Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits: e6d56fea by Moritz Muehlenhoff at 2023-11-03T20:29:20+01:00 bugnums - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -284,24 +284,24 @@ CVE-2023-5358 (Improper access control in Report log filters feature in Devoluti CVE-2023-4452 (A vulnerability has been identified in the EDR-810, EDR-G902, and EDR- ...) NOT-FOR-US: Moxa CVE-2023-46931 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow ...) - - gpac <unfixed> + - gpac <unfixed> (bug #1055298) [bullseye] - gpac <no-dsa> (Minor issue) [buster] - gpac <end-of-life> (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2664 NOTE: https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...) - - gpac <unfixed> + - gpac <unfixed> (bug #1055298) [bullseye] - gpac <no-dsa> (Minor issue) [buster] - gpac <end-of-life> (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2666 NOTE: https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8 CVE-2023-46928 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...) - - gpac <unfixed> + - gpac <unfixed> (bug #1055298) [buster] - gpac <end-of-life> (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2661 NOTE: https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1 CVE-2023-46927 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow ...) - - gpac <unfixed> + - gpac <unfixed> (bug #1055298) [buster] - gpac <end-of-life> (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2657 NOTE: https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817 @@ -2008,7 +2008,7 @@ CVE-2023-46603 (In International Color Consortium DemoIccMAX 79ecb74, there is a CVE-2023-46602 (In International Color Consortium DemoIccMAX 79ecb74, there is a stack ...) NOT-FOR-US: International Color Consortium DemoIccMAX CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataS ...) - - wabt <unfixed> + - wabt <unfixed> (bug #1055299) NOTE: https://github.com/WebAssembly/wabt/issues/2311 CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegm ...) - wabt <unfixed> (unimportant) @@ -7783,7 +7783,7 @@ CVE-2023-38255 (A potential attacker with or without (cookie theft) access to th CVE-2023-37611 (Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a re ...) NOT-FOR-US: Neos CMS CVE-2023-4237 (A flaw was found in the Ansible Automation Platform. When creating a n ...) - - ansible <unfixed> + - ansible <unfixed> (bug #1055300) [buster] - ansible <no-dsa> (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2229979 CVE-2023-42754 (A NULL pointer dereference flaw was found in the Linux kernel ipv4 sta ...) @@ -10963,7 +10963,7 @@ CVE-2023-40170 (jupyter-server is the backend for Jupyter web applications. Impr NOTE: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-64x5-55rw-9974 NOTE: https://github.com/jupyter-server/jupyter_server/commit/87a4927272819f0b1cae1afa4c8c86ee2da002fd (v2.7.2) CVE-2023-39810 (An issue in the CPIO command of Busybox v1.33.2 allows attackers to ex ...) - - busybox <unfixed> + - busybox <unfixed> (bug #1055307) [bookworm] - busybox <no-dsa> (Minor issue) [bullseye] - busybox <no-dsa> (Minor issue) [buster] - busybox <no-dsa> (Minor issue) @@ -20097,7 +20097,7 @@ CVE-2023-3295 (The Unlimited Elements For Elementor (Free Widgets, Addons, Templ NOT-FOR-US: WordPress plugin CVE-2023-35790 (An issue was discovered in dec_patch_dictionary.cc in libjxl before 0. ...) [experimental] - jpeg-xl 0.8.2-1 - - jpeg-xl <unfixed> + - jpeg-xl <unfixed> (bug #1055306) [bookworm] - jpeg-xl <no-dsa> (Minor issue) NOTE: https://github.com/libjxl/libjxl/pull/2551 NOTE: https://github.com/libjxl/libjxl/commit/d4e67a644d8babe7cb68de122d8b5ccb2ad8f226 @@ -154102,27 +154102,27 @@ CVE-2021-40268 CVE-2021-40267 RESERVED CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vul ...) - - freeimage <unfixed> + - freeimage <unfixed> (bug #1055305) [bookworm] - freeimage <no-dsa> (Minor issue) [bullseye] - freeimage <no-dsa> (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/334/ CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...) - - freeimage <unfixed> + - freeimage <unfixed> (bug #1055304) [bookworm] - freeimage <no-dsa> (Minor issue) [bullseye] - freeimage <no-dsa> (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/337/ CVE-2021-40264 (NULL pointer dereference vulnerability in FreeImage before 1.18.0 via ...) - - freeimage <unfixed> + - freeimage <unfixed> (bug #1055303) [bookworm] - freeimage <no-dsa> (Minor issue) [bullseye] - freeimage <no-dsa> (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/335/ CVE-2021-40263 (A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad funct ...) - - freeimage <unfixed> + - freeimage <unfixed> (bug #1055302) [bookworm] - freeimage <no-dsa> (Minor issue) [bullseye] - freeimage <no-dsa> (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/336/ CVE-2021-40262 (A stack exhaustion issue was discovered in FreeImage before 1.18.0 via ...) - - freeimage <unfixed> + - freeimage <unfixed> (bug #1055301) [bookworm] - freeimage <no-dsa> (Minor issue) [bullseye] - freeimage <no-dsa> (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/338/ View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6d56fea1e7391833267e9c16138ef6143076dc1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6d56fea1e7391833267e9c16138ef6143076dc1 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits