[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 644cd696 by Moritz Muehlenhoff at 2024-05-10T18:04:15+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1310,11 +1310,15 @@ CVE-2024-34078 (html-sanitizer is an allowlist-based HTML cleaner. If using `kee NOTE: https://github.com/matthiask/html-sanitizer/commit/48db42fc5143d0140c32d929c46b802f96913550 (2.4.2) CVE-2024-34069 (Werkzeug is a comprehensive WSGI web application library. The debugger ...) - python-werkzeug 3.0.3-1 (bug #1070711) + [bookworm] - python-werkzeug (Minor issue) + [bullseye] - python-werkzeug (Minor issue) NOTE: https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985 NOTE: Fixed by: https://github.com/pallets/werkzeug/commit/71b69dfb7df3d912e66bab87fbb1f21f83504967 (3.0.3) NOTE: Fixed by: https://github.com/pallets/werkzeug/commit/890b6b62634fa61224222aee31081c61b054ff01 (3.0.3) CVE-2024-34064 (Jinja is an extensible templating engine. The `xmlattr` filter in affe ...) - jinja2 (bug #1070712) + [bookworm] - jinja2 (Minor issue) + [bullseye] - jinja2 (Minor issue) NOTE: https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj NOTE: Fixed by: https://github.com/pallets/jinja/commit/d655030770081e2dfe46f90e27620472a502289d (3.1.4) CVE-2024-33912 (Missing Authorization vulnerability in Academy LMS.This issue affects ...) @@ -6701,6 +6705,8 @@ CVE-2024-32478 (Git Credential Manager (GCM) is a secure Git credential helper. - git-credential-manager (bug #1002300) CVE-2024-32473 (Moby is an open source container framework that is a key component of ...) - docker.io (bug #1070378) + [bookworm] - docker.io (Minor issue) + [bullseye] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9 NOTE: https://github.com/moby/moby/commit/841c4c8057bcf5317d6565875595a3f0c046e3fa CVE-2024-32409 (An issue in SEMCMS v.4.8 allows a remote attacker to execute arbitrary ...) @@ -17532,6 +17538,7 @@ CVE-2024-0450 (An issue was found in the CPython `zipfile` module affecting vers [bookworm] - python3.11 (Minor issue) - python3.10 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 - python2.7 [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) @@ -78571,6 +78578,7 @@ CVE-2023-28757 CVE-2023-28756 (A ReDoS issue was discovered in the Time component through 0.2.1 in Ru ...) {DLA-3447-1 DLA-3408-1} - ruby3.1 (bug #1038408) + [bookworm] - ruby3.1 (Minor issue) - ruby2.7 - ruby2.5 [experimental] - jruby 9.4.3.0+ds-1~exp1 @@ -78586,6 +78594,7 @@ CVE-2023-28755 (A ReDoS issue was discovered in the URI component through 0.12.0 [bookworm] - rubygems (Minor issue) [bullseye] - rubygems (Minor issue) - ruby3.1 (bug #1038408) + [bookworm] - ruby3.1 (Minor issue) - ruby2.7 - ruby2.5 [experimental] - jruby 9.4.3.0+ds-1~exp1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/644cd696af6b99d787c462f7c3c228d9a9ce54d8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/644cd696af6b99d787c462f7c3c228d9a9ce54d8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cb445d82 by Moritz Muehlenhoff at 2024-04-22T11:02:14+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -54,12 +54,15 @@ CVE-2024-32460 [Low] OutOfBound Read in interleaved_decompress] NOTE: https://www.freerdp.com/2024/04/17/2_11_6-release CVE-2024-32493 [SQL injection issue regarding Form IDs when cleaning up drafts] - znuny 6.5.8-1 + [bookworm] - znuny (Non-free not supported) NOTE: https://www.znuny.org/en/advisories/zsa-2024-03 CVE-2024-32492 [Cross Site Scripting (XSS) in the Customer Portal Ticket View] - znuny (Only affects Znuny from 7.0.1 up to including 7.0.16) + [bookworm] - znuny (Non-free not supported) NOTE: https://www.znuny.org/en/advisories/zsa-2024-02 CVE-2024-32491 [Directory Traversal via File Upload] - znuny 6.5.8-1 + [bookworm] - znuny (Non-free not supported) NOTE: https://www.znuny.org/en/advisories/zsa-2024-01 CVE-2024-4020 (A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified ...) NOT-FOR-US: Tenda @@ -3676,9 +3679,13 @@ CVE-2024-3210 (The Paid Membership Plugin, Ecommerce, User Registration Form, Lo NOT-FOR-US: