[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-05-10 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
644cd696 by Moritz Muehlenhoff at 2024-05-10T18:04:15+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1310,11 +1310,15 @@ CVE-2024-34078 (html-sanitizer is an allowlist-based 
HTML cleaner. If using `kee
NOTE: 
https://github.com/matthiask/html-sanitizer/commit/48db42fc5143d0140c32d929c46b802f96913550
 (2.4.2)
 CVE-2024-34069 (Werkzeug is a comprehensive WSGI web application library. The 
debugger ...)
- python-werkzeug 3.0.3-1 (bug #1070711)
+   [bookworm] - python-werkzeug  (Minor issue)
+   [bullseye] - python-werkzeug  (Minor issue)
NOTE: 
https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985
NOTE: Fixed by: 
https://github.com/pallets/werkzeug/commit/71b69dfb7df3d912e66bab87fbb1f21f83504967
 (3.0.3)
NOTE: Fixed by: 
https://github.com/pallets/werkzeug/commit/890b6b62634fa61224222aee31081c61b054ff01
 (3.0.3)
 CVE-2024-34064 (Jinja is an extensible templating engine. The `xmlattr` filter 
in affe ...)
- jinja2  (bug #1070712)
+   [bookworm] - jinja2  (Minor issue)
+   [bullseye] - jinja2  (Minor issue)
NOTE: 
https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj
NOTE: Fixed by: 
https://github.com/pallets/jinja/commit/d655030770081e2dfe46f90e27620472a502289d
 (3.1.4)
 CVE-2024-33912 (Missing Authorization vulnerability in Academy LMS.This issue 
affects  ...)
@@ -6701,6 +6705,8 @@ CVE-2024-32478 (Git Credential Manager (GCM) is a secure 
Git credential helper.
- git-credential-manager  (bug #1002300)
 CVE-2024-32473 (Moby is an open source container framework that is a key 
component of  ...)
- docker.io  (bug #1070378)
+   [bookworm] - docker.io  (Minor issue)
+   [bullseye] - docker.io  (Minor issue)
NOTE: 
https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9
NOTE: 
https://github.com/moby/moby/commit/841c4c8057bcf5317d6565875595a3f0c046e3fa
 CVE-2024-32409 (An issue in SEMCMS v.4.8 allows a remote attacker to execute 
arbitrary ...)
@@ -17532,6 +17538,7 @@ CVE-2024-0450 (An issue was found in the CPython 
`zipfile` module affecting vers
[bookworm] - python3.11  (Minor issue)
- python3.10 
- python3.9 
+   [bullseye] - python3.9  (Minor issue)
- python3.7 
- python2.7 
[bullseye] - python2.7  (Unsupported in Bullseye, only 
included to build a few applications)
@@ -78571,6 +78578,7 @@ CVE-2023-28757
 CVE-2023-28756 (A ReDoS issue was discovered in the Time component through 
0.2.1 in Ru ...)
{DLA-3447-1 DLA-3408-1}
- ruby3.1  (bug #1038408)
+   [bookworm] - ruby3.1  (Minor issue)
- ruby2.7 
- ruby2.5 
[experimental] - jruby 9.4.3.0+ds-1~exp1
@@ -78586,6 +78594,7 @@ CVE-2023-28755 (A ReDoS issue was discovered in the URI 
component through 0.12.0
[bookworm] - rubygems  (Minor issue)
[bullseye] - rubygems  (Minor issue)
- ruby3.1  (bug #1038408)
+   [bookworm] - ruby3.1  (Minor issue)
- ruby2.7 
- ruby2.5 
[experimental] - jruby 9.4.3.0+ds-1~exp1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/644cd696af6b99d787c462f7c3c228d9a9ce54d8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/644cd696af6b99d787c462f7c3c228d9a9ce54d8
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-04-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cb445d82 by Moritz Muehlenhoff at 2024-04-22T11:02:14+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -54,12 +54,15 @@ CVE-2024-32460 [Low] OutOfBound Read in 
interleaved_decompress]
NOTE: https://www.freerdp.com/2024/04/17/2_11_6-release
 CVE-2024-32493 [SQL injection issue regarding Form IDs when cleaning up drafts]
- znuny 6.5.8-1
+   [bookworm] - znuny  (Non-free not supported)
NOTE: https://www.znuny.org/en/advisories/zsa-2024-03
 CVE-2024-32492 [Cross Site Scripting (XSS) in the Customer Portal Ticket View]
- znuny  (Only affects Znuny from 7.0.1 up to including 
7.0.16)
+   [bookworm] - znuny  (Non-free not supported)
NOTE: https://www.znuny.org/en/advisories/zsa-2024-02
 CVE-2024-32491 [Directory Traversal via File Upload]
- znuny 6.5.8-1
+   [bookworm] - znuny  (Non-free not supported)
NOTE: https://www.znuny.org/en/advisories/zsa-2024-01
 CVE-2024-4020 (A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and 
classified ...)
NOT-FOR-US: Tenda
@@ -3676,9 +3679,13 @@ CVE-2024-3210 (The Paid Membership Plugin, Ecommerce, 
User Registration Form, Lo
NOT-FOR-US: WordPress plugin
 CVE-2024-3120 (A stack-buffer overflow vulnerability exists in all versions of 
sngrep ...)
- sngrep 1.8.1-1 (bug #1068818)
+   [bookworm] - sngrep  (Minor issue)
+   [bullseye] - sngrep  (Minor issue)
NOTE: 
https://github.com/irontec/sngrep/commit/f3f8ed8ef38748e6d61044b39b0dabd7e37c6809
 (v1.8.1)
 CVE-2024-3119 (A buffer overflow vulnerability exists in all versions of 
sngrep since ...)
- sngrep 1.8.1-1 (bug #1068818)
+   [bookworm] - sngrep  (Minor issue)
+   [bullseye] - sngrep  (Minor issue)
NOTE: 
https://github.com/irontec/sngrep/commit/dd5fec92730562af6f96891291cd4e102b80bfcc
 (v1.8.1)
 CVE-2024-3020 (The plugin is vulnerable to PHP Object Injection in versions up 
to and ...)
NOT-FOR-US: WordPress plugin
@@ -4530,6 +4537,7 @@ CVE-2024-2201 [Native Branch History Injection]
NOTE: https://xenbits.xen.org/xsa/advisory-456.html
 CVE-2024-31142 [x86: Incorrect logic for BTC/SRSO mitigations]
- xen 
+   [bookworm] - xen  (Minor issue, fix along in next DSA)
[bullseye] - xen  (EOLed in Bullseye)
[buster] - xen  (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-455.html
@@ -5055,6 +5063,7 @@ CVE-2024-22328 (IBM Maximo Application Suite 8.10 and 
8.11 could allow a remote
NOT-FOR-US: IBM
 CVE-2024- [RUSTSEC-2024-0332: Degradation of service in h2 servers with 
CONTINUATION Flood]
- rust-h2 0.4.4-1
+   [bookworm] - rust-h2  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2024-0332.html
NOTE: https://github.com/advisories/GHSA-q6cp-qfwq-4gcv
 CVE-2024-3362 (A vulnerability was found in SourceCodester Online Library 
System 1.0  ...)
@@ -24250,6 +24259,7 @@ CVE-2020-36771 (CloudLinux CageFS 7.1.1-1 or below 
passes the authentication tok
NOT-FOR-US: CloudLinux CageFS
 CVE-2023-46842 [x86 HVM hypercalls may trigger Xen bug check]
- xen 
+   [bookworm] - xen  (Minor issue, fix along in next DSA)
[bullseye] - xen  (EOLed in Bullseye)
[buster] - xen  (Vulnerable code not present)
NOTE: https://xenbits.xen.org/xsa/advisory-454.html
@@ -39975,6 +39985,8 @@ CVE-2023-46345 (Catdoc v0.95 was discovered to contain 
a NULL pointer dereferenc
 CVE-2023-46233 (crypto-js is a JavaScript library of crypto standards. Prior 
to versio ...)
{DLA-3669-1}
- cryptojs 3.1.2+dfsg-4 (bug #1055525)
+   [bookworm] - cryptojs  (Minor issue)
+   [bullseye] - cryptojs  (Minor issue)
NOTE: 
https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf
NOTE: 
https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a
 (4.2.0)
 CVE-2023-46232 (era-compiler-vyper is the EraVM Vyper compiler for zkSync Era, 
a layer ...)


=
data/dsa-needed.txt
=
@@ -14,8 +14,6 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 atril
 --
-cryptojs
---
 dav1d
 --
 dnsdist (jmm)
@@ -71,7 +69,7 @@ python-asyncssh
 --
 redmine/stable
 --
-ring
+ring/oldstable
   might make sense to rebase to current version
 --
 ruby2.7/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb445d829db44c592501aed8473cc3b35d1e76b7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb445d829db44c592501aed8473cc3b35d1e76b7
You're receiving this email because of your account on 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-04-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
434878ad by Moritz Muehlenhoff at 2024-04-05T20:19:39+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -3748,18 +3748,26 @@ CVE-2024-28386 (An issue in Home-Made.io fastmagsync 
v.1.7.51 and before allows
NOT-FOR-US: PrestaShop module
 CVE-2024-28246 (KaTeX is a JavaScript library for TeX math rendering on the 
web. Code  ...)
- node-katex 0.16.10+~cs6.1.0-1 (bug #1067805)
+   [bookworm] - node-katex  (Minor issue)
+   [bullseye] - node-katex  (Minor issue)
NOTE: 
https://github.com/KaTeX/KaTeX/security/advisories/GHSA-3wc5-fcw2-2329
NOTE: 
https://github.com/KaTeX/KaTeX/commit/fc5af64183a3ceb9be9d1c23a275999a728593de 
(v0.16.10)
 CVE-2024-28245 (KaTeX is a JavaScript library for TeX math rendering on the 
web. KaTeX ...)
- node-katex 0.16.10+~cs6.1.0-1 (bug #1067805)
+   [bookworm] - node-katex  (Minor issue)
+   [bullseye] - node-katex  (Minor issue)
NOTE: 
https://github.com/KaTeX/KaTeX/security/advisories/GHSA-f98w-7cxr-ff2h
NOTE: 
https://github.com/KaTeX/KaTeX/commit/c5897fcd1f73da9612a53e6b5544f1d776e17770 
(v0.16.10)
 CVE-2024-28244 (KaTeX is a JavaScript library for TeX math rendering on the 
web. KaTeX ...)
- node-katex 0.16.10+~cs6.1.0-1 (bug #1067805)
+   [bookworm] - node-katex  (Minor issue)
+   [bullseye] - node-katex  (Minor issue)
NOTE: 
https://github.com/KaTeX/KaTeX/security/advisories/GHSA-cvr6-37gx-v8wc
NOTE: 
https://github.com/KaTeX/KaTeX/commit/085e21b5da05414efefa932570e7201a7c70e5b2 
(v0.16.10)
 CVE-2024-28243 (KaTeX is a JavaScript library for TeX math rendering on the 
web. KaTeX ...)
- node-katex 0.16.10+~cs6.1.0-1 (bug #1067805)
+   [bookworm] - node-katex  (Minor issue)
+   [bullseye] - node-katex  (Minor issue)
NOTE: 
https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w
NOTE: 
https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 
(v0.16.10)
 CVE-2024-28183 (ESP-IDF is the development framework for Espressif SoCs 
supported on W ...)
@@ -4057,11 +4065,10 @@ CVE-2024-27280 [Buffer overread vulnerability in 
StringIO]
TODO: check details
 CVE-2024-30161 (In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component 
may acce ...)
- qt6-base  (bug #1068454)
-   - qtbase-opensource-src 
-   - qtbase-opensource-src-gles 
+   - qtbase-opensource-src  (Only affects Qt6)
+   - qtbase-opensource-src-gles  (Only affects Qt6)
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/544314
NOTE: 
https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365
-   TODO: check details
 CVE-2024-30156 (Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 
6.0.13 L ...)
- varnish  (bug #1068455)
[bookworm] - varnish  (Minor issue, too intrusive to backport)
@@ -4596,6 +4603,8 @@ CVE-2024-29026 (Owncast is an open source, self-hosted, 
decentralized, single us
NOT-FOR-US: Owncast
 CVE-2024-29018 (Moby is an open source container framework that is a key 
component of  ...)
- docker.io  (bug #1068460)
+   [bookworm] - docker.io  (Minor issue)
+   [bullseye] - docker.io  (Minor issue)
NOTE: 
https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx
NOTE: https://github.com/moby/moby/pull/46609
 CVE-2024-28916 (Xbox Gaming Services Elevation of Privilege Vulnerability)
@@ -5364,6 +5373,7 @@ CVE-2024-22453 (Dell PowerEdge Server BIOS contains a 
heap-based buffer overflow
NOT-FOR-US: Dell
 CVE-2024-22412 (ClickHouse is an open-source column-oriented database 
management syste ...)
- clickhouse  (bug #1067178)
+   [bullseye] - clickhouse  (Minor issue)
NOTE: 
https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r
NOTE: https://github.com/ClickHouse/ClickHouse/pull/58611
 CVE-2024-21504 (Versions of the package livewire/livewire from 3.3.5 and 
before 3.4.9  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/434878adcf5c83f25c56abbc6f1f1caf7884b32d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/434878adcf5c83f25c56abbc6f1f1caf7884b32d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-03-29 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
acba346e by Moritz Mühlenhoff at 2024-03-29T22:59:06+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -1635,6 +1635,8 @@ CVE-2024-1745 (The Testimonial Slider WordPress plugin 
before 2.3.7 does not pro
NOT-FOR-US: WordPress plugin
 CVE-2024-0901 (Remotely executed SEGV and out of bounds read allows malicious 
packet  ...)
- wolfssl  (bug #1067799)
+   [bookworm] - wolfssl  (Minor issue)
+   [bullseye] - wolfssl  (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/issues/7089
NOTE: https://github.com/wolfSSL/wolfssl/pull/7099
 CVE-2024-0866 (The Check & Log Email plugin for WordPress is vulnerable to 
Unauthenti ...)
@@ -2102,9 +2104,8 @@ CVE-2024-2826 (A vulnerability classified as problematic 
was found in lakernote
 CVE-2024-2825 (A vulnerability classified as critical has been found in 
lakernote Eas ...)
NOT-FOR-US: lakernote EasyAdmin
 CVE-2024-2824 (A vulnerability was found in Matthias-Wandel jhead 3.08 and 
classified ...)
-   - jhead 
-   [bookworm] - jhead  (Minor issue)
-   [bullseye] - jhead  (Minor issue)
+   - jhead  (unimportant)
+   NOTE: Crash in CLI tool, no security impact
NOTE: https://github.com/Matthias-Wandel/jhead/issues/84
 CVE-2024-2823 (A vulnerability has been found in DedeCMS 5.7 and classified as 
proble ...)
NOT-FOR-US: DedeCMS


=
data/dsa-needed.txt
=
@@ -28,7 +28,7 @@ frr
 --
 gpac/oldstable
 --
-gtkwave
+gtkwave (jmm)
 --
 h2o (jmm)
 --
@@ -44,6 +44,8 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y and 6.1.y versions
 --
+mediawiki (jmm)
+--
 nbconvert/oldstable
   Guilhem Moulin proposed an update ready for review
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acba346ed18709fdbdadc105a41c26053c93f61e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acba346ed18709fdbdadc105a41c26053c93f61e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-03-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d4e1c12c by Moritz Muehlenhoff at 2024-03-22T17:00:18+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -871,6 +871,7 @@ CVE-2024-0450 (An issue was found in the CPython `zipfile` 
module affecting vers
- python3.9 
- python3.7 
- python2.7 
+   [bullseye] - python2.7  (Unsupported in Bullseye, only 
included to build a few applications)
NOTE: https://github.com/python/cpython/pull/110016
NOTE: https://github.com/python/cpython/issues/109858
NOTE: 
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
 (v3.13.0a3)
@@ -886,6 +887,7 @@ CVE-2023-6597 (An issue was found in the CPython 
`tempfile.TemporaryDirectory` c
- python3.9 
- python3.7 
- python2.7 
+   [bullseye] - python2.7  (Unsupported in Bullseye, only 
included to build a few applications)
NOTE: https://github.com/python/cpython/pull/99930
NOTE: https://github.com/python/cpython/issues/91133
NOTE: 
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
 (v3.12.1)
@@ -1294,9 +1296,10 @@ CVE-2024-1333 (The Responsive Pricing Table WordPress 
plugin before 5.1.11 does
 CVE-2024-1331 (The Team Members WordPress plugin before 5.3.2 does not 
validate and e ...)
NOT-FOR-US: WordPress plugin
 CVE-2024-1013 (An out-of-bounds stack write flaw was found in unixODBC on 
64-bit arch ...)
-   - unixodbc 
+   - unixodbc  (unimportant)
NOTE: https://github.com/lurcher/unixODBC/pull/157
NOTE: Fixed by: 
https://github.com/lurcher/unixODBC/commit/45f501e1be2db6b017cc242c79bfb9de32b332a1
+   NOTE: Only affects example code, not present in binary packages
 CVE-2024-0973 (The Widget for Social Page Feeds WordPress plugin before 6.4 
does not  ...)
NOT-FOR-US: WordPress plugin
 CVE-2024-0951 (The Advanced Social Feeds Widget & Shortcode WordPress plugin 
through  ...)
@@ -1502,6 +1505,8 @@ CVE-2021-47156 (The Net::IPAddress::Util module before 
5.000 for Perl does not p
NOT-FOR-US: Net::IPAddress::Util Perl module
 CVE-2021-47155 (The Net::IPV4Addr module 0.10 for Perl does not properly 
consider extr ...)
- libnetwork-ipv4addr-perl 
+   [bookworm] - libnetwork-ipv4addr-perl  (Minor issue)
+   [bullseye] - libnetwork-ipv4addr-perl  (Minor issue)
NOTE: 
https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/#net-ipv4addrhttpsmetacpanorgreleasenet-ipv4addr
 CVE-2021-47154 (The Net::CIDR::Lite module before 0.22 for Perl does not 
properly cons ...)
- libnet-cidr-lite-perl 0.22-1
@@ -1613,6 +1618,8 @@ CVE-2024-1857 (The Ultimate Gift Cards for WooCommerce 
\u2013 Create, Redeem & M
NOT-FOR-US: WooCommerce plugin
 CVE-2024-2467 [Crypt-OpenSSL-RSA vulnerable to the Marvin Attack]
- libcrypt-openssl-rsa-perl  (bug #1066969)
+   [bookworm] - libcrypt-openssl-rsa-perl  (Minor issue)
+   [bullseye] - libcrypt-openssl-rsa-perl  (Minor issue)
[buster] - libcrypt-openssl-rsa-perl  (Minor issue; 
side-channel timing attack)
NOTE: https://people.redhat.com/~hkario/marvin/
NOTE: https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42
@@ -2667,7 +2674,8 @@ CVE-2023-4839 (The WP Go Maps for WordPress is vulnerable 
to Stored Cross-Site S
 CVE-2023-43292 (Cross Site Scripting vulnerability in My Food Recipe Using PHP 
with So ...)
NOT-FOR-US: My Food Recipe Using PHP with Source Code
 CVE-2023-43279 (Null Pointer Dereference in mask_cidr6 component at cidr.c in 
Tcprepla ...)
-   - tcpreplay 
+   - tcpreplay  (unimportant)
+   NOTE: Crash in CLI tool, no security impact
NOTE: https://github.com/appneta/tcpreplay/issues/824
 CVE-2023-42308 (Cross Site Scripting (XSS) vulnerability in Manage Fastrack 
Subjects i ...)
NOT-FOR-US: Code-Projects Exam Form Submission
@@ -7103,6 +7111,8 @@ CVE-2024-23839 (Suricata is a network Intrusion Detection 
System, Intrusion Prev
NOTE: https://redmine.openinfosecfoundation.org/issues/6657
 CVE-2024-23837 (LibHTP is a security-aware parser for the HTTP protocol. 
Crafted traff ...)
- libhtp 1:0.5.46-1
+   [bookworm] - libhtp  (Minor issue)
+   [bullseye] - libhtp  (Minor issue)
[buster] - libhtp  (Minor issue)
NOTE: 
https://github.com/OISF/libhtp/security/advisories/GHSA-f9wf-rrjj-qx8m
NOTE: 
https://github.com/OISF/libhtp/commit/20ac301d801cdf01b3f021cca08a22a87f477c4a 
(0.5.46)
@@ -45242,6 +45252,8 @@ CVE-2023-38404 (The XPRTLD web application in Veritas 
InfoScale Operations Manag
NOT-FOR-US: Veritas InfoScale
 CVE-2023-7250 (A flaw was found in iperf, a utility for testing network 
performance u ...)
 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-02-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
93c25739 by Moritz Muehlenhoff at 2024-02-23T23:29:45+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -23267,8 +23267,8 @@ CVE-2023-39333
NOTE: 
https://github.com/nodejs/node/commit/eaf9083cf1e43bd897ac8244dcc0f4e3500150ca
 CVE-2023-5388
- nss 2:3.98-1 (bug #1056284)
-   [bookworm] - nss  (Minor issue, revisit once fixed upstream)
-   [bullseye] - nss  (Minor issue, revisit once fixed upstream)
+   [bookworm] - nss  (Minor issue)
+   [bullseye] - nss  (Minor issue)
[buster] - nss  (Minor issue)
NOTE: https://people.redhat.com/~hkario/marvin/
NOTE: Vendor patch (Rocky Linux, not upstreamed): 
https://git.rockylinux.org/staging/rpms/nss/-/commit/1f7f7523b61a2ada2f461548c4160fbbf979c5dd
@@ -53132,6 +53132,8 @@ CVE-2023-28658 (Insecure inherited permissions in some 
Intel(R) oneMKL software
NOT-FOR-US: Intel
 CVE-2023-27517 (Improper access control in some Intel(R) Optane(TM) PMem 
software befo ...)
- ipmctl 03.00.00.0485-1
+   [bookworm] - ipmctl  (Minor issue)
+   [bullseye] - ipmctl  (Minor issue)
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html
TODO: full details not clear but affects the "Intel Optane Pmem 
{1,2,3}00Series management software (ipmctl)
 CVE-2023-26589 (Use after free in some Intel(R) Aptio* V UEFI Firmware 
Integrator Tool ...)


=
data/dsa-needed.txt
=
@@ -51,7 +51,7 @@ nodejs
 --
 opennds/stable
 --
-openvswitch
+openvswitch (jmm)
   Maintainer sent debdiff for CVE-2023-3966, but there are other CVE fixes 
which might be piggy backed.
 --
 php-cas/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93c25739ec8a8fad68f86a760ba5b4531e237c26

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93c25739ec8a8fad68f86a760ba5b4531e237c26
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-02-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cb0e0ce4 by Moritz Muehlenhoff at 2024-02-23T23:01:13+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -497,6 +497,8 @@ CVE-2024-26133 (EventStoreDB (ESDB) is an operational 
database built to store ev
NOT-FOR-US: EventStoreDB (ESDB)
 CVE-2024-26130 (cryptography is a package designed to expose cryptographic 
primitives  ...)
- python-cryptography 
+   [bookworm] - python-cryptography  (Minor issue)
+   [bullseye] - python-cryptography  (Minor issue)
NOTE: 
https://github.com/pyca/cryptography/security/advisories/GHSA-6vqw-3v5j-54x4
NOTE: https://github.com/pyca/cryptography/pull/10423
NOTE: Fixed by: 
https://github.com/pyca/cryptography/commit/97d231672763cdb5959a3b191e692a362f1b9e55
 (main)
@@ -527,6 +529,7 @@ CVE-2024-25249 (An issue in He3 App for macOS version 
2.0.17, allows remote atta
NOT-FOR-US: He3 App for macOS
 CVE-2024-25117 (php-svg-lib is a scalable vector graphics (SVG) file 
parsing/rendering ...)
- php-dompdf-svg-lib 
+   [bookworm] - php-dompdf-svg-lib  (Minor issue)
NOTE: 
https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273
NOTE: 
https://github.com/dompdf/php-svg-lib/commit/732faa9fb4309221e2bd9b2fda5de44f947133aa
 (0.5.2)
NOTE: 
https://github.com/dompdf/php-svg-lib/commit/8ffcc41bbde39f09f94b9760768086f12bbdce42
 (0.5.2)
@@ -856,6 +859,8 @@ CVE-2024-25274 (An arbitrary file upload vulnerability in 
the component /sysFile
NOT-FOR-US: Novel-Plus
 CVE-2024-25262 (texlive-bin commit c515e was discovered to contain heap buffer 
overflo ...)
- texlive-bin  (bug #1064517)
+   [bookworm] - texlive-bin  (Minor issue)
+   [bullseye] - texlive-bin  (Minor issue)
NOTE: 
https://tug.org/svn/texlive/trunk/Build/source/texk/ttfdump/ChangeLog?revision=69605=co
NOTE: https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912
NOTE: https://github.com/TeX-Live/texlive-source/pull/63
@@ -884,6 +889,8 @@ CVE-2024-24475
REJECTED
 CVE-2024-24474 (QEMU before 8.2.0 has an integer underflow, and resultant 
buffer overf ...)
- qemu 1:8.2.0+ds-1
+   [bookworm] - qemu  (Minor issue)
+   [bullseye] - qemu  (Minor issue)
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1810
NOTE: 
https://github.com/qemu/qemu/commit/77668e4b9bca03a856c27ba899a2513ddf52bb52 
(v8.2.0-rc0)
 CVE-2024-23809 (A double-free vulnerability exists in the BrainVision ASCII 
Header Par ...)
@@ -1359,6 +1366,8 @@ CVE-2024-1343 (A weak permission was found in the backup 
directory in LaborOffic
NOT-FOR-US: LaborOfficeFree
 CVE-2023-50257 (eProsima Fast DDS (formerly Fast RTPS) is a C++ implementation 
of the  ...)
- fastdds  (bug #1064515)
+   [bookworm] - fastdds  (Minor issue)
+   [bullseye] - fastdds  (Minor issue)
NOTE: 
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98
NOTE: 
https://github.com/eProsima/Fast-DDS/commit/f2e5ceae8fbea0a6c9445a366faaca0b98a8ef86
 CVE-2024-26308 (Allocation of Resources Without Limits or Throttling 
vulnerability in  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb0e0ce495fe2a3a6259c02c0a90a18b08dce809

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb0e0ce495fe2a3a6259c02c0a90a18b08dce809
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-02-14 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0d244b55 by Moritz Muehlenhoff at 2024-02-14T14:22:12+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -749,16 +749,19 @@ CVE-2024-25451 (Bento4 v1.6.0-640 was discovered to 
contain an out-of-memory bug
NOT-FOR-US: Bento4
 CVE-2024-25450 (imlib2 v1.9.1 was discovered to mishandle memory allocation in 
the fun ...)
- imlib2 1.10.0-2
+   [bullseye] - imlib2  (Minor issue)
NOTE: https://github.com/derf/feh/issues/712
NOTE: https://git.enlightenment.org/old/legacy-imlib2/issues/20
NOTE: Fixed by: 
https://git.enlightenment.org/old/legacy-imlib2/commit/e9c09deb08047c9e902ce37144e82b6edb8aedb6
 (v1.10.0)
 CVE-2024-25448 (An issue in the imlib_free_image_and_decache function of 
imlib2 v1.9.1 ...)
- imlib2 1.10.0-2
+   [bullseye] - imlib2  (Minor issue)
NOTE: https://github.com/derf/feh/issues/711
NOTE: https://git.enlightenment.org/old/legacy-imlib2/issues/20
NOTE: Fixed by: 
https://git.enlightenment.org/old/legacy-imlib2/commit/e9c09deb08047c9e902ce37144e82b6edb8aedb6
 (v1.10.0)
 CVE-2024-25447 (An issue in the imlib_load_image_with_error_return function of 
imlib2  ...)
- imlib2 1.10.0-2
+   [bullseye] - imlib2  (Minor issue)
NOTE: https://github.com/derf/feh/issues/709
NOTE: https://git.enlightenment.org/old/legacy-imlib2/issues/20
NOTE: Fixed by: 
https://git.enlightenment.org/old/legacy-imlib2/commit/e9c09deb08047c9e902ce37144e82b6edb8aedb6
 (v1.10.0)
@@ -59425,7 +59428,7 @@ CVE-2023-26133 (All versions of the package 
progressbar.js are vulnerable to Pro
 CVE-2023-26132 (Versions of the package dottie before 2.0.4 are vulnerable to 
Prototyp ...)
- node-dottie 2.0.6+~2.0.5-1 (bug #1040592)
[bookworm] - node-dottie 2.0.2-4+deb12u1
-   [bullseye] - node-dottie 2.0.2-4+deb11u1
+   [bullseye] - node-dottie 2.0.2-1+deb11u1
NOTE: https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763
NOTE: 
https://github.com/mickhansen/dottie.js/commit/7d3aee1c9c3c842720506e131de7e181e5c8db68
 (v2.0.4)
 CVE-2023-26131 (All versions of the package 
github.com/xyproto/algernon/engine; all ve ...)


=
data/dsa-needed.txt
=
@@ -58,6 +58,10 @@ phppgadmin
 --
 pillow (jmm)
 --
+postgresql-13/oldstable (jmm)
+--
+postgresql-15/stable (jmm)
+--
 py7zr/oldstable
 --
 python-asyncssh



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0d244b55d0d6c9768efeb920fc0b1a30c3713105

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0d244b55d0d6c9768efeb920fc0b1a30c3713105
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-02-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4b642eea by Moritz Muehlenhoff at 2024-02-05T13:06:37+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -82,6 +82,8 @@ CVE-2021-46902 (An issue was discovered in LTOS-Web-Interface 
in Meinberg LANTIM
NOT-FOR-US: Meinberg
 CVE-2024-25062 (An issue was discovered in libxml2 before 2.11.7 and 2.12.x 
before 2.1 ...)
- libxml2 
+   [bookworm] - libxml2  (Minor issue)
+   [bullseye] - libxml2  (Minor issue)
NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
NOTE: 
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2b0aac140d739905c7848a42efc60bfe783a39b7
 (v2.11.7)
NOTE: 
https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970884fcc13305cb8e23cdc5f0dd7667c2c
 (v2.12.5)
@@ -179,6 +181,8 @@ CVE-2024-23895 (A vulnerability has been reported in Cups 
Easy (Purchase & Inven
NOT-FOR-US: Cups Easy (Purchase & Inventory)
 CVE-2024-23831 (LedgerSMB is a free web-based double-entry accounting system. 
When a L ...)
- ledgersmb  (bug #1062845)
+   [bookworm] - ledgersmb  (Minor issue)
+   [bullseye] - ledgersmb  (Minor issue)
[buster] - ledgersmb  (Minor issue)
NOTE: 
https://github.com/ledgersmb/LedgerSMB/security/advisories/GHSA-98ff-f638-qxjm
NOTE: 
https://github.com/ledgersmb/LedgerSMB/commit/8c2ae5be68a782d62cb9c0e17c0127bf30ef4165
@@ -535,6 +539,8 @@ CVE-2024-1167 (When SEW-EURODRIVE MOVITOOLS MotionStudio 
processes XML informati
NOT-FOR-US: SEW-EURODRIVE MOVITOOLS MotionStudio
 CVE-2024-1141 (A vulnerability was found in python-glance-store. The issue 
occurs whe ...)
- python-glance-store 
+   [bookworm] - python-glance-store  (Minor issue)
+   [bullseye] - python-glance-store  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2258836
TODO: check, missing details in RHBZ#2258836
 CVE-2024-0935 (An insertion of Sensitive Information into Log File 
vulnerability is a ...)
@@ -545,8 +551,13 @@ CVE-2023-6078 (An OS Command Injection vulnerability 
exists in BIOVIA Materials
NOT-FOR-US: BIOVIA Materials Studio products
 CVE-2023-5841 (Due to a failure in validating the number of scanline samples 
of a Ope ...)
- openexr 
+   [bookworm] - openexr  (Minor issue)
+   [bullseye] - openexr  (Only affects 3.x)
+   [buster] - openexr  (Only affects 3.x)
NOTE: https://takeonme.org/cves/CVE-2023-5841.html
NOTE: https://github.com/AcademySoftwareFoundation/openexr/issues/1625
+   NOTE: 
https://github.com/AcademySoftwareFoundation/openexr/commit/46944c3a87ebc6c5d9a9a4962a94569ba1082bc3
+   NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1627
 CVE-2023-52195 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
NOT-FOR-US: WordPress plugin
 CVE-2023-52194 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
@@ -1003,12 +1014,16 @@ CVE-2023-6780 (An integer overflow was found in the 
__vsyslog_internal function
NOTE: 
https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2024-0003
 CVE-2024-23829 (aiohttp is an asynchronous HTTP client/server framework for 
asyncio an ...)
- python-aiohttp  (bug #1062708)
+   [bookworm] - python-aiohttp  (Minor issue)
+   [bullseye] - python-aiohttp  (Minor issue)
NOTE: 
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2
NOTE: https://github.com/aio-libs/aiohttp/pull/8074
NOTE: 
https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827
 (master)
NOTE: 
https://github.com/aio-libs/aiohttp/commit/d33bc21414e283c9e6fe7f6caf69e2ed60d66c82
 (v3.9.2)
 CVE-2024-23334 (aiohttp is an asynchronous HTTP client/server framework for 
asyncio an ...)
- python-aiohttp  (bug #1062709)
+   [bookworm] - python-aiohttp  (Minor issue)
+   [bullseye] - python-aiohttp  (Minor issue)
NOTE: 
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f
NOTE: https://github.com/aio-libs/aiohttp/pull/8079
NOTE: 
https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b
 (master)
@@ -2815,6 +2830,7 @@ CVE-2023-28743 (Improper input validation for some Intel 
NUC BIOS firmware befor
NOT-FOR-US: Intel
 CVE-2024-21733 (Generation of Error Message Containing Sensitive Information 
vulnerabi ...)
- tomcat9 9.0.53-1
+   [bullseye] - tomcat9  (Minor issue, fix along in next update)
NOTE: https://www.openwall.com/lists/oss-security/2024/01/19/2
NOTE: 
https://github.com/apache/tomcat/commit/86ccc43940861703c2be96a5f35384407522125a
 (9.0.44)
 CVE-2024-23387 (FusionPBX prior to 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-01-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b97b1d8b by Moritz Muehlenhoff at 2024-01-08T20:35:53+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3062,6 +3062,8 @@ CVE-2023-48795 (The SSH transport protocol with certain 
OpenSSH extensions, foun
[bullseye] - filezilla  (Minor issue)
[buster] - filezilla  (Minor issue)
- golang-go.crypto 1:0.17.0-1 (bug #1059003)
+   [bookworm] - golang-go.crypto  (Minor issue)
+   [bullseye] - golang-go.crypto  (Minor issue)
- jsch  (ChaCha20-Poly1305 support introduced in 0.1.61; 
*-EtM support introduced in 0.1.58)
- libssh 0.10.6-1 (bug #1059004)
- libssh2 1.11.0-4 (bug #1059005)
@@ -3091,6 +3093,8 @@ CVE-2023-48795 (The SSH transport protocol with certain 
OpenSSH extensions, foun
- python-asyncssh  (bug #1059007)
- tinyssh 20230101-4 (bug #1059058; unimportant)
- trilead-ssh2  (bug #1059294)
+   [bookworm] - trilead-ssh2  (Minor issue)
+   [bullseye] - trilead-ssh2  (Minor issue)
NOTE: https://terrapin-attack.com/
NOTE: https://www.openwall.com/lists/oss-security/2023/12/18/3
NOTE: dropbear: 
https://github.com/mkj/dropbear/commit/6e43be5c7b99dbee49dc72b6f989f29fdd7e9356
@@ -4451,6 +4455,8 @@ CVE-2023-42495 (Dasan Networks - W-Web versions 1.22-1.27 
- CWE-78: Improper Neu
 CVE-2023-34194 (StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in 
TinyXML ...)
{DLA-3701-1}
- tinyxml 2.6.2-6.1 (bug #1059315)
+   [bookworm] - tinyxml  (Minor issue)
+   [bullseye] - tinyxml  (Minor issue)
NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities
NOTE: Debian (non upstream) patch: 
https://salsa.debian.org/debian/tinyxml/-/raw/2366e1f23d059d4c20c43c54176b6bd78d6a83fc/debian/patches/CVE-2023-34194.patch
 CVE-2023-6707 (Use after free in CSS in Google Chrome prior to 120.0.6099.109 
allowed ...)
@@ -7057,6 +7063,8 @@ CVE-2023-47418 (Remote Code Execution (RCE) vulnerability 
in o2oa version 8.1.2
NOT-FOR-US: p2pa
 CVE-2023-40458 (Loop with Unreachable Exit Condition ('Infinite Loop') 
vulnerability i ...)
- tinyxml  (bug #1059315)
+   [bookworm] - tinyxml  (Minor issue)
+   [bullseye] - tinyxml  (Minor issue)
NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities
 CVE-2023-3741 (An OS Command injection vulnerability in NEC Platforms DT900 
and DT900 ...)
NOT-FOR-US: NEC
@@ -15628,6 +15636,8 @@ CVE-2023-44487 (The HTTP/2 protocol allows a denial of 
service (server resource
- tomcat10 10.1.14-1
- trafficserver 9.2.3+ds-1 (bug #1053801; bug #1054427)
- grpc 
+   [bookworm] - grpc  (Minor issue)
+   [bullseye] - grpc  (Minor issue)
- h2o 2.2.5+dfsg2-8 (bug #1054232)
- haproxy 1.8.13-1
- nginx 1.24.0-2 (unimportant; bug #1053770)


