[Git][security-tracker-team/security-tracker][master] Fixup some doubled NOTE: markers

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Feb 11 08:52:45 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1ba4ddd8 by Salvatore Bonaccorso at 2025-02-11T09:52:08+01:00
Fixup some doubled NOTE: markers

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -374,7 +374,7 @@ CVE-2025-1153 (A vulnerability classified as problematic was found in GNU Binuti
 	- binutils <unfixed> (unimportant)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32603
 	NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
-	NOTE: NOTE: binutils not covered by security support
+	NOTE: binutils not covered by security support
 CVE-2025-1152 (A vulnerability classified as problematic has been found in GNU Binuti ...)
 	- binutils <unfixed> (unimportant)
 	NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
@@ -205691,17 +205691,17 @@ CVE-2022-39291 (ZoneMinder is a free, open source Closed-circuit television soft
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/73d9f2482cdcb238506388798d3cf92546f9e40c
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/cb3fc5907da21a5111ae54128a5d0b49ae755e9b
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/de2866f9574a2bf2690276fad53c91d607825408
-	NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+	NOTE: Only supported for trusted users/behind auth, see README.debian.security
 CVE-2022-39290 (ZoneMinder is a free, open source Closed-circuit television software a ...)
 	- zoneminder 1.36.31+dfsg1-1 (unimportant; bug #1021565)
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/c0a4c05e84eea0f6ccf7169c014efe5422c9ba0d
 	NOTE: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-xgv6-qv6c-399q
-	NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+	NOTE: Only supported for trusted users/behind auth, see README.debian.security
 CVE-2022-39289 (ZoneMinder is a free, open source Closed-circuit television software a ...)
 	- zoneminder 1.36.31+dfsg1-1 (unimportant; bug #1021565)
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/34ffd92bf123070cab6c83ad4cfe6297dd0ed0b4
 	NOTE: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-mpcx-3gvh-9488
-	NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+	NOTE: Only supported for trusted users/behind auth, see README.debian.security
 CVE-2022-39288 (fastify is a fast and low overhead web framework, for Node.js. Affecte ...)
 	NOT-FOR-US: Node fastify
 CVE-2022-39287 (tiny-csrf is a Node.js cross site request forgery (CSRF) protection mi ...)
@@ -205716,7 +205716,7 @@ CVE-2022-39285 (ZoneMinder is a free, open source Closed-circuit television soft
 	NOTE: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-h6xp-cvwv-q433
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/c0a4c05e84eea0f6ccf7169c014efe5422c9ba0d
 	NOTE: https://github.com/ZoneMinder/zoneminder/commit/d289eb48601a76e34feea3c1683955337b1fae59
-	NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+	NOTE: Only supported for trusted users/behind auth, see README.debian.security
 CVE-2022-39284 (CodeIgniter is a PHP full-stack web framework. In versions prior to 4. ...)
 	- codeigniter <itp> (bug #471583)
 CVE-2022-39283 (FreeRDP is a free remote desktop protocol library and clients. All Fre ...)
@@ -223233,7 +223233,7 @@ CVE-2022-32990 (An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/e7d4b580e514029f28dc9bd59c66187e166db47c (GIMP_2_10_32)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/744959433647bdefcdf00b3f0d575f6812cd0d6d (GIMP_2_10_32)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/6ab90ecbbd7cc95901933f62227fd140c0576d55 (GIMP_2_10_32)
-	NOTE: NOTE: Crash in GUI application, no security impact
+	NOTE: Crash in GUI application, no security impact
 CVE-2022-32989
 	RESERVED
 CVE-2022-32988 (Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1. ...)
@@ -229490,7 +229490,7 @@ CVE-2022-1726 (Bootstrap Tables XSS vulnerability with Table Export plug-in when
 	NOTE: https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea
 	NOTE: src:zoneminder embedds bootstrap-table-export.js in debian/missing-sources/
 	NOTE: https://github.com/wenzhixin/bootstrap-table/commit/66ef886d5d325777c8727274c9e018f9c17bc0b9 (1.20.2)
-	NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+	NOTE: Only supported for trusted users/behind auth, see README.debian.security
 CVE-2022-1725 (NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.495 ...)
 	- vim 2:9.0.0135-1 (unimportant)
 	NOTE: https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c
@@ -239871,7 +239871,7 @@ CVE-2022-27418 (Tcpreplay v4.4.1 has a heap-based buffer overflow in do_checksum
 	NOTE: https://github.com/appneta/tcpreplay/commit/e2ac765a25e902728b6d4a825358aa536e6668c2 (v4.4.1)
 	NOTE: https://github.com/appneta/tcpreplay/commit/7248ddb7ddd363b15b86e65022773f791764c33a (v4.4.1)
 	NOTE: https://github.com/appneta/tcpreplay/commit/b63f1697c9eae73c7880882e14f9a0ec9545f19a (v4.4.1)
-	NOTE: NOTE: Crash in CLI tool, no security impact
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-27417
 	RESERVED
 CVE-2022-27416 (Tcpreplay v4.4.1 was discovered to contain a double-free via __interce ...)
@@ -239880,7 +239880,7 @@ CVE-2022-27416 (Tcpreplay v4.4.1 was discovered to contain a double-free via __i
 	NOTE: https://github.com/appneta/tcpreplay/pull/711
 	NOTE: https://github.com/appneta/tcpreplay/commit/9297ac29af91324e3f94580b8ffc2a40a4d59e98 (v4.4.1)
 	NOTE: https://github.com/appneta/tcpreplay/commit/45cb2ac23213861749d82ad3524f46e347d308a3 (v4.4.1)
-	NOTE: NOTE: Crash in CLI tool, no security impact
+	NOTE: Crash in CLI tool, no security impact
 CVE-2022-27415
 	RESERVED
 CVE-2022-27414
@@ -266821,7 +266821,7 @@ CVE-2022-21125 (Incomplete cleanup of microarchitectural fill buffers on some In
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
 	NOTE: https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDS
 	NOTE: Linux kernel documentation patch: https://git.kernel.org/linus/4419470191386456e0b8ed4eb06a70b0021798a6
-	NOTE: NOTE: https://xenbits.xen.org/xsa/advisory-404.html
+	NOTE: https://xenbits.xen.org/xsa/advisory-404.html
 CVE-2022-21123 (Incomplete cleanup of multi-core shared buffers for some Intel(R) Proc ...)
 	{DSA-5184-1 DSA-5178-1 DSA-5173-1 DLA-3065-1}
 	- intel-microcode 3.20220510.1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1ba4ddd8ca17bb2087afaa0b3891797721efbf36

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1ba4ddd8ca17bb2087afaa0b3891797721efbf36
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250211/681664e7/attachment.htm>


More information about the debian-security-tracker-commits mailing list