Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7ee10f8b by Moritz Muehlenhoff at 2023-01-16T13:09:50+01:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -22,6 +22,7 @@ CVE-2023-0306 (Cross-site Scripting (XSS) - Stored in GitHub 
repository thorsten
        NOT-FOR-US: phpmyfaq
 CVE-2023-XXXX [Multiple integer overflow and buffer overflow issues in game 
loading]
        - sgt-puzzles <unfixed> (bug #1028986)
+       [bullseye] - sgt-puzzles <no-dsa> (Minor issue)
 CVE-2023-0305 (A vulnerability classified as critical was found in 
SourceCodester Onl ...)
        NOT-FOR-US: SourceCodester Online Food Ordering System
 CVE-2023-0304 (A vulnerability classified as critical has been found in 
SourceCodeste ...)
@@ -4529,6 +4530,7 @@ CVE-2022-4744
        RESERVED
 CVE-2022-4743 (A potential memory leak issue was discovered in SDL2 in 
GLES_CreateTex ...)
        - libsdl2 2.26.0+dfsg-1
+       [bullseye] - libsdl2 <no-dsa> (Minor issue)
        [buster] - libsdl2 <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2156290
        NOTE: https://github.com/libsdl-org/SDL/pull/6269
@@ -123343,6 +123345,7 @@ CVE-2021-32440 (The Media_RewriteODFrame function in 
GPAC 1.0.1 allows attackers
        NOTE: https://github.com/gpac/gpac/issues/1772
 CVE-2021-32439 (Buffer overflow in the stbl_AppendSize function in MP4Box in 
GPAC 1.0. ...)
        - gpac 2.0.0+dfsg1-2
+       [bullseye] - gpac <no-dsa> (Minor issue)
        [buster] - gpac <not-affected> (Vulnerable code introduced later, in 
version 0.8.0)
        [stretch] - gpac <not-affected> (Vulnerable code introduced later, in 
version 0.8.0)
        NOTE: 
https://github.com/gpac/gpac/commit/77ed81c069e10b3861d88f72e1c6be1277ee7eae 
(v2.0.0)
@@ -190862,6 +190865,7 @@ CVE-2020-17355 (Arista EOS before 4.21.12M, 4.22.x 
before 4.22.7M, 4.23.x before
 CVE-2020-17354
        RESERVED
        - lilypond 2.22.1-1
+       [bullseye] - lilypond <ignored> (Unfixable, marked as insecure in later 
uploads)
        NOTE: https://phabricator.wikimedia.org/T259210
        NOTE: https://phabricator.wikimedia.org/T257062
        NOTE: 
https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory


=====================================
data/dsa-needed.txt
=====================================
@@ -17,6 +17,8 @@ curl (jmm)
 --
 frr
 --
+jupyter-core
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y versions



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to