=
data/dsa-needed.txt
=
@@ -39,6 +39,8 @@ php*seclib* (seb)
 --
 php-cas/oldstable
 --
+php-dompdf-svg-lib/stable
+--
 php-horde-mime-viewer/oldstable
 --
 php-horde-turba/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b97b1d8b86be85dbfe389ffe87b5dbe6f74a27c7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b97b1d8b86be85dbfe389ffe87b5dbe6f74a27c7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2024-01-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
baf17973 by Moritz Muehlenhoff at 2024-01-05T12:18:25+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -1156,6 +1156,8 @@ CVE-2023-51075 (hutool-core v5.8.23 was discovered to 
contain an infinite loop i
NOT-FOR-US: Hutool
 CVE-2023-51074 (json-path v2.8.0 was discovered to contain a stack overflow 
via the Cr ...)
- jayway-jsonpath 
+   [bookworm] - jayway-jsonpath  (Minor issue)
+   [bullseye] - jayway-jsonpath  (Minor issue)
NOTE: https://github.com/json-path/JsonPath/issues/973
 CVE-2023-51010 (An issue in the export component AdSdkH5Activity of 
com.sdjictec.qdmet ...)
NOT-FOR-US: com.sdjictec.qdmetro
@@ -2854,8 +2856,13 @@ CVE-2023-48795 (The SSH transport protocol with certain 
OpenSSH extensions, foun
[bookworm] - paramiko  (Minor issue)
[bullseye] - paramiko  (Minor issue)
- phpseclib 1.0.22-1
+   [bookworm] - phpseclib  (Minor issue)
+   [bullseye] - phpseclib  (Minor issue)
- php-phpseclib 2.0.46-1
+   [bookworm] - php-phpseclib  (Minor issue)
+   [bullseye] - php-phpseclib  (Minor issue)
- php-phpseclib3 3.0.35-1
+   [bookworm] - php-phpseclib3  (Minor issue)
- proftpd-dfsg 1.3.8.b+dfsg-1 (bug #1059144)
[bookworm] - proftpd-dfsg  (Minor issue)
[bullseye] - proftpd-dfsg  (Minor issue)
@@ -2934,12 +2941,18 @@ CVE-2023-6483 (The vulnerability exists in ADiTaaS 
(Allied Digital Integrated To
NOT-FOR-US: ADiTaaS (Allied Digital Integrated Tool-as-a-Service)
 CVE-2023-50981 (ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 
allows atta ...)
- libcrypto++  (bug #1059312)
+   [bookworm] - libcrypto++  (Minor issue)
+   [bullseye] - libcrypto++  (Minor issue)
NOTE: https://github.com/weidai11/cryptopp/issues/1249
 CVE-2023-50980 (gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows 
attackers to  ...)
- libcrypto++  (bug #1059311)
+   [bookworm] - libcrypto++  (Minor issue)
+   [bullseye] - libcrypto++  (Minor issue)
NOTE: https://github.com/weidai11/cryptopp/issues/1248
 CVE-2023-50979 (Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side 
channel during ...)
- libcrypto++  (bug #1059310)
+   [bookworm] - libcrypto++  (Minor issue)
+   [bullseye] - libcrypto++  (Minor issue)
NOTE: https://github.com/weidai11/cryptopp/issues/1247
 CVE-2023-50976 (Redpanda before 23.1.21 and 23.2.x before 23.2.18 has missing 
authoriz ...)
NOT-FOR-US: Redpanda
@@ -3989,6 +4002,8 @@ CVE-2023-50782 [Bleichenbacher timing oracle attack 
against RSA decryption - inc
NOTE: CVE is for incomplete fix of CVE-2020-25659
 CVE-2023-50781 [Bleichenbacher timing attacks in the RSA decryption API - 
incomplete fix for CVE-2020-25657]
- m2crypto  (bug #1059292)
+   [bookworm] - m2crypto  (Minor issue)
+   [bullseye] - m2crypto  (Minor issue)
[buster] - m2crypto  (Minor issue; it's an incomplete fix of 
CVE-2020-25657)
NOTE: https://gitlab.com/m2crypto/m2crypto/-/issues/342
NOTE: https://people.redhat.com/~hkario/marvin/
@@ -13161,6 +13176,8 @@ CVE-2023-45805 (pdm is a Python package and dependency 
manager supporting the la
NOTE: 
https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831
 CVE-2023-44483 (All versions of Apache Santuario - XML Security for Java prior 
to 2.2. ...)
- libxml-security-java  (bug #1059313)
+   [bookworm] - libxml-security-java  (Minor issue)
+   [bullseye] - libxml-security-java  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/10/20/5
NOTE: https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55
NOTE: https://santuario.apache.org/secadv.data/CVE-2023-44483.txt.asc
@@ -18706,6 +18723,8 @@ CVE-2023-37611 (Cross Site Scripting (XSS) 
vulnerability in Neos CMS 8.3.3 allow
NOT-FOR-US: Neos CMS
 CVE-2023-4237 (A flaw was found in the Ansible Automation Platform. When 
creating a n ...)
- ansible  (bug #1055300)
+   [bookworm] - ansible  (Minor issue)
+   [bullseye] - ansible  (Minor issue)
[buster] - ansible  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2229979
NOTE: https://github.com/advisories/GHSA-ww3m-ffrm-qvqv


=
data/dsa-needed.txt
=
@@ -48,6 +48,8 @@ python3.11/stable (carnil)
 --
 python3.9/oldstable
 --
+python-asyncssh
+--
 redmine/stable
 --
 ring



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/baf179734b0fede4b1a1c6cf53b59b1721456257

-- 
View it on GitLab: 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-12 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b690b335 by Moritz Muehlenhoff at 2023-12-12T16:48:39+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -262,6 +262,8 @@ CVE-2023-6356 [NULL pointer dereference in 
nvmet_tcp_build_iovec]
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254054
 CVE-2023-39804 [Incorrectly handled extension attributes in PAX archives can 
lead to a crash]
- tar  (bug #1058079)
+   [bookworm] - tar  (Minor issue)
+   [bullseye] - tar  (Minor issue)
NOTE: Fixed by: 
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4
 (v1.35)
 CVE-2023-6679 (A null pointer dereference vulnerability was found in 
dpll_pin_parent_ ...)
- linux  (Vulnerable code not present)
@@ -2480,7 +2482,9 @@ CVE-2023-34055 (In Spring Boot versions 2.7.0 - 2.7.17, 
3.0.0-3.0.12 and 3.1.0-3
NOT-FOR-US: Spring Boot
 CVE-2023-46589 (Improper Input Validation vulnerability in Apache 
Tomcat.Tomcat from 1 ...)
- tomcat10 10.1.16-1 (bug #1057082)
+   [bookworm] - tomcat10  (Minor issue, fix along in next DSA)
- tomcat9 9.0.70-2
+   [bullseye] - tomcat9  (Minor issue, fix along in next DSA)
- tomcat8 
NOTE: https://www.openwall.com/lists/oss-security/2023/11/28/2
NOTE: 
https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08
 (10.1.16)
@@ -15728,6 +15732,8 @@ CVE-2023-39514 (Cacti is an open source operational 
monitoring and fault managem
NOTE: Introduced by: 
https://github.com/Cacti/cacti/commit/75c147b70493d188ad85313569f86e33e13988b2 
(release/1.2.17)
 CVE-2023-39513 (Cacti is an open source operational monitoring and fault 
management fr ...)
- cacti 1.2.25+ds1-1
+   [bookworm] - cacti  (Minor issue)
+   [bullseye] - cacti  (Minor issue)
NOTE: 
https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2
NOTE: Initial fix: 
https://github.com/Cacti/cacti/commit/976f44dd8dfb2410e0dba00de9c4bbca17ee8910 
(release/1.2.25)
NOTE: Final fix: 
https://github.com/Cacti/cacti/commit/23abb0e0a9729bd056b56f4fb5a6fc8e7ebda523 
(release/1.2.25)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b690b335635f0f7a62c96ceca6f210c61812bb39

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b690b335635f0f7a62c96ceca6f210c61812bb39
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e846a8fc by Moritz Muehlenhoff at 2023-12-08T15:48:07+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -99,17 +99,25 @@ CVE-2023-49465 (Libde265 v1.0.14 was discovered to contain 
a heap-buffer-overflo
NOTE: https://github.com/strukturag/libde265/issues/435
 CVE-2023-49464 (libheif v1.17.5 was discovered to contain a segmentation 
violation via ...)
- libheif 
+   [bookworm] - libheif  (Minor issue)
+   [bullseye] - libheif  (Minor issue)
NOTE: https://github.com/strukturag/libheif/issues/1044
NOTE: https://github.com/strukturag/libheif/pull/1049
NOTE: 
https://github.com/strukturag/libheif/commit/2bf226a300951e6897ee7267d0dd379ba5ad7287
 CVE-2023-49463 (libheif v1.17.5 was discovered to contain a segmentation 
violation via ...)
- libheif 
+   [bookworm] - libheif  (Minor issue)
+   [bullseye] - libheif  (Minor issue)
NOTE: https://github.com/strukturag/libheif/issues/1042
 CVE-2023-49462 (libheif v1.17.5 was discovered to contain a segmentation 
violation via ...)
- libheif 
+   [bookworm] - libheif  (Minor issue)
+   [bullseye] - libheif  (Minor issue)
NOTE: https://github.com/strukturag/libheif/issues/1043
 CVE-2023-49460 (libheif v1.17.5 was discovered to contain a segmentation 
violation via ...)
- libheif 
+   [bookworm] - libheif  (Minor issue)
+   [bullseye] - libheif  (Minor issue)
NOTE: https://github.com/strukturag/libheif/issues/1046
 CVE-2023-49437 (Tenda AX12 V22.03.01.46 has been discovered to contain a 
command injec ...)
NOT-FOR-US: Tenda
@@ -157,6 +165,7 @@ CVE-2023-49402 (Tenda W30E V16.01.0.12(4843) was discovered 
to contain a stack o
NOT-FOR-US: Tenda
 CVE-2023-48958 (gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in 
gf_mpd_ ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in Buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2689
NOTE: Fixed by: 
https://github.com/gpac/gpac/commit/249c9fc18704e6d3cb6a4b173034a41aa570e7e4
@@ -172,6 +181,7 @@ CVE-2023-46974 (Cross Site Scripting vulnerability in Best 
Courier Management Sy
NOT-FOR-US: Best Courier Management System
 CVE-2023-46871 (GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box 
contains a mem ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in Buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2658
NOTE: Fixed by: 
https://github.com/gpac/gpac/commit/03760e34d32e502a0078b20d15ea83ecaf453a5c



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e846a8fc3831d68633483817636e4e9e5402b0a1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e846a8fc3831d68633483817636e4e9e5402b0a1
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
30867de7 by Moritz Muehlenhoff at 2023-12-06T10:46:03+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -57,7 +57,9 @@ CVE-2023-39326 [net/http: limit chunked data overhead]
- golang-1.21 1.21.5-1
- golang-1.20 1.20.12-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
NOTE: https://go.dev/issue/64433
NOTE: 
https://github.com/golang/go/commit/ec8c526e4be720e94b98ca509e6364f0efaf28f7 
(go1.21.5)
@@ -66,7 +68,9 @@ CVE-2023-45285 [cmd/go: go get may unexpectedly fallback to 
insecure git]
- golang-1.21 1.21.5-1
- golang-1.20 1.20.12-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
NOTE: https://go.dev/issue/63845
NOTE: 
https://github.com/golang/go/commit/23c943e5296c6fa3a6f9433bd929306c4dbf2aa3 
(go1.21.5)
@@ -152,6 +156,8 @@ CVE-2023-44297 (Dell PowerEdge platforms 16G Intel E5 BIOS 
and Dell Precision BI
NOT-FOR-US: Dell
 CVE-2023-43628 (An integer overflow vulnerability exists in the NTRIP Stream 
Parsing f ...)
- gpsd 
+   [bookworm] - gpsd  (Minor issue)
+   [bullseye] - gpsd  (Minor issue)
NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860
NOTE: 
https://gitlab.com/gpsd/gpsd/-/commit/3e5c6c28c422102dd453e31912e1e79d1f7ff7f2
 CVE-2023-43608 (A data integrity vulnerability exists in the 
BR_NO_CHECK_HASH_FOR func ...)
@@ -8775,6 +8781,8 @@ CVE-2023-40682 (IBM App Connect Enterprise 12.0.1.0 
through 12.0.8.0 contains an
 CVE-2023-3 (Exposure of Sensitive Information to an Unauthorized Actor in 
WordPres ...)
{DLA-3658-1}
- wordpress 6.3.2+dfsg1-1
+   [bookworm] - wordpress  (Minor issue)
+   [bullseye] - wordpress  (Minor issue)
NOTE: 
https://wordpress.org/documentation/wordpress-version/version-6-3-2/
NOTE: https://core.trac.wordpress.org/changeset/56843/
 CVE-2023-39960 (Nextcloud Server provides data storage for Nextcloud, an open 
source c ...)
@@ -90460,6 +90468,7 @@ CVE-2022-2851
 CVE-2022-2850 (A flaw was found In 389-ds-base. When the Content 
Synchronization plug ...)
{DLA-3399-1}
- 389-ds-base 2.3.1-1 (bug #1018054)
+   [bullseye] - 389-ds-base  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2118691
NOTE: 
https://github.com/389ds/389-ds-base/issues/4711#issuecomment-1205100979
NOTE: https://github.com/389ds/389-ds-base/issues/5418


=
data/dsa-needed.txt
=
@@ -26,6 +26,8 @@ gpac/oldstable
 --
 h2o (jmm)
 --
+haproxy
+--
 libreswan (jmm)
   Maintainer prepared bookworm-security update, but needs work on 
bullseye-security backports
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30867de72c030a7ee243172c7b235dbf4b2e4ae9

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30867de72c030a7ee243172c7b235dbf4b2e4ae9
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
336fe7c2 by Moritz Muehlenhoff at 2023-12-05T12:14:40+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -57,11 +57,10 @@ CVE-2023-49284 (fish is a smart and user-friendly command 
line shell for macOS,
 CVE-2023-49280 (XWiki Change Request is an XWiki application allowing to 
request chang ...)
NOT-FOR-US: XWiki
 CVE-2023-49080 (The Jupyter Server provides the backend (i.e. the core 
services, APIs, ...)
-   - jupyter-server  (bug #1057454)
-   [bookworm] - jupyter-server  (Minor issue)
-   [bullseye] - jupyter-server  (Minor issue)
+   - jupyter-server  (unimportant; bug #1057454)
NOTE: 
https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-h56g-gq9v-vc8r
NOTE: 
https://github.com/jupyter-server/jupyter_server/commit/0056c3aa52cbb28b263a7a609ae5f17618b36652
 (v2.11.2)
+   NOTE: Path disclosure has no security impact as packaged in Debian
 CVE-2023-48698 (Azure RTOS USBX is a USB host, device, and on-the-go (OTG) 
embedded st ...)
NOT-FOR-US: Azure RTOS USBX
 CVE-2023-48697 (Azure RTOS USBX is a USB host, device, and on-the-go (OTG) 
embedded st ...)
@@ -129524,6 +129523,7 @@ CVE-2022-24688 (An issue was discovered in DSK DSKNet 
2.16.136.0 and 2.17.136.5.
NOT-FOR-US: DSK DSKNet
 CVE-2022-24687 (HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 
1.10.7, a ...)
- consul 1.9.17+dfsg2-1 (bug #1006487)
+   [bullseye] - consul  (EOL in Bullseye)
[buster] - consul  (Vulnerable Code not present)
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/
NOTE: 
https://github.com/hashicorp/consul/commit/d35c6a97cbdff252f5238d6b52f49786f896566a
 (v1.9.15)
@@ -167120,6 +167120,7 @@ CVE-2021-37220 (MuPDF through 1.18.1 has an 
out-of-bounds write because the cach
NOTE: On Stretch, an earlier version of the code exits early instead of 
crashing.
 CVE-2021-37219 (HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer 
allows no ...)
- consul 1.8.7+dfsg1-6 (bug #1015218)
+   [bullseye] - consul  (EOL in Bullseye)
[buster] - consul  (Minor issue; intrusive to backport)
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024
NOTE: 
https://github.com/hashicorp/consul/commit/ccf8eb1947357434eb6e66303ddab79f4c9d4103



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/336fe7c2f133a9cf2c10cec3ac8c72934c413554

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/336fe7c2f133a9cf2c10cec3ac8c72934c413554
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
aac75138 by Moritz Muehlenhoff at 2023-12-04T16:22:52+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -376,8 +376,9 @@ CVE-2023-4658 (An issue has been discovered in GitLab EE 
affecting all versions
 CVE-2023-4317 (An issue has been discovered in GitLab affecting all versions 
starting ...)
- gitlab 
 CVE-2023-49735 (** UNSUPPORTED WHEN ASSIGNED **  The value set as the 
DefaultLocaleRes ...)
-   - tiles  (bug #1057315)
+   - tiles  (unimportant; bug #1057315)
NOTE: https://lists.apache.org/thread/8ktm4vxr6vvc1qsxh6ft8jzmom1zl65p
+   NOTE: Negligible security impact as packaged in Debian
 CVE-2023-48894 (Incorrect Access Control vulnerability in jshERP V3.3 allows 
attackers ...)
NOT-FOR-US: jshERP
 CVE-2023-48016 (Restaurant Table Booking System V1.0 is vulnerable to SQL 
Injection in ...)
@@ -855,6 +856,8 @@ CVE-2023-49090 (CarrierWave is a solution for file uploads 
for Rails, Sinatra an
NOT-FOR-US: CarrierWave
 CVE-2023-49083 (cryptography is a package designed to expose cryptographic 
primitives  ...)
- python-cryptography  (bug #1057108)
+   [bookworm] - python-cryptography  (Minor issue)
+   [bullseye] - python-cryptography  (Minor issue)
NOTE: 
https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97
NOTE: https://github.com/pyca/cryptography/pull/9926
NOTE: 
https://github.com/pyca/cryptography/commit/1e7b4d074e14c4e694d3ce69ad6754a6039fd6ff
 (main)
@@ -59994,7 +59997,9 @@ CVE-2023-22085 (Vulnerability in the Hospitality OPERA 
5 Property Services produ
NOT-FOR-US: Oracle
 CVE-2023-22084 (Vulnerability in the MySQL Server product of Oracle MySQL 
(component:  ...)
- mariadb 1:10.11.6-1
+   [bookworm] - mariadb  (Minor issue, will be fixed via point 
update)
- mariadb-10.5 
+   [bullseye] - mariadb-10.5  (Minor issue, will be fixed via 
point update)
- mariadb-10.3 
- mysql-8.0 8.0.35-1 (bug #1055034)
NOTE: Fixed in MariaDB: 11.2.2, 11.1.3, 11.0.4, 10.11.6, 10.10.7, 
10.6.16, 10.5.23, 10.4.32



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aac75138bca9bd8c5b3d31abb68c4972fee9f4fc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aac75138bca9bd8c5b3d31abb68c4972fee9f4fc
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b437c9cb by Moritz Muehlenhoff at 2023-12-04T11:07:03+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -779,27 +779,43 @@ CVE-2023-49052 (File Upload vulnerability in Microweber 
v.2.0.4 allows a remote
NOT-FOR-US: microweber
 CVE-2023-48952 (An issue in the box_deserialize_reusing function in openlink 
virtuoso- ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1175
 CVE-2023-48951 (An issue in the box_equal function in openlink 
virtuoso-opensource v7. ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1177
 CVE-2023-48950 (An issue in the box_col_len function in openlink 
virtuoso-opensource v ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1174
 CVE-2023-48949 (An issue in the box_add function in openlink 
virtuoso-opensource v7.2. ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1173
 CVE-2023-48948 (An issue in the box_div function in openlink 
virtuoso-opensource v7.2. ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1176
 CVE-2023-48947 (An issue in the cha_cmp function of openlink 
virtuoso-opensource v7.2. ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1179
 CVE-2023-48946 (An issue in the box_mpy function of openlink 
virtuoso-opensource v7.2. ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1178
 CVE-2023-48945 (A stack overflow in openlink virtuoso-opensource v7.2.11 
allows attack ...)
- virtuoso-opensource 
+   [bookworm] - virtuoso-opensource  (Minor issue)
+   [bullseye] - virtuoso-opensource  (Minor issue)
NOTE: https://github.com/openlink/virtuoso-opensource/issues/1172
 CVE-2023-47464 (Insecure Permissions vulnerability in GL.iNet AX1800 version 
4.0.0 bef ...)
NOT-FOR-US: GL.iNet AX1800
@@ -1048,15 +1064,23 @@ CVE-2023-46349 (In the module "Product Catalog (CSV, 
Excel) Export/Update" (upda
NOT-FOR-US: PrestaShop module
 CVE-2023-42366 (A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in 
the next_ ...)
- busybox 
+   [bookworm] - busybox  (Minor issue)
+   [bullseye] - busybox  (Minor issue)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=15874
 CVE-2023-42365 (A use-after-free vulnerability was discovered in BusyBox 
v.1.36.1 via  ...)
- busybox 
+   [bookworm] - busybox  (Minor issue)
+   [bullseye] - busybox  (Minor issue)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=15871
 CVE-2023-42364 (A use-after-free vulnerability in BusyBox v.1.36.1 allows 
attackers to ...)
- busybox 
+   [bookworm] - busybox  (Minor issue)
+   [bullseye] - busybox  (Minor issue)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=15868
 CVE-2023-42363 (A use-after-free vulnerability was discovered in xasprintf 
function in ...)
- busybox 
+   [bookworm] - busybox  (Minor issue)
+   [bullseye] - busybox  (Minor issue)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=15865
 CVE-2023-3545 (Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in 
Chamilo  ...)
NOT-FOR-US: Chamilo LMS


=
data/dsa-needed.txt
=
@@ -81,8 +81,6 @@ squid
 --
 varnish
 --
-xen (jmm)
---
 zbar
   unfixed upstream, initial aproaches are overly strict and cause zbar's tests 
to fail, some caution is in order
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b437c9cbfa47566bc2939bd89f582206d7e51e15

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b437c9cbfa47566bc2939bd89f582206d7e51e15
You're receiving 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-12-01 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a181c888 by Moritz Muehlenhoff at 2023-12-01T21:54:01+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -11249,6 +11249,7 @@ CVE-2023-5115 [malicious role archive can cause 
ansible-galaxy to overwrite arbi
[bookworm] - ansible-core  (Minor issue)
[bullseye] - ansible-core  (Minor issue)
- ansible 5.4.0-1
+   [bullseye] - ansible  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2233810
NOTE: https://github.com/ansible/ansible/pull/81780
NOTE: 
https://github.com/ansible/ansible/commit/ddf0311c63287e2d5334770377350c1e0cbfff28
@@ -14847,6 +14848,8 @@ CVE-2023-41537 (phpjabbers Business Directory Script 
3.2 is vulnerable to Cross
NOT-FOR-US: PHPJabbers
 CVE-2023-41039 (RestrictedPython is a restricted execution environment for 
Python to r ...)
- restrictedpython 6.2-1
+   [bookworm] - restrictedpython  (Minor issue)
+   [bullseye] - restrictedpython  (Minor issue)
NOTE: 
https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67
NOTE: Fixed by: 
https://github.com/zopefoundation/RestrictedPython/commit/4134aedcff17c977da7717693ed89ce56d54c120
 CVE-2023-40848 (Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is 
vulnerable to Bu ...)
@@ -20928,6 +20931,8 @@ CVE-2023-36818 (Discourse is an open source discussion 
platform. In affected ver
NOT-FOR-US: Discourse
 CVE-2023-36811 (borgbackup is an opensource, deduplicating archiver with 
compression a ...)
- borgbackup 1.2.5-1
+   [bookworm] - borgbackup  (Minor issue)
+   [bullseye] - borgbackup  (Minor issue)
NOTE: 
https://github.com/borgbackup/borg/security/advisories/GHSA-8fjr-hghr-4m99
NOTE: 
https://github.com/borgbackup/borg/commit/a2ee13fd341dcd004b4a06b17d6f2fc759327861
NOTE: 
https://github.com/borgbackup/borg/commit/bfead4b288833f890523d8881797ff6b345edaf9
@@ -21654,6 +21659,8 @@ CVE-2023-37280 (Pimcore Admin Classic Bundle provides a 
Backend UI for Pimcore b
NOT-FOR-US: Pimcore Admin Classic Bundle
 CVE-2023-37271 (RestrictedPython is a tool that helps to define a subset of 
the Python ...)
- restrictedpython 6.2-1 (bug #1041429)
+   [bookworm] - restrictedpython  (Minor issue)
+   [bullseye] - restrictedpython  (Minor issue)
NOTE: 
https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh
NOTE: 
https://github.com/zopefoundation/RestrictedPython/commit/c8eca66ae49081f0016d2e1f094c3d72095ef531
 (master)
NOTE: 
https://github.com/zopefoundation/RestrictedPython/commit/d8c5aa72c5d0ec8eceab635d93d6bc8321116002
 (5.3)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a181c8882ebcafac3889b7aa189520e9c023ec14

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a181c8882ebcafac3889b7aa189520e9c023ec14
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9afdec9f by Moritz Muehlenhoff at 2023-11-28T16:59:29+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/next-oldstable-point-update.txt


Changes:

=
data/CVE/list
=
@@ -7320,6 +7320,8 @@ CVE-2023-5554 (Lack of TLS certificate verification in 
log transmission of a fin
NOT-FOR-US: LINE
 CVE-2023-5072 (Denial of Service  in JSON-Java versions up to and including 
20230618. ...)
- libjson-java  (bug #1053882)
+   [bookworm] - libjson-java  (Minor issue)
+   [bullseye] - libjson-java  (Minor issue)
[buster] - libjson-java  (Minor issue)
- jenkins-json  (bug #1053883)
[bookworm] - jenkins-json  (Minor issue)
@@ -71351,9 +71353,13 @@ CVE-2022-44012 (An issue was discovered in 
/DS/LM_API/api/SelectionService/Inser
NOT-FOR-US: Simmeth Lieferantenmanager
 CVE-2022-44011 (An issue was discovered in ClickHouse before 22.9.1.2603. An 
authentic ...)
- clickhouse 
+   [bookworm] - clickhouse  (Minor issue)
+   [bullseye] - clickhouse  (Minor issue)
NOTE: https://github.com/ClickHouse/ClickHouse/pull/40241
 CVE-2022-44010 (An issue was discovered in ClickHouse before 22.9.1.2603. An 
attacker  ...)
- clickhouse 
+   [bookworm] - clickhouse  (Minor issue)
+   [bullseye] - clickhouse  (Minor issue)
NOTE: https://github.com/ClickHouse/ClickHouse/pull/40292
 CVE-2022-44009 (Improper access control in Key-Value RBAC in StackStorm 
version 3.7.0  ...)
NOT-FOR-US: StackStorm


=
data/next-oldstable-point-update.txt
=
@@ -100,4 +100,3 @@ CVE-2023-43887
[bullseye] - libde265 1.0.11-0+deb11u2
 CVE-2023-47471
[bullseye] - libde265 1.0.11-0+deb11u2
-CVE-2022-27240



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9afdec9f7f782cfd87ba68516b73cb4f3910a5ac

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9afdec9f7f782cfd87ba68516b73cb4f3910a5ac
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-27 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
35cf6256 by Moritz Muehlenhoff at 2023-11-27T17:11:29+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2943,6 +2943,8 @@ CVE-2023-47004 (Buffer Overflow vulnerability in Redis 
RedisGraph v.2.x through
NOT-FOR-US: RedisGraph
 CVE-2023-46998 (Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 
through ...)
- libjs-bootbox  (bug #1055612)
+   [bookworm] - libjs-bootbox  (Minor issue)
+   [bullseye] - libjs-bootbox  (Minor issue)
NOTE: https://github.com/bootboxjs/bootbox/issues/661
 CVE-2023-46845 (EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 
4.0.6-p3, ...)
NOT-FOR-US: EC-CUBE
@@ -6489,6 +6491,7 @@ CVE-2023-42497 (Reflected cross-site scripting (XSS) 
vulnerability on the Export
NOT-FOR-US: Liferay Portal
 CVE-2023-42459 (Fast DDS is a C++ implementation of the DDS (Data Distribution 
Service ...)
- fastdds 2.11.2+ds-6 (bug #1054163)
+   [bullseye] - fastdds  (Vulnerable code not present)
NOTE: 
https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm
NOTE: https://github.com/eProsima/Fast-DDS/issues/3207
NOTE: https://github.com/eProsima/Fast-DDS/pull/3824



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/35cf6256accda513d05dc3bac764eff195fe21ad

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/35cf6256accda513d05dc3bac764eff195fe21ad
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-27 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
63c2ddcc by Moritz Muehlenhoff at 2023-11-27T11:26:48+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -56,6 +56,8 @@ CVE-2023-6293 (Prototype Pollution in GitHub repository 
robinbuschmann/sequelize
NOT-FOR-US: sequelize-typescript
 CVE-2023-6277 (An out-of-memory flaw was found in libtiff. Passing a crafted 
tiff fil ...)
- tiff 4.5.1+git230720-2 (bug #1056751)
+   [bookworm] - tiff  (Minor issue)
+   [bullseye] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/614
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/545
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/5320c9d89c054fa805d037d84c57da874470b01a


=
data/dsa-needed.txt
=
@@ -16,8 +16,9 @@ cryptojs
 --
 dnsdist (jmm)
 --
-fastdds
-  Awaiting feedback from maintainer on bullseye status
+fastdds (jmm)
+--
+freeimage (jmm)
 --
 frr
 --
@@ -81,6 +82,8 @@ samba/oldstable
 --
 squid
 --
+varnish
+--
 xen (jmm)
 --
 zbar



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/63c2ddccd503001d583047ce4b7db7e17d270d9f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/63c2ddccd503001d583047ce4b7db7e17d270d9f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6718b1f7 by Moritz Muehlenhoff at 2023-11-22T17:02:18+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1149,6 +1149,8 @@ CVE-2023-1 [GIMP DDS File Parsing Heap-based Buffer 
Overflow Remote Code Exe
- gimp 2.10.36-1 (bug #1055984)
[buster] - gimp  (DDS plugin added in 2.10.10)
- gimp-dds 
+   [bookworm] - gimp-dds  (Obsoleted by src:gimp, should get 
dropped via Breaks)
+   [bullseye] - gimp-dds  (Obsoleted by src:gimp, should get 
dropped via Breaks)
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1592/
NOTE: 
https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
NOTE: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/7db71cd0b6e36c454aa0d2d3efeec7e636db4dbc
 (GIMP_2_10_36)
@@ -6569,6 +6571,8 @@ CVE-2023-5563 (The SJA1000 CAN controller driver backend 
automatically attempt t
NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr)
 CVE-2023-5557 (A flaw was found in the tracker-miners package. A weakness in 
the sand ...)
- tracker-miners 3.4.5-1 (bug #1053881)
+   [bookworm] - tracker-miners  (Minor issue)
+   [bullseye] - tracker-miners  (Minor issue)
NOTE: 
https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/#tracker-miners-seccomp-sandbox-escape
NOTE: https://gitlab.gnome.org/GNOME/tracker-miners/-/issues/277
NOTE: https://gitlab.gnome.org/GNOME/tracker-miners/-/merge_requests/480
@@ -43353,6 +43357,8 @@ CVE-2023-26142 (All versions of the package crow are 
vulnerable to HTTP Response
NOT-FOR-US: Crow
 CVE-2023-26141 (Versions of the package sidekiq before 7.1.3 are vulnerable to 
Denial  ...)
- ruby-sidekiq 
+   [bookworm] - ruby-sidekiq  (Minor issue)
+   [bullseye] - ruby-sidekiq  (Minor issue)
[buster] - ruby-sidekiq  (Minor issue, DoS still possible)
NOTE: https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107
NOTE: 
https://github.com/sidekiq/sidekiq/commit/62c90d7c5a7d8a378d79909859d87c2e0702bf89
 (v7.1.3)
@@ -229819,15 +229825,23 @@ CVE-2020-24296
RESERVED
 CVE-2020-24295 (Buffer Overflow vulnerability in 
PSDParser.cpp::ReadImageLine() in Fre ...)
- freeimage 
+   [bookworm] - freeimage  (Revisit when patches are available)
+   [bullseye] - freeimage  (Revisit when patches are available)
NOTE: 
https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
 CVE-2020-24294 (Buffer Overflow vulnerability in psdParser::UnpackRLE function 
in PSDP ...)
- freeimage 
+   [bookworm] - freeimage  (Revisit when patches are available)
+   [bullseye] - freeimage  (Revisit when patches are available)
NOTE: 
https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
 CVE-2020-24293 (Buffer Overflow vulnerability in psdThumbnail::Read in 
PSDParser.cpp i ...)
- freeimage 
+   [bookworm] - freeimage  (Revisit when patches are available)
+   [bullseye] - freeimage  (Revisit when patches are available)
NOTE: 
https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
 CVE-2020-24292 (Buffer Overflow vulnerability in load function in 
PluginICO.cpp in Fre ...)
- freeimage 
+   [bookworm] - freeimage  (Revisit when patches are available)
+   [bullseye] - freeimage  (Revisit when patches are available)
NOTE: 
https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/
 CVE-2020-24291
RESERVED
@@ -481417,11 +481431,15 @@ CVE-2016-1245 (It was discovered that the zebra 
daemon in Quagga before 1.0.2016
 CVE-2016-1244 (The extractTree function in unADF allows remote attackers to 
execute a ...)
{DSA-3676-1 DLA-631-1}
- unadf  (bug #838248)
+   [bookworm] - unadf  (Minor issue)
+   [bullseye] - unadf  (Minor issue)
NOTE: Fixed by: 
https://github.com/lclevy/ADFlib/commit/8e973d7b894552c3a3de0ccd2d1e9cb0b8e618dd
NOTE: The changes between 0.7.11a-3 and 0.7.11a-4 did not include the 
upstream fix.
 CVE-2016-1243 (Stack-based buffer overflow in the extractTree function in 
unADF allow ...)
{DSA-3676-1 DLA-631-1}
- unadf  (bug #838248)
+   [bookworm] - unadf  (Minor issue)
+   [bullseye] - unadf  (Minor issue)
NOTE: Fixed by: 
https://github.com/lclevy/ADFlib/commit/8e973d7b894552c3a3de0ccd2d1e9cb0b8e618dd
NOTE: The changes between 0.7.11a-3 and 0.7.11a-4 did not include the 
upstream fix.
 CVE-2016-1242 (file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x 
before 3 ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6718b1f7011e963f7d1ed317be9f222859974ee4

-- 
View it on 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-22 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1a0109c5 by Moritz Muehlenhoff at 2023-11-22T10:59:25+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -76,9 +76,10 @@ CVE-2023-6238 (A buffer overflow vulnerability was found in 
the NVM Express (NVM
 CVE-2023-6235 (An uncontrolled search path element vulnerability has been 
found in th ...)
NOT-FOR-US: Duet Display for Windows
 CVE-2023-6228 [heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c]
-   - tiff 
+   - tiff  (unimportant)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/606
NOTE: Fixed by: 
https://gitlab.com/libtiff/libtiff/-/commit/1e7d217a323eac701b134afc4ae39b6bdfdbc96a
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-6213 (Memory safety bugs present in Firefox 119. Some of these bugs 
showed e ...)
- firefox 120.0-1
NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6213
@@ -1536,9 +1537,13 @@ CVE-2023-47117 (Label Studio is an open source data 
labeling tool. In all curren
NOT-FOR-US: Label Studio
 CVE-2023-46446 (An issue in AsyncSSH v2.14.0 and earlier allows attackers to 
control t ...)
- python-asyncssh  (bug #1055999)
+   [bookworm] - python-asyncssh  (Minor issue)
+   [bullseye] - python-asyncssh  (Minor issue)
NOTE: 
https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm
 CVE-2023-46445 (An issue in AsyncSSH v2.14.0 and earlier allows attackers to 
control t ...)
- python-asyncssh  (bug #1056000)
+   [bookworm] - python-asyncssh  (Minor issue)
+   [bullseye] - python-asyncssh  (Minor issue)
NOTE: 
https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5
 CVE-2023-46021 (SQL Injection vulnerability in cancel.php in Code-Projects 
Blood Bank  ...)
NOT-FOR-US: Code-Projects Blood Bank
@@ -4573,6 +4578,8 @@ CVE-2023-46119 (Parse Server is an open source backend 
that can be deployed to a
NOT-FOR-US: Parse Server
 CVE-2023-46118 (RabbitMQ is a multi-protocol messaging and streaming broker. 
HTTP API  ...)
- rabbitmq-server 
+   [bookworm] - rabbitmq-server  (Minor issue)
+   [bullseye] - rabbitmq-server  (Minor issue)
NOTE: 
https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg
NOTE: https://github.com/rabbitmq/rabbitmq-server/pull/9708
 CVE-2023-4 (File Upload vulnerability in zzzCMS v.2.1.9 allows a remote 
attacker t ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a0109c5a3b29c102ddc93d794e6c0ba32b7e007

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a0109c5a3b29c102ddc93d794e6c0ba32b7e007
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-20 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c8df1691 by Moritz Muehlenhoff at 2023-11-20T22:22:29+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -6542,8 +6542,12 @@ CVE-2023-32724 (Memory pointer is in a property of the 
Ducktape object. This lea
- zabbix  (bug #1053877)
[buster] - zabbix  (vulnerable code introduced later)
NOTE: https://support.zabbix.com/browse/ZBX-23391
+   NOTE: 
https://github.com/zabbix/zabbix/commit/7266d0ac709b68ccb4d69d28253488670b8b4eb7
 (release/5.0)
+   NOTE: 
https://github.com/zabbix/zabbix/commit/b28bf2f7081cffaeecbfb797d6e625e72679c06e
 (release/6.0)
 CVE-2023-32723 (Request to LDAP is sent before user permissions are checked.)
- zabbix  (bug #1053877)
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-23230
NOTE: very likely commit 
https://github.com/zabbix/zabbix/commit/3576afe9b87d8ad1ba92a13c28ba904671087688
 (for 4.0.x)
 CVE-2023-32722 (The zabbix/src/libs/zbxjson module is vulnerable to a buffer 
overflow  ...)
@@ -10995,6 +10999,7 @@ CVE-2023-4568 (PaperCut NG allows for unauthenticated 
XMLRPC commands to be run
NOT-FOR-US: PaperCut
 CVE-2023-42503 (Improper Input Validation, Uncontrolled Resource Consumption 
vulnerabi ...)
- libcommons-compress-java 1.24.0-1 (bug #1052065)
+   [bookworm] - libcommons-compress-java  (Minor issue)
[bullseye] - libcommons-compress-java  (Vulnerable code 
introduced later)
[buster] - libcommons-compress-java  (Vulnerable code 
introduced later)
NOTE: https://lists.apache.org/thread/5xwcyr600mn074vgxq92tjssrchmc93c
@@ -51544,6 +51549,7 @@ CVE-2023-23457 (A Segmentation fault was found in UPX 
in PackLinuxElf64::invert_
NOTE: https://github.com/upx/upx/issues/631
 CVE-2023-23456 (A heap-based buffer overflow issue was discovered in UPX in 
PackTmt::p ...)
- upx-ucl  (bug #1033258)
+   [bullseye] - upx-ucl  (Minor issue)
[buster] - upx-ucl  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2160381
NOTE: 
https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4
@@ -62772,6 +62778,8 @@ CVE-2022-41985 (An authentication bypass vulnerability 
exists in the Authenticat
NOT-FOR-US: uC-FTPs
 CVE-2022-46337 (A cleverly devised username might bypass LDAP authentication 
checks. I ...)
- derby 
+   [bookworm] - derby  (Minor issue)
+   [bullseye] - derby  (Minor issue)
NOTE: https://issues.apache.org/jira/browse/DERBY-7147
NOTE: https://www.openwall.com/lists/oss-security/2023/11/19/3
 CVE-2022-46336



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8df16913c86b0c6997fa87f1eb455d033b86d59

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8df16913c86b0c6997fa87f1eb455d033b86d59
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7c17f80f by Moritz Muehlenhoff at 2023-11-17T10:12:46+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -17,33 +17,40 @@ CVE-2023-48649 (Concrete CMS before 8.5.13 and 9.x before 
9.2.2 allows stored XS
 CVE-2023-48648 (Concrete CMS before 8.5.13 and 9.x before 9.2.2 allows 
unauthorized ac ...)
NOT-FOR-US: Concrete CMS
 CVE-2023-48237 (Vim is an open source command line text editor. In affected 
versions w ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87
NOTE: 
https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e 
(v9.0.2112)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48236 (Vim is an open source command line text editor. When using the 
z= comm ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5
NOTE: 
https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968 
(v9.0.2111)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48235 (Vim is an open source command line text editor. When parsing 
relative  ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g
NOTE: 
https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 
(v9.0.2110)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48234 (Vim is an open source command line text editor. When getting 
the count ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq
NOTE: 
https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca 
(v9.0.2109)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48233 (Vim is an open source command line text editor. If the count 
after the ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj
NOTE: 
https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78 
(v9.0.2108)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48232 (Vim is an open source command line text editor. A floating 
point excep ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw
NOTE: 
https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce 
(v9.0.2107)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48231 (Vim is an open source command line text editor. When closing a 
window, ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765
NOTE: 
https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a 
(v9.0.2106)
+   NOTE: Self-inflicted crash, no security impact
 CVE-2023-48222 (Rundeck is an open source automation service with a web 
console, comma ...)
TODO: check
 CVE-2023-48078 (SQL Injection vulnerability in add.php in Simple CRUD 
Functionality v1 ...)


=
data/dsa-needed.txt
=
@@ -19,12 +19,16 @@ dnsdist (jmm)
 fastdds
   Awaiting feedback from maintainer on bullseye status
 --
+frr
+--
 gimp (carnil)
 --
 gpac/oldstable
 --
 gst-plugins-bad1.0 (carnil)
 --
+h2o (jmm)
+--
 intel-microcode (carnil)
   wait for exposure of update in unstable
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c17f80f6ed5b997c00b5567c23d35b9b25aba15

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c17f80f6ed5b997c00b5567c23d35b9b25aba15
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b8b4809a by Moritz Muehlenhoff at 2023-11-16T22:07:05+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -6,6 +6,7 @@ CVE-2023-6176 (A null pointer dereference flaw was found in the 
Linux kernel API
NOTE: 
https://git.kernel.org/linus/cfaa80c91f6f99b9342b6557f0f0e1143e434066 (6.6-rc2)
 CVE-2023-6174 (SSH dissector crash in Wireshark 4.0.0 to 4.0.10 allows denial 
of serv ...)
- wireshark 
+   [bullseye] - wireshark  (Only affects 4.x)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-28.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19369
 CVE-2023-6121 (An out-of-bounds read vulnerability was found in the 
NVMe-oF/TCP subsy ...)
@@ -12492,6 +12493,8 @@ CVE-2023-40316
- moodle 
 CVE-2023-38037 [Active Support Possibly Discloses Locally Encrypted Files]
- rails  (bug #1051057)
+   [bookworm] - rails  (Minor issue)
+   [bullseye] - rails  (Minor issue)
NOTE: https://github.com/advisories/GHSA-cr5q-6q9f-rq6q
NOTE: 
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-38037.yml
NOTE: 
https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731 
(v7.0.7.1)
@@ -36216,6 +36219,8 @@ CVE-2023-28363
 CVE-2023-28362 [Possible XSS via User Supplied Values to redirect_to]
RESERVED
- rails  (bug #1051058)
+   [bookworm] - rails  (Minor issue)
+   [bullseye] - rails  (Minor issue)
NOTE: 
https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132
NOTE: 
https://github.com/rails/rails/commit/69e37c84e3f77d75566424c7d0015172d6a6fac5 
(main)
NOTE: 
https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441 
(v6.1.7.4)


=
data/dsa-needed.txt
=
@@ -92,6 +92,8 @@ tor (jmm)
 --
 webkit2gtk (berto)
 --
+wireshark/stable
+--
 xen (jmm)
 --
 zbar



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b8b4809a931283d31c3f6f9c86a82f8e20858468

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b8b4809a931283d31c3f6f9c86a82f8e20858468
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1acf5ec2 by Moritz Muehlenhoff at 2023-11-16T21:27:57+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -2192,6 +2192,8 @@ CVE-2023-5707 (The SEO Slider plugin for WordPress is 
vulnerable to Stored Cross
NOT-FOR-US: WordPress plugin
 CVE-2023-5088 (A bug in QEMU could cause a guest I/O operation otherwise 
addressed to ...)
- qemu 1:8.1.1+ds-2
+   [bookworm] - qemu  (Minor issue)
+   [bullseye] - qemu  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2247283
NOTE: 
https://lore.kernel.org/all/20230921160712.99521-1-simon.r...@nutanix.com/T/
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2023-09/msg01011.html
@@ -28708,9 +28710,13 @@ CVE-2023-2089 (A vulnerability was found in 
SourceCodester Complaint Management
NOT-FOR-US: SourceCodester Complaint Management System
 CVE-2023-2088 (A flaw was found in OpenStack due to an inconsistency between 
Cinder a ...)
- cinder 2:21.1.0-3 (bug #1035961)
+   [bullseye] - cinder  (Minor issue)
- python-glance-store 4.1.0-4 (bug #1035962; bug #1035978)
+   [bullseye] - python-glance-store  (Minor issue)
- nova 2:26.1.0-4 (bug #1035963; bug #1035981)
+   [bullseye] - nova  (Minor issue)
- python-os-brick 4.1.0-3 (bug #1035932)
+   [bullseye] - python-os-brick  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/05/10/5
NOTE: https://bugs.launchpad.net/nova/+bug/2004555
 CVE-2023-2087 (The Essential Blocks plugin for WordPress is vulnerable to 
Cross-Site  ...)


=
data/dsa-needed.txt
=
@@ -11,8 +11,6 @@ To pick an issue, simply add your uid behind it.
 
 If needed, specify the release by adding a slash after the name of the source 
package.
 
---
-cinder/oldstable
 --
 cryptojs
 --
@@ -23,7 +21,7 @@ fastdds
 --
 gimp (carnil)
 --
-gpac/oldstable (jmm)
+gpac/oldstable
 --
 gst-plugins-bad1.0 (carnil)
 --
@@ -47,8 +45,6 @@ nghttp2
 nodejs
   maintainer proposed to follow the upstream 18.x LTS branch
 --
-nova/oldstable
---
 php-cas/oldstable
 --
 php-horde-mime-viewer/oldstable
@@ -63,10 +59,6 @@ python3.11/stable
 --
 python3.9/oldstable
 --
-python-glance-store/oldstable
---
-python-os-brick/oldstable
---
 redmine/stable
 --
 ring
@@ -96,7 +88,7 @@ squid
 --
 tiff (aron)
 --
-tor
+tor (jmm)
 --
 webkit2gtk (berto)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1acf5ec2fd721052131499f888e5501c18634f1c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1acf5ec2fd721052131499f888e5501c18634f1c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f01e3f85 by Moritz Muehlenhoff at 2023-11-16T12:44:50+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -28,6 +28,8 @@ CVE-2023-47638
REJECTED
 CVE-2023-47471 (Buffer Overflow vulnerability in strukturag libde265 v1.10.12 
allows a ...)
- libde265 
+   [bookworm] - libde265  (Minor issue)
+   [bullseye] - libde265  (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/426
NOTE: 
https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7
 CVE-2023-47470 (Buffer Overflow vulnerability in Ffmpeg before github commit 
456574705 ...)
@@ -416,7 +418,7 @@ CVE-2023-46096 (A vulnerability has been identified in 
SIMATIC PCS neo (All vers
 CVE-2023-45794 (A vulnerability has been identified in Mendix Applications 
using Mendi ...)
NOT-FOR-US: Siemens
 CVE-2023-45684 (Northern.tech CFEngine Enterprise before 3.21.3 allows SQL 
Injection.  ...)
-   - cfengine3 
+   - cfengine3  (Only affects CFEngine Enterprise)
NOTE: https://cfengine.com/blog/2023/cve-2023-45684/
 CVE-2023-45585 (An insertion of sensitive information into log file 
vulnerability [CWE ...)
NOT-FOR-US: FortiGuard


=
data/dsa-needed.txt
=
@@ -14,6 +14,10 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 cinder/oldstable
 --
+cryptojs
+--
+dnsdist (jmm)
+--
 fastdds
   Awaiting feedback from maintainer on bullseye status
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f01e3f858260623a2b8e5ef899e6da388c48085d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f01e3f858260623a2b8e5ef899e6da388c48085d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cbf5d52a by Moritz Muehlenhoff at 2023-11-16T11:57:11+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -32,9 +32,13 @@ CVE-2023-47471 (Buffer Overflow vulnerability in strukturag 
libde265 v1.10.12 al
NOTE: 
https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7
 CVE-2023-47470 (Buffer Overflow vulnerability in Ffmpeg before github commit 
456574705 ...)
- ffmpeg 7:6.1-1
+   [bookworm] - ffmpeg  (Vulnerable code not present)
+   [bullseye] - ffmpeg  (Vulnerable code not present)
+   [buster] - ffmpeg  (Vulnerable code not present)
NOTE: 
https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60
 (n6.1)
NOTE: 
https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael%40niedermayer.cc/
NOTE: https://github.com/goldds96/Report/tree/main/FFmpeg
+   NOTE: Introduced in 
https://github.com/FFmpeg/FFmpeg/commit/34e4f18360c4ecb8e5979cab8f389478d8cd7819
 CVE-2023-47444 (An issue discovered in OpenCart 4.0.0.0 to 4.0.2.3 allows 
authenticate ...)
TODO: check
 CVE-2023-47347 (Buffer Overflow vulnerability in free5gc 3.3.0 allows 
attackers to cau ...)
@@ -5928,6 +5932,8 @@ CVE-2023-32723 (Request to LDAP is sent before user 
permissions are checked.)
NOTE: very likely commit 
https://github.com/zabbix/zabbix/commit/3576afe9b87d8ad1ba92a13c28ba904671087688
 (for 4.0.x)
 CVE-2023-32722 (The zabbix/src/libs/zbxjson module is vulnerable to a buffer 
overflow  ...)
- zabbix  (bug #1053877)
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
[buster] - zabbix  (vulnerable code introduced later)
NOTE: https://support.zabbix.com/browse/ZBX-23390
 CVE-2023-32721 (A stored XSS has been found in the Zabbix web application in 
the Maps  ...)
@@ -33638,6 +33644,7 @@ CVE-2023-29001
RESERVED
 CVE-2023-29000 (The Nextcloud Desktop Client is a tool to synchronize files 
from Nextc ...)
- nextcloud-desktop 3.7.0-1
+   [bullseye] - nextcloud-desktop  (Minor issue)
[buster] - nextcloud-desktop  (Minor issue)
NOTE: https://github.com/nextcloud/desktop/pull/4949
NOTE: 
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534
@@ -33651,11 +33658,13 @@ CVE-2023-28999 (Nextcloud is an open-source 
productivity platform. In Nextcloud
NOTE: https://github.com/nextcloud/desktop/pull/5560
 CVE-2023-28998 (The Nextcloud Desktop Client is a tool to synchronize files 
from Nextc ...)
- nextcloud-desktop 3.7.0-1
+   [bullseye] - nextcloud-desktop  (Minor issue)
[buster] - nextcloud-desktop  (Minor issue)
NOTE: https://github.com/nextcloud/desktop/pull/5323
NOTE: 
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr
 CVE-2023-28997 (The Nextcloud Desktop Client is a tool to synchronize files 
from Nextc ...)
- nextcloud-desktop 3.7.0-1
+   [bullseye] - nextcloud-desktop  (Minor issue)
[buster] - nextcloud-desktop  (Minor issue)
NOTE: https://github.com/nextcloud/desktop/pull/5324
NOTE: 
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc
@@ -113225,6 +113234,7 @@ CVE-2022-29154 (An issue was discovered in rsync 
before 3.2.5 that allows malici
NOTE: 
https://git.samba.org/?p=rsync.git;a=commit;h=2f7c583143bc6e80902139c23d9d7283f88fbc6a
 (v3.2.5pre1)
 CVE-2022-29153 (HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, 
and 1.11. ...)
- consul 1.9.17+dfsg2-1 (bug #1017982)
+   [bullseye] - consul  (Minor issue)
[buster] - consul  (Intrusive to backport)
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393
NOTE: 
https://github.com/hashicorp/consul/commit/72e1ce6317d6a4b28c73cd15f3976eb2c362be19
 (v1.9.17)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbf5d52a8fe0533e9eab8b136fa191c981b16ef3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbf5d52a8fe0533e9eab8b136fa191c981b16ef3
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5c174d13 by Moritz Muehlenhoff at 2023-11-15T11:26:23+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -18,6 +18,8 @@ CVE-2023-47678 (An improper access control vulnerability 
exists in RT-AC87U all
NOT-FOR-US: ASUSTeK
 CVE-2023-47641 (aiohttp is an asynchronous HTTP client/server framework for 
asyncio an ...)
- python-aiohttp 3.8.1-2
+   [bookworm] - python-aiohttp  (Minor issue)
+   [bullseye] - python-aiohttp  (Minor issue)
NOTE: 
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j
NOTE: 
https://github.com/aio-libs/aiohttp/commit/f016f0680e4ace6742b03a70cb0382ce86abe371
 (v3.8.0b0)
 CVE-2023-47640 (DataHub is an open-source metadata platform. The HMAC 
signature for Da ...)
@@ -28,6 +30,8 @@ CVE-2023-47630 (Kyverno is a policy engine designed for 
Kubernetes. An issue was
NOT-FOR-US: Kyverno
 CVE-2023-47627 (aiohttp is an asynchronous HTTP client/server framework for 
asyncio an ...)
- python-aiohttp 3.8.6-1
+   [bookworm] - python-aiohttp  (Minor issue)
+   [bullseye] - python-aiohttp  (Minor issue)
NOTE: 
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg
NOTE: 
https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d
 (v3.8.6)
 CVE-2023-47586 (Multiple heap-based buffer overflow vulnerabilities exist in 
V-Server  ...)
@@ -1110,6 +1114,8 @@ CVE-2023-45875 (An issue was discovered in Couchbase 
Server 7.2.0. There is a pr
NOT-FOR-US: Couchbase Server
 CVE-2023-45857 (An issue discovered in Axios 1.5.1 inadvertently reveals the 
confident ...)
- node-axios 
+   [bookworm] - node-axios  (Minor issue)
+   [bullseye] - node-axios  (Minor issue)
NOTE: https://github.com/axios/axios/issues/6006
 CVE-2023-45225 (Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,  
CB6231, ...)
NOT-FOR-US: Zavio


=
data/dsa-needed.txt
=
@@ -19,6 +19,8 @@ cinder/oldstable
 fastdds
   Awaiting feedback from maintainer on bullseye status
 --
+gimp
+--
 gpac/oldstable (jmm)
 --
 intel-microcode (carnil)
@@ -92,6 +94,8 @@ squid
 --
 tiff (aron)
 --
+tor
+--
 xen (jmm)
 --
 zbar



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5c174d13cb3c42bf2643b125d0e78af75826a749

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5c174d13cb3c42bf2643b125d0e78af75826a749
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-14 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f48e587f by Moritz Muehlenhoff at 2023-11-14T17:18:56+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -261,10 +261,14 @@ CVE-2023-47122 (Gitsign is software for keyless Git 
signing using Sigstore. In v
- gitsign  (bug #1019518)
 CVE-2023-46850 (Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to 
undefined ...)
- openvpn 2.6.7-1 (bug #1055805)
+   [bullseye] - openvpn  (Vulnerable code not present)
+   [buster] - openvpn  (Vulnerable code not present)
NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2023-46850
NOTE: 
https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/
 CVE-2023-46849 (Using the --fragment option in certain configuration setups 
OpenVPN ve ...)
- openvpn 2.6.7-1 (bug #1055805)
+   [bullseye] - openvpn  (Vulnerable code not present)
+   [buster] - openvpn  (Vulnerable code not present)
NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2023-46849
NOTE: 
https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/
 CVE-2023-6076 (A vulnerability classified as problematic was found in 
PHPGurukul Rest ...)
@@ -5252,6 +5256,8 @@ CVE-2023-32722 (The zabbix/src/libs/zbxjson module is 
vulnerable to a buffer ove
NOTE: https://support.zabbix.com/browse/ZBX-23390
 CVE-2023-32721 (A stored XSS has been found in the Zabbix web application in 
the Maps  ...)
- zabbix  (bug #1053877)
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-23389
NOTE: possible upstream fix (4.0.x) 
https://github.com/zabbix/zabbix/commit/d05854bc0e638bbc0c2077ded09797648dba0911
 CVE-2023-5535 (Use After Free in GitHub repository vim/vim prior to v9.0.2010.)
@@ -13371,6 +13377,8 @@ CVE-2023-4427 (Out of bounds memory access in V8 in 
Google Chrome prior to 116.0
[buster] - chromium  (see DSA 5046)
 CVE-2023-40175 (Puma is a Ruby/Rack web server built for parallelism. Prior to 
version ...)
- puma 5.6.7-1 (bug #1050079)
+   [bookworm] - puma  (Minor issue)
+   [bullseye] - puma  (Minor issue)
[buster] - puma  (invasive to backport)
NOTE: 
https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8
NOTE: 
https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a 
(master)


=
data/dsa-needed.txt
=
@@ -38,6 +38,8 @@ nodejs
 --
 nova/oldstable
 --
+openvpn (jmm)
+--
 php-cas/oldstable
 --
 php-horde-mime-viewer/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f48e587f848d5df04942cd885d8ae7e736fc55e6

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f48e587f848d5df04942cd885d8ae7e736fc55e6
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-12 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
24e76af0 by Moritz Muehlenhoff at 2023-11-12T19:34:58+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3152,6 +3152,8 @@ CVE-2023-46602 (In International Color Consortium 
DemoIccMAX 79ecb74, there is a
NOT-FOR-US: International Color Consortium DemoIccMAX
 CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write 
in DataS ...)
- wabt  (bug #1055299)
+   [bookworm] - wabt  (Minor issue)
+   [bullseye] - wabt  (Minor issue)
NOTE: https://github.com/WebAssembly/wabt/issues/2311
 CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in 
DataSegm ...)
- wabt  (unimportant)
@@ -9608,6 +9610,8 @@ CVE-2023-4913 (Cross-site Scripting (XSS) - Reflected in 
GitHub repository cecil
NOT-FOR-US: cecil.app
 CVE-2023-4759 (Arbitrary File Overwrite in Eclipse JGit <= 6.6.0  In Eclipse 
JGit, al ...)
- jgit 
+   [bookworm] - jgit  (Minor issue)
+   [bullseye] - jgit  (Minor issue)
[buster] - jgit  (Minor issue. Only case-insensitive 
filesystems are affected)
NOTE: 
https://git.eclipse.org/c/jgit/jgit.git/commit/?id=9072103f3b3cf64dd12ad2949836ab98f62dabf1
 (v6.6.1.202309021850-r)
NOTE: 
https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11
@@ -43093,7 +43097,6 @@ CVE-2022-4907 (Uninitialized Use in FFmpeg in Google 
Chrome prior to 108.0.5359.
- chromium 108.0.5359.71-1
[buster] - chromium  (see DSA 5046)
- ffmpeg 7:6.0-4
-   [bookworm] - ffmpeg  (Minor issue, wait until it lands in 
5.1.x)
[bullseye] - ffmpeg  (Vulnerable code introduced later)
[buster] - ffmpeg  (Vulnerable code introduced later)
NOTE: Fixed by: 
https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/e601ec3c1991ee09ff45db3be4d894e5774f6f2b
 (n6.0)


=
data/dsa-needed.txt
=
@@ -17,6 +17,8 @@ cinder/oldstable
 fastdds
   Awaiting feedback from maintainer on bullseye status
 --
+ffmpeg/stable (jmm)
+--
 gpac/oldstable (jmm)
 --
 libreswan (jmm)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24e76af012b54053a8763f2746c36fb7ac797e69

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24e76af012b54053a8763f2746c36fb7ac797e69
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
34647b7b by Moritz Muehlenhoff at 2023-11-09T10:12:09+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -8006,6 +8006,8 @@ CVE-2023-43644 (Sing-box is an open source proxy system. 
Affected versions are s
NOT-FOR-US: sing-box
 CVE-2023-43642 (snappy-java is a Java port of the snappy, a fast C++ 
compresser/decomp ...)
- snappy-java 1.1.10.5-1 (bug #1053474)
+   [bookworm] - snappy-java  (Minor issue)
+   [bullseye] - snappy-java  (Minor issue)
NOTE: 
https://github.com/xerial/snappy-java/commit/9f8c3cf74223ed0a8a834134be9c917b9f10ceb5
 (v1.1.10.4)
NOTE: 
https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv
 CVE-2023-43458 (Cross Site Scripting (XSS) vulnerability in Resort Reservation 
System  ...)
@@ -125639,7 +125641,7 @@ CVE-2022-24576 (GPAC 1.0.1 is affected by Use After 
Free through MP4Box.)
NOTE: 
https://github.com/gpac/gpac/commit/96699aabae042f8f55cf8a85fa5758e3db752bae 
(v2.0.0)
 CVE-2022-24575 (GPAC 1.0.1 is affected by a stack-based buffer overflow 
through MP4Box ...)
- gpac 2.0.0+dfsg1-2
-   [bullseye] - gpac  (Minor issue)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/2058
@@ -136976,7 +136978,7 @@ CVE-2021-45289 (A vulnerability exists in GPAC 1.0.1 
due to an omission of secur
NOTE: 
https://github.com/gpac/gpac/commit/5e1f084e0c6ad2736c9913715c4abb57c554209d 
(v2.0.0)
 CVE-2021-45288 (A Double Free vulnerability exists in filedump.c in GPAC 
1.0.1, which  ...)
- gpac 2.0.0+dfsg1-2
-   [bullseye] - gpac  (Minor issue)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1956



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/34647b7b70c7b1c853f012b5af50ee250a880780

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/34647b7b70c7b1c853f012b5af50ee250a880780
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-08 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1845b22c by Moritz Muehlenhoff at 2023-11-08T12:36:28+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -926,6 +926,7 @@ CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master 
contains a SEGV in gpac/MP
NOTE: 
https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8
 CVE-2023-46928 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in 
gpac/MP4Box i ...)
- gpac  (bug #1055298)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2661
NOTE: 
https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1
@@ -3802,6 +3803,7 @@ CVE-2011-10004 (A vulnerability was found in reciply 
Plugin up to 1.1.7 on WordP
NOT-FOR-US: WordPress plugin
 CVE-2023-5595 (Denial of Service in GitHub repository gpac/gpac prior to 
2.3.0-DEV.)
- gpac  (bug #1055125)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
NOTE: https://github.com/gpac/gpac/issues/2633
@@ -4469,6 +4471,7 @@ CVE-2023-44187 (An Exposure of Sensitive Information 
vulnerability in the 'file
NOT-FOR-US: Juniper
 CVE-2023-42298 (An issue in GPAC GPAC v.2.2.1 and before allows a local 
attacker to ca ...)
- gpac  (bug #1053878)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2567
NOTE: 
https://github.com/gpac/gpac/commit/16c4fafc2881112eba7051cac48f922eb2b94e06
@@ -10633,6 +10636,7 @@ CVE-2023-4718 (The Font Awesome 4 Menus plugin for 
WordPress is vulnerable to St
NOT-FOR-US: Font Awesome 4 Menus plugin for WordPress
 CVE-2023-4722 (Integer Overflow or Wraparound in GitHub repository gpac/gpac 
prior to ...)
- gpac  (bug #1051740)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: 
https://github.com/gpac/gpac/commit/de7f3a852bef72a52825fd307cf4e8f486401a76
NOTE: https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830


=
data/dsa-needed.txt
=
@@ -60,6 +60,8 @@ python-glance-store/oldstable
 --
 python-os-brick/oldstable
 --
+redmine/stable
+--
 ring
   might make sense to rebase to current version
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1845b22cc9848cecd3ab90e9732084e7787a9650

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1845b22cc9848cecd3ab90e9732084e7787a9650
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-07 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4c5363e5 by Moritz Muehlenhoff at 2023-11-07T20:32:55+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -18019,6 +18019,8 @@ CVE-2023-29156 (DroneScout ds230 Remote ID receiver 
from BlueMark Innovationsis
NOT-FOR-US: Rockwell
 CVE-2022-48521 (An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x 
through ...)
- opendkim  (bug #1041107)
+   [bookworm] - opendkim  (Minor issue)
+   [bullseye] - opendkim  (Minor issue)
NOTE: https://github.com/trusteddomainproject/OpenDKIM/issues/148
 CVE-2023-36543 (Apache Airflow, versions before 2.6.3, has a vulnerability 
where an au ...)
- airflow  (bug #819700)
@@ -18898,6 +18900,7 @@ CVE-2023-36608 (The affected TBox RTUs store hashed 
passwords using MD5 encrypti
NOT-FOR-US: TBox
 CVE-2023-36377 (Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 
and befor ...)
- osslsigncode 2.3.0-1 (bug #1035875)
+   [bullseye] - osslsigncode  (Minor issue)
NOTE: https://github.com/mtrojnar/osslsigncode/releases/tag/2.3
 CVE-2023-36291 (Cross Site Scripting vulnerability in Maxsite CMS v.108.7 
allows a rem ...)
NOT-FOR-US: Maxsite CMS
@@ -82631,18 +82634,21 @@ CVE-2022-39252 (matrix-rust-sdk is an implementation 
of a Matrix client-server l
NOT-FOR-US: matrix-rust-sdk
 CVE-2022-39251 (Matrix Javascript SDK is the Matrix Client-Server SDK for 
JavaScript.  ...)
- node-matrix-js-sdk  (bug #1021136)
+   [bullseye] - node-matrix-js-sdk  (Incompatible with current 
Matrix implementations)
[buster] - node-matrix-js-sdk  (Can wait for next update)
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
NOTE: 
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
 CVE-2022-39250 (Matrix JavaScript SDK is the Matrix Client-Server software 
development ...)
- node-matrix-js-sdk  (bug #1021136)
+   [bullseye] - node-matrix-js-sdk  (Incompatible with current 
Matrix implementations)
[buster] - node-matrix-js-sdk  (Can wait for next update)
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-5w8r-8pgj-5jmf
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
NOTE: 
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
 CVE-2022-39249 (Matrix Javascript SDK is the Matrix Client-Server SDK for 
JavaScript.  ...)
- node-matrix-js-sdk  (bug #1021136)
+   [bullseye] - node-matrix-js-sdk  (Incompatible with current 
Matrix implementations)
[buster] - node-matrix-js-sdk  (Can wait for next update)
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
@@ -82684,6 +82690,7 @@ CVE-2022-39237 (syslabs/sif is the Singularity Image 
Format (SIF) reference impl
NOTE: 
https://github.com/sylabs/sif/commit/a854038ce1f18237b81d505a1c3be6a60505db52 
(v2.8.1)
 CVE-2022-39236 (Matrix Javascript SDK is the Matrix Client-Server SDK for 
JavaScript.  ...)
- node-matrix-js-sdk  (bug #1021136)
+   [bullseye] - node-matrix-js-sdk  (Incompatible with current 
Matrix implementations)
[buster] - node-matrix-js-sdk  (Minor issue)
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x
NOTE: 
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76


=
data/dsa-needed.txt
=
@@ -73,6 +73,8 @@ ruby-nokogiri/oldstable
 --
 ruby-rails-html-sanitizer
 --
+ruby-sanitize
+--
 ruby-sinatra/oldstable
   Maintainer posted packaging repository link with proposed changes for review
 --
@@ -88,3 +90,6 @@ tiff (aron)
 --
 xen (jmm)
 --
+zbar
+  unfixed upstream
+--



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4c5363e59507a38b049fa27f1f0ea7731faee9de

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4c5363e59507a38b049fa27f1f0ea7731faee9de
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8b140a47 by Moritz Muehlenhoff at 2023-11-06T23:38:48+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -2265,9 +2265,7 @@ CVE-2023-44760 (Multiple Cross Site Scripting (XSS) 
vulnerabilities in Concrete
 CVE-2023-43358 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 
allows a  ...)
NOT-FOR-US: CMSmadesimple
 CVE-2023-43281 (Double Free vulnerability in Nothings Stb Image.h v.2.28 
allows a remo ...)
-   - libstb 
-   NOTE: https://github.com/peccc/double-stb
-   TODO: check, is this duplicate of CVE-2023-45664?
+   NOTE: Duplicate of CVE-2023-45664
 CVE-2023-39817
REJECTED
 CVE-2023-39816
@@ -3970,6 +3968,8 @@ CVE-2023-5554 (Lack of TLS certificate verification in 
log transmission of a fin
 CVE-2023-5072 (Denial of Service  in JSON-Java versions up to and including 
20230618. ...)
- libjson-java  (bug #1053882)
- jenkins-json  (bug #1053883)
+   [bookworm] - jenkins-json  (Minor issue)
+   [bullseye] - jenkins-json  (Minor issue)
- libjettison-java  (bug #1053884)
[bookworm] - libjettison-java  (Minor issue)
[bullseye] - libjettison-java  (Minor issue)
@@ -5715,6 +5715,8 @@ CVE-2023-33268 (An issue was discovered in DTS Monitoring 
3.57.0. The parameter
NOT-FOR-US: DTS Monitoring
 CVE-2023-5366 (A flaw was found in Open vSwitch that allows ICMPv6 Neighbor 
Advertise ...)
- openvswitch 3.1.2-1
+   [bookworm] - openvswitch  (Minor issue)
+   [bullseye] - openvswitch  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2006347
NOTE: 
https://github.com/openvswitch/ovs/commit/694c7b4e097c4d89e23ea9b3c7b677b4fcbe0459
 (v3.1.2)
NOTE: 
https://github.com/openvswitch/ovs/commit/489553b1c21692063931a9f50b6849b23128443c
 (v3.2.0)
@@ -14293,6 +14295,8 @@ CVE-2023-38698 (Ethereum Name Service (ENS) is a 
distributed, open, and extensib
NOT-FOR-US: Ethereum Name Service (ENS)
 CVE-2023-38697 (protocol-http1 provides a low-level implementation of the 
HTTP/1 proto ...)
- ruby-protocol-http1  (bug #1043432)
+   [bookworm] - ruby-protocol-http1  (Minor issue)
+   [bullseye] - ruby-protocol-http1  (Minor issue)
NOTE: https://github.com/socketry/protocol-http1/pull/20
NOTE: 
https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding
NOTE: 
https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj
@@ -21437,6 +21441,8 @@ CVE-2020-36705 (The Adning Advertising plugin for 
WordPress is vulnerable to arb
 CVE-2023-33865 (RenderDoc before 1.27 allows local privilege escalation via a 
symlink  ...)
{DLA-3501-1}
- renderdoc  (bug #1037208)
+   [bookworm] - renderdoc  (Minor issue)
+   [bullseye] - renderdoc  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3
NOTE: 
https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856
 (v1.27)
NOTE: 
https://github.com/baldurk/renderdoc/commit/e0464fea4f9a7f149c4ee1d84e5ac57839a4a862
 (v1.27)
@@ -21446,6 +21452,8 @@ CVE-2023-33865 (RenderDoc before 1.27 allows local 
privilege escalation via a sy
 CVE-2023-33864 (StreamReader::ReadFromExternal in RenderDoc before 1.27 allows 
an Inte ...)
{DLA-3501-1}
- renderdoc  (bug #1037208)
+   [bookworm] - renderdoc  (Minor issue)
+   [bullseye] - renderdoc  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3
NOTE: 
https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856
 (v1.27)
NOTE: 
https://github.com/baldurk/renderdoc/commit/e0464fea4f9a7f149c4ee1d84e5ac57839a4a862
 (v1.27)
@@ -21455,6 +21463,8 @@ CVE-2023-33864 (StreamReader::ReadFromExternal in 
RenderDoc before 1.27 allows a
 CVE-2023-33863 (SerialiseValue in RenderDoc before 1.27 allows an Integer 
Overflow wit ...)
{DLA-3501-1}
- renderdoc  (bug #1037208)
+   [bookworm] - renderdoc  (Minor issue)
+   [bullseye] - renderdoc  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3
NOTE: 
https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856
 (v1.27)
NOTE: 
https://github.com/baldurk/renderdoc/commit/e0464fea4f9a7f149c4ee1d84e5ac57839a4a862
 (v1.27)
@@ -130847,6 +130857,7 @@ CVE-2022-22996 (The G-RAID 4/8 Software Utility 
setups for Windows were affected
NOT-FOR-US: Western Digital Windows setup
 CVE-2022-22995 (The combination of primitives offered by SMB and AFP in their 
default  ...)
- netatalk 3.1.18~ds-1 (bug #1053545)
+   [bullseye] - netatalk  (Minor issue)
NOTE: 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1cf10d84 by Moritz Muehlenhoff at 2023-11-05T17:51:49+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -768,6 +768,8 @@ CVE-2023-46451 (Best Courier Management System v1.0 is 
vulnerable to Cross Site
NOT-FOR-US: Best Courier Management System
 CVE-2023-46361 (Artifex Software jbig2dec v0.20 was discovered to contain a 
SEGV vulne ...)
- jbig2dec  (bug #1055387)
+   [bookworm] - jbig2dec  (Minor issue)
+   [bullseye] - jbig2dec  (Minor issue)
NOTE: 
https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md
NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=707308
 CVE-2023-46356 (In the module "CSV Feeds PRO" (csvfeeds) before 2.6.1 from Bl 
Modules  ...)
@@ -10546,6 +10548,8 @@ CVE-2023-40582 (find-exec is a utility to discover 
available shell commands. Ver
 CVE-2023-40188 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
{DLA-3606-1}
- freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+   [bookworm] - freerdp2  (Minor issue)
+   [bullseye] - freerdp2  (Minor issue)
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq
NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/bdb3909a7713fb0b3d94c9676fe44d19de80eb4b
 (2.11.0)
 CVE-2023-40187 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
@@ -10556,6 +10560,8 @@ CVE-2023-40187 (FreeRDP is a free implementation of the 
Remote Desktop Protocol
 CVE-2023-40186 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
{DLA-3606-1}
- freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+   [bookworm] - freerdp2  (Minor issue)
+   [bullseye] - freerdp2  (Minor issue)
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v
NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/d8a1ac342ae375644c70579c33b5cf38fb43b083
 (2.11.0)
 CVE-2023-40184 (xrdp is an open source remote desktop protocol (RDP) server. 
In versio ...)
@@ -10568,6 +10574,8 @@ CVE-2023-40184 (xrdp is an open source remote desktop 
protocol (RDP) server. In
 CVE-2023-40181 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
{DLA-3606-1}
- freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+   [bookworm] - freerdp2  (Minor issue)
+   [bullseye] - freerdp2  (Minor issue)
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8
NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/c23cbdc4a5756bd723223c7139654de7439fdcc0
 (2.11.0)
 CVE-2023-3992 (The PostX WordPress plugin before 3.0.6 does not sanitise and 
escape a ...)
@@ -11253,6 +11261,8 @@ CVE-2023-40570 (Datasette is an open source multi-tool 
for exploring and publish
 CVE-2023-40569 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
{DLA-3606-1}
- freerdp2  (bug #1051638)
+   [bookworm] - freerdp2  (Minor issue)
+   [bullseye] - freerdp2  (Minor issue)
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp
NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/23c3daeca1598393f8c93f563f7847a4d67919f1
 (2.11.0)
 CVE-2023-40568
@@ -11260,6 +11270,8 @@ CVE-2023-40568
 CVE-2023-40567 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
{DLA-3606-1}
- freerdp2 2.11.2+dfsg1-1 (bug #1051638)
+   [bookworm] - freerdp2  (Minor issue)
+   [bullseye] - freerdp2  (Minor issue)
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp
NOTE: 
https://github.com/FreeRDP/FreeRDP/commit/bacb8c016ef72aa767760b6b01d15500aee9d59a
 (2.11.0)
 CVE-2023-40530 (Improper authorization in handler for custom URL scheme issue 
in 'Skyl ...)
@@ -29909,9 +29921,8 @@ CVE-2023-29454 (Stored or persistent cross-site 
scripting (XSS) is a type of XSS
[bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22985
 CVE-2023-29453 (Templates do not properly consider backticks (`) as Javascript 
string  ...)
-   - zabbix  (bug #1055175)
-   [buster] - zabbix  (buster does not have the Go agent)
-   NOTE: https://support.zabbix.com/browse/ZBX-23388
+   - zabbix  (unimportant)
+   NOTE: Zabbix in Debian uses Debian Go package
 CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> 
Geograph ...)
- zabbix  (bug #1055175)
[bookworm] - zabbix  (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cf10d84e2381d0bb9184344c61a78c028532647

-- 
View it on GitLab: 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
18707d01 by Moritz Muehlenhoff at 2023-11-03T20:19:20+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -285,11 +285,13 @@ CVE-2023-4452 (A vulnerability has been identified in the 
EDR-810, EDR-G902, and
NOT-FOR-US: Moxa
 CVE-2023-46931 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a 
heap-buffer-overflow  ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2664
NOTE: 
https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf
 CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in 
gpac/MP4Box i ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2666
NOTE: 
https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8
@@ -1645,6 +1647,8 @@ CVE-2023-46158 (IBM WebSphere Application Server Liberty 
23.0.0.9 through 23.0.0
NOT-FOR-US: IBM
 CVE-2023-46136 (Werkzeug is a comprehensive WSGI web application library. If 
an upload ...)
- python-werkzeug  (bug #1054553)
+   [bookworm] - python-werkzeug  (Minor issue)
+   [bullseye] - python-werkzeug  (Minor issue)
NOTE: 
https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw
NOTE: 
https://github.com/pallets/werkzeug/commit/b1916c0c083e0be1c9d887ee2f3d696922bfc5c1
 (3.0.1)
 CVE-2023-46135 (rs-stellar-strkey is a Rust lib for encode/decode of Stellar 
Strkeys.  ...)
@@ -3001,6 +3005,8 @@ CVE-2023-45901 (Dreamer CMS v4.1.3 was discovered to 
contain a Cross-Site Reques
NOT-FOR-US: Dreamer CMS
 CVE-2023-45803 (urllib3 is a user-friendly HTTP client library for Python. 
urllib3 pre ...)
- python-urllib3 1.26.18-1 (bug #1054226)
+   [bookworm] - python-urllib3  (Minor issue)
+   [bullseye] - python-urllib3  (Minor issue)
NOTE: 
https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4
NOTE: 
https://github.com/urllib3/urllib3/commit/b594c5ceaca38e1ac215f916538fb128e3526a36
 (1.26.18)
 CVE-2023-45010 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability 
in Alex ...)
@@ -5271,6 +5277,8 @@ CVE-2023-43838 (An arbitrary file upload vulnerability in 
Personal Management Sy
 CVE-2023-43804 (urllib3 is a user-friendly HTTP client library for Python. 
urllib3 doe ...)
{DLA-3610-1}
- python-urllib3 1.26.17-1 (bug #1053626)
+   [bookworm] - python-urllib3  (Minor issue)
+   [bullseye] - python-urllib3  (Minor issue)
NOTE: 
https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
NOTE: 
https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb
 (1.26.17)
 CVE-2023-43261 (An information disclosure in Milesight UR5X, UR32L, UR32, 
UR35, UR41 b ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18707d0185d0a283ce345688c203dd9dd00de0ce

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18707d0185d0a283ce345688c203dd9dd00de0ce
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-11-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9525575f by Moritz Muehlenhoff at 2023-11-03T13:18:54+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3657,6 +3657,8 @@ CVE-2023-5072 (Denial of Service  in JSON-Java versions 
up to and including 2023
- libjson-java  (bug #1053882)
- jenkins-json  (bug #1053883)
- libjettison-java  (bug #1053884)
+   [bookworm] - libjettison-java  (Minor issue)
+   [bullseye] - libjettison-java  (Minor issue)
NOTE: https://github.com/stleary/JSON-java/issues/758
NOTE: https://github.com/stleary/JSON-java/issues/771
NOTE: https://github.com/stleary/JSON-java/pull/772/


=
data/dsa-needed.txt
=
@@ -34,6 +34,8 @@ linux (carnil)
 nbconvert/oldstable
   Guilhem Moulin proposed an update ready for review
 --
+netty
+--
 nghttp2
 --
 nodejs
@@ -42,6 +44,7 @@ nodejs
 nova/oldstable
 --
 openjdk-17 (jmm)
+  needs a fixed jtreg6, will also be release via the security archive
 --
 php-cas/oldstable
 --
@@ -86,9 +89,7 @@ squid
 --
 tiff (aron)
 --
-trafficserver
---
-wpewebkit/oldstable
+trafficserver (jmm)
 --
 xen (jmm)
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9525575f4dcd17c5d0f4cde6e61a2a7ea4844779