WordPress plugin CVE-2024-3120 (A stack-buffer overflow vulnerability exists in all versions of sngrep ...) - sngrep 1.8.1-1 (bug #1068818) + [bookworm] - sngrep (Minor issue) + [bullseye] - sngrep (Minor issue) NOTE: https://github.com/irontec/sngrep/commit/f3f8ed8ef38748e6d61044b39b0dabd7e37c6809 (v1.8.1) CVE-2024-3119 (A buffer overflow vulnerability exists in all versions of sngrep since ...) - sngrep 1.8.1-1 (bug #1068818) + [bookworm] - sngrep (Minor issue) + [bullseye] - sngrep (Minor issue) NOTE: https://github.com/irontec/sngrep/commit/dd5fec92730562af6f96891291cd4e102b80bfcc (v1.8.1) CVE-2024-3020 (The plugin is vulnerable to PHP Object Injection in versions up to and ...) NOT-FOR-US: WordPress plugin @@ -4530,6 +4537,7 @@ CVE-2024-2201 [Native Branch History Injection] NOTE: https://xenbits.xen.org/xsa/advisory-456.html CVE-2024-31142 [x86: Incorrect logic for BTC/SRSO mitigations] - xen + [bookworm] - xen (Minor issue, fix along in next DSA) [bullseye] - xen (EOLed in Bullseye) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-455.html @@ -5055,6 +5063,7 @@ CVE-2024-22328 (IBM Maximo Application Suite 8.10 and 8.11 could allow a remote NOT-FOR-US: IBM CVE-2024- [RUSTSEC-2024-0332: Degradation of service in h2 servers with CONTINUATION Flood] - rust-h2 0.4.4-1 + [bookworm] - rust-h2 (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2024-0332.html NOTE: https://github.com/advisories/GHSA-q6cp-qfwq-4gcv CVE-2024-3362 (A vulnerability was found in SourceCodester Online Library System 1.0 ...) @@ -24250,6 +24259,7 @@ CVE-2020-36771 (CloudLinux CageFS 7.1.1-1 or below passes the authentication tok NOT-FOR-US: CloudLinux CageFS CVE-2023-46842 [x86 HVM hypercalls may trigger Xen bug check] - xen + [bookworm] - xen (Minor issue, fix along in next DSA) [bullseye] - xen (EOLed in Bullseye) [buster] - xen (Vulnerable code not present) NOTE: https://xenbits.xen.org/xsa/advisory-454.html @@ -39975,6 +39985,8 @@ CVE-2023-46345 (Catdoc v0.95 was discovered to contain a NULL pointer dereferenc CVE-2023-46233 (crypto-js is a JavaScript library of crypto standards. Prior to versio ...) {DLA-3669-1} - cryptojs 3.1.2+dfsg-4 (bug #1055525) + [bookworm] - cryptojs (Minor issue) + [bullseye] - cryptojs (Minor issue) NOTE: https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf NOTE: https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a (4.2.0) CVE-2023-46232 (era-compiler-vyper is the EraVM Vyper compiler for zkSync Era, a layer ...) = data/dsa-needed.txt = @@ -14,8 +14,6 @@ If needed, specify the release by adding a slash after the name of the source pa -- atril -- -cryptojs --- dav1d -- dnsdist (jmm) @@ -71,7 +69,7 @@ python-asyncssh -- redmine/stable -- -ring +ring/oldstable might make sense to rebase to current version -- ruby2.7/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb445d829db44c592501aed8473cc3b35d1e76b7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb445d829db44c592501aed8473cc3b35d1e76b7 You're receiving this email because of your account on
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 434878ad by Moritz Muehlenhoff at 2024-04-05T20:19:39+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3748,18 +3748,26 @@ CVE-2024-28386 (An issue in Home-Made.io fastmagsync v.1.7.51 and before allows NOT-FOR-US: PrestaShop module CVE-2024-28246 (KaTeX is a JavaScript library for TeX math rendering on the web. Code ...) - node-katex 0.16.10+~cs6.1.0-1 (bug #1067805) + [bookworm] - node-katex (Minor issue) + [bullseye] - node-katex (Minor issue) NOTE: https://github.com/KaTeX/KaTeX/security/advisories/GHSA-3wc5-fcw2-2329 NOTE: https://github.com/KaTeX/KaTeX/commit/fc5af64183a3ceb9be9d1c23a275999a728593de (v0.16.10) CVE-2024-28245 (KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX ...) - node-katex 0.16.10+~cs6.1.0-1 (bug #1067805) + [bookworm] - node-katex (Minor issue) + [bullseye] - node-katex (Minor issue) NOTE: https://github.com/KaTeX/KaTeX/security/advisories/GHSA-f98w-7cxr-ff2h NOTE: https://github.com/KaTeX/KaTeX/commit/c5897fcd1f73da9612a53e6b5544f1d776e17770 (v0.16.10) CVE-2024-28244 (KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX ...) - node-katex 0.16.10+~cs6.1.0-1 (bug #1067805) + [bookworm] - node-katex (Minor issue) + [bullseye] - node-katex (Minor issue) NOTE: https://github.com/KaTeX/KaTeX/security/advisories/GHSA-cvr6-37gx-v8wc NOTE: https://github.com/KaTeX/KaTeX/commit/085e21b5da05414efefa932570e7201a7c70e5b2 (v0.16.10) CVE-2024-28243 (KaTeX is a JavaScript library for TeX math rendering on the web. KaTeX ...) - node-katex 0.16.10+~cs6.1.0-1 (bug #1067805) + [bookworm] - node-katex (Minor issue) + [bullseye] - node-katex (Minor issue) NOTE: https://github.com/KaTeX/KaTeX/security/advisories/GHSA-64fm-8hw2-v72w NOTE: https://github.com/KaTeX/KaTeX/commit/e88b4c357f978b1bca8edfe3297f0aa309bcbe34 (v0.16.10) CVE-2024-28183 (ESP-IDF is the development framework for Espressif SoCs supported on W ...) @@ -4057,11 +4065,10 @@ CVE-2024-27280 [Buffer overread vulnerability in StringIO] TODO: check details CVE-2024-30161 (In Qt before 6.5.6 and 6.6.x before 6.6.3, the wasm component may acce ...) - qt6-base (bug #1068454) - - qtbase-opensource-src - - qtbase-opensource-src-gles + - qtbase-opensource-src (Only affects Qt6) + - qtbase-opensource-src-gles (Only affects Qt6) NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/544314 NOTE: https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365 - TODO: check details CVE-2024-30156 (Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 L ...) - varnish (bug #1068455) [bookworm] - varnish (Minor issue, too intrusive to backport) @@ -4596,6 +4603,8 @@ CVE-2024-29026 (Owncast is an open source, self-hosted, decentralized, single us NOT-FOR-US: Owncast CVE-2024-29018 (Moby is an open source container framework that is a key component of ...) - docker.io (bug #1068460) + [bookworm] - docker.io (Minor issue) + [bullseye] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx NOTE: https://github.com/moby/moby/pull/46609 CVE-2024-28916 (Xbox Gaming Services Elevation of Privilege Vulnerability) @@ -5364,6 +5373,7 @@ CVE-2024-22453 (Dell PowerEdge Server BIOS contains a heap-based buffer overflow NOT-FOR-US: Dell CVE-2024-22412 (ClickHouse is an open-source column-oriented database management syste ...) - clickhouse (bug #1067178) + [bullseye] - clickhouse (Minor issue) NOTE: https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r NOTE: https://github.com/ClickHouse/ClickHouse/pull/58611 CVE-2024-21504 (Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/434878adcf5c83f25c56abbc6f1f1caf7884b32d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/434878adcf5c83f25c56abbc6f1f1caf7884b32d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: acba346e by Moritz Mühlenhoff at 2024-03-29T22:59:06+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1635,6 +1635,8 @@ CVE-2024-1745 (The Testimonial Slider WordPress plugin before 2.3.7 does not pro NOT-FOR-US: WordPress plugin CVE-2024-0901 (Remotely executed SEGV and out of bounds read allows malicious packet ...) - wolfssl (bug #1067799) + [bookworm] - wolfssl (Minor issue) + [bullseye] - wolfssl (Minor issue) NOTE: https://github.com/wolfSSL/wolfssl/issues/7089 NOTE: https://github.com/wolfSSL/wolfssl/pull/7099 CVE-2024-0866 (The Check & Log Email plugin for WordPress is vulnerable to Unauthenti ...) @@ -2102,9 +2104,8 @@ CVE-2024-2826 (A vulnerability classified as problematic was found in lakernote CVE-2024-2825 (A vulnerability classified as critical has been found in lakernote Eas ...) NOT-FOR-US: lakernote EasyAdmin CVE-2024-2824 (A vulnerability was found in Matthias-Wandel jhead 3.08 and classified ...) - - jhead - [bookworm] - jhead (Minor issue) - [bullseye] - jhead (Minor issue) + - jhead (unimportant) + NOTE: Crash in CLI tool, no security impact NOTE: https://github.com/Matthias-Wandel/jhead/issues/84 CVE-2024-2823 (A vulnerability has been found in DedeCMS 5.7 and classified as proble ...) NOT-FOR-US: DedeCMS = data/dsa-needed.txt = @@ -28,7 +28,7 @@ frr -- gpac/oldstable -- -gtkwave +gtkwave (jmm) -- h2o (jmm) -- @@ -44,6 +44,8 @@ linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y and 6.1.y versions -- +mediawiki (jmm) +-- nbconvert/oldstable Guilhem Moulin proposed an update ready for review -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acba346ed18709fdbdadc105a41c26053c93f61e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acba346ed18709fdbdadc105a41c26053c93f61e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d4e1c12c by Moritz Muehlenhoff at 2024-03-22T17:00:18+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -871,6 +871,7 @@ CVE-2024-0450 (An issue was found in the CPython `zipfile` module affecting vers - python3.9 - python3.7 - python2.7 + [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) NOTE: https://github.com/python/cpython/pull/110016 NOTE: https://github.com/python/cpython/issues/109858 NOTE: https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba (v3.13.0a3) @@ -886,6 +887,7 @@ CVE-2023-6597 (An issue was found in the CPython `tempfile.TemporaryDirectory` c - python3.9 - python3.7 - python2.7 + [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) NOTE: https://github.com/python/cpython/pull/99930 NOTE: https://github.com/python/cpython/issues/91133 NOTE: https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5 (v3.12.1) @@ -1294,9 +1296,10 @@ CVE-2024-1333 (The Responsive Pricing Table WordPress plugin before 5.1.11 does CVE-2024-1331 (The Team Members WordPress plugin before 5.3.2 does not validate and e ...) NOT-FOR-US: WordPress plugin CVE-2024-1013 (An out-of-bounds stack write flaw was found in unixODBC on 64-bit arch ...) - - unixodbc + - unixodbc (unimportant) NOTE: https://github.com/lurcher/unixODBC/pull/157 NOTE: Fixed by: https://github.com/lurcher/unixODBC/commit/45f501e1be2db6b017cc242c79bfb9de32b332a1 + NOTE: Only affects example code, not present in binary packages CVE-2024-0973 (The Widget for Social Page Feeds WordPress plugin before 6.4 does not ...) NOT-FOR-US: WordPress plugin CVE-2024-0951 (The Advanced Social Feeds Widget & Shortcode WordPress plugin through ...) @@ -1502,6 +1505,8 @@ CVE-2021-47156 (The Net::IPAddress::Util module before 5.000 for Perl does not p NOT-FOR-US: Net::IPAddress::Util Perl module CVE-2021-47155 (The Net::IPV4Addr module 0.10 for Perl does not properly consider extr ...) - libnetwork-ipv4addr-perl + [bookworm] - libnetwork-ipv4addr-perl (Minor issue) + [bullseye] - libnetwork-ipv4addr-perl (Minor issue) NOTE: https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/#net-ipv4addrhttpsmetacpanorgreleasenet-ipv4addr CVE-2021-47154 (The Net::CIDR::Lite module before 0.22 for Perl does not properly cons ...) - libnet-cidr-lite-perl 0.22-1 @@ -1613,6 +1618,8 @@ CVE-2024-1857 (The Ultimate Gift Cards for WooCommerce \u2013 Create, Redeem & M NOT-FOR-US: WooCommerce plugin CVE-2024-2467 [Crypt-OpenSSL-RSA vulnerable to the Marvin Attack] - libcrypt-openssl-rsa-perl (bug #1066969) + [bookworm] - libcrypt-openssl-rsa-perl (Minor issue) + [bullseye] - libcrypt-openssl-rsa-perl (Minor issue) [buster] - libcrypt-openssl-rsa-perl (Minor issue; side-channel timing attack) NOTE: https://people.redhat.com/~hkario/marvin/ NOTE: https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42 @@ -2667,7 +2674,8 @@ CVE-2023-4839 (The WP Go Maps for WordPress is vulnerable to Stored Cross-Site S CVE-2023-43292 (Cross Site Scripting vulnerability in My Food Recipe Using PHP with So ...) NOT-FOR-US: My Food Recipe Using PHP with Source Code CVE-2023-43279 (Null Pointer Dereference in mask_cidr6 component at cidr.c in Tcprepla ...) - - tcpreplay + - tcpreplay (unimportant) + NOTE: Crash in CLI tool, no security impact NOTE: https://github.com/appneta/tcpreplay/issues/824 CVE-2023-42308 (Cross Site Scripting (XSS) vulnerability in Manage Fastrack Subjects i ...) NOT-FOR-US: Code-Projects Exam Form Submission @@ -7103,6 +7111,8 @@ CVE-2024-23839 (Suricata is a network Intrusion Detection System, Intrusion