracker-commits mailing list