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9525575f4dcd17c5d0f4cde6e61a2a7ea4844779
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-30 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
96bead19 by Moritz Mühlenhoff at 2023-10-30T12:13:05+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -479,6 +479,8 @@ CVE-2023-46232 (era-compiler-vyper is the EraVM Vyper 
compiler for zkSync Era, a
NOT-FOR-US: era-compiler-vyper
 CVE-2023-46137 (Twisted is an event-based framework for internet applications. 
Prior t ...)
- twisted  (bug #1054913)
+   [bookworm] - twisted  (Minor issue)
+   [bullseye] - twisted  (Minor issue)
NOTE: 
https://github.com/twisted/twisted/security/advisories/GHSA-xc8x-vp79-p3wm
 CVE-2023-46134 (D-Tale is the combination of a Flask back-end and a React 
front-end to ...)
NOT-FOR-US: D-Tale


=
data/dsa-needed.txt
=
@@ -101,6 +101,6 @@ wpewebkit/oldstable
 --
 xen (jmm)
 --
-zookeeper
+zookeeper (jmm)
   Pierre Gruet proposed debdiff, reviewed, question asked back
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96bead19d3019e56bcbe9ab522aeb06bf953c732

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96bead19d3019e56bcbe9ab522aeb06bf953c732
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e730a4f0 by Moritz Muehlenhoff at 2023-10-28T14:43:05+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -104,9 +104,13 @@ CVE-2023-4967 (Denial of Service in NetScaler ADC and 
NetScaler Gateway when con
NOT-FOR-US: Citrix
 CVE-2023-46853 (In Memcached before 1.6.22, an off-by-one error exists when 
processing ...)
- memcached 1.6.22-1
+   [bookworm] - memcached  (Minor issue)
+   [bullseye] - memcached  (Minor issue)
NOTE: 
https://github.com/memcached/memcached/commit/6987918e9a3094ec4fc8976f01f769f624d790fa
 (1.6.22)
 CVE-2023-46852 (In Memcached before 1.6.22, a buffer overflow exists when 
processing m ...)
- memcached 1.6.22-1
+   [bookworm] - memcached  (Minor issue)
+   [bullseye] - memcached  (Minor issue)
NOTE: 
https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767
 (1.6.22)
 CVE-2023-46604 (Apache ActiveMQ is vulnerable to Remote Code Execution.The 
vulnerabili ...)
TODO: check
@@ -5199,6 +5203,8 @@ CVE-2023-5256 (In certain scenarios, Drupal's JSON:API 
module will output error
- drupal7 
 CVE-2023-5215 (A flaw was found in libnbd. A server can reply with a block 
size large ...)
- libnbd 1.16.5-1
+   [bookworm] - libnbd  (Minor issue)
+   [bullseye] - libnbd  (Minor issue)
NOTE: 
https://listman.redhat.com/archives/libguestfs/2023-September/032635.html
NOTE: Fixed by: 
https://gitlab.com/nbdkit/libnbd/-/commit/0f8ee8c6bd6dd93de771e6d4da87ec5a59504aae
 (v1.18.0)
NOTE: Fixed by: 
https://gitlab.com/nbdkit/libnbd/-/commit/f03330181229360a1a97a264aa956fea54c657de
 (v1.16.5)
@@ -13374,6 +13380,8 @@ CVE-2023-4067 (The Bus Ticket Booking with Seat 
Reservation plugin for WordPress
NOT-FOR-US: Bus Ticket Booking with Seat Reservation plugin for 
WordPress
 CVE-2023-3978 (Text nodes not in the HTML namespace are incorrectly literally 
rendere ...)
- golang-golang-x-net 1:0.14.0-1 (bug #1043163)
+   [bookworm] - golang-golang-x-net  (Minor issue)
+   [bullseye] - golang-golang-x-net  (Minor issue)
- golang-golang-x-net-dev 
[buster] - golang-golang-x-net-dev  (Limited support, follow 
bullseye DSAs/point-releases)
NOTE: https://go.dev/cl/514896



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e730a4f0cf1bc421d202ffc2e99341fbd9021c98

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e730a4f0cf1bc421d202ffc2e99341fbd9021c98
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
756240f9 by Moritz Muehlenhoff at 2023-10-26T14:14:21+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -331,6 +331,8 @@ CVE-2023-5758 (When opening a page in reader mode, the 
redirect URL could have c
NOTE: https://www.mozilla.org/security/advisories/mfsa2023-48/
 CVE-2023-5752 (When installing a package from a Mercurial VCS URL  (ie "pip 
install   ...)
- python-pip 23.3+dfsg-1
+   [bookworm] - python-pip  (Minor issue)
+   [bullseye] - python-pip  (Minor issue)
NOTE: https://github.com/pypa/pip/pull/12306
NOTE: 
https://mail.python.org/archives/list/security-annou...@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/
 CVE-2023-5311 (The WP EXtra plugin for WordPress is vulnerable to unauthorized 
modifi ...)
@@ -705,8 +707,9 @@ CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an 
Out-of-Bound Memory Write in
- wabt 
NOTE: https://github.com/WebAssembly/wabt/issues/2311
 CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in 
DataSegm ...)
-   - wabt 
+   - wabt  (unimportant)
NOTE: https://github.com/WebAssembly/wabt/issues/2310
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-46127 (Frappe is a full-stack web application framework that uses 
Python and  ...)
NOT-FOR-US: Frappe Framework
 CVE-2023-46122 (sbt is a build tool for Scala, Java, and others. Given a 
specially cra ...)
@@ -895,6 +898,8 @@ CVE-2023-38275 (IBM Cognos Dashboards on Cloud Pak for Data 
4.7.0 exposes sensit
 CVE-2023-5349 [memory leak]
{DLA-3625-1}
- ruby-rmagick 5.3.0-1
+   [bookworm] - ruby-rmagick  (Minor issue)
+   [bullseye] - ruby-rmagick  (Minor issue)
NOTE: https://github.com/rmagick/rmagick/pull/1406
NOTE: 
https://github.com/rmagick/rmagick/commit/fec7a7e639ae565386f7615155dbcf49b957b64a
 (RMagick_5-3-0)
 CVE-2023-5684 (A vulnerability was found in Beijing Baichuo Smart S85F 
Management Pla ...)
@@ -1201,6 +1206,8 @@ CVE-2023-4021 (The Modern Events Calendar lite plugin for 
WordPress is vulnerabl
NOT-FOR-US: WordPress plugin
 CVE-2023-46277 (please (aka pleaser) through 0.5.4 allows privilege escalation 
through ...)
- rust-pleaser  (bug #1054289)
+   [bookworm] - rust-pleaser  (Minor issue)
+   [bullseye] - rust-pleaser  (Minor issue)
NOTE: https://gitlab.com/edneville/please/-/issues/13
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0066.html
 CVE-2023-46267
@@ -4780,6 +4787,8 @@ CVE-2023-43739 (The 'bookisbn' parameter of the cart.php 
resource  does not vali
NOT-FOR-US: Online Book Store Project
 CVE-2023-43665 [Denial-of-service possibility in django.utils.text.Truncator]
- python-django 3:4.2.6-1 (bug #1053475)
+   [bookworm] - python-django  (Minor issue, fix along in 
future update)
+   [bullseye] - python-django  (Minor issue, fix along in 
future update)
NOTE: https://www.openwall.com/lists/oss-security/2023/10/04/6
NOTE: 
https://www.djangoproject.com/weblog/2023/oct/04/security-releases/
NOTE: 
https://github.com/django/django/commit/17b51094d778b421bb2b3aae0c270894b050455d
 (main)
@@ -5512,6 +5521,8 @@ CVE-2023-5157 (A vulnerability was found in MariaDB. An 
OpenVAS port scan on por
- galera-4 26.4.13-1
[bullseye] - galera-4  (Minor issue; can be fixed via point 
release)
- galera-3  (bug #1053476)
+   [bookworm] - galera-3  (Minor issue)
+   [bullseye] - galera-3  (Minor issue)
NOTE: https://jira.mariadb.org/browse/MDEV-25068
 CVE-2023-5115 [malicious role archive can cause ansible-galaxy to overwrite 
arbitrary files]
- ansible-core 2.14.11-1 (bug #1053693)
@@ -28611,12 +28622,16 @@ CVE-2023-29409 (Extremely large RSA keys in 
certificate chains can cause a clien
NOTE: https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI
 CVE-2023-29408 (The TIFF decoder does not place a limit on the size of 
compressed tile ...)
- golang-golang-x-image  (bug #1043159)
+   [bookworm] - golang-golang-x-image  (Minor issue)
+   [bullseye] - golang-golang-x-image  (Minor issue)
[buster] - golang-golang-x-image  (Limited support, minor 
issue, DoS)
NOTE: https://go.dev/issue/61582
NOTE: https://go.dev/cl/514897
NOTE: 
https://github.com/golang/image/commit/cb227cd2c919b27c6206fe0c1041a8bcc677949d 
(v0.10.0)
 CVE-2023-29407 (A maliciously-crafted image can cause excessive CPU 
consumption in dec ...)
- golang-golang-x-image  (bug #1043159)
+   [bookworm] - golang-golang-x-image  (Minor issue)
+   [bullseye] - golang-golang-x-image  (Minor issue)
[buster] - golang-golang-x-image  (Limited support, 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a159b1c2 by Moritz Muehlenhoff at 2023-10-23T20:45:06+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -32,6 +32,8 @@ CVE-2023-46319 (WALLIX Bastion 9.x before 9.0.9 and 10.x 
before 10.0.5 allows un
NOT-FOR-US: WALLIX Bastion
 CVE-2023-46317 (Knot Resolver before 5.7.0 performs many TCP reconnections 
upon receiv ...)
- knot-resolver 5.7.0-1
+   [bookworm] - knot-resolver  (Minor issue)
+   [bullseye] - knot-resolver  (Minor issue)
NOTE: https://www.knot-resolver.cz/2023-08-22-knot-resolver-5.7.0.html
NOTE: https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1448
 CVE-2023-46315 (The zanllp sd-webui-infinite-image-browsing (aka Infinite 
Image Browsi ...)
@@ -99,6 +101,8 @@ CVE-2023-39333
NOTE: 
https://github.com/nodejs/node/commit/eaf9083cf1e43bd897ac8244dcc0f4e3500150ca
 CVE-2023-5388
- nss 
+   [bookworm] - nss  (Minor issue, revisit once fixed upstream)
+   [bullseye] - nss  (Minor issue, revisit once fixed upstream)
NOTE: https://people.redhat.com/~hkario/marvin/
 CVE-2023-5551
- moodle 
@@ -303,6 +307,7 @@ CVE-2023-46117 (reconFTW is a tool designed to perform 
automated recon on a targ
NOT-FOR-US: reconFTW
 CVE-2023-45805 (pdm is a Python package and dependency manager supporting the 
latest P ...)
- pdm 
+   [bookworm] - pdm  (Minor issue)
NOTE: 
https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9
NOTE: 
https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831
 CVE-2023-44483 (All versions of Apache Santuario - XML Security for Java prior 
to 2.2. ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a159b1c2ddd92aa5a4e7578c83e3e06329280710

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a159b1c2ddd92aa5a4e7578c83e3e06329280710
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
76be03cc by Moritz Muehlenhoff at 2023-10-23T15:40:56+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -201,22 +201,40 @@ CVE-2023-45675 (stb_vorbis is a single file MIT licensed 
library for processing
NOTE: https://github.com/nothings/stb/pull/1553
 CVE-2023-45667 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 7)
+   NOTE: https://github.com/nothings/stb/pull/1551
 CVE-2023-45666 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 6)
+   NOTE: https://github.com/nothings/stb/pull/1549
 CVE-2023-45664 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 4)
+   NOTE: https://github.com/nothings/stb/pull/1545
 CVE-2023-45663 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 3)
+   NOTE: https://github.com/nothings/stb/pull/1543
 CVE-2023-45662 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 2)
+   NOTE: https://github.com/nothings/stb/pull/1541
 CVE-2023-45661 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 1)
+   NOTE: https://github.com/nothings/stb/pull/1539
 CVE-2023-43357 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 
allows a  ...)
NOT-FOR-US: CMSmadesimple
 CVE-2023-43356 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 
allows a  ...)
@@ -1876,7 +1894,9 @@ CVE-2023-39325 (A malicious HTTP/2 client which rapidly 
creates requests and imm
- golang-1.21 1.21.3-1
- golang-1.20 1.20.10-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
NOTE: https://github.com/golang/go/issues/63417
 CVE-2023-5473 (Use after free in Cast in Google Chrome prior to 118.0.5993.70 
allowed ...)
@@ -3888,6 +3908,8 @@ CVE-2023-43909 (Hospital Management System thru commit 
4770d was discovered to c
NOT-FOR-US: Hospital Management System
 CVE-2023-43655 (Composer is a dependency manager for PHP. Users publishing a 
composer. ...)
- composer 2.6.4-1
+   [bookworm] - composer  (Minor issue)
+   [bullseye] - composer  (Minor issue)
[buster] - composer  (Minor issue, only a problem when 
configured improperly)
NOTE: 
https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf
NOTE: 
https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d
 (1.10.27)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76be03cce30e752219a2e04c9ba69d4134cea2d5

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76be03cce30e752219a2e04c9ba69d4134cea2d5
You're receiving this email because of your account on salsa.debian.org.



[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
daaa8d06 by Moritz Muehlenhoff at 2023-10-23T11:30:13+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -153,28 +153,52 @@ CVE-2023-46003 (I-doit pro 25 and below is vulnerable to 
Cross Site Scripting (X
NOT-FOR-US: I-doit pro
 CVE-2023-45682 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 15)
+   NOTE: https://github.com/nothings/stb/pull/1560
 CVE-2023-45681 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 14)
+   NOTE: https://github.com/nothings/stb/pull/1559
 CVE-2023-45680 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 13)
+   NOTE: https://github.com/nothings/stb/pull/1558
 CVE-2023-45679 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 12)
+   NOTE: https://github.com/nothings/stb/pull/1557
 CVE-2023-45678 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 11)
+   NOTE: https://github.com/nothings/stb/pull/1556
 CVE-2023-45677 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 10)
+   NOTE: https://github.com/nothings/stb/pull/1555
 CVE-2023-45676 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 9)
+   NOTE: https://github.com/nothings/stb/pull/1554
 CVE-2023-45675 (stb_vorbis is a single file MIT licensed library for 
processing ogg vo ...)
- libstb 
-   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
+   [bookworm] - libstb  (Minor issue)
+   [bullseye] - libstb  (Minor issue)
+   NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
 (issue 8)
+   NOTE: https://github.com/nothings/stb/pull/1553
 CVE-2023-45667 (stb_image is a single file MIT licensed library for processing 
images. ...)
- libstb 
NOTE: 
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
@@ -235,6 +259,8 @@ CVE-2023-5618 (The Modern Footnotes plugin for WordPress is 
vulnerable to Stored
NOT-FOR-US: WordPress plugin
 CVE-2023-46287 (XSS exists in NagVis before 1.9.38 via the select function in 
share/se ...)
- nagvis 1:1.9.38-1
+   [bookworm] - nagvis  (Minor issue)
+   [bullseye] - nagvis  (Minor issue)
NOTE: https://github.com/NagVis/nagvis/pull/356
NOTE: 
https://github.com/NagVis/nagvis/commit/093c2b0b31001bb74c78452858a0a9d27fa0a9b5
 (nagvis-1.9.38)
 CVE-2023-46117 (reconFTW is a tool designed to perform automated recon on a 
target dom ...)
@@ -2795,6 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-10 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
009104d1 by Moritz Muehlenhoff at 2023-10-10T11:52:30+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -142,6 +142,8 @@ CVE-2023-43696 (Improper Access Control in SICK APU allows 
an unprivileged remot
NOT-FOR-US: SICK
 CVE-2023-43643 (AntiSamy is a library for performing fast, configurable 
cleansing of H ...)
- libowasp-antisamy-java 
+   [bookworm] - libowasp-antisamy-java  (Minor issue)
+   [bullseye] - libowasp-antisamy-java  (Minor issue)
NOTE: 
https://github.com/nahsra/antisamy/security/advisories/GHSA-pcf2-gh6g-h5r2
NOTE: 
https://github.com/nahsra/antisamy/commit/05c52b98bb845b8175b8406bd2f391ce334a05d6
 (v1.7.4)
 CVE-2023-42455 (Wazuh is a security detection, visibility, and compliance open 
source  ...)
@@ -1835,6 +1837,8 @@ CVE-2023-43124 (BIG-IP APM clients may send IP traffic 
outside of the VPN tunnel
NOT-FOR-US: F5 BIG-IP
 CVE-2023-42822 (xrdp is an open source remote desktop protocol server. Access 
to the f ...)
- xrdp  (bug #1053284)
+   [bookworm] - xrdp  (Minor issue)
+   [bullseye] - xrdp  (Minor issue)
NOTE: 
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw
NOTE: 
https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40
 CVE-2023-42657 (In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a 
directory traver ...)


=
data/dsa-needed.txt
=
@@ -25,6 +25,8 @@ gpac/oldstable (jmm)
 --
 gst-plugins-bad1.0 (carnil)
 --
+libcue (jmm)
+--
 libreswan (jmm)
   Maintainer prepared bookworm-security update, but needs work on 
bullseye-security backports
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/009104d18850e65a51d811e0cff2fc697ed4ae8d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/009104d18850e65a51d811e0cff2fc697ed4ae8d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-09 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
06c9a8c7 by Moritz Muehlenhoff at 2023-10-09T16:24:47+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -346,23 +346,33 @@ CVE-2023-35803 (IQ Engine before 10.6r2 on Extreme 
Network AP devices has a Buff
NOT-FOR-US: IQ Engine
 CVE-2023-3430
- openimageio 2.4.13.0+dfsg-1
+   [bookworm] - openimageio  (Minor issue)
+   [bullseye] - openimageio  (Minor issue)
NOTE: https://github.com/OpenImageIO/oiio/issues/3840
NOTE: https://github.com/AcademySoftwareFoundation/OpenImageIO/pull/3841
NOTE: 
https://github.com/OpenImageIO/oiio/commit/5ff2c56dd28e96f67ed8f80d8a3d1235e51f9957
 (v2.4.12.0)
 CVE-2023-38473
- avahi 
+   [bookworm] - avahi  (Minor issue)
+   [bullseye] - avahi  (Minor issue)
NOTE: https://github.com/lathiat/avahi/issues/451
NOTE: https://www.openwall.com/lists/oss-security/2023/10/06/4
 CVE-2023-38472
- avahi 
+   [bookworm] - avahi  (Minor issue)
+   [bullseye] - avahi  (Minor issue)
NOTE: https://github.com/lathiat/avahi/issues/452
NOTE: https://www.openwall.com/lists/oss-security/2023/10/06/4
 CVE-2023-38471
- avahi 
+   [bookworm] - avahi  (Minor issue)
+   [bullseye] - avahi  (Minor issue)
NOTE: https://github.com/lathiat/avahi/issues/453
NOTE: https://www.openwall.com/lists/oss-security/2023/10/06/4
 CVE-2023-38470
- avahi 
+   [bookworm] - avahi  (Minor issue)
+   [bullseye] - avahi  (Minor issue)
NOTE: https://github.com/lathiat/avahi/issues/454
NOTE: https://github.com/lathiat/avahi/pull/457
NOTE: 
https://github.com/lathiat/avahi/commit/94cb6489114636940ac683515417990b55b5d66c
@@ -2005,6 +2015,8 @@ CVE-2023-5157 (A vulnerability was found in MariaDB. An 
OpenVAS port scan on por
NOTE: https://jira.mariadb.org/browse/MDEV-25068
 CVE-2023-5115 [malicious role archive can cause ansible-galaxy to overwrite 
arbitrary files]
- ansible-core  (bug #1053693)
+   [bookworm] - ansible-core  (Minor issue)
+   [bullseye] - ansible-core  (Minor issue)
- ansible 5.4.0-1
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2233810
NOTE: https://github.com/ansible/ansible/pull/81780
@@ -6362,6 +6374,8 @@ CVE-2023-40217 (An issue was discovered in Python before 
3.8.18, 3.9.x before 3.
- python2.7 
[bullseye] - python2.7 2.7.18-8+deb11u1
- pypy3 7.3.13+dfsg-1
+   [bookworm] - pypy3  (Minor issue)
+   [bullseye] - pypy3  (Minor issue)
NOTE: 
https://mail.python.org/archives/list/security-annou...@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
NOTE: https://github.com/python/cpython/issues/108310
NOTE: https://github.com/python/cpython/pull/108315
@@ -37600,7 +37614,7 @@ CVE-2023-25516 (NVIDIA GPU Display Driver for Linux 
contains a vulnerability in
[bookworm] - nvidia-graphics-drivers-tesla 525.125.06-1~deb12u1
- nvidia-graphics-drivers-tesla-470 470.199.02-1 (bug #1039684)
[bookworm] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb12u1
-   [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1
+   [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb11u1
- nvidia-graphics-drivers-tesla-460 460.106.00-3 (bug #1039683)
[bullseye] - nvidia-graphics-drivers-tesla-460  (Non-free not 
supported)
NOTE: 460.106.00-3 turned the package into a metapackage to aid 
switching to nvidia-graphics-drivers-tesla-470
@@ -37625,7 +37639,7 @@ CVE-2023-25515 (NVIDIA GPU Display Driver for Windows 
and Linux contains a vulne
[bookworm] - nvidia-graphics-drivers-tesla 525.125.06-1~deb12u1
- nvidia-graphics-drivers-tesla-470 470.199.02-1 (bug #1039684)
[bookworm] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb12u1
-   [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1
+   [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb11u1
- nvidia-graphics-drivers-tesla-460 460.106.00-3 (bug #1039683)
[bullseye] - nvidia-graphics-drivers-tesla-460  (Non-free not 
supported)
NOTE: 460.106.00-3 turned the package into a metapackage to aid 
switching to nvidia-graphics-drivers-tesla-470


=
data/dsa-needed.txt
=
@@ -19,6 +19,8 @@ cacti
 --
 cinder/oldstable
 --
+curl (jmm)
+--
 gpac/oldstable (jmm)
 --
 gst-plugins-bad1.0 (carnil)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06c9a8c793683242bd0cf3a109148e5542dae21b

-- 
View it on GitLab: 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-10-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f35d7aa3 by Moritz Muehlenhoff at 2023-10-04T14:21:50+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -248,6 +248,8 @@ CVE-2023-5345 (A use-after-free vulnerability in the Linux 
kernel's fs/smb/clien
NOTE: https://kernel.dance/#e6e43b8aa7cd3c3af686caf0c2e11819a886d705
 CVE-2023-5344 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0.1 ...)
- vim 
+   [bookworm] - vim  (Minor issue)
+   [bullseye] - vim  (Minor issue)
NOTE: 
https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04
NOTE: https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
 CVE-2023-5334 (The WP Responsive header image slider plugin for WordPress is 
vulnerab ...)
@@ -457,8 +459,9 @@ CVE-2023-5112 (Os Commerce is currently susceptible to a 
Cross-Site Scripting (X
 CVE-2023-5111 (Os Commerce is currently susceptible to a Cross-Site Scripting 
(XSS) v ...)
NOT-FOR-US: Os Commerce
 CVE-2023-43907 (OptiPNG v0.7.7 was discovered to contain a global buffer 
overflow via  ...)
-   - optipng 
+   - optipng  (unimportant)
NOTE: 
https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-43735 (Os Commerce is currently susceptible to a Cross-Site Scripting 
(XSS) v ...)
NOT-FOR-US: Os Commerce
 CVE-2023-43734 (Os Commerce is currently susceptible to a Cross-Site Scripting 
(XSS) v ...)
@@ -561,6 +564,8 @@ CVE-2023-5201 (The OpenHook plugin for WordPress is 
vulnerable to Remote Code Ex
NOT-FOR-US: OpenHook plugin for WordPress
 CVE-2023-44270 (An issue was discovered in PostCSS before 8.4.31. It affects 
linters u ...)
- node-postcss  (bug #1053282)
+   [bookworm] - node-postcss  (Minor issue)
+   [bullseye] - node-postcss  (Minor issue)
NOTE: 
https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5
 (8.4.31)
 CVE-2023-43711 (Os Commerce is currently susceptible to a Cross-Site Scripting 
(XSS) v ...)
NOT-FOR-US: Os Commerce
@@ -1475,6 +1480,8 @@ CVE-2023-43775 (Denial-of-service vulnerability in the 
web server of the Eaton S
NOT-FOR-US: Eaton
 CVE-2023-43646 (get-func-name is a module to retrieve a function's name 
securely and c ...)
- node-get-func-name  (bug #1053262)
+   [bookworm] - node-get-func-name  (Minor issue)
+   [bullseye] - node-get-func-name  (Minor issue)
NOTE: 
https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5
NOTE: 
https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69
 (v2.0.1)
 CVE-2023-43614 (Cross-site scripting vulnerability in Order Data Edit page of 
Welcart  ...)
@@ -4042,8 +4049,8 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When 
integrating Apache Axis 1.x
NOTE: 
https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
 CVE-2023-34322 [top-level shadow reference dropped too early for 64-bit PV 
guests]
- xen 
-   [bookworm] - xen  (Minor issue, fix along in future DSA or 
point release)
-   [bullseye] - xen  (Minor issue, fix along in future DSA or 
point release)
+   [bookworm] - xen  (Minor issue, fix along in future DSA or 
point release)
+   [bullseye] - xen  (Minor issue, fix along in future DSA or 
point release)
[buster] - xen  (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-438.html
 CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
@@ -24821,6 +24828,8 @@ CVE-2023-29338 (Visual Studio Code Information 
Disclosure Vulnerability)
NOT-FOR-US: Microsoft
 CVE-2023-29337 (NuGet Client Remote Code Execution Vulnerability)
- nuget  (bug #1050835)
+   [bookworm] - nuget  (Minor issue)
+   [bullseye] - nuget  (Minor issue)
[buster] - nuget  (Can wait for next update)
NOTE: 
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337
 CVE-2023-29336 (Win32k Elevation of Privilege Vulnerability)
@@ -62647,6 +62656,8 @@ CVE-2023-20588 (A division-by-zero error on some AMD 
processors can potentially
{DSA-5492-1 DSA-5480-1}
- linux 6.4.13-1
- xen 
+   [bookworm] - xen  (Minor issue, fix along in future DSA or 
point release)
+   [bullseye] - xen  (Minor issue, fix along in future DSA or 
point release)
[buster] - xen  (DSA 4677-1)
NOTE: 
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html
NOTE: 
https://git.kernel.org/linus/77245f1c3c6495521f6a3af082696ee2f8ce3921


=

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
252b4ef2 by Moritz Muehlenhoff at 2023-09-26T21:34:07+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -514,16 +514,28 @@ CVE-2023-43477 (The ping_from parameter of 
ping_tracerte.cgi in the web UI of Te
NOT-FOR-US: Telstra Smart Modem Gen 2 (Arcadyan LH1000) firmware
 CVE-2023-43377 (A cross-site scripting (XSS) vulnerability in 
/hoteldruid/visualizza_c ...)
- hoteldruid  (bug #1052572)
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
 CVE-2023-43376 (A cross-site scripting (XSS) vulnerability in 
/hoteldruid/clienti.php  ...)
- hoteldruid  (bug #1052572)
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
 CVE-2023-43375 (Hoteldruid v3.0.5 was discovered to contain multiple SQL 
injection vul ...)
- hoteldruid  (bug #1052572)
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
 CVE-2023-43374 (Hoteldruid v3.0.5 was discovered to contain a SQL injection 
vulnerabil ...)
- hoteldruid  (bug #1052572)
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
 CVE-2023-43373 (Hoteldruid v3.0.5 was discovered to contain a SQL injection 
vulnerabil ...)
- hoteldruid  (bug #1052572)
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
 CVE-2023-43371 (Hoteldruid v3.0.5 was discovered to contain a SQL injection 
vulnerabil ...)
- hoteldruid  (bug #1052572)
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
 CVE-2023-43207 (D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a 
command  ...)
NOT-FOR-US: D-Link
 CVE-2023-43206 (D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a 
command  ...)


=
data/dsa-needed.txt
=
@@ -23,6 +23,8 @@ firefox-esr (jmm)
 --
 gpac/oldstable (jmm)
 --
+jetty9
+--
 libreswan (jmm)
   Maintainer prepared bookworm-security update, but needs work on 
bullseye-security backports
 --
@@ -30,6 +32,8 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y and 6.1.y versions
 --
+mosquitto
+--
 nbconvert/oldstable
   Guilhem Moulin proposed an update ready for review
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/252b4ef2ee10a12cb552e54ce10713cf33f54113

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/252b4ef2ee10a12cb552e54ce10713cf33f54113
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6e0c5676 by Moritz Muehlenhoff at 2023-09-26T10:52:06+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -244,6 +244,7 @@ CVE-2023-43144 (Projectworldsl 
Assets-management-system-in-php 1.0 is vulnerable
NOT-FOR-US: Projectworldsl Assets-management-system-in-php
 CVE-2023-42821 (The package `github.com/gomarkdown/markdown` is a Go library 
for parsi ...)
- golang-github-gomarkdown-markdown 
+   [bookworm] - golang-github-gomarkdown-markdown  (Minor issue)
NOTE: 
https://github.com/gomarkdown/markdown/commit/14b16010c2ee7ff33a940a541d993bd043a88940
NOTE: 
https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2
 CVE-2023-42812 (Galaxy is an open-source platform for FAIR data analysis. 
Prior to ver ...)
@@ -360,6 +361,7 @@ CVE-2023-42806 (Hydra is the layer-two scalability solution 
for Cardano. Prior t
TODO: check
 CVE-2023-42805 (quinn-proto is a state machine for the QUIC transport 
protocol. Prior  ...)
- rust-quinn-proto  (bug #1052546)
+   [bookworm] - rust-quinn-proto  (Minor issue)
NOTE: https://github.com/quinn-rs/quinn/pull/1667
NOTE: https://github.com/quinn-rs/quinn/pull/1668
NOTE: https://github.com/quinn-rs/quinn/pull/1669
@@ -864,6 +866,7 @@ CVE-2023-3025 (The Dropbox Folder Share plugin for 
WordPress is vulnerable to Se
NOT-FOR-US: Dropbox Folder Share plugin for WordPress
 CVE-2023-43091 [Code injection via service.json file]
- gnome-maps 45~rc-1
+   [bookworm] - gnome-maps  (Minor issue)
[bullseye] - gnome-maps  (Vulnerable code not present)
[buster] - gnome-maps  (Vulnerable code not present)
NOTE: https://gitlab.gnome.org/GNOME/gnome-maps/-/issues/588
@@ -988,10 +991,12 @@ CVE-2023-41889 (SHIRASAGI is a Content Management System. 
Prior to version 1.18.
NOT-FOR-US: SHIRASAGI
 CVE-2023-41887 (OpenRefine is a powerful free, open source tool for working 
with messy ...)
- openrefine 3.7.5-1
+   [bookworm] - openrefine  (Minor issue)
NOTE: 
https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5
NOTE: 
https://github.com/OpenRefine/OpenRefine/commit/693fde606d4b5b78b16391c29d110389eb605511
 (3.7.5)
 CVE-2023-41886 (OpenRefine is a powerful free, open source tool for working 
with messy ...)
- openrefine 3.7.5-1
+   [bookworm] - openrefine  (Minor issue)
NOTE: 
https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m
NOTE: 
https://github.com/OpenRefine/OpenRefine/commit/2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d
 (master)
NOTE: 
https://github.com/OpenRefine/OpenRefine/commit/693fde606d4b5b78b16391c29d110389eb605511
 (3.7.5)
@@ -1235,6 +1240,7 @@ CVE-2023-39915 (NLnet Labs\u2019 Routinator up to and 
including version 0.12.1 m
- routinator  (bug #929024)
 CVE-2023-39914 (NLnet Labs\u2019 bcder library up to and including version 
0.7.2 panic ...)
- rust-bcder  (bug #1052176)
+   [bookworm] - rust-bcder  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0062.html
NOTE: https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt
NOTE: https://github.com/NLnetLabs/bcder/pull/74
@@ -1306,6 +1312,7 @@ CVE-2023-3865 [ksmbd: fix out-of-bound read in smb2_write]
NOTE: 
https://git.kernel.org/linus/5fe7f7b78290638806211046a99f031ff26164e1 (6.4)
 CVE-2023-4813 (A flaw was found in glibc. In an uncommon situation, the 
gaih_inet fun ...)
- glibc 2.36-3
+   [bullseye] - glibc  (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28931
NOTE: Fixed by: 
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215
 (glibc-2.36)
 CVE-2023-4806 (A flaw was found in glibc. In an extremely rare situation, the 
getaddr ...)
@@ -33046,6 +33053,7 @@ CVE-2023-26145
RESERVED
 CVE-2023-26144 (Versions of the package graphql from 16.3.0 and before 16.8.1 
are vuln ...)
- node-graphql 
+   [bookworm] - node-graphql  (Minor issue)
NOTE: https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181
NOTE: https://github.com/graphql/graphql-js/pull/3972
NOTE: https://github.com/graphql/graphql-js/issues/3955
@@ -53994,6 +54002,8 @@ CVE-2022-4133
 CVE-2022-4132 [Tomcat: Memory leak in JSS]
RESERVED
- jss  (bug #1052575)
+   [bookworm] - jss  (Minor issue)
+   [bullseye] - jss  (Minor issue)
[buster] - jss  (The vulnerable code was introduced later)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2147372
NOTE: Triggered by: https://github.com/dogtagpki/jss/pull/928
@@ -102215,10 +102225,7 @@ CVE-2022-29656 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-20 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9c021404 by Moritz Muehlenhoff at 2023-09-20T09:13:55+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -156,6 +156,8 @@ CVE-2020-36766 (An issue was discovered in the Linux kernel 
before 5.8.6. driver
NOTE: 
https://git.kernel.org/linus/6c42227c3467549ddc65efe99c869021d2f4a570 (5.9-rc1)
 CVE-2023- [cross-site scripting (XSS) vulnerability in handling of 
linkrefs in plain text messages]
- roundcube 1.6.3+dfsg-1 (bug #1052059)
+   [bookworm] - roundcube  (Minor issue)
+   [bullseye] - roundcube  (Minor issue)
NOTE: 
https://roundcube.net/news/2023/09/15/security-update-1.6.3-released
NOTE: Fixed by: 
https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b
 (1.6.3)
 CVE-2023-5036 (Cross-Site Request Forgery (CSRF) in GitHub repository 
usememos/memos  ...)
@@ -587,6 +589,8 @@ CVE-2023-41892 (Craft CMS is a platform for creating 
digital experiences. This i
NOT-FOR-US: Craft CMS
 CVE-2023-41081 (The mod_jk component of Apache Tomcat Connectorsin some 
circumstances, ...)
- libapache-mod-jk 1:1.2.49-1 (bug #1051956)
+   [bookworm] - libapache-mod-jk  (Minor issue)
+   [bullseye] - libapache-mod-jk  (Minor issue)
NOTE: https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b
NOTE: http://www.openwall.com/lists/oss-security/2023/09/13/2
NOTE: 
https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.49
@@ -683,6 +687,8 @@ CVE-2023-4813 (A flaw was found in glibc. In an uncommon 
situation, the gaih_ine
NOTE: Fixed by: 
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215
 (glibc-2.36)
 CVE-2023-4806 (A flaw was found in glibc. In an extremely rare situation, the 
getaddr ...)
- glibc 2.37-10
+   [bookworm] - glibc  (Minor issue)
+   [bullseye] - glibc  (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30843
 CVE-2023-4527 (A flaw was found in glibc. When the getaddrinfo function is 
called wit ...)
- glibc 2.37-9 (bug #1051958)
@@ -1968,6 +1974,8 @@ CVE-2023-2813 (All of the above Aapna WordPress theme 
through 1.3, Anand WordPre
 CVE-2023-41164
{DLA-3558-1}
- python-django 3:3.2.21-1 (bug #1051226)
+   [bookworm] - python-django  (Minor issue, fix along in 
future update)
+   [bullseye] - python-django  (Minor issue, fix along in 
future update)
NOTE: https://www.openwall.com/lists/oss-security/2023/09/04/1
NOTE: 
https://www.djangoproject.com/weblog/2023/sep/04/security-releases/
NOTE: 
https://github.com/django/django/commit/3f41d6d62929dfe53eda8109b3b836f26645bdce
 (main)
@@ -7306,6 +7314,8 @@ CVE-2023-38410 (The issue was addressed with improved 
checks. This issue is fixe
NOT-FOR-US: Apple
 CVE-2023-38285 (Trustwave ModSecurity 3.x before 3.0.10 has Inefficient 
Algorithmic Co ...)
- modsecurity 3.0.10-1 (bug #1042475)
+   [bookworm] - modsecurity  (Minor issue)
+   [bullseye] - modsecurity  (Minor issue)
NOTE: 
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-v3-dos-vulnerability-in-four-transformations-cve-2023-38285/
 CVE-2023-38261 (The issue was addressed with improved memory handling. This 
issue is f ...)
NOT-FOR-US: Apple


=
data/dsa-needed.txt
=
@@ -33,6 +33,8 @@ lldpd (carnil)
 nbconvert/oldstable
   Guilhem Moulin proposed an update ready for review
 --
+netatalk/oldstable (jmm)
+--
 nodejs
   maintainer proposed to follow the upstream 18.x LTS branch
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9c021404e462f119daeb92be61dc95566a140cdc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9c021404e462f119daeb92be61dc95566a140cdc
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2b2424b6 by Moritz Muehlenhoff at 2023-09-17T23:22:36+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/dsa-needed.txt


Changes:

=
data/dsa-needed.txt
=
@@ -23,9 +23,11 @@ cinder/oldstable
 --
 flac/oldstable (jmm)
 --
-gnome-shell
+gnome-shell (jmm)
   Maintainer preparing updates
 --
+gpac/oldstable (jmm)
+--
 libreswan (jmm)
   Maintainer prepared bookworm-security update, but needs work on 
bullseye-security backports
 --
@@ -33,6 +35,8 @@ linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y and 6.1.y versions
 --
+lldpd
+--
 nbconvert/oldstable
   Guilhem Moulin proposed an update ready for review
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2b2424b6f08917cb6c499f9462923571f817680c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2b2424b6f08917cb6c499f9462923571f817680c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8007d715 by Moritz Muehlenhoff at 2023-09-15T14:09:12+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -104,6 +104,8 @@ CVE-2023-4801 (An improper certification validation 
vulnerability in the Insider
NOT-FOR-US: Insider Threat Management (ITM) Server
 CVE-2023-4785 (Lack of error handling in the TCP server in Google's gRPC 
starting ver ...)
- grpc 
+   [bookworm] - grpc  (Minor issue)
+   [bullseye] - grpc  (Minor issue)
NOTE: https://github.com/grpc/grpc/pull/33656
NOTE: https://github.com/grpc/grpc/pull/33667
NOTE: https://github.com/grpc/grpc/pull/33669
@@ -157,9 +159,13 @@ CVE-2023-34984 (A protection mechanism failure in Fortinet 
FortiWeb 7.2.0 throug
 CVE-2023-4039 (A failure in the -fstack-protector feature in GCC-based 
toolchains  th ...)
- gcc-13 13.2.0-4
- gcc-12 12.3.0-9
+   [bookworm] - gcc-12  (Minor issue)
- gcc-11 11.4.0-4
+   [bookworm] - gcc-11  (Minor issue)
- gcc-10 
+   [bullseye] - gcc-10  (Minor issue)
- gcc-9 
+   [bullseye] - gcc-9  (Minor issue)
- gcc-8 
- gcc-7 
NOTE: 
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
@@ -1743,6 +1749,7 @@ CVE-2023-41364 (In tine through 2023.01.14.325, the sort 
parameter of the /index
NOT-FOR-US: Tine groupware
 CVE-2023-41051 (In a typical Virtual Machine Monitor (VMM) there are several 
component ...)
- rust-vm-memory 0.12.2-1 (bug #1051101)
+   [bookworm] - rust-vm-memory  (Minor issue)
[bullseye] - rust-vm-memory  (Minor issue)
NOTE: 
https://github.com/rust-vmm/vm-memory/security/advisories/GHSA-49hh-fprx-m68g
NOTE: 
https://github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8
 (v0.12.2)
@@ -216800,6 +216807,7 @@ CVE-2020-24905
RESERVED
 CVE-2020-24904 (An issue was discovered in attach parameter in GNOME Gmail 
version 2.5 ...)
- viagee  (bug #1051726)
+   [bookworm] - viagee  (Minor issue)
- gnome-gmail 
[bullseye] - gnome-gmail  (Minor issue)
[buster] - gnome-gmail  (Minor issue)