Prev NOTE: https://redmine.openinfosecfoundation.org/issues/6657 CVE-2024-23837 (LibHTP is a security-aware parser for the HTTP protocol. Crafted traff ...) - libhtp 1:0.5.46-1 + [bookworm] - libhtp (Minor issue) + [bullseye] - libhtp (Minor issue) [buster] - libhtp (Minor issue) NOTE: https://github.com/OISF/libhtp/security/advisories/GHSA-f9wf-rrjj-qx8m NOTE: https://github.com/OISF/libhtp/commit/20ac301d801cdf01b3f021cca08a22a87f477c4a (0.5.46) @@ -45242,6 +45252,8 @@ CVE-2023-38404 (The XPRTLD web application in Veritas InfoScale Operations Manag NOT-FOR-US: Veritas InfoScale CVE-2023-7250 (A flaw was found in iperf, a utility for testing network performance u ...)
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 93c25739 by Moritz Muehlenhoff at 2024-02-23T23:29:45+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -23267,8 +23267,8 @@ CVE-2023-39333 NOTE: https://github.com/nodejs/node/commit/eaf9083cf1e43bd897ac8244dcc0f4e3500150ca CVE-2023-5388 - nss 2:3.98-1 (bug #1056284) - [bookworm] - nss (Minor issue, revisit once fixed upstream) - [bullseye] - nss (Minor issue, revisit once fixed upstream) + [bookworm] - nss (Minor issue) + [bullseye] - nss (Minor issue) [buster] - nss (Minor issue) NOTE: https://people.redhat.com/~hkario/marvin/ NOTE: Vendor patch (Rocky Linux, not upstreamed): https://git.rockylinux.org/staging/rpms/nss/-/commit/1f7f7523b61a2ada2f461548c4160fbbf979c5dd @@ -53132,6 +53132,8 @@ CVE-2023-28658 (Insecure inherited permissions in some Intel(R) oneMKL software NOT-FOR-US: Intel CVE-2023-27517 (Improper access control in some Intel(R) Optane(TM) PMem software befo ...) - ipmctl 03.00.00.0485-1 + [bookworm] - ipmctl (Minor issue) + [bullseye] - ipmctl (Minor issue) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html TODO: full details not clear but affects the "Intel Optane Pmem {1,2,3}00Series management software (ipmctl) CVE-2023-26589 (Use after free in some Intel(R) Aptio* V UEFI Firmware Integrator Tool ...) = data/dsa-needed.txt = @@ -51,7 +51,7 @@ nodejs -- opennds/stable -- -openvswitch +openvswitch (jmm) Maintainer sent debdiff for CVE-2023-3966, but there are other CVE fixes which might be piggy backed. -- php-cas/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93c25739ec8a8fad68f86a760ba5b4531e237c26 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93c25739ec8a8fad68f86a760ba5b4531e237c26 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cb0e0ce4 by Moritz Muehlenhoff at 2024-02-23T23:01:13+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -497,6 +497,8 @@ CVE-2024-26133 (EventStoreDB (ESDB) is an operational database built to store ev NOT-FOR-US: EventStoreDB (ESDB) CVE-2024-26130 (cryptography is a package designed to expose cryptographic primitives ...) - python-cryptography + [bookworm] - python-cryptography (Minor issue) + [bullseye] - python-cryptography (Minor issue) NOTE: https://github.com/pyca/cryptography/security/advisories/GHSA-6vqw-3v5j-54x4 NOTE: https://github.com/pyca/cryptography/pull/10423 NOTE: Fixed by: https://github.com/pyca/cryptography/commit/97d231672763cdb5959a3b191e692a362f1b9e55 (main) @@ -527,6 +529,7 @@ CVE-2024-25249 (An issue in He3 App for macOS version 2.0.17, allows remote atta NOT-FOR-US: He3 App for macOS CVE-2024-25117 (php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering ...) - php-dompdf-svg-lib + [bookworm] - php-dompdf-svg-lib (Minor issue) NOTE: https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273 NOTE: https://github.com/dompdf/php-svg-lib/commit/732faa9fb4309221e2bd9b2fda5de44f947133aa (0.5.2) NOTE: https://github.com/dompdf/php-svg-lib/commit/8ffcc41bbde39f09f94b9760768086f12bbdce42 (0.5.2) @@ -856,6 +859,8 @@ CVE-2024-25274 (An arbitrary file upload vulnerability in the component /sysFile NOT-FOR-US: Novel-Plus CVE-2024-25262 (texlive-bin commit c515e was discovered to contain heap buffer overflo ...) - texlive-bin (bug #1064517) + [bookworm] - texlive-bin (Minor issue) + [bullseye] - texlive-bin (Minor issue) NOTE: