[Git][security-tracker-team/security-tracker][master] Fixup some doubled NOTE: markers
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Feb 11 08:52:45 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1ba4ddd8 by Salvatore Bonaccorso at 2025-02-11T09:52:08+01:00
Fixup some doubled NOTE: markers
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -374,7 +374,7 @@ CVE-2025-1153 (A vulnerability classified as problematic was found in GNU Binuti
- binutils <unfixed> (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32603
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
- NOTE: NOTE: binutils not covered by security support
+ NOTE: binutils not covered by security support
CVE-2025-1152 (A vulnerability classified as problematic has been found in GNU Binuti ...)
- binutils <unfixed> (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
@@ -205691,17 +205691,17 @@ CVE-2022-39291 (ZoneMinder is a free, open source Closed-circuit television soft
NOTE: https://github.com/ZoneMinder/zoneminder/commit/73d9f2482cdcb238506388798d3cf92546f9e40c
NOTE: https://github.com/ZoneMinder/zoneminder/commit/cb3fc5907da21a5111ae54128a5d0b49ae755e9b
NOTE: https://github.com/ZoneMinder/zoneminder/commit/de2866f9574a2bf2690276fad53c91d607825408
- NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+ NOTE: Only supported for trusted users/behind auth, see README.debian.security
CVE-2022-39290 (ZoneMinder is a free, open source Closed-circuit television software a ...)
- zoneminder 1.36.31+dfsg1-1 (unimportant; bug #1021565)
NOTE: https://github.com/ZoneMinder/zoneminder/commit/c0a4c05e84eea0f6ccf7169c014efe5422c9ba0d
NOTE: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-xgv6-qv6c-399q
- NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+ NOTE: Only supported for trusted users/behind auth, see README.debian.security
CVE-2022-39289 (ZoneMinder is a free, open source Closed-circuit television software a ...)
- zoneminder 1.36.31+dfsg1-1 (unimportant; bug #1021565)
NOTE: https://github.com/ZoneMinder/zoneminder/commit/34ffd92bf123070cab6c83ad4cfe6297dd0ed0b4
NOTE: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-mpcx-3gvh-9488
- NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+ NOTE: Only supported for trusted users/behind auth, see README.debian.security
CVE-2022-39288 (fastify is a fast and low overhead web framework, for Node.js. Affecte ...)
NOT-FOR-US: Node fastify
CVE-2022-39287 (tiny-csrf is a Node.js cross site request forgery (CSRF) protection mi ...)
@@ -205716,7 +205716,7 @@ CVE-2022-39285 (ZoneMinder is a free, open source Closed-circuit television soft
NOTE: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-h6xp-cvwv-q433
NOTE: https://github.com/ZoneMinder/zoneminder/commit/c0a4c05e84eea0f6ccf7169c014efe5422c9ba0d
NOTE: https://github.com/ZoneMinder/zoneminder/commit/d289eb48601a76e34feea3c1683955337b1fae59
- NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+ NOTE: Only supported for trusted users/behind auth, see README.debian.security
CVE-2022-39284 (CodeIgniter is a PHP full-stack web framework. In versions prior to 4. ...)
- codeigniter <itp> (bug #471583)
CVE-2022-39283 (FreeRDP is a free remote desktop protocol library and clients. All Fre ...)
@@ -223233,7 +223233,7 @@ CVE-2022-32990 (An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/e7d4b580e514029f28dc9bd59c66187e166db47c (GIMP_2_10_32)
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/744959433647bdefcdf00b3f0d575f6812cd0d6d (GIMP_2_10_32)
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/6ab90ecbbd7cc95901933f62227fd140c0576d55 (GIMP_2_10_32)
- NOTE: NOTE: Crash in GUI application, no security impact
+ NOTE: Crash in GUI application, no security impact
CVE-2022-32989
RESERVED
CVE-2022-32988 (Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1. ...)
@@ -229490,7 +229490,7 @@ CVE-2022-1726 (Bootstrap Tables XSS vulnerability with Table Export plug-in when
NOTE: https://huntr.dev/bounties/9b85cc33-0395-4c31-8a42-3a94beb2efea
NOTE: src:zoneminder embedds bootstrap-table-export.js in debian/missing-sources/
NOTE: https://github.com/wenzhixin/bootstrap-table/commit/66ef886d5d325777c8727274c9e018f9c17bc0b9 (1.20.2)
- NOTE: NOTE: Only supported for trusted users/behind auth, see README.debian.security
+ NOTE: Only supported for trusted users/behind auth, see README.debian.security
CVE-2022-1725 (NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.495 ...)
- vim 2:9.0.0135-1 (unimportant)
NOTE: https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c
@@ -239871,7 +239871,7 @@ CVE-2022-27418 (Tcpreplay v4.4.1 has a heap-based buffer overflow in do_checksum
NOTE: https://github.com/appneta/tcpreplay/commit/e2ac765a25e902728b6d4a825358aa536e6668c2 (v4.4.1)
NOTE: https://github.com/appneta/tcpreplay/commit/7248ddb7ddd363b15b86e65022773f791764c33a (v4.4.1)
NOTE: https://github.com/appneta/tcpreplay/commit/b63f1697c9eae73c7880882e14f9a0ec9545f19a (v4.4.1)
- NOTE: NOTE: Crash in CLI tool, no security impact
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-27417
RESERVED
CVE-2022-27416 (Tcpreplay v4.4.1 was discovered to contain a double-free via __interce ...)
@@ -239880,7 +239880,7 @@ CVE-2022-27416 (Tcpreplay v4.4.1 was discovered to contain a double-free via __i
NOTE: https://github.com/appneta/tcpreplay/pull/711
NOTE: https://github.com/appneta/tcpreplay/commit/9297ac29af91324e3f94580b8ffc2a40a4d59e98 (v4.4.1)
NOTE: https://github.com/appneta/tcpreplay/commit/45cb2ac23213861749d82ad3524f46e347d308a3 (v4.4.1)
- NOTE: NOTE: Crash in CLI tool, no security impact
+ NOTE: Crash in CLI tool, no security impact
CVE-2022-27415
RESERVED
CVE-2022-27414
@@ -266821,7 +266821,7 @@ CVE-2022-21125 (Incomplete cleanup of microarchitectural fill buffers on some In
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
NOTE: https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/processor-mmio-stale-data-vulnerabilities.html#SBDS
NOTE: Linux kernel documentation patch: https://git.kernel.org/linus/4419470191386456e0b8ed4eb06a70b0021798a6
- NOTE: NOTE: https://xenbits.xen.org/xsa/advisory-404.html
+ NOTE: https://xenbits.xen.org/xsa/advisory-404.html
CVE-2022-21123 (Incomplete cleanup of multi-core shared buffers for some Intel(R) Proc ...)
{DSA-5184-1 DSA-5178-1 DSA-5173-1 DLA-3065-1}
- intel-microcode 3.20220510.1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1ba4ddd8ca17bb2087afaa0b3891797721efbf36
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1ba4ddd8ca17bb2087afaa0b3891797721efbf36
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250211/681664e7/attachment.htm>
More information about the debian-security-tracker-commits
mailing list