=
data/dsa-needed.txt
=
@@ -26,6 +26,8 @@ flac/oldstable
 libreswan (jmm)
   Maintainer prepared bookworm-security update, but needs work on 
bullseye-security backports
 --
+libwebp/oldstable (jmm)
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y and 6.1.y versions
@@ -80,6 +82,8 @@ salt/oldstable
 --
 samba/oldstable
 --
+thunderbird (jmm)
+--
 tiff (aron)
 --
 trafficserver



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8007d715cb1457755a1282c418cc1d91019f599d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8007d715cb1457755a1282c418cc1d91019f599d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-12 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9a82bd9a by Moritz Muehlenhoff at 2023-09-12T10:52:16+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -1237,6 +1237,7 @@ CVE-2023-41364 (In tine through 2023.01.14.325, the sort 
parameter of the /index
NOT-FOR-US: Tine groupware
 CVE-2023-41051 (In a typical Virtual Machine Monitor (VMM) there are several 
component ...)
- rust-vm-memory 0.12.2-1 (bug #1051101)
+   [bullseye] - rust-vm-memory  (Minor issue)
NOTE: 
https://github.com/rust-vmm/vm-memory/security/advisories/GHSA-49hh-fprx-m68g
NOTE: 
https://github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8
 (v0.12.2)
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0056.html
@@ -21129,7 +21130,9 @@ CVE-2023-39319 (The html/template package does not 
apply the proper rules for ha
- golang-1.21 1.21.1-1
- golang-1.20 1.20.8-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
NOTE: https://go.dev/issue/62197
NOTE: 
https://github.com/golang/go/commit/bbd043ff0d6d59f1a9232d31ecd5eacf6507bf6a 
(go1.21.1)
@@ -21139,7 +21142,9 @@ CVE-2023-39318 (The html/template package does not 
properly handle HTML-like ""
- golang-1.21 1.21.1-1
- golang-1.20 1.20.8-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
NOTE: https://go.dev/issue/62196
NOTE: 
https://github.com/golang/go/commit/b0e1d3ea26e8e8fce7726690c9ef0597e60739fb 
(go1.21.1)
@@ -221516,6 +221521,7 @@ CVE-2020-22525
 CVE-2020-22524 (Buffer Overflow vulnerability in FreeImage_Load function in 
FreeImage  ...)
- freeimage 
NOTE: https://sourceforge.net/p/freeimage/bugs/319/
+   NOTE: Fixed with r1848 from 
http://svn.code.sf.net/p/freeimage/svn/FreeImage/
 CVE-2020-22523
RESERVED
 CVE-2020-22522


=
data/dsa-needed.txt
=
@@ -14,7 +14,7 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 cacti
 --
-chromium
+chromium (jmm)
 --
 cinder/oldstable
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a82bd9ac77bacf2f10ebc192c69d934630176c7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a82bd9ac77bacf2f10ebc192c69d934630176c7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-12 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
51837e30 by Moritz Muehlenhoff at 2023-09-12T09:02:40+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -29,6 +29,7 @@ CVE-2023-41103 (Interact 7.9.79.5 allows stored Cross-site 
Scripting (XSS) attac
NOT-FOR-US: Interact
 CVE-2023-41000 (GPAC through 2.2.1 has a use-after-free vulnerability in the 
function  ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
NOTE: https://github.com/gpac/gpac/issues/2550
NOTE: Fixed by: 
https://github.com/gpac/gpac/commit/0018b5e4e07a1465287e7dff69b387929f5a75fa
 CVE-2023-40946 (Schoolmate 1.3 is vulnerable to SQL Injection in the variable 
$usernam ...)
@@ -43,6 +44,7 @@ CVE-2023-40150 (Softneta MedDream PACS does not perform an 
authentication check
NOT-FOR-US: Softneta MedDream PACS
 CVE-2023-40032 (libvips is a demand-driven, horizontally threaded image 
processing lib ...)
- vips 8.14.4-1
+   [bookworm] - vips  (Minor issue)
[bullseye] - vips  (Vulnerable code not present)
[buster] - vips  (Vulnerable code not present)
NOTE: https://github.com/libvips/libvips/pull/3604
@@ -61,7 +63,7 @@ CVE-2023-39780 (ASUS RT-AX55 v3.0.0.4.386.51598 was 
discovered to contain an aut
 CVE-2023-39227 (Softneta MedDream PACSstores usernames and passwords in 
plaintext. The ...)
NOT-FOR-US: Softneta MedDream PACS
 CVE-2023-39070 (An issue in Cppcheck 2.12 dev allows a local attacker to 
execute arbit ...)
-   - cppcheck 
+   - cppcheck  (unimportant)
NOTE: 
https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/
 CVE-2023-39068 (Buffer Overflow vulnerability in NBD80S09S-KLC 
v.YK_HZXM_NBD80S09S-KLC ...)
TODO: check
@@ -95,6 +97,8 @@ CVE-2023-42470 (The Imou Life com.mm.android.smartlifeiot 
application through 6.
NOT-FOR-US: Imou Life com.mm.android.smartlifeiot application
 CVE-2023-42467 (QEMU through 8.0.0 could trigger a division by zero in 
scsi_disk_reset ...)
- qemu 
+   [bookworm] - qemu  (Minor issue)
+   [bullseye] - qemu  (Minor issue)
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1813
 CVE-2023-40040 (An issue was discovered in the MyCrops HiGrade "THC Testing & 
Cannabi" ...)
NOT-FOR-US: MyCrops HiGrade "THC Testing & Cannabi" application
@@ -2065,6 +2069,7 @@ CVE-2023-39578 (A stored cross-site scripting (XSS) 
vulnerability in the Create
NOT-FOR-US: Zenario CMS
 CVE-2023-39562 (GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to 
contain a hea ...)
- gpac  (bug #1051740)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2537
NOTE: 
https://github.com/gpac/gpac/commit/9024531ee8e6ae8318a8fe0cbb64710d1acc31f6



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51837e301a0e976499cc2b9e6c5d26bca1c24a96

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51837e301a0e976499cc2b9e6c5d26bca1c24a96
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-07 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
95731b3f by Moritz Muehlenhoff at 2023-09-07T12:11:29+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -436,6 +436,8 @@ CVE-2023-4587 (An IDOR vulnerability has been found in 
ZKTeco ZEM800 product aff
NOT-FOR-US: ZKTeco ZEM800 product
 CVE-2023-4540 (Improper Handling of Exceptional Conditions vulnerability in 
Daurnimat ...)
- lua-http 
+   [bookworm] - lua-http  (Minor issue)
+   [bullseye] - lua-http  (Minor issue)
NOTE: Fixed by: 
https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6
 CVE-2023-4298 (The 123.chat WordPress plugin before 1.3.1 does not sanitise 
and escap ...)
NOT-FOR-US: WordPress plugin
@@ -705,9 +707,10 @@ CVE-2023-32806 (In wlan driver, there is a possible out of 
bounds write due to i
 CVE-2023-32805 (In power, there is a possible out of bounds write due to an 
insecure d ...)
NOT-FOR-US: MediaTek
 CVE-2023-4751 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0.1 ...)
-   - vim 
+   - vim  (unimportant)
NOTE: 
https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b 
(v9.0.1331)
NOTE: https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-4740 (A vulnerability, which was classified as critical, was found in 
IBOS O ...)
NOT-FOR-US: IBOS OA
 CVE-2023-4739 (A vulnerability, which was classified as critical, has been 
found in B ...)
@@ -1413,6 +1416,8 @@ CVE-2023-39678 (A cross-site scripting (XSS) 
vulnerability in the device web int
NOT-FOR-US: BDCOM OLT P3310D-2AC
 CVE-2023-39663 (Mathjax up to v2.7.9 was discovered to contain two Regular 
expression  ...)
- mathjax 
+   [bookworm] - mathjax  (Minor issue)
+   [bullseye] - mathjax  (Minor issue)
NOTE: https://github.com/mathjax/MathJax/issues/3074
 CVE-2023-39616 (AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid 
read mem ...)
[experimental] - aom 3.7.0-1~exp1


=
data/dsa-needed.txt
=
@@ -38,6 +38,8 @@ nodejs
 --
 nova/oldstable
 --
+open-vm-tools (jmm)
+--
 openjdk-17/oldstable (jmm)
 --
 php-cas/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95731b3fce160a20d0d1d246a2e985aa76671f84

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95731b3fce160a20d0d1d246a2e985aa76671f84
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
75ddbc45 by Moritz Muehlenhoff at 2023-09-06T11:29:19+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -54,10 +54,13 @@ CVE-2023-36851
NOT-FOR-US: Juniper
 CVE-2023-4781 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0.1 ...)
- vim 
+   [bookworm] - vim  (Minor issue)
+   [bullseye] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883/
NOTE: 
https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93 
(v9.0.1873)
 CVE-2023-4778 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 
2.3-DEV.)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397/
NOTE: 
https://github.com/gpac/gpac/commit/d553698050af478049e1a09e44a15ac884f223ed
@@ -184,20 +187,25 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When 
integrating Apache Axis 1.x
NOTE: 
https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
 CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
- xen 
+   [bookworm] - xen  (Minor issue, fix along in future DSA)
+   [bullseye] - xen  (Minor issue, fix along in future DSA)
[buster] - xen  (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-437.html
 CVE-2023-4758 (Buffer Over-read in GitHub repository gpac/gpac prior to 
2.3-DEV.)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: 
https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86
NOTE: https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6
 CVE-2023-4756 (Stack-based Buffer Overflow in GitHub repository gpac/gpac 
prior to 2. ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: 
https://github.com/gpac/gpac/commit/6914d016e2b540bac2c471c4aea156ddef8e8e01
NOTE: https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05
 CVE-2023-4755 (Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV.)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: 
https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a
NOTE: https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
@@ -208,18 +216,22 @@ CVE-2023-4754 (Out-of-bounds Write in GitHub repository 
gpac/gpac prior to 2.3-D
NOTE: https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
 CVE-2023-4752 (Use After Free in GitHub repository vim/vim prior to 9.0.1858.)
- vim 
+   [bookworm] - vim  (Minor issue)
+   [bullseye] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757/
NOTE: 
https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139 
(v9.0.1858)
 CVE-2023-4750 (Use After Free in GitHub repository vim/vim prior to 9.0.1857.)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea/
NOTE: 
https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed 
(v9.0.1857)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-4748 (A vulnerability, which was classified as critical, has been 
found in Y ...)
NOT-FOR-US: Yongyou UFIDA-NC
 CVE-2023-4733 (Use After Free in GitHub repository vim/vim prior to 9.0.1840.)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217/
NOTE: 
https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c 
(v9.0.1840)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-4636 (The WordPress File Sharing Plugin plugin for WordPress is 
vulnerable t ...)
NOT-FOR-US: WordPress File Sharing Plugin plugin for WordPress
 CVE-2023-4616 (This vulnerability allows remote attackers to disclose 
sensitive infor ...)


=
data/dsa-needed.txt
=
@@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it.
 
 If needed, specify the release by adding a slash after the name of the source 
package.
 
+--
+cacti
 --
 chromium
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75ddbc4597f0d393e6017696d1567a8623c2ce1d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75ddbc4597f0d393e6017696d1567a8623c2ce1d
You're receiving this email because of 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6f2cbdbb by Moritz Muehlenhoff at 2023-09-03T21:02:13+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1,19 +1,23 @@
 CVE-2023-4738 (Heap-based Buffer Overflow in GitHub repository vim/vim prior 
to 9.0.1 ...)
- vim 
+   [bookworm] - vim  (Minor issue)
+   [bullseye] - vim  (Minor issue)
NOTE: https://huntr.dev/bounties/9fc7dced-a7bb-4479-9718-f956df20f612/
NOTE: 
https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1 
(v9.0.1848)
 CVE-2023-4736 (Untrusted Search Path in GitHub repository vim/vim prior to 
9.0.1833.)
-   - vim 
+   - vim  (Windows-specific)
NOTE: https://huntr.dev/bounties/e1ce0995-4df4-4dec-9cd7-3136ac3e8e71/
NOTE: 
https://github.com/vim/vim/commit/816fbcc262687b81fc46f82f7bbeb1453addfe0c 
(v9.0.1833)
 CVE-2023-4735 (Out-of-bounds Write in GitHub repository vim/vim prior to 
9.0.1847.)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51/
NOTE: 
https://github.com/vim/vim/commit/889f6af37164775192e33b233a90e86fd3df0f57 
(v9.0.1847)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-4734 (Integer Overflow or Wraparound in GitHub repository vim/vim 
prior to 9 ...)
-   - vim 
+   - vim  (unimportant)
NOTE: https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217/
NOTE: 
https://github.com/vim/vim/commit/4c6fe2e2ea62469642ed1d80b16d39e616b25cf5 
(v9.0.1846)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-39983 (A vulnerability that poses a potential risk of polluting the 
MXsecurit ...)
NOT-FOR-US: MXsecurity
 CVE-2023-39982 (A vulnerability has been identified in MXsecurity versions 
prior to v1 ...)
@@ -1276,6 +1280,8 @@ CVE-2023-40217 (An issue was discovered in Python before 
3.8.18, 3.9.x before 3.
NOTE: 2. 
https://github.com/python/cpython/commit/592bacb6fc086c0453e818e9b95016e9fd47
 CVE-2023-4380
- ansible 
+   [bookworm] - ansible  (Minor issue)
+   [bullseye] - ansible  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2232324
 CVE-2023-4420 (A remote unprivileged attacker can intercept the communication 
via e.g ...)
NOT-FOR-US: SICK LMS5xx
@@ -5762,11 +5768,13 @@ CVE-2023-3779 (The Essential Addons For Elementor 
plugin for WordPress is vulner
NOT-FOR-US: WordPress plugin
 CVE-2023-3300 (HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 
1.4.1 HTTP ...)
- nomad 
+   [bullseye] - nomad  (Will be removed in Bullseye 11.8)
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272
 CVE-2023-3299 (HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL 
policies ...)
- nomad  (Specific to Nomad Enterprise)
 CVE-2023-3072 (HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 
1.4.10 ACL  ...)
- nomad 
+   [bullseye] - nomad  (Will be removed in Bullseye 11.8)
NOTE: 
https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270
 CVE-2023-37362 (Weintek Weincloud v0.13.6 could allow an attacker to abuse 
the reg ...)
NOT-FOR-US: Weincloud
@@ -19742,11 +19750,15 @@ CVE-2023-29451 (Specially crafted string can cause a 
buffer overrun in the JSON
 CVE-2023-29450 (JavaScript pre-processing can be used by the attacker to gain 
access t ...)
{DLA-3538-1}
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22588
NOTE: Patch for 5.0.32rc1: 
https://github.com/zabbix/zabbix/commit/c3f1543e4
NOTE: Patch for 6.0.14rc2: 
https://github.com/zabbix/zabbix/commit/76f6a80cb
 CVE-2023-29449 (JavaScript preprocessing, webhooks and global scripts can 
cause uncont ...)
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
[buster] - zabbix  (vulnerable code introduced later)
NOTE: https://support.zabbix.com/browse/ZBX-22589
NOTE: Upstream patch for 5.0.32: 
https://github.com/zabbix/zabbix/commit/e90b8a3c62



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2cbdbbbd71480032bd068740a244e3cae0520c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2cbdbbbd71480032bd068740a244e3cae0520c
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-02 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ac3dd65a by Moritz Muehlenhoff at 2023-09-02T20:08:57+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -95,6 +95,8 @@ CVE-2023-37826 (A cross-site scripting (XSS) vulnerability in 
General Solutions
NOT-FOR-US: General Solutions Steiner GmbH CASE 3 Taskmanagement
 CVE-2023-36328 (Integer Overflow vulnerability in mp_grow in libtom libtommath 
before  ...)
- libtommath 
+   [bookworm] - libtommath  (Minor issue)
+   [bullseye] - libtommath  (Minor issue)
NOTE: https://github.com/libtom/libtommath/pull/546
NOTE: 
https://github.com/libtom/libtommath/commit/beba892bc0d4e4ded4d667ab1d2a94f4d75109a9
 CVE-2023-36327 (Integer Overflow vulnerability in RELIC before commit 
421f2e91cf2ba424 ...)
@@ -466,6 +468,8 @@ CVE-2023-40186 (FreeRDP is a free implementation of the 
Remote Desktop Protocol
NOTE: 
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v
 CVE-2023-40184 (xrdp is an open source remote desktop protocol (RDP) server. 
In versio ...)
- xrdp  (bug #1051061)
+   [bookworm] - xrdp  (Minor issue)
+   [bullseye] - xrdp  (Minor issue)
NOTE: 
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq
NOTE: 
https://github.com/neutrinolabs/xrdp/commit/25a1fab5b6c5ef2a8bb109232b765cb8b332ce5e
 CVE-2023-40181 (FreeRDP is a free implementation of the Remote Desktop 
Protocol (RDP), ...)
@@ -623,6 +627,7 @@ CVE-2023-39663 (Mathjax up to v2.7.9 was discovered to 
contain two Regular expre
TODO: check
 CVE-2023-39616 (AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid 
read mem ...)
- aom 3.7.0~rc3-1
+   [bookworm] - aom  (Minor issue)
[bullseye] - aom  (Vulnerable code introduced later)
[buster] - aom  (Vulnerable code introduced later)
NOTE: https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3
@@ -1989,6 +1994,8 @@ CVE-2023-39743 (lrzip-next LZMA v23.01 was discovered to 
contain an access viola
- lrzip-next  (bug #1042088)
 CVE-2023-39741 (lrzip v0.651 was discovered to contain a heap overflow via the 
libzpaq ...)
- lrzip 
+   [bookworm] - lrzip  (Minor issue)
+   [bullseye] - lrzip  (Minor issue)
NOTE: https://github.com/ckolivas/lrzip/issues/246
 CVE-2023-38905 (SQL injection vulnerability in Jeecg-boot v.3.5.0 and before 
allows a  ...)
NOT-FOR-US: JeecgBoot
@@ -6165,6 +6172,7 @@ CVE-2023-37479 (Open Enclave is a hardware-agnostic open 
source library for deve
NOT-FOR-US: Open Enclave
 CVE-2023-37476 (OpenRefine is a free, open source tool for data processing. A 
carefull ...)
- openrefine 3.6.2-3 (bug #1041422)
+   [bookworm] - openrefine  (Minor issue)
NOTE: 
https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq
NOTE: 
https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e
 (master)
NOTE: 
https://github.com/OpenRefine/OpenRefine/commit/c40c84d8170c4d61c6a0926531b552a50caa5651
 (3.7.4)
@@ -22207,6 +22215,8 @@ CVE-2023-28756 (A ReDoS issue was discovered in the 
Time component through 0.2.1
 CVE-2023-28755 (A ReDoS issue was discovered in the URI component through 
0.12.0 in Ru ...)
{DLA-3447-1 DLA-3408-1}
- rubygems 
+   [bookworm] - rubygems  (Minor issue)
+   [bullseye] - rubygems  (Minor issue)
- ruby3.1  (bug #1038408)
- ruby2.7 
- ruby2.5 



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac3dd65ac6eac8ffc0729eb262b40827d8b0ec88

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac3dd65ac6eac8ffc0729eb262b40827d8b0ec88
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-09-01 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
36af2a11 by Moritz Muehlenhoff at 2023-09-01T10:01:06+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -1,5 +1,6 @@
 CVE-2023-4683 (NULL Pointer Dereference in GitHub repository gpac/gpac prior 
to 2.3-D ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
NOTE: 
https://github.com/gpac/gpac/commit/112767e8b178fc82dec3cf82a1ca14d802cdb8ec
NOTE: https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922
 CVE-2023-4682 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior 
to 2.3 ...)
@@ -8,10 +9,12 @@ CVE-2023-4682 (Heap-based Buffer Overflow in GitHub 
repository gpac/gpac prior t
NOTE: https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c
 CVE-2023-4681 (NULL Pointer Dereference in GitHub repository gpac/gpac prior 
to 2.3-D ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
NOTE: 
https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c
NOTE: https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e
 CVE-2023-4678 (Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV.)
- gpac 
+   [bullseye] - gpac  (Minor issue)
NOTE: 
https://github.com/gpac/gpac/commit/4607052c482a51dbdacfe1ade10645c181d07b07
NOTE: https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877
 CVE-2023-41748 (Remote command execution due to improper input validation. The 
followi ...)
@@ -110,6 +113,8 @@ CVE-2023-4649 (Session Fixation in GitHub repository 
instantsoft/icms2 prior to
NOT-FOR-US: icms2
 CVE-2023-4641 [gpasswd(1) password leak]
- shadow 
+   [bookworm] - shadow  (Minor issue)
+   [bullseye] - shadow  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2215945
NOTE: 
https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904
 (4.14.0-rc1)
 CVE-2023-4500 (The Order Tracking Pro plugin for WordPress is vulnerable to 
Stored Cr ...)
@@ -19504,6 +19509,7 @@ CVE-2023-29452 (Currently, geomap configuration 
(Administration -> General -> Ge
 CVE-2023-29451 (Specially crafted string can cause a buffer overrun in the 
JSON parser ...)
{DLA-3538-1}
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
[bullseye] - zabbix  (5.x not affected)
NOTE: https://support.zabbix.com/browse/ZBX-22587
 CVE-2023-29450 (JavaScript pre-processing can be used by the attacker to gain 
access t ...)
@@ -2,6 +30005,8 @@ CVE-2023-0923
NOT-FOR-US: Red Hat OpenShift Data Science
 CVE-2023-0922 (The Samba AD DC administration tool, when operating against a 
remote L ...)
- samba 2:4.17.7+dfsg-1
+   [bullseye] - samba  (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
+   [buster] - samba  (Domain controller functionality is EOLed, 
see DSA-5015-1)
NOTE: https://www.samba.org/samba/security/CVE-2023-0922.html
 CVE-2023-0921 (A lack of length validation in GitLab CE/EE affecting all 
versions fro ...)
- gitlab 15.10.8+ds1-2
@@ -117984,15 +117992,18 @@ CVE-2022-23517 (rails-html-sanitizer is responsible 
for sanitizing HTML fragment
NOTE: 
https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
 CVE-2022-23516 (Loofah is a general library for manipulating and transforming 
HTML/XML ...)
- ruby-loofah 2.19.1-1 (bug #1026083)
+   [bullseye] - ruby-loofah  (Minor issue)
[buster] - ruby-loofah  (Minor issue)
NOTE: 
https://github.com/flavorjones/loofah/security/advisories/GHSA-3x8r-x6xp-q4vm
NOTE: 
https://github.com/flavorjones/loofah/commit/86f7f6364491b0099d215db858ecdc0c89ded040
 CVE-2022-23515 (Loofah is a general library for manipulating and transforming 
HTML/XML ...)
- ruby-loofah 2.19.1-1 (bug #1026083)
+   [bullseye] - ruby-loofah  (Minor issue)
NOTE: 
https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx
NOTE: 
https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f
 CVE-2022-23514 (Loofah is a general library for manipulating and transforming 
HTML/XML ...)
- ruby-loofah 2.19.1-1 (bug #1026083)
+   [bullseye] - ruby-loofah  (Minor issue)
[buster] - ruby-loofah  (Minor issue)
NOTE: 
https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh
NOTE: 
https://github.com/flavorjones/loofah/commit/a6e0a1ab90675a17b1b2be189129d94139e4b143
@@ -150154,7 +150165,7 @@ CVE-2021-3670 (MaxQueryDuration not honoured in Samba 
AD DC LDAP)
[buster] - ldb  (Minor issue)
[stretch] - ldb  (Minor issue)
- samba 2:4.16.0+dfsg-2
-   [bullseye] - samba  (Minor 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
058a607b by Moritz Muehlenhoff at 2023-08-28T13:38:08+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -64,10 +64,11 @@ CVE-2023-41080 (URL Redirection to Untrusted Site ('Open 
Redirect') vulnerabilit
NOTE: Starting with 9.0.70-2 Tomcat9 no longer ships the server stack, 
using that as the fixed version
 CVE-2023-40587 (Pyramid is an open source Python web framework. A path 
traversal vulne ...)
- python-pyramid 
+   [bookworm] - python-pyramid  (Minor issue)
+   [bullseye] - python-pyramid  (Python version in Bullseye 
is not affected)
NOTE: 
https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8
NOTE: 
https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85
 (2.0.2)
NOTE: Underlying issue fixed in Python 3.11 and 3.12.
-   TODO: check,  claimed to be only affecting >= 2.0
 CVE-2023-40586 (OWASP Coraza WAF is a golang modsecurity compatible web 
application fi ...)
NOT-FOR-US: OWASP Coraza WAF
 CVE-2023-40585 (ironic-image is a container image to run OpenStack Ironic as 
part of M ...)
@@ -149,6 +150,7 @@ CVE-2023-40579 (OpenFGA is an authorization/permission 
engine built for develope
 CVE-2023-40577 (Alertmanager handles alerts sent by client applications such 
as the Pr ...)
- prometheus-alertmanager 0.26.0+ds-1 (bug #1050558)
NOTE: 
https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j
+   NOTE: 
https://github.com/prometheus/alertmanager/commit/8b9f2fd20c25e0d1e76aa0b407f7e354996d8e72
 (release-0.25)
 CVE-2023-40570 (Datasette is an open source multi-tool for exploring and 
publishing da ...)
NOT-FOR-US: Datasette
 CVE-2023-40568
@@ -142855,6 +142857,7 @@ CVE-2021-40212 (An exploitable out-of-bounds write 
vulnerability in PotPlayer 1.
NOT-FOR-US: PotPlayer
 CVE-2021-40211 (An issue was discovered with ImageMagick 7.1.0-4 via Division 
by zero  ...)
- imagemagick 8:6.9.11.60+dfsg-1.5
+   [bullseye] - imagemagick  (Minor issue)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/4097
NOTE: 
https://github.com/ImageMagick/ImageMagick/commit/0fb77f2a231038efdc38dcceddae6952ebdfb000
 (7.1.0-5)
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa#diff-9509dd2616f8c0aab419100d616e5e926099cc61bdfde60f2ae408f02f43472a
 (6.9.12-43)
@@ -219738,6 +219741,7 @@ CVE-2020-22219 (Buffer Overflow vulnerability in 
function bitwriter_grow_ in fla
NOTE: https://github.com/xiph/flac/pull/419 (1.4.0)
 CVE-2020-22218 (An issue was discovered in function _libssh2_packet_add in 
libssh2 1.1 ...)
- libssh2 1.10.0-2
+   [bullseye] - libssh2  (Minor issue)
NOTE: https://github.com/libssh2/libssh2/pull/476
NOTE: 
https://github.com/libssh2/libssh2/commit/642eec48ff3adfdb7a9e562b6d7fc865d1733f45
 (libssh2-1.10.0)
 CVE-2020-22217 (Buffer overflow vulnerability in c-ares before 1_16_1 thru 
1_17_0 via  ...)
@@ -220868,12 +220872,18 @@ CVE-2020-21725 (OpenSNS v6.1.0 contains a blind SQL 
injection vulnerability in /
NOT-FOR-US: OpenSNS
 CVE-2020-21724 (Buffer Overflow vulnerability in ExtractorInformation function 
in stre ...)
- oggvideotools 
+   [bookworm] - oggvideotools  (Minor issue)
+   [bullseye] - oggvideotools  (Minor issue)
NOTE: https://sourceforge.net/p/oggvideotools/bugs/9/
 CVE-2020-21723 (A Segmentation Fault issue discovered 
StreamSerializer::extractStreams ...)
- oggvideotools 
+   [bookworm] - oggvideotools  (Minor issue)
+   [bullseye] - oggvideotools  (Minor issue)
NOTE: https://sourceforge.net/p/oggvideotools/bugs/10/
 CVE-2020-21722 (Buffer Overflow vulnerability in oggvideotools 0.9.1 allows 
remote att ...)
- oggvideotools 
+   [bookworm] - oggvideotools  (Minor issue)
+   [bullseye] - oggvideotools  (Minor issue)
NOTE: https://sourceforge.net/p/oggvideotools/bugs/11/
 CVE-2020-21721
RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/058a607ba3bdd8473c997fc8757d2fffd1989027

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/058a607ba3bdd8473c997fc8757d2fffd1989027
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
616b8997 by Moritz Muehlenhoff at 2023-08-28T11:52:30+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -54,7 +54,9 @@ CVE-2023-41121 (Array AG OS before 9.4.0.499 allows denial of 
service: remote at
NOT-FOR-US: Array AG OS
 CVE-2023-41080 (URL Redirection to Untrusted Site ('Open Redirect') 
vulnerability in F ...)
- tomcat10 
+   [bookworm] - tomcat10  (Minor issue, fix along with future 
update)
- tomcat9 9.0.70-2
+   [bullseye] - tomcat9  (Minor issue, fix along with future 
update)
- tomcat8 
NOTE: https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
NOTE: 
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
 (10.1.13)
@@ -46229,8 +46231,11 @@ CVE-2022-47023
RESERVED
 CVE-2022-47022 (An issue was discovered in open-mpi hwloc 2.1.0 allows 
attackers to ca ...)
- hwloc 
+   [bookworm] - hwloc  (Minor issue)
+   [bullseye] - hwloc  (Minor issue)
NOTE: https://github.com/open-mpi/hwloc/issues/544
-   TODO: check, additionally openmpi and mpich embedd hwloc, but issue 
seems negligible
+   NOTE: 
https://github.com/open-mpi/hwloc/commit/eec84f84d4c4a7af6ed2c57ba95a9256e56e73b4
+   NOTE: Additionally openmpi and mpich embedd hwloc, but issue seems 
negligible
 CVE-2022-47021 (A null pointer dereference issue was discovered in functions 
op_get_da ...)
- opusfile 0.12-4 (bug #1030049)
[bullseye] - opusfile  (Minor issue)
@@ -59984,6 +59989,8 @@ CVE-2022-43358 (Stack overflow vulnerability in 
ast_selectors.cpp: in function S
NOTE: https://github.com/sass/libsass/issues/3178
 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function 
Sass::Co ...)
- libsass 
+   [bookworm] - libsass  (Minor issue)
+   [bullseye] - libsass  (Minor issue)
NOTE: https://github.com/sass/libsass/issues/3177
 CVE-2022-43356
RESERVED
@@ -68800,6 +68807,7 @@ CVE-2022-40091 (Online Tours & Travels Management 
System v1.0 was discovered to
NOT-FOR-US: Online Tours & Travels Management System
 CVE-2022-40090 (An issue was discovered in function TIFFReadDirectory libtiff 
before 4 ...)
- tiff 4.5.0-2
+   [bullseye] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/455
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/386
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/d093eb5d961e21ba51420bc22382c514683a4d91
 (v4.5.0rc1)
@@ -107155,6 +107163,8 @@ CVE-2022-26593 (Cross-site scripting (XSS) 
vulnerability in the Asset module's a
NOT-FOR-US: Liferay
 CVE-2022-26592 (Stack Overflow vulnerability in libsass 3.6.5 via the 
CompoundSelector ...)
- libsass 
+   [bookworm] - libsass  (Minor issue)
+   [bullseye] - libsass  (Minor issue)
NOTE: https://github.com/sass/libsass/issues/3174
 CVE-2022-26591 (FANTEC GmbH MWiD25-DS Firmware v2.000.030 allows 
unauthenticated attac ...)
NOT-FOR-US: FANTEC GmbH MWiD25-DS Firmware
@@ -118015,6 +118025,8 @@ CVE-2021-46313 (The binary MP4Box in GPAC v1.0.1 was 
discovered to contain a seg
NOTE: 
https://github.com/gpac/gpac/commit/ee969d3c4c425ecb25999eb68ada616925b58eba 
(v2.0.0)
 CVE-2021-46312 (An issue was discovered IW44EncodeCodec.cpp in djvulibre 
3.5.28 in all ...)
- djvulibre 
+   [bookworm] - djvulibre  (Minor issue)
+   [bullseye] - djvulibre  (Minor issue)
NOTE: https://sourceforge.net/p/djvu/bugs/344/
 CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 
via the ...)
- gpac 2.0.0+dfsg1-2
@@ -118025,6 +118037,8 @@ CVE-2021-46311 (A NULL pointer dereference 
vulnerability exists in GPAC v1.1.0 v
NOTE: 
https://github.com/gpac/gpac/commit/ad19e0c4504a89ca273442b1b1483ae7adfb9491 
(v2.0.0)
 CVE-2021-46310 (An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in 
allows at ...)
- djvulibre 
+   [bookworm] - djvulibre  (Minor issue)
+   [bullseye] - djvulibre  (Minor issue)
NOTE: https://sourceforge.net/p/djvu/bugs/345/
 CVE-2021-46309 (An SQL Injection vulnerability exists in Sourcecodester 
Employee and V ...)
NOT-FOR-US: Sourcecodester
@@ -221395,10 +221409,11 @@ CVE-2020-21529 (fig2dev 3.2.7b contains a stack 
buffer overflow in the bezier_sp
NOTE: 
https://sourceforge.net/p/mcj/fig2dev/ci/d70e4ba6308046f71cb51f67db8412155af52411/
 (3.2.8)
NOTE: 
https://sourceforge.net/p/mcj/fig2dev/ci/e3cee2576438f47a3b8678c6960472e625f8f7d7/
 (3.2.8)
 CVE-2020-21528 (A Segmentation Fault issue discovered in in ieee_segment 
function in o ...)
-   - nasm 2.16.01-1
+   - nasm 2.16.01-1 (unimportant)
NOTE: 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
41e7aa64 by Moritz Muehlenhoff at 2023-08-28T09:58:58+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -73,6 +73,8 @@ CVE-2023-4520 (The FV Flowplayer Video Player plugin for 
WordPress is vulnerable
NOT-FOR-US: FV Flowplayer Video Player plugin for WordPress
 CVE-2023-4508 (A user able to control file input to Gerbv, between versions 
2.4.0 and ...)
- gerbv 2.10.0-1 (bug #1050560)
+   [bookworm] - gerbv  (Minor issue)
+   [bullseye] - gerbv  (Minor issue)
NOTE: https://github.com/gerbv/gerbv/issues/191
NOTE: https://github.com/gerbv/gerbv/pull/192
NOTE: 
https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a 
(v2.10.0-rc.1)
@@ -227170,6 +227172,8 @@ CVE-2020-18771 (Exiv2 0.27.99.0 has a global buffer 
over-read in Exiv2::Internal
NOTE: https://github.com/Exiv2/exiv2/issues/756
 CVE-2020-18770 (An issue was discovered in function 
zzip_disk_entry_to_file_header in  ...)
- zziplib 
+   [bookworm] - zziplib  (Minor issue)
+   [bullseye] - zziplib  (Minor issue)
NOTE: https://github.com/gdraheim/zziplib/issues/69
 CVE-2020-18769
RESERVED



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41e7aa64ec76e0cfc22c421b71f66c289411153e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41e7aa64ec76e0cfc22c421b71f66c289411153e
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-25 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b91c790d by Moritz Muehlenhoff at 2023-08-25T18:39:58+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -159586,13 +159586,15 @@ CVE-2021-33391 (An issue in HTACG HTML Tidy v5.7.28 
allows attacker to execute a
NOTE: https://github.com/htacg/tidy-html5/issues/946
NOTE: 
https://github.com/htacg/tidy-html5/commit/efa61528aa500a1efbd2768121820742d3bb709b
 CVE-2021-33390 (dpic 2021.04.10 has a use-after-free in thedeletestringbox() 
function  ...)
-   - dpic 2021.11.01-1
+   - dpic 2021.11.01-1 (unimportant)
NOTE: https://gitlab.com/aplevich/dpic/-/issues/10
NOTE: Fixed by: 
https://gitlab.com/aplevich/dpic/-/commit/32c26bb3996511662029c961f5e83fb696c087d4
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-33389
RESERVED
 CVE-2021-33388 (dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() 
function in ...)
- dpic 2021.11.01-1
+   [bullseye] - dpic  (Minor issue)
NOTE: https://gitlab.com/aplevich/dpic/-/issues/8
NOTE: Fixed by: 
https://gitlab.com/aplevich/dpic/-/commit/32c26bb3996511662029c961f5e83fb696c087d4
 CVE-2021-33387 (Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows 
attacker t ...)
@@ -162214,15 +162216,18 @@ CVE-2021-32424 (In TrendNet TW100-S4W1CA 2.3.32, 
due to a lack of proper session
 CVE-2021-32423
RESERVED
 CVE-2021-32422 (dpic 2021.01.01 has a Global buffer overflow in theyylex() 
function in ...)
-   - dpic 2021.11.01-1
+   - dpic 2021.11.01-1 (unimportant)
NOTE: https://gitlab.com/aplevich/dpic/-/issues/6
NOTE: Fixed by: 
https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-32421 (dpic 2021.01.01 has a Heap Use-After-Free in 
thedeletestringbox() func ...)
-   - dpic 2021.11.01-1
+   - dpic 2021.11.01-1 (unimportant)
NOTE: https://gitlab.com/aplevich/dpic/-/issues/7
NOTE: Fixed by: 
https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf
+   NOTE: Crash in CLI tool, no security impact
 CVE-2021-32420 (dpic 2021.01.01 has a Heap-based Buffer Overflow in 
thestorestring fun ...)
- dpic 2021.11.01-1
+   [bullseye] - dpic  (Minor issue)
NOTE: https://gitlab.com/aplevich/dpic/-/issues/5
NOTE: Fixed by: 
https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf
 CVE-2021-32419 (An issue in Schism Tracker v20200412 fixed in v.20200412 
allows attack ...)