https://tug.org/svn/texlive/trunk/Build/source/texk/ttfdump/ChangeLog?revision=69605=co NOTE: https://bugs.launchpad.net/ubuntu/+source/texlive-bin/+bug/2047912 NOTE: https://github.com/TeX-Live/texlive-source/pull/63 @@ -884,6 +889,8 @@ CVE-2024-24475 REJECTED CVE-2024-24474 (QEMU before 8.2.0 has an integer underflow, and resultant buffer overf ...) - qemu 1:8.2.0+ds-1 + [bookworm] - qemu (Minor issue) + [bullseye] - qemu (Minor issue) NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1810 NOTE: https://github.com/qemu/qemu/commit/77668e4b9bca03a856c27ba899a2513ddf52bb52 (v8.2.0-rc0) CVE-2024-23809 (A double-free vulnerability exists in the BrainVision ASCII Header Par ...) @@ -1359,6 +1366,8 @@ CVE-2024-1343 (A weak permission was found in the backup directory in LaborOffic NOT-FOR-US: LaborOfficeFree CVE-2023-50257 (eProsima Fast DDS (formerly Fast RTPS) is a C++ implementation of the ...) - fastdds (bug #1064515) + [bookworm] - fastdds (Minor issue) + [bullseye] - fastdds (Minor issue) NOTE: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98 NOTE: https://github.com/eProsima/Fast-DDS/commit/f2e5ceae8fbea0a6c9445a366faaca0b98a8ef86 CVE-2024-26308 (Allocation of Resources Without Limits or Throttling vulnerability in ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb0e0ce495fe2a3a6259c02c0a90a18b08dce809 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb0e0ce495fe2a3a6259c02c0a90a18b08dce809 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0d244b55 by Moritz Muehlenhoff at 2024-02-14T14:22:12+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -749,16 +749,19 @@ CVE-2024-25451 (Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug NOT-FOR-US: Bento4 CVE-2024-25450 (imlib2 v1.9.1 was discovered to mishandle memory allocation in the fun ...) - imlib2 1.10.0-2 + [bullseye] - imlib2 (Minor issue) NOTE: https://github.com/derf/feh/issues/712 NOTE: https://git.enlightenment.org/old/legacy-imlib2/issues/20 NOTE: Fixed by: https://git.enlightenment.org/old/legacy-imlib2/commit/e9c09deb08047c9e902ce37144e82b6edb8aedb6 (v1.10.0) CVE-2024-25448 (An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 ...) - imlib2 1.10.0-2 + [bullseye] - imlib2 (Minor issue) NOTE: https://github.com/derf/feh/issues/711 NOTE: https://git.enlightenment.org/old/legacy-imlib2/issues/20 NOTE: Fixed by: https://git.enlightenment.org/old/legacy-imlib2/commit/e9c09deb08047c9e902ce37144e82b6edb8aedb6 (v1.10.0) CVE-2024-25447 (An issue in the imlib_load_image_with_error_return function of imlib2 ...) - imlib2 1.10.0-2 + [bullseye] - imlib2 (Minor issue) NOTE: https://github.com/derf/feh/issues/709 NOTE: https://git.enlightenment.org/old/legacy-imlib2/issues/20 NOTE: Fixed by: https://git.enlightenment.org/old/legacy-imlib2/commit/e9c09deb08047c9e902ce37144e82b6edb8aedb6 (v1.10.0) @@ -59425,7 +59428,7 @@ CVE-2023-26133 (All versions of the package progressbar.js are vulnerable to Pro CVE-2023-26132 (Versions of the package dottie before 2.0.4 are vulnerable to Prototyp ...) - node-dottie 2.0.6+~2.0.5-1 (bug #1040592) [bookworm] - node-dottie 2.0.2-4+deb12u1 - [bullseye] - node-dottie 2.0.2-4+deb11u1 + [bullseye] - node-dottie 2.0.2-1+deb11u1 NOTE: https://security.snyk.io/vuln/SNYK-JS-DOTTIE-3332763 NOTE: https://github.com/mickhansen/dottie.js/commit/7d3aee1c9c3c842720506e131de7e181e5c8db68 (v2.0.4) CVE-2023-26131 (All versions of the package github.com/xyproto/algernon/engine; all ve ...) = data/dsa-needed.txt = @@ -58,6 +58,10 @@ phppgadmin -- pillow (jmm) -- +postgresql-13/oldstable (jmm) +-- +postgresql-15/stable (jmm) +-- py7zr/oldstable -- python-asyncssh View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0d244b55d0d6c9768efeb920fc0b1a30c3713105 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0d244b55d0d6c9768efeb920fc0b1a30c3713105 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 4b642eea by Moritz Muehlenhoff at 2024-02-05T13:06:37+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -82,6 +82,8 @@ CVE-2021-46902 (An issue was discovered in