Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f2089065 by Moritz Muehlenhoff at 2022-10-05T17:02:42+02:00
bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -7460,11 +7460,13 @@ CVE-2022-39210 (Nextcloud android is the official 
Android client for the Nextclo
 CVE-2022-39209 (cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and 
renderin ...)
        - cmark-gfm <unfixed> (bug #1020588)
        - python-cmarkgfm <unfixed>
-       - ghostwriter <unfixed>
+       - ghostwriter <unfixed> (unimportant)
        - ruby-commonmarker <unfixed>
        - r-cran-commonmark <unfixed>
+       [bullseye] - r-cran-commonmark <no-dsa> (Minor issue)
        NOTE: 
https://github.com/github/cmark-gfm/security/advisories/GHSA-cgh3-p57x-9q7q
        NOTE: 
https://github.com/github/cmark-gfm/commit/cfcaa0068bf319974fdec283416fcee5035c2d70
 (0.29.0.gfm.6)
+       NOTE: For ghostwriter just a hang/crash in GUI tool, no security impact
 CVE-2022-39208 (Onedev is an open source, self-hosted Git Server with CI/CD 
and Kanban ...)
        NOT-FOR-US: Onedev
 CVE-2022-39207 (Onedev is an open source, self-hosted Git Server with CI/CD 
and Kanban ...)
@@ -7824,6 +7826,7 @@ CVE-2006-20001
        RESERVED
 CVE-2022-XXXX [wordpress 6.0.2]
        - wordpress 6.0.2+dfsg1-1 (bug #1018863)
+       [bullseye] - wordpress <no-dsa> (Minor issue)
        NOTE: 
https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/
 CVE-2022-39079
        RESERVED
@@ -18258,11 +18261,13 @@ CVE-2022-2321 (Improper Restriction of Excessive 
Authentication Attempts in GitH
 CVE-2022-35230 (An authenticated user can create a link with reflected 
Javascript code ...)
        [experimental] - zabbix 1:6.0.6+dfsg-1
        - zabbix 1:6.0.7+dfsg-2 (bug #1014994)
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-21305
        NOTE: Fixed in: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/3b47a97676ee9ca4e16566f1931c456459108eae
 (5.0.25rc1)
 CVE-2022-35229 (An authenticated user can create a link with reflected 
Javascript code ...)
        [experimental] - zabbix 1:6.0.6+dfsg-1
        - zabbix 1:6.0.7+dfsg-2 (bug #1014992)
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-21306
        NOTE: Fixed in: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/b546c3f10ce98b0c914e5fc4114bd43042880c3c
 (5.0.25rc1)
 CVE-2022-35228 (SAP BusinessObjects CMC allows an unauthenticated attacker to 
retrieve ...)
@@ -47753,16 +47758,19 @@ CVE-2022-24920
 CVE-2022-24919 (An authenticated user can create a link with reflected 
Javascript code ...)
        {DLA-2980-1}
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-20680
        NOTE: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
 (5.0.21rc1)
 CVE-2022-24918 (An authenticated user can create a link with reflected 
Javascript code ...)
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        [stretch] - zabbix <not-affected> (The vulnerable code was introduced 
later)
        NOTE: https://support.zabbix.com/browse/ZBX-20680
        NOTE: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
 (5.0.21rc1)
 CVE-2022-24917 (An authenticated user can create a link with reflected 
Javascript code ...)
        {DLA-2980-1}
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-20680
        NOTE: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
 (5.0.21rc1)
 CVE-2022-24911
@@ -48391,6 +48399,7 @@ CVE-2022-24725 (Shescape is a shell escape package for 
JavaScript. An issue in v
 CVE-2022-24724 (cmark-gfm is GitHub's extended version of the C reference 
implementati ...)
        - cmark-gfm 0.29.0.gfm.3-3 (bug #1006756)
        - ghostwriter <unfixed> (bug #1006757)
+       [bullseye] - ghostwriter <no-dsa> (Minor issue)
        - python-cmarkgfm 0.7.0-1 (bug #1006758)
        - ruby-commonmarker <unfixed> (bug #1006759)
        - r-cran-commonmark 1.8.0-1 (bug #1006760)
@@ -49549,6 +49558,7 @@ CVE-2022-24350
 CVE-2022-24349 (An authenticated user can create a link with reflected XSS 
payload for ...)
        {DLA-2980-1}
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-20680
        NOTE: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
 (5.0.21rc1)
 CVE-2022-24348 (Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory 
traversal ...)
@@ -54285,10 +54295,12 @@ CVE-2022-23135 (There is a directory traversal 
vulnerability in some home gatewa
 CVE-2022-23134 (After the initial setup process, some steps of setup.php file 
are reac ...)
        {DLA-2914-1}
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        NOTE: https://support.zabbix.com/browse/ZBX-20384
        NOTE: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/aa0fecfbcc9794bc00206630a7424575dfc944df
 (5.0.19rc2)
 CVE-2022-23133 (An authenticated user can create a hosts group from the 
configuration  ...)
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        [buster] - zabbix <not-affected> (Vulnerable code introduced later, and 
reverted with the fix)
        [stretch] - zabbix <not-affected> (Vulnerable code introduced later, 
and reverted with the fix)
        NOTE: https://support.zabbix.com/browse/ZBX-20388
@@ -54296,6 +54308,7 @@ CVE-2022-23133 (An authenticated user can create a 
hosts group from the configur
        NOTE: Introduced by: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/f3654d0173ea244a2319a093f7c4e27ad9086dc3
 (4.4.0alpha3)
 CVE-2022-23132 (During Zabbix installation from RPM, DAC_OVERRIDE SELinux 
capability i ...)
        - zabbix 1:6.0.7+dfsg-2
+       [bullseye] - zabbix <no-dsa> (Minor issue)
        [stretch] - zabbix <not-affected> (Not using RPM or DAC_OVERRIDE in 
Debian installs, zbx_ipc_service_init_env() not present)
        NOTE: https://support.zabbix.com/browse/ZBX-20341
        NOTE: 
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/019fbd9b5cc9c455304f1a48460435ca474ba2ac
 (5.0.18)


=====================================
data/dsa-needed.txt
=====================================
@@ -42,6 +42,8 @@ rpki-client
 --
 ruby-image-processing
 --
+ruby-nokogiri
+--
 ruby-rack
 --
 ruby-tzinfo



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f208906503b226a8ed78815240dc67764bbd2d6b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f208906503b226a8ed78815240dc67764bbd2d6b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to