=
data/dsa-needed.txt
=
@@ -52,6 +52,10 @@ php-horde-turba/oldstable
 --
 py7zr/oldstable
 --
+python3.11/stable
+--
+python3.9/oldstable
+--
 python-glance-store/oldstable
 --
 python-os-brick/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b91c790df6aa973246eeb72b286a0bb13255687a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b91c790df6aa973246eeb72b286a0bb13255687a
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-25 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9625bc10 by Moritz Muehlenhoff at 2023-08-25T11:33:30+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -79,14 +79,20 @@ CVE-2023- [tryton-server lack of record validation]
NOTE: https://discuss.tryton.org/t/security-release-for-issue-12428
 CVE-2023-4513 (BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 
3.6.0 to  ...)
- wireshark 4.0.8-1
+   [bookworm] - wireshark  (Minor issue)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19259
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-25.html
 CVE-2023-4512 (CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial 
of serv ...)
- wireshark 4.0.8-1
+   [bookworm] - wireshark  (Minor issue)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19144
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-23.html
 CVE-2023-4511 (BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 
3.6.0 t ...)
- wireshark 4.0.8-1
+   [bookworm] - wireshark  (Minor issue)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19258
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-24.html
 CVE-2023-4230 (A vulnerability has been identified in ioLogik 4000 Series 
(ioLogik E4 ...)
@@ -1715,6 +1721,7 @@ CVE-2023-32560 (An attacker can send a specially crafted 
message to the Wavelink
NOT-FOR-US: Ivanti
 CVE-2023-39418 (A vulnerability was found in PostgreSQL with the use of the 
MERGE comm ...)
- postgresql-15 15.4-1
+   [bookworm] - postgresql-15  (Minor issue, fix along with 
next round of updates)
- postgresql-13  (Only affects 15.x)
- postgresql-11  (Only affects 15.x)
NOTE: https://www.postgresql.org/support/security/CVE-2023-39418/
@@ -1722,7 +1729,9 @@ CVE-2023-39418 (A vulnerability was found in PostgreSQL 
with the use of the MERG
NOTE: 
https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=cb2ae5741f2458a474ed3c31458d242e678ff229
 (REL_15_4)
 CVE-2023-39417 (IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was 
found in Po ...)
- postgresql-15 15.4-1
+   [bookworm] - postgresql-15  (Minor issue, fix along with 
next round of updates)
- postgresql-13 
+   [bullseye] - postgresql-13  (Minor issue, fix along with 
next round of updates)
- postgresql-11 
NOTE: https://www.postgresql.org/support/security/CVE-2023-39417/
NOTE: 
https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/
@@ -50311,6 +50320,8 @@ CVE-2022-45583
RESERVED
 CVE-2022-45582 (Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 
thru 20.1. ...)
- horizon 3:23.1.0-3
+   [bookworm] - horizon  (Minor issue)
+   [bullseye] - horizon  (Minor issue)
NOTE: https://bugs.launchpad.net/horizon/+bug/1982676
NOTE: 
https://opendev.org/openstack/horizon/commit/beed6bf6f6f83df9972db5fb539d64175ce12ce9
 (19.4.0)
NOTE: 
https://opendev.org/openstack/horizon/commit/2f600272bfffb3024e6f06a369f9b4768dd1a0b0
 (20.1.4)
@@ -65091,6 +65102,7 @@ CVE-2022-41445 (A cross-site scripting (XSS) 
vulnerability in Record Management
NOT-FOR-US: Record Management System
 CVE-2022-41444 (Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via 
crafted P ...)
- cacti 1.2.22+ds1-1
+   [bullseye] - cacti  (Minor issue)
NOTE: https://gist.github.com/enferas/9079535112e4f4ff2c1d2ce1c099d4c2
NOTE: Fixed by: 
https://github.com/Cacti/cacti/commit/ccb8b62de0f27f59d5e6073c2ae577a9ca7adaf8 
(release/1.2.22)
 CVE-2022-41443 (phpipam v1.5.0 was discovered to contain a header injection 
vulnerabil ...)
@@ -142406,18 +142418,28 @@ CVE-2021-40267
RESERVED
 CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in 
PluginTIFF.cpp is vul ...)
- freeimage 
+   [bookworm] - freeimage  (Minor issue)
+   [bullseye] - freeimage  (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/334/
 CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad 
function ...)
- freeimage 
+   [bookworm] - freeimage  (Minor issue)
+   [bullseye] - freeimage  (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/337/
 CVE-2021-40264 (NULL pointer dereference vulnerability in FreeImage before 
1.18.0 via  ...)
- freeimage 
+   [bookworm] - freeimage  (Minor issue)
+   [bullseye] - freeimage  (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/335/
 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
295a6867 by Moritz Muehlenhoff at 2023-08-24T10:58:32+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -113,6 +113,7 @@ CVE-2023-4041 (Buffer Copy without Checking Size of Input 
('Classic Buffer Overf
 CVE-2023-41105 (An issue was discovered in Python 3.11 through 3.11.4. If a 
path conta ...)
- python3.12 
- python3.11 
+   [bookworm] - python3.11  (Minor issue)
- python3.10  (Vulnerable code introduced in 3.11.y)
- python3.9  (Vulnerable code introduced in 3.11.y)
- python3.7  (Vulnerable code introduced in 3.11.y)
@@ -238,6 +239,8 @@ CVE-2022-48571 (memcached 1.6.7 allows a Denial of Service 
via multi-packet uplo
NOTE: Fixed by: 
https://github.com/memcached/memcached/commit/6b319c8c7a29e9c353dec83dc92f01905f6c8966
 (1.6.8)
 CVE-2022-48570 (Crypto++ through 8.4 contains a timing side channel in ECDSA 
signature ...)
- libcrypto++ 
+   [bookworm] - libcrypto++  (Minor issue)
+   [bullseye] - libcrypto++  (Minor issue)
NOTE: https://github.com/weidai11/cryptopp/issues/992
NOTE: This issue exists because the CVE-2019-14318 fix was 
intentionally removed for
NOTE: functionality reasons.
@@ -308,6 +311,7 @@ CVE-2023- [RUSTSEC-2023-0053: rustls-webpki: CPU denial 
of service in certif
NOTE: https://github.com/briansmith/webpki/issues/69
 CVE-2023- [RUSTSEC-2023-0052 webpki: CPU denial of service in certificate 
path building]
- rust-webpki  (bug #1050299)
+   [bookworm] - rust-webpki  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0052.html
NOTE: https://github.com/briansmith/webpki/issues/69
 CVE-2023-32184
@@ -18260,6 +18264,7 @@ CVE-2023-29453
RESERVED
 CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> 
Geograph ...)
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
[bullseye] - zabbix  (vulnerable code introduced later)
[buster] - zabbix  (vulnerable code introduced later)
NOTE: https://support.zabbix.com/browse/ZBX-22981
@@ -40763,6 +40768,8 @@ CVE-2022-48175 (Rukovoditel v3.2.1 was discovered to 
contain a remote code execu
NOT-FOR-US: Rukovoditel
 CVE-2022-48174 (There is a stack overflow vulnerability in ash.c:6030 in 
busybox befor ...)
- busybox 
+   [bookworm] - busybox  (Minor issue)
+   [bullseye] - busybox  (Minor issue)
NOTE: https://bugs.busybox.net/show_bug.cgi?id=15216
NOTE: 
https://git.busybox.net/busybox/commit/?id=d417193cf37ca1005830d7e16f5fa7e1d8a44209
 CVE-2022-48173
@@ -59580,6 +59587,8 @@ CVE-2022-43359 (Gifdec commit 
1dcbae19363597314f6623010cc80abad4e47f7c was disco
NOT-FOR-US: Gifdec
 CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function 
Sass::C ...)
- libsass 
+   [bookworm] - libsass  (Minor issue)
+   [bullseye] - libsass  (Minor issue)
NOTE: https://github.com/sass/libsass/issues/3178
 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function 
Sass::Co ...)
TODO: check
@@ -131765,7 +131774,7 @@ CVE-2021-43400 (An issue was discovered in 
gatt-database.c in BlueZ 5.61. A use-
 CVE-2021-43399 (The Yubico YubiHSM YubiHSM2 library 2021.08, included in the 
yubihsm-s ...)
NOT-FOR-US: yubihsm-shell
 CVE-2021-43398 (Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing 
leakage in ...)
-   - libcrypto++  (unimportant; bug #1000227)
+   NOTE: Disputed Crypto++ issue, also see #1000227
NOTE: https://github.com/weidai11/cryptopp/issues/1080
NOTE: As per upstream believed to be the expected behaviour:
NOTE: 
https://github.com/weidai11/cryptopp/issues/1080#issuecomment-99649


=
data/dsa-needed.txt
=
@@ -78,6 +78,8 @@ samba/oldstable
 --
 tiff
 --
+trafficserver
+--
 wpewebkit/oldstable
 --
 xrdp/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
42035754 by Moritz Muehlenhoff at 2023-08-23T20:08:10+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -76583,6 +76583,7 @@ CVE-2022-37051 (An issue was discovered in Poppler 
22.07.0. There is a reachable
NOTE: Fixed by: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4631115647c1e4f0482ffe0491c2f38d2231337b
 (poppler-22.08.0)
 CVE-2022-37050 (In Poppler 22.07.0, PDFDoc::savePageAs in PDFDoc.c callows 
attackers t ...)
- poppler 22.08.0-2
+   [bullseye] - poppler  (Minor issue)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274
NOTE: Fixed by: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/dcd5bd8238ea448addd102ff045badd0aca1b990
 (poppler-22.08.0)
 CVE-2022-37049 (The component tcpprep in Tcpreplay v4.4.1 was discovered to 
contain a  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/420357547f16bdae35d1d5d5c11c0feac392a446

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/420357547f16bdae35d1d5d5c11c0feac392a446
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6768eaac by Moritz Muehlenhoff at 2023-08-23T14:38:29+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -59,16 +59,19 @@ CVE-2023-38906 (An issue in TPLink Smart bulb Tapo series 
L530 v.1.0.0 and Tapo
 CVE-2023-38732 (IBM Robotic Process Automation 21.0.0 through 21.0.7 server 
could allo ...)
NOT-FOR-US: IBM
 CVE-2023-38668 (Stack-based buffer over-read in disasm in nasm 2.16 allows 
attackers t ...)
-   - nasm 
+   - nasm  (unimportant)
NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392811
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-38667 (Stack-based buffer over-read in function disasm in nasm 2.16 
allows at ...)
-   - nasm 
+   - nasm  (unimportant)
NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392812
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-38666 (Bento4 v1.6.0-639 was discovered to contain a segmentation 
violation v ...)
NOT-FOR-US: Bento4
 CVE-2023-38665 (Null pointer dereference in ieee_write_file in nasm 2.16rc0 
allows att ...)
-   - nasm 
+   - nasm  (unimportant)
NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392818
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-37440 (A vulnerability in the web-based management interfaceof 
EdgeConnect SD ...)
NOT-FOR-US: Aruba
 CVE-2023-37439 (Multiple vulnerabilities in the web-based managementinterface 
of EdgeC ...)
@@ -219,6 +222,7 @@ CVE-2023-38976 (An issue in weaviate v.1.20.0 allows a 
remote attacker to cause
NOT-FOR-US: weaviate
 CVE-2023-38961 (Buffer Overflwo vulnerability in JerryScript Project 
jerryscript v.3.0 ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/5092
 CVE-2023-38899 (SQL injection vulnerability in berkaygediz O_Blog v.1.0 allows 
a local ...)
NOT-FOR-US: berkaygediz O_Blog



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6768eaac994a336a215479bc645a202cbee8f4ba

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6768eaac994a336a215479bc645a202cbee8f4ba
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
9784d119 by Moritz Muehlenhoff at 2023-08-23T13:13:39+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -73177,6 +73177,7 @@ CVE-2022-38350
RESERVED
 CVE-2022-38349 (An issue was discovered in Poppler 22.08.0. There is a 
reachable asser ...)
- poppler 22.12.0-2
+   [bullseye] - poppler  (Minor issue)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282
NOTE: Fixed by: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4564a002bcb6094cc460bc0d5ddff9423fe6dd28
 (poppler-22.09.0)
 CVE-2022-38348
@@ -76566,10 +76567,12 @@ CVE-2022-37053 (TRENDnet TEW733GR v1.03B01 is 
vulnerable to Command injection vi
NOT-FOR-US: Trendnet
 CVE-2022-37052 (A reachable Object::getString assertion in Poppler 22.07.0 
allows atta ...)
- poppler 22.08.0-2
+   [bullseye] - poppler  (Minor issue)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278
NOTE: Fixed by: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/8677500399fc2548fa816b619580c2c07915a98c
 (poppler-22.08.0)
 CVE-2022-37051 (An issue was discovered in Poppler 22.07.0. There is a 
reachable abort ...)
- poppler 22.08.0-2
+   [bullseye] - poppler  (Minor issue)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276
NOTE: Fixed by: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4631115647c1e4f0482ffe0491c2f38d2231337b
 (poppler-22.08.0)
 CVE-2022-37050 (In Poppler 22.07.0, PDFDoc::savePageAs in PDFDoc.c callows 
attackers t ...)
@@ -77653,6 +77656,8 @@ CVE-2022-36649
RESERVED
 CVE-2022-36648 (The hardware emulation in the of_dpa_cmd_add_l2_flood of 
rocker device ...)
- qemu 
+   [bookworm] - qemu  (Minor issue, revisit when fixed upstream)
+   [bullseye] - qemu  (Minor issue, revisit when fixed upstream)
NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.html
 CVE-2022-36647 (PKUVCL davs2 v1.6.205 was discovered to contain a global 
buffer overfl ...)
- davs2  (bug #1019358)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9784d1197bea2444c63c6db292da3f297cffbea8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9784d1197bea2444c63c6db292da3f297cffbea8
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-23 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ab4493a4 by Moritz Muehlenhoff at 2023-08-23T12:28:33+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -18085,6 +18085,8 @@ CVE-2023-29459 (The laola.redbull application through 
5.1.9-R for Android expose
NOT-FOR-US: laola.redbull
 CVE-2023-29458 (Duktape is an 3rd-party embeddable JavaScript engine, with a 
focus on  ...)
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
[buster] - zabbix  (vulnerable code introduced later)
NOTE: This appears to be bug in Zabbix's use of duktape, not an issue 
in src:duktape per se
NOTE: https://support.zabbix.com/browse/ZBX-22989
@@ -18092,18 +18094,26 @@ CVE-2023-29458 (Duktape is an 3rd-party embeddable 
JavaScript engine, with a foc
 CVE-2023-29457 (Reflected XSS attacks, occur when a malicious script is 
reflected off  ...)
{DLA-3538-1}
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22988
 CVE-2023-29456 (URL validation scheme receives input from a user and then 
parses it to ...)
{DLA-3538-1}
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22987
 CVE-2023-29455 (Reflected XSS attacks, also known as non-persistent attacks, 
occur whe ...)
{DLA-3538-1}
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22986
 CVE-2023-29454 (Stored or persistent cross-site scripting (XSS) is a type of 
XSS where ...)
{DLA-3538-1}
- zabbix 
+   [bookworm] - zabbix  (Minor issue)
+   [bullseye] - zabbix  (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22985
 CVE-2023-29453
RESERVED
@@ -19169,11 +19179,11 @@ CVE-2023-1791 (A vulnerability has been found in 
SourceCodester Simple Task Allo
 CVE-2023-1790 (A vulnerability, which was classified as problematic, was found 
in Sou ...)
NOT-FOR-US: SourceCodester Simple Task Allocation System
 CVE-2023-28938 (Uncontrolled resource consumption in some Intel(R) SSD Tools 
software  ...)
-   - mdadm 
+   - mdadm 
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html
TODO: check details, fixes should be somewhere prior to mdadm-4.2-rc2
 CVE-2023-28736 (Buffer overflow in some Intel(R) SSD Tools software before 
version mda ...)
-   - mdadm 
+   - mdadm 
NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html
TODO: check details, fixes should be somewhere prior to mdadm-4.2-rc2
 CVE-2023-28717
@@ -45573,8 +45583,9 @@ CVE-2022-47071 (In NVS365 V01, the background network 
test function can trigger
 CVE-2022-47070 (NVS365 V01 is vulnerable to Incorrect Access Control. After 
entering a ...)
NOT-FOR-US: NVS365 V01
 CVE-2022-47069 (p7zip 16.02 was discovered to contain a heap-buffer-overflow 
vulnerabi ...)
-   - p7zip 
+   - p7zip  (unimportant)
NOTE: https://sourceforge.net/p/p7zip/bugs/241/
+   NOTE: Crash in CLI tool, no security impact
 CVE-2022-47068
RESERVED
 CVE-2022-47067
@@ -85001,6 +85012,8 @@ CVE-2022-34039
RESERVED
 CVE-2022-34038 (Etcd v3.5.4 allows remote attackers to cause a denial of 
service via f ...)
- etcd 
+   [bookworm] - etcd  (Minor issue)
+   [bullseye] - etcd  (Minor issue)
NOTE: https://github.com/etcd-io/etcd/pull/14022
NOTE: https://github.com/etcd-io/etcd/pull/14452
NOTE: Fixed by: 
https://github.com/etcd-io/etcd/commit/5a315ef88fbfa454e02d27b0b8acb4f89457cd90
@@ -223972,9 +223985,10 @@ CVE-2020-19911
 CVE-2020-19910
RESERVED
 CVE-2020-19909 (Integer overflow vulnerability in tool_operate.c in curl 
7.65.2 via cr ...)
-   - curl 7.66.0-1
+   - curl 7.66.0-1 (unimportant)
NOTE: https://github.com/curl/curl/pull/4166
NOTE: Fixed by: 
https://github.com/curl/curl/commit/db0a0dfb0eb41d39273b0590b992df58f38b9a4d 
(curl-7_66_0)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2020-19908
RESERVED
 CVE-2020-19907 (A command injection vulnerability in the sandcat plugin of 
Caldera 2.3 ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab4493a4a6698de08f74da2a1816649ee55fdc6c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab4493a4a6698de08f74da2a1816649ee55fdc6c
You're receiving this email because of your account on salsa.debian.org.



[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-20 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2731639a by Moritz Muehlenhoff at 2023-08-20T17:06:29+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1270,6 +1270,8 @@ CVE-2023-34545 (A SQL injection vulnerability in CSZCMS 
1.3.0 allows remote atta
NOT-FOR-US: CSZCMS
 CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table 
accounting error ...)
- grpc 
+   [bookworm] - grpc  (Minor issue)
+   [bullseye] - grpc  (Minor issue)
[buster] - grpc  (recheck when upstream patch is 
available/published)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2230890
NOTE: https://cloud.google.com/support/bulletins#gcp-2023-022
@@ -14726,6 +14728,8 @@ CVE-2023-30578
RESERVED
 CVE-2023-30577 (AMANDA (Advanced Maryland Automatic Network Disk Archiver) 
before tag- ...)
- amanda 
+   [bookworm] - amanda  (Minor issue)
+   [bullseye] - amanda  (Minor issue)
NOTE: 
https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3
NOTE: https://github.com/zmanda/amanda/pull/228
 CVE-2023-30576 (Apache Guacamole 0.9.10 through 1.5.1 may continue to 
reference a free ...)
@@ -17923,6 +17927,7 @@ CVE-2023-29410 (A CWE-20: Improper Input Validation 
vulnerability exists that co
 CVE-2023-29409 (Extremely large RSA keys in certificate chains can cause a 
client/serv ...)
- golang-1.20 1.20.7-1
- golang-1.19 1.19.12-1
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
[bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
@@ -63673,6 +63678,7 @@ CVE-2022-41715 (Programs which compile regular 
expressions from untrusted source
- golang-1.18 1.18.7-1
- golang-1.17 
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://go.dev/issue/55949
@@ -214441,6 +214447,7 @@ CVE-2020-24188 (Cross-site scripting (XSS) 
vulnerability in the search functiona
NOT-FOR-US: United Planet Intrexx Professional
 CVE-2020-24187 (An issue was discovered in ecma-helpers.c in jerryscript 
version 2.3.0 ...)
- iotjs 
+   [bullseye] - iotjs  (Minor issue)
NOTE: https://github.com/jerryscript-project/jerryscript/issues/4076
 CVE-2020-24186 (A Remote Code Execution vulnerability exists in the gVectors 
wpDiscuz  ...)
NOT-FOR-US: gVectors wpDiscuz plugin for WordPress



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2731639a18ec1ab2c4b4975ebf606fa610544a5f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2731639a18ec1ab2c4b4975ebf606fa610544a5f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
50054c99 by Moritz Muehlenhoff at 2023-08-16T13:22:36+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -440,6 +440,8 @@ CVE-2023-4105 (Mattermost fails to delete the attachments 
when deleting a messag
 CVE-2023-40267 (GitPython before 3.1.32 does not block insecure non-multi 
options in c ...)
{DLA-3502-1}
- python-git  (bug #1043503)
+   [bookworm] - python-git  (Minor issue)
+   [bullseye] - python-git  (Minor issue)
NOTE: https://github.com/gitpython-developers/GitPython/pull/1609
NOTE: 
https://github.com/gitpython-developers/GitPython/commit/5c59e0d63da6180db8a0b349f0ad36fef42aceed
 (3.1.32)
 CVE-2023-40260 (EmpowerID before 7.205.0.1 allows an attacker to bypass an MFA 
(multi  ...)
@@ -5825,6 +5827,8 @@ CVE-2023-34471 (AMI SPx contains a vulnerability in the 
BMC where a user may cau
NOT-FOR-US: AMI SPx
 CVE-2023-34457 (MechanicalSoup is a Python library for automating interaction 
with web ...)
- python-mechanicalsoup  (bug #1041814)
+   [bookworm] - python-mechanicalsoup  (Minor issue)
+   [bullseye] - python-mechanicalsoup  (Minor issue)
NOTE: 
https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4
NOTE: 
https://github.com/MechanicalSoup/MechanicalSoup/commit/d57c4a269bba3b9a0c5bfa20292955b849006d9e
 (v1.3.0)
 CVE-2023-34338 (AMI SPx contains a vulnerability in the BMC where an Attacker 
may caus ...)
@@ -193123,6 +193127,7 @@ CVE-2021-20252 (A flaw was found in Red Hat 3scale 
API Management Platform 2. Th
 CVE-2021-20251 (A flaw was found in samba. A race condition in the password 
lockout co ...)
[experimental] - samba 2:4.17.1+dfsg-1
- samba 2:4.17.2+dfsg-3
+   [bullseye] - samba  (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14611
NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2708
 CVE-2021-20250 (A flaw was found in wildfly. The JBoss EJB client has publicly 
accessi ...)
@@ -345053,7 +345058,7 @@ CVE-2018-14629 (A denial of service vulnerability was 
discovered in Samba's LDAP
 CVE-2018-14628 (An information leak vulnerability was discovered in Samba's 
LDAP serve ...)
- samba  (bug #1034803)
[bookworm] - samba  (Minor issue, revisit when fixed 
upstream)
-   [bullseye] - samba  (Minor issue, revisit when fixed 
upstream)
+   [bullseye] - samba  (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=13595
 CVE-2018-14627 (The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 
does not h ...)
- wildfly  (bug #752018)


=
data/dsa-needed.txt
=
@@ -18,6 +18,8 @@ chromium
 --
 cinder/oldstable
 --
+fastdds
+--
 frr (aron)
   maintainer proposed to update to 8.4.4 for bookworm, which might be a good 
idea
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/50054c991c4e62a7de9dd70a49ffd22507ba5e34

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/50054c991c4e62a7de9dd70a49ffd22507ba5e34
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ef344f17 by Moritz Muehlenhoff at 2023-08-15T18:04:26+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -198729,11 +198729,12 @@ CVE-2020-28842
 CVE-2020-28841 (MyDrivers64.sys in DriverGenius 9.61.3708.3054 allows 
attackers to cau ...)
NOT-FOR-US: DriverGenius
 CVE-2020-28840 (Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel 
jhead ve ...)
-   - jhead 1:3.06.0.1-2
+   - jhead 1:3.06.0.1-2 (unimportant)
NOTE: https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820
NOTE: 
https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da
 (3.06.0.1)
NOTE: https://github.com/Matthias-Wandel/jhead/issues/8
NOTE: 
https://github.com/Fstark-prog/jhead/security/advisories/GHSA-xh27-xwgj-gqw2
+   NOTE: Crash in CLI tool, no security impact
 CVE-2020-28839
RESERVED
 CVE-2020-28838 (Cross Site Request Forgery (CSRF) in CART option in OpenCart 
Ltd. Open ...)
@@ -209868,6 +209869,7 @@ CVE-2020-25721 (Kerberos acceptors need easy access 
to stable AD identifiers (eg
 CVE-2020-25720
RESERVED
- samba 2:4.17.8+dfsg-1
+   [bullseye] - samba  (Domain controller functionality is EOLed, 
see DSA DSA-5477-1)
NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14810
NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2514
NOTE: 
https://gitlab.com/samba-team/samba/-/commit/cc64ea24daa649dc8de4a212c7abfbe111095655



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef344f17682c9467b21654fa7a484cb9d8075521

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef344f17682c9467b21654fa7a484cb9d8075521
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1fd8bdc5 by Moritz Muehlenhoff at 2023-08-15T09:33:37+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -76,6 +76,8 @@ CVE-2023-40305 (GNU indent 2.2.13 has a heap-based buffer 
overflow in search_bra
NOTE: https://savannah.gnu.org/bugs/index.php?64503
 CVE-2023-40303 (GNU inetutils through 2.4 may allow privilege escalation 
because of un ...)
- inetutils  (bug #1049365)
+   [bookworm] - inetutils  (Minor issue)
+   [bullseye] - inetutils  (Minor issue)
NOTE: 
https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6
NOTE: 
https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg0.html
 CVE-2023-40296 (async-sockets-cpp through 0.3.1 has a stack-based buffer 
overflow in R ...)


=
data/dsa-needed.txt
=
@@ -19,6 +19,8 @@ cinder/oldstable
 frr (aron)
   maintainer proposed to update to 8.4.4 for bookworm, which might be a good 
idea
 --
+libreswan (jmm)
+--
 librsvg
 --
 linux (carnil)
@@ -70,6 +72,8 @@ ruby-tzinfo/oldstable
 --
 salt/oldstable
 --
+samba/oldstable
+--
 tiff
 --
 wpewebkit/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1fd8bdc5e4f8292b4ecdea51d6c75c7d501732c7

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1fd8bdc5e4f8292b4ecdea51d6c75c7d501732c7
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-06 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
16f66a18 by Moritz Muehlenhoff at 2023-08-06T23:51:57+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -243,7 +243,11 @@ CVE-2023-33665 (ai-dev aitable before v0.2.2 was 
discovered to contain a SQL inj
NOT-FOR-US: ai-dev aitable
 CVE-2023-38497 (Cargo downloads the Rust project\u2019s dependencies and 
compiles the  ...)
- cargo 
+   [bookworm] - cargo  (Minor issue)
+   [bullseye] - cargo  (Minor issue)
- rust-cargo 
+   [bookworm] - rust-cargo  (Minor issue)
+   [bullseye] - rust-cargo  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/08/03/2
NOTE: 
https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497
NOTE: 
https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87
@@ -527,7 +531,7 @@ CVE-2023-33383 (Shelly 4PM Pro four-channel smart switch 
0.11.0 allows an attack
 CVE-2023-33257 (Verint Engagement Management 15.3 Update 2023R2 is vulnerable 
to HTML  ...)
NOT-FOR-US: Verint Engagement Management
 CVE-2023-4016 (Under some circumstances, this weakness allows a user who has 
access t ...)
-   - procps  (bug #1042887)
+   - procps  (bug #1042887)
NOTE: https://gitlab.com/procps-ng/procps/-/issues/297
 CVE-2023-3739 (Insufficient validation of untrusted input in Chromad in Google 
Chrome ...)
{DSA-5456-1}
@@ -1553,6 +1557,7 @@ CVE-2023-3248 (The All-in-one Floating Contact Form 
WordPress plugin before 2.1.
NOT-FOR-US: WordPress plugin
 CVE-2023-38060 (Improper Input Validation vulnerability in the ContentType 
parameter f ...)
- znuny 6.5.3-1
+   NOTE: 
https://github.com/znuny/Znuny/commit/355800e68c1560c1d098ec0953ee9940d2d1f836
 CVE-2023-38058 (An improper privilege check in the OTRS ticket move action in 
the agen ...)
NOT-FOR-US: OTRS
NOTE: Issue is listed as specific to 8.x, so won't affect Znuny which 
forked from 6.x
@@ -1949,6 +1954,8 @@ CVE-2023-37733 (An arbitrary file upload vulnerability in 
tduck-platform v4.0 al
NOT-FOR-US: Grav CMStduck-platform
 CVE-2023-37276 (aiohttp is an asynchronous HTTP client/server framework for 
asyncio an ...)
- python-aiohttp 
+   [bookworm] - python-aiohttp  (Minor issue)
+   [bullseye] - python-aiohttp  (Minor issue)
NOTE: 
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-45c4-8wx5-qw6w
NOTE: 
https://github.com/aio-libs/aiohttp/commit/9337fb3f2ab2b5f38d7e98a194bde6f7e3d16c40
NOTE: https://hackerone.com/reports/2001873



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/16f66a182d0737180f801c002ac8fda900a19a6d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/16f66a182d0737180f801c002ac8fda900a19a6d
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-08-04 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c963e58a by Moritz Mühlenhoff at 2023-08-04T20:17:53+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -259,6 +259,8 @@ CVE-2023-3971
NOT-FOR-US: Red Hat Ansible Automation Controller
 CVE-2023-34320 [arm: Guests can trigger a deadlock on Cortex-A77]
- xen 
+   [bookworm] - xen  (Minor issue)
+   [bullseye] - xen  (Minor issue)
[buster] - xen  (DSA 4677-1)
NOTE: https://www.openwall.com/lists/oss-security/2023/08/01/1
NOTE: https://xenbits.xen.org/xsa/advisory-436.html
@@ -670,6 +672,8 @@ CVE-2023-34916 (Fuge CMS v1.0 contains an Open Redirect 
vulnerability via /front
NOT-FOR-US: Fuge CMS
 CVE-2023-34872 (A vulnerability in Outline.cc for Poppler prior to 23.06.0 
allows a re ...)
- poppler  (bug #1042811)
+   [bookworm] - poppler  (Minor issue)
+   [bullseye] - poppler  (Minor issue)
NOTE: 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe
 (poppler-23.06.0)
NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399
 CVE-2023-34842 (Remote Code Execution vulnerability in DedeCMS through 5.7.109 
allows  ...)


=
data/dsa-needed.txt
=
@@ -16,8 +16,7 @@ aom/oldstable
 --
 chromium (jmm)
 --
-cjose
-  Maintainer asked to prepare updates
+cjose (jmm)
 --
 cinder/oldstable
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c963e58a842c13ccd133979ce7f28c9dd9d85a8f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c963e58a842c13ccd133979ce7f28c9dd9d85a8f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-31 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8fd8ff2d by Moritz Muehlenhoff at 2023-07-31T14:20:22+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -940,6 +940,8 @@ CVE-2023-35134 (Weintek Weincloud v0.13.6   could allow an 
attacker to reset a p
NOT-FOR-US: Weincloud
 CVE-2023-34478 (Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be 
susceptible to a  ...)
- shiro 
+   [bookworm] - shiro  (Minor issue)
+   [bullseye] - shiro  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/07/24/4
 CVE-2023-34429 (Weintek Weincloud v0.13.6 could allow an attacker to cause 
a denia ...)
NOT-FOR-US: Weincloud
@@ -60322,6 +60324,7 @@ CVE-2022-41725 (A denial of service is possible from 
excessive resource consumpt
[experimental] - golang-1.19 1.19.6-1
- golang-1.19 1.19.6-2
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
@@ -60331,6 +60334,7 @@ CVE-2022-41724 (Large handshake records may cause 
panics in crypto/tls. Both cli
[experimental] - golang-1.19 1.19.6-1
- golang-1.19 1.19.6-2
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11  (Vulnerable code introduced later)
NOTE: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
NOTE: https://go.dev/issue/58001
@@ -60342,6 +60346,7 @@ CVE-2022-41723 (A maliciously crafted HTTP/2 stream 
could cause excessive CPU co
[experimental] - golang-1.19 1.19.6-1
- golang-1.19 1.19.6-2
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
- golang-golang-x-net 1:0.7.0+dfsg-1
@@ -60381,6 +60386,7 @@ CVE-2022-41717 (An attacker can cause excessive memory 
growth in a Go server acc
- golang-1.19 1.19.4-1
- golang-1.18 1.18.9-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
- golang-golang-x-net 1:0.4.0+dfsg-1


=
data/dsa-needed.txt
=
@@ -21,6 +21,8 @@ cinder/oldstable
 frr (aron)
   maintainer proposed to update to 8.4.4 for bookworm, which might be a good 
idea
 --
+librsvg
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y and 6.1.y versions
@@ -42,7 +44,10 @@ ntpsec (carnil)
 openjdk-11/oldstable (jmm)
   needs asmtools backport in bullseye
 --
+openjdk-17/oldstable (jmm)
+--
 orthanc (jmm)
+  needs ca-certificates-java fix for bookworm
 --
 php-cas/oldstable
 --
@@ -87,7 +92,9 @@ sox
   all issues unfixed upstream
   for CVE-2023-34432, rest can be ignored
 --
-wpewebkit
+tiff
+--
+wpewebkit/oldstable
 --
 xrdp/oldstable
   needs some additional clarification, tentatively DSA worthy



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fd8ff2d62d95782afe0e51e5835d12f9cfc63bc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fd8ff2d62d95782afe0e51e5835d12f9cfc63bc
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
382d6ed2 by Moritz Muehlenhoff at 2023-07-26T22:13:16+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -73,17 +73,17 @@ CVE-2023-39174 (In JetBrains TeamCity before 2023.05.2 a 
ReDoS attack was possib
 CVE-2023-39173 (In JetBrains TeamCity before 2023.05.2 a token with limited 
permission ...)
NOT-FOR-US: JetBrains TeamCity
 CVE-2023-39130 (GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a 
heap bu ...)
-   - gdb 
+   - gdb  (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30641
-   TODO: check details
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-39129 (GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a 
heap us ...)
-   - gdb 
+   - gdb  (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30640
-   TODO: check details
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-39128 (GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a 
stack o ...)
-   - gdb 
+   - gdb  (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30639
-   TODO: check details
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-38555 (Authentication bypass vulnerability in Fujitsu network devices 
Si-R se ...)
NOT-FOR-US: Fujitsu network devices
 CVE-2023-38503 (Directus is a real-time API and App dashboard for managing SQL 
databas ...)
@@ -85813,6 +85813,7 @@ CVE-2022-32189 (A too-short encoded message can cause a 
panic in Float.GobDecode
- golang-1.18 1.18.5-1
- golang-1.17 1.17.13-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://go.dev/issue/53871
@@ -85917,6 +85918,7 @@ CVE-2022-32148 (Improper exposure of client IP 
addresses in net/http before Go 1
- golang-1.18 1.18.4-1
- golang-1.17 1.17.13-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://github.com/golang/go/issues/53423
@@ -144286,8 +144288,14 @@ CVE-2021-37819 (PDF Labs pdftk-java v3.2.3 was 
discovered to contain an infinite
[buster] - pdftk-java  (Minor issue)
- pdftk 2.02-5
- libitext-java 
+   [bookworm] - libitext-java  (Minor issue)
+   [bullseye] - libitext-java  (Minor issue)
- libitext1-java 
+   [bookworm] - libitext1-java  (Minor issue)
+   [bullseye] - libitext1-java  (Minor issue)
- libitext5-java 
+   [bookworm] - libitext5-java  (Minor issue)
+   [bullseye] - libitext5-java  (Minor issue)
NOTE: https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21
NOTE: 
https://gitlab.com/pdftk-java/pdftk/-/commit/75deacdf5c46fd4eefb310c784eb9dfdc7b9fdc9
 (v3.3.0)
NOTE: 
https://gitlab.com/pdftk-java/pdftk/-/commit/9b0cbb76c8434a8505f02ada02a94263dcae9247
 (v3.3.0)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/382d6ed28384a98a00745ca2d2647ab82cb9c929

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/382d6ed28384a98a00745ca2d2647ab82cb9c929
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-24 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bb8ce9ac by Moritz Muehlenhoff at 2023-07-24T12:53:10+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -566,6 +566,8 @@ CVE-2018-25088 (A vulnerability, which was classified as 
critical, was found in
NOT-FOR-US: Blue Yonder postgraas_server
 CVE-2023-3724 (If a TLS 1.3 client gets neither a PSK (pre shared key) 
extension nor  ...)
- wolfssl  (bug #1041699)
+   [bookworm] - wolfssl  (Minor issue)
+   [bullseye] - wolfssl  (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/pull/6412
NOTE: 
https://github.com/wolfSSL/wolfssl/commit/00f1eddee429ff51390b20caadd2eb6afe51e1aa
 (v5.6.2-stable)
 CVE-2023-3714 (The ProfileGrid plugin for WordPress is vulnerable to 
unauthorized mod ...)
@@ -696,8 +698,9 @@ CVE-2023-37770 (faust commit ee39a19 was discovered to 
contain a stack overflow
NOTE: Negligible security impact
 CVE-2023-37769 (stress-test master commit e4c878 was discovered to contain a 
FPE vulne ...)
- pixman 
+   [bookworm] - pixman  (Minor issue)
+   [bullseye] - pixman  (Minor issue)
NOTE: https://gitlab.freedesktop.org/pixman/pixman/-/issues/76
-   TODO: check, not clear if the issue only in the stress-test binary or 
affecting as well the library
 CVE-2023-37479 (Open Enclave is a hardware-agnostic open source library for 
developing ...)
NOT-FOR-US: Open Enclave
 CVE-2023-37476 (OpenRefine is a free, open source tool for data processing. A 
carefull ...)
@@ -5424,6 +5427,8 @@ CVE-2023-3140 (Missing HTTP headers (X-Frame-Options, 
Content-Security-Policy) i
NOT-FOR-US: KNIME Business Hub
 CVE-2023-34237 (SABnzbd is an open source automated Usenet download tool. A 
design fla ...)
- sabnzbdplus 4.0.2+dfsg-1 (bug #1038949)
+   [bookworm] - sabnzbdplus  (Minor issue)
+   [bullseye] - sabnzbdplus  (Minor issue)
NOTE: 
https://github.com/sabnzbd/sabnzbd/commit/422b4fce7bfd56e95a315be0400cdfdc585df7cc
 (4.0.2RC2)
NOTE: 
https://github.com/sabnzbd/sabnzbd/commit/e3a722664819d1c7c8fab97144cc299b1c18b429
 (4.0.2RC2)
NOTE: 
https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-hhgh-xgh3-985r
@@ -65801,6 +65806,7 @@ CVE-2022-39265 (MyBB is a free and open source forum 
software. The _Mail Setting
NOT-FOR-US: MyBB
 CVE-2022-39264 (nheko is a desktop client for the Matrix communication 
application. Al ...)
- nheko 0.10.2-1
+   [bullseye] - nheko  (Vulnerable code not present)
[buster] - nheko  (Vulnerable code not present)
NOTE: 
https://github.com/Nheko-Reborn/nheko/security/advisories/GHSA-8jcp-8jq4-5mm7
NOTE: 
https://github.com/Nheko-Reborn/nheko/commit/67bee15a389f9b8a9f6c3a340558d1e2319e7199
 (v0.10.2)
@@ -97668,6 +97674,7 @@ CVE-2022-28132
 CVE-2022-28131 (Uncontrolled recursion in Decoder.Skip in encoding/xml before 
Go 1.17. ...)
- golang-1.18 1.18.4-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://github.com/golang/go/issues/53614