LTOS-Web-Interface in Meinberg LANTIM NOT-FOR-US: Meinberg CVE-2024-25062 (An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.1 ...) - libxml2 + [bookworm] - libxml2 (Minor issue) + [bullseye] - libxml2 (Minor issue) NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2b0aac140d739905c7848a42efc60bfe783a39b7 (v2.11.7) NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970884fcc13305cb8e23cdc5f0dd7667c2c (v2.12.5) @@ -179,6 +181,8 @@ CVE-2024-23895 (A vulnerability has been reported in Cups Easy (Purchase & Inven NOT-FOR-US: Cups Easy (Purchase & Inventory) CVE-2024-23831 (LedgerSMB is a free web-based double-entry accounting system. When a L ...) - ledgersmb (bug #1062845) + [bookworm] - ledgersmb (Minor issue) + [bullseye] - ledgersmb (Minor issue) [buster] - ledgersmb (Minor issue) NOTE: https://github.com/ledgersmb/LedgerSMB/security/advisories/GHSA-98ff-f638-qxjm NOTE: https://github.com/ledgersmb/LedgerSMB/commit/8c2ae5be68a782d62cb9c0e17c0127bf30ef4165 @@ -535,6 +539,8 @@ CVE-2024-1167 (When SEW-EURODRIVE MOVITOOLS MotionStudio processes XML informati NOT-FOR-US: SEW-EURODRIVE MOVITOOLS MotionStudio CVE-2024-1141 (A vulnerability was found in python-glance-store. The issue occurs whe ...) - python-glance-store + [bookworm] - python-glance-store (Minor issue) + [bullseye] - python-glance-store (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2258836 TODO: check, missing details in RHBZ#2258836 CVE-2024-0935 (An insertion of Sensitive Information into Log File vulnerability is a ...) @@ -545,8 +551,13 @@ CVE-2023-6078 (An OS Command Injection vulnerability exists in BIOVIA Materials NOT-FOR-US: BIOVIA Materials Studio products CVE-2023-5841 (Due to a failure in validating the number of scanline samples of a Ope ...) - openexr + [bookworm] - openexr (Minor issue) + [bullseye] - openexr (Only affects 3.x) + [buster] - openexr (Only affects 3.x) NOTE: https://takeonme.org/cves/CVE-2023-5841.html NOTE: https://github.com/AcademySoftwareFoundation/openexr/issues/1625 + NOTE: https://github.com/AcademySoftwareFoundation/openexr/commit/46944c3a87ebc6c5d9a9a4962a94569ba1082bc3 + NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1627 CVE-2023-52195 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) NOT-FOR-US: WordPress plugin CVE-2023-52194 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) @@ -1003,12 +1014,16 @@ CVE-2023-6780 (An integer overflow was found in the __vsyslog_internal function NOTE: https://sourceware.org/cgit/glibc/tree/advisories/GLIBC-SA-2024-0003 CVE-2024-23829 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...) - python-aiohttp (bug #1062708) + [bookworm] - python-aiohttp (Minor issue) + [bullseye] - python-aiohttp (Minor issue) NOTE: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-8qpw-xqxj-h4r2 NOTE: https://github.com/aio-libs/aiohttp/pull/8074 NOTE: https://github.com/aio-libs/aiohttp/commit/33ccdfb0a12690af5bb49bda2319ec0907fa7827 (master) NOTE: https://github.com/aio-libs/aiohttp/commit/d33bc21414e283c9e6fe7f6caf69e2ed60d66c82 (v3.9.2) CVE-2024-23334 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...) - python-aiohttp (bug #1062709) + [bookworm] - python-aiohttp (Minor issue) + [bullseye] - python-aiohttp (Minor issue) NOTE: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5h86-8mv2-jq9f NOTE: https://github.com/aio-libs/aiohttp/pull/8079 NOTE: https://github.com/aio-libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b (master) @@ -2815,6 +2830,7 @@ CVE-2023-28743 (Improper input validation for some Intel NUC BIOS firmware befor NOT-FOR-US: Intel CVE-2024-21733 (Generation of Error Message Containing Sensitive Information vulnerabi ...) - tomcat9 9.0.53-1 + [bullseye] - tomcat9 (Minor issue, fix along in next update) NOTE: https://www.openwall.com/lists/oss-security/2024/01/19/2 NOTE: https://github.com/apache/tomcat/commit/86ccc43940861703c2be96a5f35384407522125a (9.0.44) CVE-2024-23387 (FusionPBX prior to
