Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
24493847 by Moritz Muehlenhoff at 2023-01-09T16:59:33+01:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -3368,34 +3368,42 @@ CVE-2022-47664
        RESERVED
 CVE-2022-47663 (GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer 
overflow ...)
        - gpac <unfixed>
+       [bullseye] - gpac <no-dsa> (Minor issue)
        NOTE: https://github.com/gpac/gpac/issues/2360
        NOTE: 
https://github.com/gpac/gpac/commit/e7e8745f677010a5cb3366d5cbf39df7cffaaa2d 
(v2.2.0)
 CVE-2022-47662 (GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault 
(/stack over ...)
        - gpac <unfixed>
+       [bullseye] - gpac <no-dsa> (Minor issue)
        NOTE: https://github.com/gpac/gpac/issues/2359
        NOTE: 
https://github.com/gpac/gpac/commit/080a62728ccd251a7f20eaac3fda21b0716e3c9b 
(v2.2.0)
 CVE-2022-47661 (GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer 
Overflow ...)
        - gpac <unfixed>
+       [bullseye] - gpac <no-dsa> (Minor issue)
        NOTE: https://github.com/gpac/gpac/issues/2358
        NOTE: 
https://github.com/gpac/gpac/commit/aa8fbec874b5e040854effff5309aa445c234618 
(v2.2.0)
 CVE-2022-47660 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer 
overflow in is ...)
        - gpac <unfixed>
+       [bullseye] - gpac <no-dsa> (Minor issue)
        NOTE: https://github.com/gpac/gpac/issues/2357
        NOTE: 
https://github.com/gpac/gpac/commit/a8f438d201fb165961ba1d5d3b80daa3637735f4 
(v2.2.0)
 CVE-2022-47659 (GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer 
Overflow ...)
        - gpac <unfixed>
+       [bullseye] - gpac <no-dsa> (Minor issue)
        NOTE: https://github.com/gpac/gpac/issues/2354
        NOTE: 
https://github.com/gpac/gpac/commit/348d7722c1e90c7811b43b0eed5c2aca2cb8a717 
(v2.2.0)
 CVE-2022-47658 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer 
overflow ...)
        - gpac <unfixed>
+       [bullseye] - gpac <not-affected> (Vulnerable code not present)
        NOTE: https://github.com/gpac/gpac/issues/2356
        NOTE: 
https://github.com/gpac/gpac/commit/55c8b3af6f5ef9e51edb41172062ca9b5db4026b 
(v2.2.0)
 CVE-2022-47657 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer 
overflow ...)
        - gpac <unfixed>
+       [bullseye] - gpac <no-dsa> (Minor issue)
        NOTE: https://github.com/gpac/gpac/issues/2355
        NOTE: 
https://github.com/gpac/gpac/commit/9f1e633184904fffc315bd35ebce76b4b42f9097 
(v2.2.0)
 CVE-2022-47656 (GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer 
Overflow ...)
        - gpac <unfixed>
+       [bullseye] - gpac <not-affected> (Vulnerable code not present)
        NOTE: https://github.com/gpac/gpac/issues/2353
        NOTE: 
https://github.com/gpac/gpac/commit/c9a8118965b53d29837b1b82b6a58543efb23baf 
(v2.2.0)
 CVE-2022-47655 (Libde265 1.0.9 is vulnerable to Buffer Overflow in function 
void put_q ...)
@@ -5168,6 +5176,7 @@ CVE-2022-4516
 CVE-2022-4515 (A flaw was found in Exuberant Ctags in the way it handles the 
"-o" opt ...)
        {DLA-3254-1}
        - exuberant-ctags 1:5.9~svn20110310-18 (bug #1026995)
+       [bullseye] - exuberant-ctags <no-dsa> (Minor issue)
        - universal-ctags <not-affected> (Fixed before initial upload to Debian)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2153519
        NOTE: Fixed by: 
https://github.com/universal-ctags/ctags/commit/e00c55d7a0204dc1d0ae316141323959e1e16162
@@ -5681,6 +5690,7 @@ CVE-2022-4442
        RESERVED
 CVE-2019-25078 (A vulnerability classified as problematic was found in 
pacparser up to ...)
        - pacparser <unfixed> (bug #1026106)
+       [bullseye] - pacparser <no-dsa> (Minor issue)
        [buster] - pacparser <no-dsa> (Minor issue)
        NOTE: https://github.com/manugarg/pacparser/issues/99
        NOTE: 
https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9
 (v1.4.0)


=====================================
data/dsa-needed.txt
=====================================
@@ -66,3 +66,8 @@ sox
 --
 tiff (aron)
 --
+varnish
+--
+xrdp
+  needs some additional clarification, tentatively DSA worthy
+  maybe upgrade to 0.9.21 within bullseye?



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/244938475e37774c5c75690533d9804cd49f61de

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/244938475e37774c5c75690533d9804cd49f61de
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to