=
data/dsa-needed.txt
=
@@ -55,6 +55,8 @@ php-horde-turba/oldstable
 --
 py7zr/oldstable
 --
+python-django (jmm)
+--
 python-glance-store/oldstable
 --
 python-os-brick/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb8ce9ace77483ce137fb502a9265477525637cf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb8ce9ace77483ce137fb502a9265477525637cf
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
119aca37 by Moritz Muehlenhoff at 2023-07-16T21:14:44+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -322,6 +322,8 @@ CVE-2023-3319 (Improper Neutralization of Input During Web 
Page Generation ('Cro
NOT-FOR-US: PlatPlay DSr
 CVE-2023-38199 (coreruleset (aka OWASP ModSecurity Core Rule Set) through 
3.3.4 does n ...)
- modsecurity-crs  (bug #1041109)
+   [bookworm] - modsecurity-crs  (Minor issue)
+   [bullseye] - modsecurity-crs  (Minor issue)
NOTE: https://github.com/coreruleset/coreruleset/issues/3191
NOTE: https://github.com/coreruleset/coreruleset/pull/3237
 CVE-2023-38198 (acme.sh before 3.0.6 runs arbitrary commands from a remote 
server via  ...)
@@ -3840,13 +3842,15 @@ CVE-2023-34867 (Jerryscript 3.0 (commit 05dbbd1) was 
discovered to contain an As
 CVE-2023-34865 (Directory traversal vulnerability in ujcms 6.0.2 allows 
attackers to m ...)
NOT-FOR-US: ujcms
 CVE-2023-34824 (fdkaac before 1.0.5 was discovered to contain a heap buffer 
overflow i ...)
-   - fdkaac  (bug #1038951)
+   - fdkaac  (unimportant; bug #1038951)
NOTE: https://github.com/nu774/fdkaac/issues/55
NOTE: 
https://github.com/nu774/fdkaac/commit/22dbf72491541aa854835fdf2a9a0d92532728d8 
(v1.0.5)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-34823 (fdkaac before 1.0.5 was discovered to contain a stack overflow 
in read ...)
-   - fdkaac  (bug #1038951)
+   - fdkaac  (unimportant; bug #1038951)
NOTE: https://github.com/nu774/fdkaac/issues/55
NOTE: 
https://github.com/nu774/fdkaac/commit/22dbf72491541aa854835fdf2a9a0d92532728d8 
(v1.0.5)
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-34756 (bloofox v0.5.2.1 was discovered to contain a SQL injection 
vulnerabili ...)
NOT-FOR-US: bloofox
 CVE-2023-34755 (bloofox v0.5.2.1 was discovered to contain a SQL injection 
vulnerabili ...)
@@ -4916,8 +4920,11 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with 
use of yajl_tree_parse
NOTE: Introduced with: 
https://github.com/lloyd/yajl/commit/cfa9f8fcb12d80dd5ebf94f5e6a607aab4d225fb 
(2.0.0)
NOTE: The original fix uploaded as 2.1.0-3.1 was incomplete.
- burp 
+   [bookworm] - burp  (Minor issue)
+   [bullseye] - burp  (Minor issue)
[buster] - burp  (Minor issue; fix only after newer releases 
got a fix)
- epics-base 
+   [bookworm] - epics-base  (Minor issue)
[buster] - epics-base  (Minor issue; fix only after newer 
releases got a fix)
- r-cran-jsonlite 
[bookworm] - r-cran-jsonlite  (Minor issue)
@@ -6628,6 +6635,8 @@ CVE-2023-33203 (The Linux kernel before 6.2.9 has a race 
condition and resultant
NOTE: 
https://git.kernel.org/linus/6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 (6.3-rc4)
 CVE-2023-33201 (Bouncy Castle For Java before 1.74 is affected by an LDAP 
injection vu ...)
- bouncycastle  (bug #1040050)
+   [bookworm] - bouncycastle  (Minor issue)
+   [bullseye] - bouncycastle  (Minor issue)
NOTE: https://github.com/bcgit/bc-java/wiki/CVE-2023-33201
 CVE-2023-31729 (TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command 
Injection.)
NOT-FOR-US: TOTOLINK
@@ -13339,6 +13348,7 @@ CVE-2023-29407
 CVE-2023-29406 (The HTTP/1 client does not fully validate the contents of the 
Host hea ...)
- golang-1.20 1.20.6-1
- golang-1.19 1.19.11-1
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
- golang-1.11 
NOTE: https://groups.google.com/g/golang-announce/c/2q13H6LEEx0
@@ -106475,7 +106485,10 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL 
JSON parsing and generation
[bookworm] - yajl  (Minor issue)
[bullseye] - yajl  (Minor issue)
- burp  (bug #1040146)
+   [bookworm] - burp  (Minor issue)
+   [bullseye] - burp  (Minor issue)
- epics-base  (bug #1040159)
+   [bookworm] - epics-base  (Minor issue)
- r-cran-jsonlite  (bug #1040161)
[bookworm] - r-cran-jsonlite  (Minor issue)
[bullseye] - r-cran-jsonlite  (Minor issue)
@@ -152746,6 +152759,7 @@ CVE-2021-33797 (Buffer-overflow in jsdtoa.c in 
Artifex MuJS in versions 1.0.1 to
NOTE: 
https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550 
(1.1.2)
 CVE-2021-33796 (In MuJS before version 1.1.2, a use-after-free flaw in the 
regexp sour ...)
- mujs 1.1.3-2
+   [bullseye] - mujs  (Minor issue)
NOTE: 
https://github.com/ccxvii/mujs/commit/7ef066a3bb95bf83e7c5be50d859e62e58fe8515 
(1.1.2)
 CVE-2021-3573 (A use-after-free in function hci_sock_bound_ioctl() of the 
Linux kerne ...)
{DLA-2690-1 DLA-2689-1}
@@ 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7dace96e by Moritz Muehlenhoff at 2023-07-16T19:59:28+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -657,6 +657,7 @@ CVE-2023-37196 (A CWE-89: Improper Neutralization of 
Special Elements vulnerabil
NOT-FOR-US: Schneider Electric
 CVE-2023-37174 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to 
contain a seg ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2505
NOTE: 
https://github.com/gpac/gpac/commit/549ff4484246f2bc4d5fec6760332b43774db483
@@ -1546,6 +1547,7 @@ CVE-2023-3528 (A vulnerability was found in ThinuTech 
ThinuCMS 1.5. It has been
NOT-FOR-US: ThinuTech ThinuCMS
 CVE-2023-3523 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 
2.2.2.)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac/
NOTE: 
https://github.com/gpac/gpac/commit/64201a26476c12a7dbd7ffb5757743af6954db96
@@ -4368,9 +4370,13 @@ CVE-2023-33557 (Fuel CMS v1.5.2 was discovered to 
contain a SQL injection vulner
NOT-FOR-US: Fuel CMS
 CVE-2023-32732 (gRPC contains a vulnerability whereby a client can cause a 
termination ...)
- grpc 
+   [bookworm] - grpc  (Minor issue)
+   [bullseye] - grpc  (Minor issue)
NOTE: https://github.com/grpc/grpc/pull/32309
 CVE-2023-32731 (When gRPC HTTP2 stack raised a header size exceeded error, it 
skipped  ...)
- grpc 
+   [bookworm] - grpc  (Minor issue)
+   [bullseye] - grpc  (Minor issue)
NOTE: https://github.com/grpc/grpc/pull/32309
NOTE: https://github.com/grpc/grpc/pull/33005
 CVE-2023-32312 (UmbracoIdentityExtensions is an Umbraco add-on package that 
enables ea ...)
@@ -1,6 +16672,8 @@ CVE-2023-1429 (Cross-site Scripting (XSS) - Reflected 
in GitHub repository pimco
NOT-FOR-US: pimcore
 CVE-2023-1428 (There exists an vulnerability causing an abort() to be called 
in gRPC. ...)
- grpc 
+   [bookworm] - grpc  (Minor issue)
+   [bullseye] - grpc  (Minor issue)
NOTE: 
https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8 
(v1.54.0-pre1)
 CVE-2023-1427 (- The Photo Gallery by 10Web WordPress plugin before 1.8.15 did 
not en ...)
NOT-FOR-US: WordPress plugin



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7dace96e208c4985be19716090774d0fc4b1a434

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7dace96e208c4985be19716090774d0fc4b1a434
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cb137028 by Moritz Muehlenhoff at 2023-07-16T15:15:09+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -96,11 +96,13 @@ CVE-2023-38325 (The cryptography package before 41.0.2 for 
Python mishandles SSH
NOTE: Fixed by: 
https://github.com/pyca/cryptography/commit/1ca7adc97b76a9dfbd3d850628b613eb93b78fc3
 (main)
NOTE: Fixed by: 
https://github.com/pyca/cryptography/commit/e190ef190525999d1f599cf8c3aef5cb7f3a8bc4
 (41.0.2)
 CVE-2023-38253 (An out-of-bounds read flaw was found in w3m, in the 
growbuf_to_Str fun ...)
-   - w3m 
+   - w3m  (unimportant)
NOTE: https://github.com/tats/w3m/issues/271
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-38252 (An out-of-bounds read flaw was found in w3m, in the 
Strnew_size functi ...)
-   - w3m 
+   - w3m  (unimportant)
NOTE: https://github.com/tats/w3m/issues/270
+   NOTE: Crash in CLI tool, no security impact
 CVE-2023-37474 (Copyparty is a portable file server. Versions prior to 1.8.2 
are subje ...)
NOT-FOR-US: copyparty
 CVE-2023-37473 (zenstruck/collections is a set of helpers for 
iterating/paginating/fil ...)
@@ -619,22 +621,27 @@ CVE-2023-3023 (The WP EasyCart plugin for WordPress is 
vulnerable to time-based
NOT-FOR-US: WP EasyCart plugin for WordPress
 CVE-2023-3019 [e1000e: heap use-after-free in e1000e_write_packet_to_guest()]
- qemu  (bug #1041102)
+   [bookworm] - qemu  (Minor issue)
+   [bullseye] - qemu  (Minor issue)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59243
NOTE: Proposed upstream patch: 
https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg08310.html
 CVE-2023-3011 (The ARMember plugin for WordPress is vulnerable to Cross-Site 
Request  ...)
NOT-FOR-US: ARMember plugin for WordPress
 CVE-2023-37767 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to 
contain a seg ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2514
NOTE: 
https://github.com/gpac/gpac/commit/d414df635c773b21bbb3a9fbf17b101b1e8ea345
 CVE-2023-37766 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to 
contain a seg ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2516
NOTE: 
https://github.com/gpac/gpac/commit/a64c60ef0983be6db8ab1e4a663e0ce83ff7bf2c
 CVE-2023-37765 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to 
contain a seg ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2515
NOTE: 
https://github.com/gpac/gpac/commit/36e1b9900ff638576cb88636bbbe2116ed06dfdc
@@ -789,6 +796,7 @@ CVE-2023-36825 (Decidim is a participatory democracy 
framework, written in Ruby
NOT-FOR-US: Decidim
 CVE-2023-36824 (Redis is an in-memory database that persists on disk. In Redit 
7.0 pri ...)
- redis 5:7.0.12-1 (bug #1040879)
+   [bookworm] - redis  (Minor issue)
[bullseye] - redis  (Vulnerable code introduced later)
[buster] - redis  (Vulnerable code introduced later)
NOTE: 
https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3


=
data/dsa-needed.txt
=
@@ -18,8 +18,13 @@ cjose
 --
 cinder/oldstable
 --
+frr
+  maintainer proposed to update to 8.4.4 for bookworm-stable, which might be a 
good idea
+--
 iperf3 (aron)
 --
+kanboard (jmm)
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y and 6.1.y versions
@@ -71,6 +76,10 @@ salt/oldstable
 --
 samba/oldstable
 --
+sox
+  all issues unfixed upstream
+  for CVE-2023-34432, rest can be ignored
+--
 wpewebkit
 --
 xrdp/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb13702815ca326ed196f2d6df6a2e05d6539618

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb13702815ca326ed196f2d6df6a2e05d6539618
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-10 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
10e64aab by Moritz Muehlenhoff at 2023-07-10T17:25:16+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -382,6 +382,8 @@ CVE-2023-35939 (GLPI is a free asset and IT management 
software package. Startin
NOTE: Only supported behind an authenticated HTTP zone
 CVE-2023-35936 (Pandoc is a Haskell library for converting from one markup 
format to a ...)
- pandoc 
+   [bookworm] - pandoc  (Minor issue)
+   [bullseye] - pandoc  (Minor issue)
NOTE: 
https://github.com/jgm/pandoc/security/advisories/GHSA-xj5q-fv23-575g
NOTE: 
https://github.com/jgm/pandoc/commit/5e381e3878b5da87ee7542f7e51c3c1a7fd84b89 
(3.1.4)
 CVE-2023-3515 (Open Redirect in GitHub repository go-gitea/gitea prior to 
1.19.4.)
@@ -487,6 +489,8 @@ CVE-2023-34150 (** UNSUPPORTED WHEN ASSIGNED **Use of 
TikaEncodingDetector in Ap
NOT-FOR-US: Apache Any23
 CVE-2023-3255 [VNC: infinite loop in inflate_buffer() leads to denial of 
service]
- qemu 
+   [bookworm] - qemu  (Minor issue)
+   [bullseye] - qemu  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2218486
NOTE: Proposed patch: 
https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg00596.html
 CVE-2023-37212 (Memory safety bugs present in Firefox 114. Some of these bugs 
showed e ...)
@@ -786,9 +790,13 @@ CVE-2023-3478 (A vulnerability classified as critical was 
found in IBOS OA 4.5.5
NOT-FOR-US: IBOS OA
 CVE-2023-37365 (Hnswlib 0.7.0 has a double free in init_index when the M 
argument is a ...)
- hnswlib 
+   [bookworm] - hnswlib  (Minor issue)
+   [bullseye] - hnswlib  (Minor issue)
NOTE: https://github.com/nmslib/hnswlib/issues/467
 CVE-2023-37360 (pacparser_find_proxy in Pacparser before 1.4.2 allows 
JavaScript injec ...)
- pacparser 
+   [bookworm] - pacparser  (Minor issue)
+   [bullseye] - pacparser  (Minor issue)
NOTE: 
https://github.com/manugarg/pacparser/security/advisories/GHSA-62q6-v997-f7v9
NOTE: 
https://github.com/manugarg/pacparser/commit/0bf0636de624996fe202b51eec8a58abd774269e
 (v1.4.2)
 CVE-2023-37307 (In MISP before 2.4.172, title_for_layout is not properly 
sanitized in  ...)
@@ -24654,6 +24662,7 @@ CVE-2023-25400
RESERVED
 CVE-2023-25399 (A refcounting issue which leads to potential memory leak was 
discovere ...)
- scipy 1.10.0-2
+   [bullseye] - scipy  (Minor issue)
NOTE: https://github.com/scipy/scipy/issues/16235
NOTE: https://github.com/scipy/scipy/pull/16397
NOTE: Fixed by: 
https://github.com/scipy/scipy/commit/9b6521198c4f31d3f9cb525e581bea8e3e77f0a2 
(v1.10.0rc1)
@@ -105049,10 +105058,14 @@ CVE-2022-24795 (yajl-ruby is a C binding to the 
YAJL JSON parsing and generation
[buster] - ruby-yajl  (Minor issue)
[stretch] - ruby-yajl  (Minor issue)
- yajl 2.1.0-4 (bug #1040036)
+   [bookworm] - yajl  (Minor issue)
+   [bullseye] - yajl  (Minor issue)
- burp  (bug #1040146)
- crun  (bug #1040147)
- epics-base  (bug #1040159)
- r-cran-jsonlite  (bug #1040161)
+   [bookworm] - r-cran-jsonlite  (Minor issue)
+   [bullseye] - r-cran-jsonlite  (Minor issue)
- xqilla  (bug #1040164)
[bullseye] - xqilla  (Minor issue)
NOTE: 
https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm
@@ -382798,10 +382811,14 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for 
Ruby, when a crafted JSON file is
[stretch] - ruby-yajl  (Minor issue)
[jessie] - ruby-yajl  (Minor issue)
- yajl 2.1.0-4 (bug #1040036)
+   [bookworm] - yajl  (Minor issue)
+   [bullseye] - yajl  (Minor issue)
- burp  (bug #1040146)
- crun  (bug #1040147)
- epics-base  (bug #1040159)
- r-cran-jsonlite  (bug #1040161)
+   [bookworm] - r-cran-jsonlite  (Minor issue)
+   [bullseye] - r-cran-jsonlite  (Minor issue)
- xqilla  (bug #1040164)
[bullseye] - xqilla  (Minor issue)
NOTE: https://github.com/brianmario/yajl-ruby/issues/176



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10e64aabadd2744bb59ee1f8be5f869c5c5022d8

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10e64aabadd2744bb59ee1f8be5f869c5c5022d8
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-07-03 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ef1aa0ff by Moritz Muehlenhoff at 2023-07-03T17:30:39+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1330,6 +1330,8 @@ CVE-2023-31410 (A remote unprivileged attacker can 
intercept the communication v
NOT-FOR-US: SICK
 CVE-2023-2908 (A null pointer dereference issue was discovered in Libtiff's 
tif_dir.c ...)
- tiff 4.5.1~rc3-1
+   [bookworm] - tiff  (Minor issue)
+   [bullseye] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/479
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
 (v4.5.1rc1)
 CVE-2023-2907 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
@@ -19228,10 +19230,11 @@ CVE-2023-26967
RESERVED
 CVE-2023-26966 (libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() 
when lib ...)
- tiff 4.5.1~rc3-1
+   [bookworm] - tiff  (Minor issue)
+   [bullseye] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/530
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/473
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/b0e1c25dd1d065200c8d8f59ad0afe014861a1b9
 (v4.5.1rc1)
-   TODO: check
 CVE-2023-26965 (loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a 
heap-ba ...)
- tiff 4.5.1~rc3-1
[bookworm] - tiff  (Minor issue)
@@ -104277,6 +104280,7 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL 
JSON parsing and generation
- epics-base  (bug #1040159)
- r-cran-jsonlite  (bug #1040161)
- xqilla  (bug #1040164)
+   [bullseye] - xqilla  (Minor issue)
NOTE: 
https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm
NOTE: 
https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6
NOTE: 
https://github.com/brianmario/yajl-ruby/commit/e8de283a6d64f0902740fd09e858fc3d7d803161
@@ -382008,6 +382012,7 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, 
when a crafted JSON file is
- epics-base  (bug #1040159)
- r-cran-jsonlite  (bug #1040161)
- xqilla  (bug #1040164)
+   [bullseye] - xqilla  (Minor issue)
NOTE: https://github.com/brianmario/yajl-ruby/issues/176
NOTE: 
https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce
NOTE: yail: https://github.com/lloyd/yajl/issues/248



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef1aa0ff91ef2e78571718f393da36113ea369d4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef1aa0ff91ef2e78571718f393da36113ea369d4
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-29 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5936ceab by Moritz Muehlenhoff at 2023-06-29T16:04:51+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -65052,6 +65052,7 @@ CVE-2021-46834 (A permission bypass vulnerability in 
Huawei cross device task ma
 CVE-2020-36599 (lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and 
before  ...)
[experimental] - ruby-omniauth 2.0.4-1~exp1
- ruby-omniauth 2.0.4-2
+   [bullseye] - ruby-omniauth  (Minor issue)
[buster] - ruby-omniauth  (Minor issue)
NOTE: 
https://github.com/omniauth/omniauth/commit/43a396f181ef7d0ed2ec8291c939c95e3ed3ff00
 (v2.0.0-rc1)
 CVE-2020-36598
@@ -72262,6 +72263,7 @@ CVE-2022-2401 (Unrestricted information disclosure of 
all users in Mattermost ve
- mattermost-server  (bug #823556)
 CVE-2022-2400 (External Control of File Name or Path in GitHub repository 
dompdf/domp ...)
- php-dompdf 2.0.2+dfsg-1 (bug #1015874)
+   [bullseye] - php-dompdf  (Minor issue)
NOTE: https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a
NOTE: 
https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a
 CVE-2022-2399 (Use after free in WebGPU in Google Chrome prior to 
100.0.4896.88 allow ...)
@@ -82198,6 +82200,7 @@ CVE-2022-1962 (Uncontrolled recursion in the Parse 
functions in go/parser before
- golang-1.18 1.18.4-1
- golang-1.17 1.17.13-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://go.dev/issue/53616
@@ -86689,6 +86692,7 @@ CVE-2022-1705 (Acceptance of some invalid 
Transfer-Encoding headers in the HTTP/
- golang-1.18 1.18.4-1
- golang-1.17 1.17.13-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11  (Introduced in 1.15)
NOTE: https://go.dev/issue/53188
NOTE: 
https://github.com/golang/go/commit/e5017a93fcde94f09836200bca55324af037ee5f 
(go1.19rc1)
@@ -92740,7 +92744,7 @@ CVE-2022-1227 (A privilege escalation flaw was found in 
Podman. This flaw allows
- libpod 3.4.7+ds1-1
[bullseye] - libpod 3.0.1+dfsg1-3+deb11u2
- golang-github-containers-psgo 1.7.1+ds1-1 (bug #1020907)
-   [bullseye] - golang-github-containers-psgo 1.5.2-2~deb11u1
+   [bullseye] - golang-github-containers-psgo 1.5.2-1+deb11u1
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2070368
NOTE: https://github.com/containers/psgo/pull/92
NOTE: 
https://github.com/containers/psgo/commit/d9467da9f563a9de1ece79dcae86b37b1db75443
 (v1.7.2)
@@ -126108,6 +126112,7 @@ CVE-2021-42853 (It was discovered that the 
SteelCentral AppInternals Dynamic Sam
 CVE-2021-3902
RESERVED
- php-dompdf 2.0.2+dfsg-1
+   [bullseye] - php-dompdf  (Minor issue)
NOTE: https://github.com/dompdf/dompdf/issues/2564
NOTE: https://huntr.dev/bounties/a6071c07-806f-429a-8656-a4742e4191b1
 CVE-2021-3901 (firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF))
@@ -130261,6 +130266,7 @@ CVE-2021-41770 (Ping Identity PingFederate before 
10.3.1 mishandles pre-parsing
 CVE-2021-3838
RESERVED
- php-dompdf 2.0.2+dfsg-1
+   [bullseye] - php-dompdf  (Minor issue)
NOTE: https://github.com/dompdf/dompdf/issues/2564
NOTE: https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e
 CVE-2021-41769 (A vulnerability has been identified in SIPROTEC 5 6MD85 
devices (CPU v ...)
@@ -160782,6 +160788,7 @@ CVE-2021-29924
 CVE-2021-29923 (Go before 1.17 does not properly consider extraneous zero 
characters a ...)
- golang-1.16 
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, minor issue, 
follow bullseye DSAs/point-releases)
- golang-1.8 


=
data/dsa-needed.txt
=
@@ -22,6 +22,12 @@ ghostscript (carnil)
 --
 gpac/oldstable (jmm)
 --
+gst-plugins-base1.0 (jmm)
+--
+gst-plugins-bad1.0 (jmm)
+--
+gst-plugins-bad1.0 (jmm)
+--
 linux (carnil)
   Wait until more issues have piled up, though try to regulary rebase for point
   releases to more recent v5.10.y versions



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5936ceabfeaa1226e6dc1e82e854a848f2260327

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5936ceabfeaa1226e6dc1e82e854a848f2260327
You're receiving this email because of your account on salsa.debian.org.


___

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8ab4d6fb by Moritz Muehlenhoff at 2023-06-28T12:26:48+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -241,6 +241,8 @@ CVE-2023-2992 (An unauthenticated denial of service 
vulnerability exists in the
NOT-FOR-US: Lenovo
 CVE-2023-36675 (An issue was discovered in MediaWiki before 1.35.11, 1.36.x 
through 1. ...)
- mediawiki 
+   [bookworm] - mediawiki  (Fix in next security release)
+   [bullseye] - mediawiki  (Fix in next security release)
NOTE: https://gerrit.wikimedia.org/r/c/mediawiki/core/+/921452
NOTE: https://phabricator.wikimedia.org/T332889
 CVE-2023-3 (INEX IXP-Manager before 6.3.1 allows XSS. 
list-preamble.foil.php, page ...)
@@ -1356,6 +1358,8 @@ CVE-2023-31671 (PrestaShop postfinance <= 17.1.13 is 
vulnerable to SQL Injection
NOT-FOR-US: PrestaShop postfinance
 CVE-2023-2976 (Use of Java's default temporary directory for file creation in 
`FileBa ...)
- guava-libraries 32.0.1-1 (bug #1038979)
+   [bookworm] - guava-libraries  (Minor issue)
+   [bullseye] - guava-libraries  (Minor issue)
NOTE: https://github.com/google/guava/releases/tag/v32.0.0
NOTE: https://github.com/google/guava/issues/2575
 CVE-2023-35149 (A missing permission check in Jenkins Digital.ai App 
Management Publis ...)
@@ -2343,6 +2347,8 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with 
use of yajl_tree_parse
[bookworm] - r-cran-jsonlite  (Minor issue)
[bullseye] - r-cran-jsonlite  (Minor issue)
- ruby-yajl 
+   [bookworm] - ruby-yajl  (Minor issue)
+   [bullseye] - ruby-yajl  (Minor issue)
 CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in 
URIParser::parse , ...)
NOT-FOR-US: Sogou Workflow
 CVE-2023-33381 (A command injection vulnerability was found in the ping 
functionality  ...)
@@ -2552,6 +2558,8 @@ CVE-2023-34410 (An issue was discovered in Qt before 
5.15.15, 6.x before 6.2.9,
- qt6-base 6.4.2+dfsg-11 (bug #1037209)
[bookworm] - qt6-base  (Minor issue)
- qtbase-opensource-src 5.15.8+dfsg-12 (bug #1037210)
+   [bookworm] - qtbase-opensource-src  (Minor issue)
+   [bullseye] - qtbase-opensource-src  (Minor issue)
[buster] - qtbase-opensource-src  (Minor issue)
- qtbase-opensource-src-gles 
[bookworm] - qtbase-opensource-src-gles  (Minor issue)
@@ -3879,6 +3887,7 @@ CVE-2023-33285 (An issue was discovered in Qt 5.x before 
5.15.14, 6.x before 6.2
- qt6-base 6.4.2+dfsg-10 (bug #1036848)
[bookworm] - qt6-base  (Minor issue)
- qtbase-opensource-src 5.15.8+dfsg-11
+   [bullseye] - qtbase-opensource-src  (Minor issue)
[buster] - qtbase-opensource-src  (Minor issue)
- qtbase-opensource-src-gles 
[bookworm] - qtbase-opensource-src-gles  (Minor issue)
@@ -4042,6 +4051,7 @@ CVE-2019-25137 (Umbraco CMS 4.11.8 through 7.15.10, and 
7.12.4, allows Remote Co
 CVE-2023-32763 (An issue was discovered in Qt before 5.15.15, 6.x before 
6.2.9, and 6. ...)
- qt6-base 6.4.2+dfsg-8
- qtbase-opensource-src 5.15.8+dfsg-10
+   [bullseye] - qtbase-opensource-src  (Minor issue)
[buster] - qtbase-opensource-src  (Minor issue)
- qtbase-opensource-src-gles 5.15.8+dfsg-3 (bug #1036702)
[bullseye] - qtbase-opensource-src-gles  (Minor issue)
@@ -4054,6 +4064,7 @@ CVE-2023-32763 (An issue was discovered in Qt before 
5.15.15, 6.x before 6.2.9,
 CVE-2023-32762 (An issue was discovered in Qt before 5.15.14, 6.x before 
6.2.9, and 6. ...)
- qt6-base 6.4.2+dfsg-9
- qtbase-opensource-src 5.15.8+dfsg-10
+   [bullseye] - qtbase-opensource-src  (Minor issue)
[buster] - qtbase-opensource-src  (Can wait for next upload)
- qtbase-opensource-src-gles  (Not built in GLES variant)
NOTE: 
https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305
@@ -24400,6 +24411,7 @@ CVE-2023-24999 (HashiCorp Vault and Vault 
Enterprise\u2019s approle auth method
 CVE-2023-24998 (Apache Commons FileUpload before 1.5 does not limit the number 
of requ ...)
- tomcat10 10.1.5-1
- tomcat9 9.0.70-2
+   [bullseye] - tomcat9  (Minor issue, fix along with future 
update)
[buster] - tomcat9  (Minor issue)
- libcommons-fileupload-java 1.4-2 (bug #1031733)
[bullseye] - libcommons-fileupload-java  (Minor issue)
@@ -58600,6 +58612,7 @@ CVE-2022-40717 (This vulnerability allows 
network-adjacent attackers to execute
NOT-FOR-US: D-Link
 CVE-2022-40716 (HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, 
and 1.13. ...)
- consul  (bug #1027161)
+   [bullseye] - consul  (Minor issue)
[buster] - consul  (Vulnerable Code not 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-26 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
826bb966 by Moritz Muehlenhoff at 2023-06-26T18:43:04+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1021,9 +1021,9 @@ CVE-2023-3040 (A debug function in the lua-resty-json 
package, up to commit id 3
 CVE-2023-3036 (An unchecked read in NTP server in github.com/cloudflare/cfnts 
prior t ...)
NOT-FOR-US: cfnts
 CVE-2023-35116 (An issue was discovered jackson-databind thru 2.15.2 allows 
attackers  ...)
-   - jackson-databind 
-   [buster] - jackson-databind  (Minor issue)
+   NOTE: Disputed jackson-databind issue
NOTE: https://github.com/FasterXML/jackson-databind/issues/3972
+   NOTE: 
https://github.com/FasterXML/jackson-databind/issues/3972#issuecomment-1597218091
 CVE-2023-35110 (An issue was discovered jjson thru 0.1.7 allows attackers to 
cause a d ...)
NOT-FOR-US: jjson
 CVE-2023-34878 (An issue was discovered in Ujcms v6.0.2 allows attackers to 
gain sensi ...)
@@ -2094,6 +2094,8 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with 
use of yajl_tree_parse
- crun 
- epic-base 
- r-cran-jsonlite 
+   [bookworm] - r-cran-jsonlite  (Minor issue)
+   [bullseye] - r-cran-jsonlite  (Minor issue)
- ruby-yajl 
 CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in 
URIParser::parse , ...)
NOT-FOR-US: Sogou Workflow
@@ -20633,6 +20635,7 @@ CVE-2023-26131 (All versions of the package 
github.com/xyproto/algernon/engine;
NOT-FOR-US: github.com/xyproto/algernon/engine
 CVE-2023-26130 (Versions of the package yhirose/cpp-httplib before 0.12.4 are 
vulnerab ...)
- cpp-httplib  (bug #1037100)
+   [bookworm] - cpp-httplib  (Minor issue)
NOTE: 
https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194
NOTE: 
https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280
NOTE: 
https://github.com/yhirose/cpp-httplib/commit/5b397d455d25a391ba346863830c1949627b4d08
 (v0.12.4)
@@ -81671,6 +81674,7 @@ CVE-2022-32150
RESERVED
 CVE-2022-32149 (An attacker may cause a denial of service by crafting an 
Accept-Langua ...)
- golang-golang-x-text 0.3.8-1 (bug #1021785)
+   [bullseye] - golang-golang-x-text  (Minor issue)
- golang-x-text 
[buster] - golang-x-text  (Limited support, minor issue, 
follow bullseye DSAs/point-releases (renamed package))
NOTE: https://groups.google.com/g/golang-dev/c/qfPIly0X7aU
@@ -137849,6 +137853,7 @@ CVE-2021-38562 (Best Practical Request Tracker (RT) 
4.2 before 4.2.17, 4.4 befor
NOTE: 
https://github.com/bestpractical/rt/commit/d16f8cf13c2af517ee55a85e7b91a0267477189f
 (rt-4.2.17)
 CVE-2021-38561 (golang.org/x/text/language in golang.org/x/text before 0.3.7 
can panic ...)
- golang-golang-x-text 0.3.7-1
+   [bullseye] - golang-golang-x-text  (Minor issue)
- golang-x-text 
[buster] - golang-x-text  (Limited support, minor issue, 
follow bullseye DSAs/point-releases)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2100495



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/826bb96661a31e35b0686f5d23f6c83e61e97185

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/826bb96661a31e35b0686f5d23f6c83e61e97185
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-21 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d76a24f2 by Moritz Muehlenhoff at 2023-06-21T13:16:07+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -66,6 +66,8 @@ CVE-2023-3317 [wifi: mt76: mt7921: Fix use-after-free in fw 
features query]
NOTE: 
https://git.kernel.org/linus/2ceb76f734e37833824b7fab6af17c999eb48d2b (6.3-rc6)
 CVE-2023-3316 (A NULL pointer dereference in TIFFClose() is caused by a 
failure to op ...)
- tiff 4.5.1~rc3-1
+   [bookworm] - tiff  (Minor issue)
+   [bullseye] - tiff  (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/515
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/468
NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/d63de61b1ec3385f6383ef9a1f453e4b8b11d536
 (v4.5.1rc1)
@@ -9951,6 +9953,7 @@ CVE-2023-29403 (On Unix platforms, the Go runtime does 
not behave differently wh
- golang-1.20 1.20.5-1
[experimental] - golang-1.19 1.19.10-1
- golang-1.19 1.19.10-2
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
[bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
@@ -9963,6 +9966,7 @@ CVE-2023-29402 (The go command may generate unexpected 
code at build time when u
- golang-1.20 1.20.5-1
[experimental] - golang-1.19 1.19.10-1
- golang-1.19 1.19.10-2
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
[bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
@@ -17767,6 +17771,7 @@ CVE-2023-27043 (The email module of Python through 
3.11.3 incorrectly parses e-m
[bookworm] - python3.11  (Minor issue)
- python3.10 
- python3.9 
+   [bullseye] - python3.9  (Minor issue)
- python3.7 
- python2.7 
[bullseye] - python2.7  (Unsupported in Bullseye, only 
included to build a few applications)
@@ -89067,6 +89072,7 @@ CVE-2022-29526 (Go before 1.17.10 and 1.18.x before 
1.18.2 has Incorrect Privile
- golang-1.18 1.18.2-1
- golang-1.17 1.17.10-1
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11  (Vulnerable code introduced later)
- golang-1.8  (Vulnerable code introduced later)
- golang-1.7  (Vulnerable code introduced later)
@@ -94572,6 +94578,7 @@ CVE-2022-27664 (In net/http in Go before 1.18.6 and 
1.19.x before 1.19.1, attack
- golang-1.18 1.18.6-1
- golang-1.17 
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, minor issue, 
follow bullseye DSAs/point-releases)
- golang-golang-x-net 1:0.0+git20221012.0b7e1fb+dfsg-1
@@ -103197,6 +103204,7 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended 
version of the C reference implem
[bullseye] - ghostwriter  (Vulnerable code not present)
[buster] - ghostwriter  (Vulnerable code not present)
- python-cmarkgfm 0.7.0-1 (bug #1006758)
+   [bullseye] - python-cmarkgfm  (Minor issue)
[buster] - python-cmarkgfm  (Minor issue)
- ruby-commonmarker 0.23.4-1 (bug #1006759)
[bullseye] - ruby-commonmarker  (Minor issue)


=
data/dsa-needed.txt
=
@@ -78,6 +78,8 @@ salt/oldstable
 --
 samba/oldstable
 --
+trafficserver (jmm)
+--
 wpewebkit
 --
 xrdp/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d76a24f2a838b7314f74de9d1baaff1c10be7d49

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d76a24f2a838b7314f74de9d1baaff1c10be7d49
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-20 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
05fb674b by Moritz Muehlenhoff at 2023-06-20T14:59:40+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -3184,6 +3184,7 @@ CVE-2023-2481 (Compiler removal of buffer clearing in 
sli_se_opaque_import_k
 CVE-2023-33204 (sysstat through 12.7.2 allows a multiplication integer 
overflow in che ...)
{DLA-3434-1}
- sysstat  (bug #1036294)
+   [bookworm] - sysstat  (Minor issue)
[bullseye] - sysstat  (Incomplete fix for CVE-2022-39377 
not applied)
NOTE: https://github.com/sysstat/sysstat/pull/360
NOTE: 
https://github.com/sysstat/sysstat/commit/6f8dc568e6ab072bb8205b732f04e685bf9237c0
@@ -9848,6 +9849,7 @@ CVE-2023-29405 (The go command may execute arbitrary code 
at build time when usi
- golang-1.19 1.19.10-2
[bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support)
NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924
@@ -9862,6 +9864,7 @@ CVE-2023-29404 (The go command may execute arbitrary code 
at build time when usi
- golang-1.19 1.19.10-2
[bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support)
NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924
@@ -9873,6 +9876,7 @@ CVE-2023-29403 (On Unix platforms, the Go runtime does 
not behave differently wh
[experimental] - golang-1.19 1.19.10-1
- golang-1.19 1.19.10-2
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support)
NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924
@@ -9884,6 +9888,7 @@ CVE-2023-29402 (The go command may generate unexpected 
code at build time when u
[experimental] - golang-1.19 1.19.10-1
- golang-1.19 1.19.10-2
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support)
NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924
@@ -9892,6 +9897,8 @@ CVE-2023-29402 (The go command may generate unexpected 
code at build time when u
NOTE: 
https://github.com/golang/go/commit/c160b49b6d328c86bd76ca2fff9009a71347333f 
(go.1.19.10)
 CVE-2023-29401 (The filename parameter of the Context.FileAttachment function 
is not p ...)
- golang-github-gin-gonic-gin  (bug #1037530)
+   [bookworm] - golang-github-gin-gonic-gin  (Minor issue)
+   [bullseye] - golang-github-gin-gonic-gin  (Minor issue)
[buster] - golang-github-gin-gonic-gin  (Minor issue)
NOTE: https://github.com/gin-gonic/gin/issues/3555
NOTE: 
https://github.com/gin-gonic/gin/commit/2d4bbec941551479b1fdf1e54ece03e6e82a7e72
 (v1.9.1)
@@ -9902,6 +9909,7 @@ CVE-2023-29400 (Templates containing actions in unquoted 
HTML attributes (e.g. "
[bookworm] - golang-1.19  (Minor issue)
[bullseye] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Minor issue)
NOTE: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
@@ -24843,6 +24851,7 @@ CVE-2023-24540 (Not all valid JavaScript whitespace 
characters are considered to
[bookworm] - golang-1.19  (Minor issue)
[bullseye] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Minor issue)
NOTE: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
@@ -24856,6 +24865,7 @@ CVE-2023-24539 (Angle brackets (<>) are not considered 
dangerous characters when
[bookworm] - golang-1.19  (Minor issue)
[bullseye] - golang-1.19  (Minor issue)
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Minor issue)
NOTE: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU
@@ -24867,6 +24877,7 @@ CVE-2023-24538 (Templates do not properly consider 
backticks (`) as Javascript s
[experimental] - golang-1.19 1.19.8-1
- golang-1.19 1.19.8-2
- golang-1.15 
+   [bullseye] - golang-1.15  (Minor issue)
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8
@@ -24878,6 +24889,7 @@ CVE-2023-24537 (Calling any of the Parse functions on 
Go source code which conta

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-19 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b3ab1ada by Moritz Muehlenhoff at 2023-06-19T23:00:08+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -395,6 +395,8 @@ CVE-2023-2683 (A memory leak in the EFR32 Bluetooth LE 
stack 5.1.0 through 5.1.1
NOT-FOR-US: silabs Bluetooth SDK
 CVE-2023- [RUSTSEC-2023-0038: Out-of-bounds array access leads to panic]
- rust-sequoia-openpgp 1.16.0-1
+   [bookworm] - rust-sequoia-openpgp  (Minor issue)
+   [bullseye] - rust-sequoia-openpgp  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0038.html
 CVE-2023-3193 (Cross-site scripting (XSS) vulnerability in the Layout module's 
SEO co ...)
NOT-FOR-US: Liferay
@@ -55063,6 +55065,7 @@ CVE-2022-41723 (A maliciously crafted HTTP/2 stream 
could cause excessive CPU co
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
- golang-golang-x-net 1:0.7.0+dfsg-1
+   [bullseye] - golang-golang-x-net  (Minor issue)
NOTE: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E
NOTE: https://go.dev/issue/57855
 CVE-2022-41722 (A path traversal vulnerability exists in filepath.Clean on 
Windows. On ...)
@@ -55101,6 +55104,7 @@ CVE-2022-41717 (An attacker can cause excessive memory 
growth in a Go server acc
- golang-1.11 
[buster] - golang-1.11  (Limited support, follow bullseye 
DSAs/point-releases)
- golang-golang-x-net 1:0.4.0+dfsg-1
+   [bullseye] - golang-golang-x-net  (Minor issue)
- golang-golang-x-net-dev 
[buster] - golang-golang-x-net-dev  (Limited support, follow 
bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU
@@ -94408,6 +94412,7 @@ CVE-2022-27664 (In net/http in Go before 1.18.6 and 
1.19.x before 1.19.1, attack
- golang-1.11 
[buster] - golang-1.11  (Limited support, minor issue, 
follow bullseye DSAs/point-releases)
- golang-golang-x-net 1:0.0+git20221012.0b7e1fb+dfsg-1
+   [bullseye] - golang-golang-x-net  (Minor issue)
- golang-golang-x-net-dev 
[buster] - golang-golang-x-net-dev  (Limited support, follow 
bullseye DSAs/point-releases)
NOTE: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s
@@ -151504,6 +151509,7 @@ CVE-2021-32838 (Flask-RESTX (pypi package 
flask-restx) is a community driven for
NOT-FOR-US: Flask restx
 CVE-2021-32837 (mechanize, a library for automatically interacting with HTTP 
web serve ...)
- python-mechanize 1:0.4.7-1
+   [bullseye] - python-mechanize  (Minor issue)
NOTE: 
https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/
NOTE: 
https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6
 (v0.4.6)
 CVE-2021-32836 (ZStack is open source IaaS(infrastructure as a service) 
software. In Z ...)
@@ -190305,6 +190311,7 @@ CVE-2020-35914 (An issue was discovered in the 
lock_api crate before 0.4.2 for R
[bullseye] - rust-lock-api  (Minor issue)
[buster] - rust-lock-api  (Minor issue)
- rust-lock-api-0.1  (bug #1032854)
+   [bullseye] - rust-lock-api-0.1  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0070.html
NOTE: https://github.com/Amanieu/parking_lot/pull/262
 CVE-2020-35913 (An issue was discovered in the lock_api crate before 0.4.2 for 
Rust. A ...)
@@ -190312,6 +190319,7 @@ CVE-2020-35913 (An issue was discovered in the 
lock_api crate before 0.4.2 for R
[bullseye] - rust-lock-api  (Minor issue)
[buster] - rust-lock-api  (Minor issue)
- rust-lock-api-0.1  (bug #1032854)
+   [bullseye] - rust-lock-api-0.1  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0070.html
NOTE: https://github.com/Amanieu/parking_lot/pull/262
 CVE-2020-35912 (An issue was discovered in the lock_api crate before 0.4.2 for 
Rust. A ...)
@@ -190319,6 +190327,7 @@ CVE-2020-35912 (An issue was discovered in the 
lock_api crate before 0.4.2 for R
[bullseye] - rust-lock-api  (Minor issue)
[buster] - rust-lock-api  (Minor issue)
- rust-lock-api-0.1  (bug #1032854)
+   [bullseye] - rust-lock-api-0.1  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0070.html
NOTE: https://github.com/Amanieu/parking_lot/pull/262
 CVE-2020-35911 (An issue was discovered in the lock_api crate before 0.4.2 for 
Rust. A ...)
@@ -190326,6 +190335,7 @@ CVE-2020-35911 (An issue was discovered in the 
lock_api crate before 0.4.2 for R
[bullseye] - rust-lock-api  (Minor issue)
[buster] - rust-lock-api  (Minor issue)
- rust-lock-api-0.1  (bug #1032854)
+   [bullseye] - 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-19 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
89ead2a8 by Moritz Muehlenhoff at 2023-06-19T17:40:13+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -809,6 +809,8 @@ CVE-2015-10118 (A vulnerability classified as problematic 
was found in cchetanon
NOT-FOR-US: WordPress plugin
 CVE-2023-3195 (A stack-based buffer overflow issue was found in ImageMagick's 
coders/ ...)
- imagemagick 
+   [bookworm] - imagemagick  (Minor issue)
+   [bullseye] - imagemagick  (Minor issue)
[buster] - imagemagick  (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/05/29/1
NOTE: ImageMagick6: 
https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023
 (6.9.12-26)
@@ -1363,6 +1365,8 @@ CVE-2023-33477 (In Harmonic NSG 9000-6G devices, an 
authenticated remote user ca
NOT-FOR-US: Harmonic NSG 9000-6G devices
 CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with use of 
yajl_tree_parse functi ...)
- yajl 
+   [bookworm] - yajl  (Minor issue)
+   [bullseye] - yajl  (Minor issue)
[buster] - yajl  (Minor issue)
NOTE: https://github.com/lloyd/yajl/issues/250
 CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in 
URIParser::parse , ...)
@@ -2563,6 +2567,8 @@ CVE-2023-27529 (Wacom Tablet Driver installer prior to 
6.4.2-1 (for macOS) conta
NOT-FOR-US: Wacom Tablet Driver installer
 CVE-2023- [Block themes parsing shortcodes in user-generated data]
- wordpress 6.2.2+dfsg1-1 (bug #1036689)
+   [bookworm] - wordpress  (Minor issue, fix along in future 
update)
+   [bullseye] - wordpress  (Minor issue, fix along in future 
update)
NOTE: 
https://wordpress.org/news/2023/05/wordpress-6-2-2-security-release/
 CVE-2023-33983 (The Introduction Client in Briar through 1.5.3 does not 
implement out- ...)
- briar  (bug #1019932)
@@ -3135,6 +3141,8 @@ CVE-2023-2756 (SQL Injection in GitHub repository 
pimcore/customer-data-framewor
NOT-FOR-US: pimcore
 CVE-2023-2745 (WordPress Core is vulnerable to Directory Traversal in versions 
up to, ...)
- wordpress 6.2.1+dfsg1-1 (bug #1036296)
+   [bookworm] - wordpress  (Minor issue, fix along in future 
update)
+   [bullseye] - wordpress  (Minor issue, fix along in future 
update)
NOTE: https://core.trac.wordpress.org/changeset?old=55765=55765
NOTE: 
https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/
 CVE-2023-2679 (Data leakage in Adobe connector in Snow Software SPE 9.27.0 on 
Windows ...)
@@ -9342,6 +9350,7 @@ CVE-2012-10010 (A vulnerability was found in BestWebSoft 
Contact Form 3.21. It h
NOT-FOR-US: WordPress plugin
 CVE-2023-32665 [GVariant deserialisation does not match spec for non-normal 
data]
- glib2.0 2.74.4-1
+   [bullseye] - glib2.0  (Minor issue)
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2121
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126
@@ -9351,6 +9360,7 @@ CVE-2023-32665 [GVariant deserialisation does not match 
spec for non-normal data
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2841
 CVE-2023-32611 [g_variant_byteswap() can take a long time with some non-normal 
inputs]
- glib2.0 2.74.4-1
+   [bullseye] - glib2.0  (Minor issue)
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2797
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126
@@ -9360,6 +9370,7 @@ CVE-2023-32611 [g_variant_byteswap() can take a long time 
with some non-normal i
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2841
 CVE-2023-29499 [GVariant offset table entry size is not checked in is_normal()]
- glib2.0 2.74.4-1
+   [bullseye] - glib2.0  (Minor issue)
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2794
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126
@@ -11895,6 +11906,7 @@ CVE-2023-28766 (A vulnerability has been identified in 
SIPROTEC 5 6MD85 (CP300)
 CVE-2023-25180
RESERVED
- glib2.0 2.74.4-1
+   [bullseye] - glib2.0  (Minor issue)
NOTE: 
https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126
@@ -11906,6 +11918,7 @@ CVE-2023-25180
 CVE-2023-24593
RESERVED
- glib2.0 2.74.4-1
+   [bullseye] - glib2.0  (Minor issue)

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-18 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
76306029 by Moritz Muehlenhoff at 2023-06-18T21:22:39+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -21,6 +21,7 @@ CVE-2023-3295 (The Unlimited Elements For Elementor (Free 
Widgets, Addons, Templ
NOT-FOR-US: WordPress plugin
 CVE-2023-35790 (An issue was discovered in dec_patch_dictionary.cc in libjxl 
before 0. ...)
- jpeg-xl 
+   [bookworm] - jpeg-xl  (Minor issue)
NOTE: https://github.com/libjxl/libjxl/pull/2551
NOTE: 
https://github.com/libjxl/libjxl/commit/d4e67a644d8babe7cb68de122d8b5ccb2ad8f226
 CVE-2023-35789 (An issue was discovered in the C AMQP client library (aka 
rabbitmq-c)  ...)
@@ -3746,6 +3747,7 @@ CVE-2023- [several critical memory corruption 
vulnerabilities]
 CVE-2023-32573 (In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 
6.3.x thro ...)
- qt6-svg 6.4.2-2
- qtsvg-opensource-src 5.15.8-3
+   [bullseye] - qtsvg-opensource-src  (Minor issue)
[buster] - qtsvg-opensource-src  (Minor issue)
- qt4-x11 
NOTE: https://codereview.qt-project.org/c/qt/qtsvg/+/474093
@@ -9593,6 +9595,7 @@ CVE-2023-29405 (The go command may execute arbitrary code 
at build time when usi
- golang-1.20 1.20.5-1
[experimental] - golang-1.19 1.19.10-1
- golang-1.19 1.19.10-2
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
- golang-1.11 
NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924
@@ -9605,6 +9608,7 @@ CVE-2023-29404 (The go command may execute arbitrary code 
at build time when usi
- golang-1.20 1.20.5-1
[experimental] - golang-1.19 1.19.10-1
- golang-1.19 1.19.10-2
+   [bookworm] - golang-1.19  (Minor issue)
- golang-1.15 
- golang-1.11 
NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924
@@ -49927,6 +49931,7 @@ CVE-2022-3617
RESERVED
 CVE-2022-3616 (Attackers can create long chains of CAs that would lead to 
OctoRPKI ex ...)
- cfrpki 1.4.4-1
+   [bullseye] - cfrpki  (Minor issue)
NOTE: 
https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc
 CVE-2022-3615
RESERVED
@@ -102778,6 +102783,7 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended 
version of the C reference implem
- python-cmarkgfm 0.7.0-1 (bug #1006758)
[buster] - python-cmarkgfm  (Minor issue)
- ruby-commonmarker 0.23.4-1 (bug #1006759)
+   [bullseye] - ruby-commonmarker  (Minor issue)
[buster] - ruby-commonmarker  (Minor issue)
- r-cran-commonmark 1.8.0-1 (bug #1006760)
[bullseye] - r-cran-commonmark  (Minor issue)


=
data/dsa-needed.txt
=
@@ -25,6 +25,8 @@ linux (carnil)
 nbconvert/oldstable
   Guilhem Moulin proposed an update ready for review
 --
+maradns/oldstable
+--
 netatalk/oldstable
   open regression with MacOS, tentative patch not yet merged upstream
   See discussion on team mailing list.
@@ -55,7 +57,7 @@ ruby2.7/oldstable
 --
 ruby3.1/stable
 --
-ruby-nokogiri/oldstble
+ruby-nokogiri/oldstable
 --
 ruby-rack/oldstable (carnil)
   Utkarsh Gupta available for preparing updates, debdiff ready for review



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76306029fa98d8a35037fd5816c2465eacaa3997

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76306029fa98d8a35037fd5816c2465eacaa3997
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-17 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6f4d703c by Moritz Muehlenhoff at 2023-06-17T20:48:41+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1989,6 +1989,7 @@ CVE-2023-2978 (A vulnerability was found in Abstrium 
Pydio Cells 4.2.0. It has b
NOT-FOR-US: Abstrium Pydio Cells
 CVE-2023-2977 (A vulnerbility was found in OpenSC. This security flaw cause a 
buffer  ...)
- opensc 0.23.0-0.3 (bug #1037021)
+   [bullseye] - opensc  (Minor issue)
NOTE: https://github.com/OpenSC/OpenSC/issues/2785
NOTE: https://github.com/OpenSC/OpenSC/pull/2787
NOTE: Fixed by: 
https://github.com/OpenSC/OpenSC/commit/81944d1529202bd28359bede57c0a15deb65ba8a
@@ -2928,6 +2929,7 @@ CVE-2023-32763 (An issue was discovered in Qt before 
5.15.15, 6.x before 6.2.9,
- qt6-base 6.4.2+dfsg-8
- qtbase-opensource-src 5.15.8+dfsg-10
- qtbase-opensource-src-gles 5.15.8+dfsg-3 (bug #1036702)
+   [bullseye] - qtbase-opensource-src-gles  (Minor issue)
- qt4-x11 
NOTE: 
https://lists.qt-project.org/pipermail/announce/2023-May/000413.html
NOTE: 
https://download.qt.io/official_releases/qt/5.15/CVE-2023-32763-qtbase-5.15.diff
@@ -20714,6 +20716,7 @@ CVE-2023-0842 (xml2js version 0.4.23 allows an external 
attacker to edit or add
NOTE: 
https://github.com/Leonidas-from-XIV/node-xml2js/commit/581b19a62d88f8a3c068b5a45f4542c2d6a495a5
 CVE-2023-0841 (A vulnerability, which was classified as critical, has been 
found in G ...)
- gpac  (bug #1034890)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
 CVE-2023-0840 (A vulnerability classified as problematic was found in PHPCrazy 
1.1.1. ...)
NOT-FOR-US: PHPCrazy
@@ -21268,6 +21271,7 @@ CVE-2023-0779 (At the most basic level, an invalid 
pointer can be input that cra
NOT-FOR-US: Zephyr
 CVE-2023-0778 (A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. 
This is ...)
- libpod 4.3.1+ds1-7 (bug #1032099)
+   [bullseye] - libpod  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2168256
NOTE: 
https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8
 CVE-2023-25678
@@ -26833,6 +26837,7 @@ CVE-2023-0359
RESERVED
 CVE-2023-0358 (Use After Free in GitHub repository gpac/gpac prior to 
2.3.0-DEV.)
- gpac  (bug #1033116)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355
NOTE: 
https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b
@@ -129558,6 +129563,7 @@ CVE-2021-41459 (There is a stack buffer overflow in 
MP4Box v1.0.1 at src/filters
NOTE: Fixed by: 
https://github.com/gpac/gpac/commit/7d4538e104f2b3ff6a65a41394795654e6972339 
(v2.0.0)
 CVE-2021-41458 (In GPAC MP4Box v1.1.0, there is a stack buffer overflow at 
src/utils/e ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
[stretch] - gpac  (No longer supported in LTS)
NOTE: https://github.com/gpac/gpac/issues/1910
@@ -130870,6 +130876,7 @@ CVE-2021-40943 (In Bento4 1.6.0-638, there is a null 
pointer reference in the fu
NOT-FOR-US: Bento4
 CVE-2021-40942 (In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the 
function ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/1908
NOTE: 
https://github.com/gpac/gpac/commit/da37ec8582266983d0ec4b7550ec907401ec441e 
(v2.0.0)
@@ -131703,6 +131710,7 @@ CVE-2021-40608 (The gf_hinter_track_finalize function 
in GPAC 1.0.1 allows attac
NOTE: 
https://github.com/gpac/gpac/commit/b09c75dc2d4bf68ac447daa71e72365aa30231a9 
(v2.0.0)
 CVE-2021-40607 (The schm_box_size function in GPAC 1.0.1 allows attackers to 
cause a d ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/1879
NOTE: 
https://github.com/gpac/gpac/commit/f19668964bf422cf5a63e4dbe1d3c6c75edadcbb 
(v2.0.0)
@@ -131800,6 +131808,7 @@ CVE-2021-40574 (The binary MP4Box in Gpac 1.0.1 has a 
double-free vulnerability
NOTE: 
https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb 
(v2.0.0)
 CVE-2021-40573 (The binary MP4Box in Gpac 1.0.1 has a double-free 
vulnerability in the ...)
- gpac 2.0.0+dfsg1-2
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
[stretch] - gpac  (No longer supported in LTS)
NOTE: 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5113f761 by Moritz Muehlenhoff at 2023-06-16T17:11:32+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -772,6 +772,7 @@ CVE-2023-34096 (Thruk is a multibackend monitoring 
webinterface which currently
NOT-FOR-US: Thruk
 CVE-2023-34095 (cpdb-libs provides frontend and backend libraries for the 
Common Print ...)
- cpdb-libs 
+   [bookworm] - cpdb-libs  (Minor issue)
NOTE: 
https://github.com/OpenPrinting/cpdb-libs/security/advisories/GHSA-25j7-9gfc-f46x
NOTE: Fixed by: 
https://github.com/OpenPrinting/cpdb-libs/commit/f181bd1f14757c2ae0f17cc76dc20421a40f30b7
NOTE: 1.2.x version predate the upstream commit 3f66d47252d5 
("print_frontend: Use
@@ -818,8 +819,8 @@ CVE-2023-2866 (If an attacker can trick an authenticated 
user into loading a mal
NOT-FOR-US: Advantech
 CVE-2023-3153 [service monitor MAC flow is not rate limited]
- ovn 
+   [bookworm] - ovn  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2213279
-   TODO: check details
 CVE-2023-3152 (A vulnerability classified as critical has been found in 
SourceCodeste ...)
NOT-FOR-US: SourceCodester Online Discussion Forum Site
 CVE-2023-3151 (A vulnerability was found in SourceCodester Online Discussion 
Forum Si ...)
@@ -1247,6 +1248,7 @@ CVE-2023-34414
NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2023-21/#CVE-2023-34414
 CVE-2023- [RUSTSEC-2023-0041]
- rust-trust-dns-server 
+   [bookworm] - rust-trust-dns-server  (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0041.html
NOTE: https://github.com/bluejekyll/trust-dns/pull/1952
NOTE: 
https://github.com/bluejekyll/trust-dns/commit/217974c0544483efe0c648befabb25bf88242716
@@ -1378,6 +1380,7 @@ CVE-2023-34411 (The xml-rs crate before 0.8.14 for Rust 
and Crab allows a denial
NOTE: Fixed by: 
https://github.com/netvl/xml-rs/commit/c09549a187e62d39d40467f129e64abf32efc35c 
(0.8.14)
 CVE-2023-34410 (An issue was discovered in Qt before 5.15.15, 6.x before 
6.2.9, and 6. ...)
- qt6-base 6.4.2+dfsg-11 (bug #1037209)
+   [bookworm] - qt6-base  (Minor issue)
- qtbase-opensource-src 5.15.8+dfsg-12 (bug #1037210)
- qtbase-opensource-src-gles 
[bookworm] - qtbase-opensource-src-gles  (Minor issue)
@@ -11252,6 +11255,7 @@ CVE-2023-1656 (Cleartext Transmission of Sensitive 
Information vulnerability in
NOT-FOR-US: ForgeRock
 CVE-2023-1655 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior 
to 2.4 ...)
- gpac  (bug #1034187)
+   [bullseye] - gpac  (Minor issue)
[buster] - gpac  (EOL in buster LTS)
NOTE: https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9
NOTE: 
https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4
@@ -17292,6 +17296,7 @@ CVE-2023-27044
RESERVED
 CVE-2023-27043 (The email module of Python through 3.11.3 incorrectly parses 
e-mail ad ...)
- python3.11 
+   [bookworm] - python3.11  (Minor issue)
- python3.10 
- python3.9 
- python3.7 
@@ -25205,6 +25210,7 @@ CVE-2023-24330
RESERVED
 CVE-2023-24329 (An issue in the urllib.parse component of Python before 3.11.4 
allows  ...)
- python3.11 3.11.4-1
+   [bookworm] - python3.11  (Minor issue)
- python3.9 
[bullseye] - python3.9  (Minor issue)
- python3.7 
@@ -36703,6 +36709,7 @@ CVE-2022-46946 (Helmet Store Showroom Site v1.0 was 
discovered to contain a SQL
NOT-FOR-US: Helmet Store Showroom Site
 CVE-2022-46945 (Nagvis before 1.9.34 was discovered to contain an arbitrary 
file read  ...)
- nagvis 1:1.9.34-1
+   [bullseye] - nagvis  (Minor issue)
NOTE: 
https://github.com/NagVis/nagvis/commit/71aba7f46f79d846e1df037f165d206a2cd1d22a
 (nagvis-1.9.34)
 CVE-2022-46944
RESERVED


=
data/dsa-needed.txt
=
@@ -53,6 +53,8 @@ ring
 ruby2.7/oldstable
   Utkarsh Gupta offered help in preparing updates
 --
+ruby3.1/stable
+--
 ruby-nokogiri/oldstble
 --
 ruby-rack/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5113f761d99bed0d46673be23cd7055d5e790e60

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5113f761d99bed0d46673be23cd7055d5e790e60
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-16 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
4a6be8e4 by Moritz Muehlenhoff at 2023-06-16T10:57:12+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -1372,6 +1372,8 @@ CVE-2023-34410 (An issue was discovered in Qt before 
5.15.15, 6.x before 6.2.9,
- qt6-base 6.4.2+dfsg-11 (bug #1037209)
- qtbase-opensource-src 5.15.8+dfsg-12 (bug #1037210)
- qtbase-opensource-src-gles 
+   [bookworm] - qtbase-opensource-src-gles  (Minor issue)
+   [bullseye] - qtbase-opensource-src-gles  (Minor issue)
- qt4-x11 
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/477560
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/480002
@@ -2485,6 +2487,8 @@ CVE-2023-32685 (Kanboard is project management software 
that focuses on the Kanb
NOTE: 
https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv
 CVE-2023-32681 (Requests is a HTTP library. Since Requests 2.3.0, Requests has 
been le ...)
- requests  (bug #1036693)
+   [bookworm] - requests  (Minor issue)
+   [bullseye] - requests  (Minor issue)
NOTE: 
https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q
NOTE: Fixed by: 
https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5 
(v2.31.0)
 CVE-2023-31763 (Weak security in the transmitter of AGShome Smart Alarm v1.0 
allows at ...)
@@ -2685,6 +2689,8 @@ CVE-2023-33285 (An issue was discovered in Qt 5.x before 
5.15.14, 6.x before 6.2
[bookworm] - qt6-base  (Minor issue)
- qtbase-opensource-src 5.15.8+dfsg-11
- qtbase-opensource-src-gles 
+   [bookworm] - qtbase-opensource-src-gles  (Minor issue)
+   [bullseye] - qtbase-opensource-src-gles  (Minor issue)
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/477644
 CVE-2023-33281 (The remote keyfob system on Nissan Sylphy Classic 2021 sends 
the same  ...)
NOT-FOR-US: Nissan Sylphy Classic 2021
@@ -3639,6 +3645,8 @@ CVE-2023-32573 (In Qt before 5.15.14, 6.0.x through 6.2.x 
before 6.2.9, and 6.3.
 CVE-2023-32570 (VideoLAN dav1d before 1.2.0 has a thread_task.c race condition 
that ca ...)
[experimental] - dav1d 1.2.0-1
- dav1d 1.2.1-2 (bug #1035950)
+   [bookworm] - dav1d  (Minor issue)
+   [bullseye] - dav1d  (Minor issue)
NOTE: 
https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa
 (1.2.0)
 CVE-2023-32569 (An issue was discovered in Veritas InfoScale Operations 
Manager (VIOM) ...)
NOT-FOR-US: Veritas InfoScale Operations Manager
@@ -11396,18 +11404,18 @@ CVE-2023-1637 (A flaw that boot CPU could be 
vulnerable for the speculative exec
NOTE: 
https://git.kernel.org/linus/e2a1256b17b16f9b9adf1b6fea56819e7b68e463 (5.18-rc2)
 CVE-2023-1636 [incomplete container isolation]
RESERVED
-   - barbican 
+   - barbican 
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2181765
-   TODO: check, possibly RedHat downstream RHOSP specific, RedHat 
clarifying with reporter
+   NOTE: possibly RedHat downstream RHOSP specific, RedHat clarifying with 
reporter
 CVE-2023-1635 (A vulnerability was found in OTCMS 6.72. It has been declared 
as probl ...)
NOT-FOR-US: OTCMS
 CVE-2023-1634 (A vulnerability was found in OTCMS 6.72. It has been classified 
as cri ...)
NOT-FOR-US: OTCMS
 CVE-2023-1633 [Insecure Barbican configuration file leaking credential]
RESERVED
-   - barbican 
+   - barbican 
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2181761
-   TODO: check, possibly RedHat downstream RHOSP specific, RedHat 
clarifying with reporter
+   NOTE: possibly RedHat downstream RHOSP specific, RedHat clarifying with 
reporter
 CVE-2023-1632 (** DISPUTED ** A vulnerability has been found in Ellucian 
Banner Web T ...)
NOT-FOR-US: Ellucian Banner Web Tailor
 CVE-2023-1631 (A vulnerability, which was classified as problematic, was found 
in Jia ...)
@@ -24530,6 +24538,7 @@ CVE-2023-24531
 CVE-2023-24473 (An information disclosure vulnerability exists in the 
TGAInput::read_t ...)
[experimental] - openimageio 2.4.9.0+dfsg-1
- openimageio  (bug #1034150)
+   [bookworm] - openimageio  (Minor issue)
[bullseye] - openimageio  (Minor issue)
NOTE: https://github.com/OpenImageIO/oiio/pull/3768
NOTE: 
https://github.com/OpenImageIO/oiio/commit/759fcd392d130c12ae476857e1ed2a91bcf2686b
 (master)
@@ -24538,6 +24547,7 @@ CVE-2023-24473 (An information disclosure vulnerability 
exists in the TGAInput::
 CVE-2023-24472 (A denial of service vulnerability exists in the 
FitsOutput::close() fu ...)
[experimental] - openimageio 2.4.9.0+dfsg-1
- openimageio  (bug #1034151)
+   [bookworm] - 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b5a0150f by Moritz Muehlenhoff at 2023-06-15T16:17:42+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -183,6 +183,8 @@ CVE-2023-34944 (An arbitrary file upload vulnerability in 
the /fileUpload.lib.ph
NOT-FOR-US: Chamilo LMS
 CVE-2023-34537 (A Reflected XSS was discovered in HotelDruid version 3.0.5, an 
attacke ...)
- hoteldruid 
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
[buster] - hoteldruid  (Minor issue)
NOTE: 
https://github.com/leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5
 CVE-2023-34396 (Allocation of Resources Without Limits or Throttling 
vulnerability in  ...)
@@ -201,6 +203,8 @@ CVE-2023-33933 (Exposure of Sensitive Information to an 
Unauthorized Actor vulne
NOTE: 
https://github.com/apache/trafficserver/commit/496fa2c4cbdf2b3d6c61760a3fb6675b74b549f0
 (8.1.x)
 CVE-2023-33817 (hoteldruid v3.0.5 was discovered to contain a SQL injection 
vulnerabil ...)
- hoteldruid 
+   [bookworm] - hoteldruid  (Minor issue)
+   [bullseye] - hoteldruid  (Minor issue)
[buster] - hoteldruid  (Minor issue)
NOTE: 
https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5
 CVE-2023-33146 (Microsoft Office Remote Code Execution Vulnerability)
@@ -1749,7 +1753,6 @@ CVE-2023-2952 (XRA dissector infinite loop in Wireshark 
4.0.0 to 4.0.5 and 3.6.0
{DLA-3443-1}
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-20.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19100
@@ -2149,7 +2152,6 @@ CVE-2023-2817 (A post-authentication stored cross-site 
scripting vulnerability e
 CVE-2023-2854 (BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 
3.6.13  ...)
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (vulnerable code introduced later)
[buster] - wireshark  (vulnerable code introduced in 4.0)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-17.html
@@ -2159,7 +2161,6 @@ CVE-2023-2856 (VMS TCPIPtrace file parser crash in 
Wireshark 4.0.0 to 4.0.5 and
{DLA-3443-1}
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-16.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19083
@@ -2167,7 +2168,6 @@ CVE-2023-2858 (NetScaler file parser crash in Wireshark 
4.0.0 to 4.0.5 and 3.6.0
{DLA-3443-1}
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-15.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19081
@@ -2175,7 +2175,6 @@ CVE-2023-2879 (GDSDB infinite loop in Wireshark 4.0.0 to 
4.0.5 and 3.6.0 to 3.6.
{DLA-3443-1}
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-14.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19068
@@ -2190,7 +2189,6 @@ CVE-2023-2857 (BLF file parser crash in Wireshark 4.0.0 
to 4.0.5 and 3.6.0 to 3.
 CVE-2023-2855 (Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 
to 3.6. ...)
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (Minor issue)
[buster] - wireshark  (Candump support added in 3.2)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-12.html
@@ -22494,7 +22492,6 @@ CVE-2023-0669 (Fortra (formerly, HelpSystems) 
GoAnywhere MFT suffers from a pre-
 CVE-2023-0668 (Due to failure in validating the length provided by an 
attacker-crafte ...)
[experimental] - wireshark 4.0.6-1~exp1
- wireshark 4.0.6-1
-   [bookworm] - wireshark  (Minor issue)
[bullseye] - wireshark  (Minor issue)
[buster] - wireshark  (vulnerable code introduced in 3.2)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-19.html
@@ -22505,7 +22502,6 @@ CVE-2023-0667 (Due to failure in validating the length 
provided by an attacker-c
 CVE-2023-0666 (Due to failure in validating the length provided by an 

[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-15 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
95679643 by Moritz Muehlenhoff at 2023-06-15T09:33:47+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=
data/CVE/list
=
@@ -25654,13 +25654,13 @@ CVE-2022-48280
 CVE-2023-0412 (TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 
3.6.10 a ...)
{DLA-3313-1}
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-07.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18770
 CVE-2023-0411 (Excessive loops in multiple dissectors in Wireshark 4.0.0 to 
4.0.2 and ...)
{DLA-3313-1}
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-06.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18711
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18720
@@ -25668,12 +25668,12 @@ CVE-2023-0411 (Excessive loops in multiple dissectors 
in Wireshark 4.0.0 to 4.0.
 CVE-2023-0415 (iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 
3.6.10  ...)
{DLA-3313-1}
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-05.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18796
 CVE-2023-0416 (GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 
3.6.10 an ...)
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
[buster] - wireshark  (Vulnerable code introduced later)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-04.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18779
@@ -25682,18 +25682,18 @@ CVE-2023-0416 (GNW dissector crash in Wireshark 4.0.0 
to 4.0.2 and 3.6.0 to 3.6.
 CVE-2023-0413 (Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 
3.6.10  ...)
{DLA-3313-1}
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-03.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18766
 CVE-2023-0417 (Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 
and 3.6.0 ...)
{DLA-3313-1}
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-02.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18628
 CVE-2023-0414 (Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows 
denial o ...)
- wireshark 4.0.3-1
-   [bullseye] - wireshark  (Minor issue, fix along in future 
update)
+   [bullseye] - wireshark  (Minor issue)
[buster] - wireshark  (Vulnerable code introduced later)
NOTE: https://www.wireshark.org/security/wnpa-sec-2023-01.html
NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18622


=
data/dsa-needed.txt
=
@@ -14,7 +14,7 @@ If needed, specify the release by adding a slash after the 
name of the source pa
 --
 asterisk/oldstable
 --
-chromium
+chromium (jmm)
 --
 cinder/oldstable
 --
@@ -75,10 +75,10 @@ webkit2gtk
 --
 wpewebkit
 --
-wireshark
-  bookworm to 4.0.6, bullseye isolated cherrypick
+wireshark/stable (jmm)
+  bookworm to 4.0.6, bullseye only harmless issues and no DSA
 --
-xmltooling
+xmltooling (jmm)
   Maintainer preparing updates
 --
 xrdp/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/956796437979d389da90370d80e2a83236b022c6

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/956796437979d389da90370d80e2a83236b022c6
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-05 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
11d8335a by Moritz Muehlenhoff at 2023-06-05T21:14:39+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -183,6 +183,8 @@ CVE-2023-33551 (Heap Buffer Overflow in the 
erofsfsck_dirent_iter function in fs
NOTE: Proposed fix: 
https://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs-utils.git/commit/?h=experimental=27aeef179bf17d5f1d98f827e93d24839a6d4176
 CVE-2023-33546 (janino 3.1.9 and earlier are subject to denial of service 
(DOS) attack ...)
- janino 
+   [bookworm] - janino  (Minor issue)
+   [bullseye] - janino  (Minor issue)
NOTE: https://github.com/janino-compiler/janino/issues/201
 CVE-2023-33544 (hawtio 2.17.2 is vulnerable to Path Traversal. it is possible 
to input ...)
TODO: check
@@ -8059,6 +8061,7 @@ CVE-2023-29400 (Templates containing actions in unquoted 
HTML attributes (e.g. "
- golang-1.20 1.20.4-1
[experimental] - golang-1.19 1.19.9-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
[bullseye] - golang-1.19  (Minor issue)
- golang-1.15 
- golang-1.11 
@@ -22949,6 +22952,7 @@ CVE-2023-24540 (Not all valid JavaScript whitespace 
characters are considered to
- golang-1.20 1.20.4-1
[experimental] - golang-1.19 1.19.9-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
[bullseye] - golang-1.19  (Minor issue)
- golang-1.15 
- golang-1.11 
@@ -22960,6 +22964,7 @@ CVE-2023-24539 (Angle brackets (<>) are not considered 
dangerous characters when
- golang-1.20 1.20.4-1
[experimental] - golang-1.19 1.19.9-1
- golang-1.19 
+   [bookworm] - golang-1.19  (Minor issue)
[bullseye] - golang-1.19  (Minor issue)
- golang-1.15 
- golang-1.11 



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d8335a7c7d8acf3dbc315078eebc0d4857da22

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d8335a7c7d8acf3dbc315078eebc0d4857da22
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-06-02 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1493cc75 by Moritz Muehlenhoff at 2023-06-02T20:53:53+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -179,10 +179,12 @@ CVE-2023-3014 (A vulnerability, which was classified as 
problematic, was found i
NOT-FOR-US: BeipyVideoResolution
 CVE-2023-3013 (Unchecked Return Value in GitHub repository gpac/gpac prior to 
2.2.2.)
- gpac 
+   [bullseye] - gpac  (Minor issue)
NOTE: https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073
NOTE: 
https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594
 CVE-2023-3012 (NULL Pointer Dereference in GitHub repository gpac/gpac prior 
to 2.2.2 ...)
- gpac 
+   [bullseye] - gpac  (Minor issue)
NOTE: https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
NOTE: 
https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7
 CVE-2023-3009 (Cross-site Scripting (XSS) - Stored in GitHub repository 
nilsteampassn ...)
@@ -77639,6 +77641,8 @@ CVE-2022-32547 (In ImageMagick, there is load of 
misaligned address for type 'do
NOTE: 
https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b
 (6.9.12-45)
 CVE-2023-34151 (A vulnerability was found in ImageMagick. This security flaw 
ouccers a ...)
- imagemagick  (bug #1036999)
+   [bookworm] - imagemagick  (Minor issue)
+   [bullseye] - imagemagick  (Minor issue)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/6341
NOTE: ImageMagick: 
https://github.com/ImageMagick/ImageMagick/commit/3d6d98d8a2be30d74172ab43b5b8e874d2deb158
 (7.1.1-10)
NOTE: ImageMagick6: 
https://github.com/ImageMagick/ImageMagick6/commit/133089f716f23ce0b80d89ccc1fd680960235512
 (6.9.12-88)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1493cc75b54619481cb3683d027b32dd4c8f60bf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1493cc75b54619481cb3683d027b32dd4c8f60bf
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

2023-05-28 Thread Moritz Muehlenhoff (@jmm)


Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
e41ae35a by Moritz Mühlenhoff at 2023-05-28T22:46:28+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=
data/CVE/list
=
@@ -569,6 +569,7 @@ CVE-2023-33288 (An issue was discovered in the Linux kernel 
before 6.2.9. A use-
NOTE: 
https://git.kernel.org/linus/47c29d69212911f50bdcdd0564b5999a559010d4 (6.3-rc4)
 CVE-2023-33285 (An issue was discovered in Qt 5.x before 5.15.14, 6.x before 
6.2.9, an ...)
- qt6-base 6.4.2+dfsg-10 (bug #1036848)
+   [bookworm] - qt6-base  (Minor issue)
- qtbase-opensource-src 5.15.8+dfsg-11
- qtbase-opensource-src-gles 
NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/477644
@@ -1406,6 +1407,7 @@ CVE-2023-2454 [CREATE SCHEMA ... schema_element defeats 
protective search_path c
NOTE: 
https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/
 CVE-2023-32668 (LuaTeX before 1.17.0 allows a document (compiled with the 
default sett ...)
- texlive-bin  (bug #1036470)
+   [bookworm] - texlive-bin  (Minor issue)
[bullseye] - texlive-bin  (Minor issue)
[buster] - texlive-bin  (Minor issue)
NOTE: https://tug.org/pipermail/tex-live/2023-May/049188.html
@@ -10692,7 +10694,10 @@ CVE-2023-28448 (Versionize is a framework for version 
tolerant serializion/deser
NOT-FOR-US: Versionize (firecracker-microvm / framework for version 
tolerant serializion/deserialization of Rust data structures)
 CVE-2023-28447 (Smarty is a template engine for PHP. In affected versions 
smarty did n ...)
- smarty3  (bug #1033964)
+   [bookworm] - smarty3  (Minor issue)
+   [bullseye] - smarty3  (Minor issue)
- smarty4  (bug #1033965)
+   [bookworm] - smarty4  (Minor issue)
NOTE: 
https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj
NOTE: 
https://github.com/smarty-php/smarty/commit/e75165565e9e5956a73365c24d650ba40570ae72
 (v4.3.1)
NOTE: 
https://github.com/smarty-php/smarty/commit/7677db7bc9a1dcfcad1435fc9d3bac3f295ca3ad
 (v3.1.48)
@@ -12290,6 +12295,7 @@ CVE-2023-1290 (A vulnerability, which was classified as 
critical, has been found
NOT-FOR-US: SourceCodester Sales Tracker Management System
 CVE-2023-1289 (A vulnerability was discovered in ImageMagick where a specially 
create ...)
- imagemagick  (bug #1033254)
+   [bookworm] - imagemagick  (Minor issue)
[bullseye] - imagemagick  (Minor issue)
[buster] - imagemagick  (Should be fixed together with some 
other CVEs)
NOTE: 
https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr
@@ -14566,6 +14572,8 @@ CVE-2023-1056 (A vulnerability was found in 
SourceCodester Doctors Appointment S
NOT-FOR-US: SourceCodester Doctors Appointment System
 CVE-2023-1055 (A flaw was found in RHDS 11 and RHDS 12. While browsing entries 
LDAP t ...)
- 389-ds-base  (bug #1034891)
+   [bookworm] - 389-ds-base  (Minor issue)
+   [bullseye] - 389-ds-base  (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2173517
 CVE-2023-1054 (A vulnerability was found in SourceCodester Music Gallery Site 
1.0. It ...)
NOT-FOR-US: SourceCodester Music Gallery Site
@@ -147394,6 +147402,7 @@ CVE-2021-33392
RESERVED
 CVE-2021-33391 (An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute 
arbitra ...)
- tidy-html5  (bug #1032665)
+   [bookworm] - tidy-html5  (Minor issue)
[bullseye] - tidy-html5  (Minor issue)
[buster] - tidy-html5  (Minor issue)
NOTE: https://github.com/htacg/tidy-html5/issues/946



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e41ae35aeddf8f8462802238f1a5833e4767375f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e41ae35aeddf8f8462802238f1a5833e4767375f
You're receiving this email because of your account on salsa.debian.org.


___
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits


  1   2   >