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b97b1d8b by Moritz Muehlenhoff at 2024-01-08T20:35:53+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3062,6 +3062,8 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun [bullseye] - filezilla (Minor issue) [buster] - filezilla (Minor issue) - golang-go.crypto 1:0.17.0-1 (bug #1059003) + [bookworm] - golang-go.crypto (Minor issue) + [bullseye] - golang-go.crypto (Minor issue) - jsch (ChaCha20-Poly1305 support introduced in 0.1.61; *-EtM support introduced in 0.1.58) - libssh 0.10.6-1 (bug #1059004) - libssh2 1.11.0-4 (bug #1059005) @@ -3091,6 +3093,8 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun - python-asyncssh (bug #1059007) - tinyssh 20230101-4 (bug #1059058; unimportant) - trilead-ssh2 (bug #1059294) + [bookworm] - trilead-ssh2 (Minor issue) + [bullseye] - trilead-ssh2 (Minor issue) NOTE: https://terrapin-attack.com/ NOTE: https://www.openwall.com/lists/oss-security/2023/12/18/3 NOTE: dropbear: https://github.com/mkj/dropbear/commit/6e43be5c7b99dbee49dc72b6f989f29fdd7e9356 @@ -4451,6 +4455,8 @@ CVE-2023-42495 (Dasan Networks - W-Web versions 1.22-1.27 - CWE-78: Improper Neu CVE-2023-34194 (StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML ...) {DLA-3701-1} - tinyxml 2.6.2-6.1 (bug #1059315) + [bookworm] - tinyxml (Minor issue) + [bullseye] - tinyxml (Minor issue) NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities NOTE: Debian (non upstream) patch: https://salsa.debian.org/debian/tinyxml/-/raw/2366e1f23d059d4c20c43c54176b6bd78d6a83fc/debian/patches/CVE-2023-34194.patch CVE-2023-6707 (Use after free in CSS in Google Chrome prior to 120.0.6099.109 allowed ...) @@ -7057,6 +7063,8 @@ CVE-2023-47418 (Remote Code Execution (RCE) vulnerability in o2oa version 8.1.2 NOT-FOR-US: p2pa CVE-2023-40458 (Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability i ...) - tinyxml (bug #1059315) + [bookworm] - tinyxml (Minor issue) + [bullseye] - tinyxml (Minor issue) NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities CVE-2023-3741 (An OS Command injection vulnerability in NEC Platforms DT900 and DT900 ...) NOT-FOR-US: NEC @@ -15628,6 +15636,8 @@ CVE-2023-44487 (The HTTP/2 protocol allows a denial of service (server resource - tomcat10 10.1.14-1 - trafficserver 9.2.3+ds-1 (bug #1053801; bug #1054427) - grpc + [bookworm] - grpc (Minor issue) + [bullseye] - grpc (Minor issue) - h2o 2.2.5+dfsg2-8 (bug #1054232) - haproxy 1.8.13-1 - nginx 1.24.0-2 (unimportant; bug #1053770) = data/dsa-needed.txt = @@ -39,6 +39,8 @@ php*seclib* (seb) -- php-cas/oldstable -- +php-dompdf-svg-lib/stable +-- php-horde-mime-viewer/oldstable -- php-horde-turba/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b97b1d8b86be85dbfe389ffe87b5dbe6f74a27c7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b97b1d8b86be85dbfe389ffe87b5dbe6f74a27c7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: baf17973 by Moritz Muehlenhoff at 2024-01-05T12:18:25+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1156,6 +1156,8 @@ CVE-2023-51075 (hutool-core v5.8.23 was discovered to contain an infinite loop i NOT-FOR-US: Hutool CVE-2023-51074 (json-path v2.8.0 was discovered to contain a stack overflow via the Cr ...) - jayway-jsonpath + [bookworm] - jayway-jsonpath (Minor issue) + [bullseye] - jayway-jsonpath (Minor issue) NOTE: https://github.com/json-path/JsonPath/issues/973 CVE-2023-51010 (An issue in the export component AdSdkH5Activity of com.sdjictec.qdmet ...) NOT-FOR-US: com.sdjictec.qdmetro @@ -2854,8 +2856,13 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun [bookworm] - paramiko (Minor issue) [bullseye] - paramiko (Minor issue) - phpseclib 1.0.22-1 + [bookworm] - phpseclib (Minor issue) + [bullseye] - phpseclib (Minor issue) - php-phpseclib 2.0.46-1 + [bookworm] - php-phpseclib (Minor issue) + [bullseye] - php-phpseclib (Minor issue) - php-phpseclib3 3.0.35-1 + [bookworm] - php-phpseclib3 (Minor issue) - proftpd-dfsg 1.3.8.b+dfsg-1 (bug #1059144) [bookworm] - proftpd-dfsg (Minor issue) [bullseye] - proftpd-dfsg (Minor issue) @@ -2934,12 +2941,18 @@ CVE-2023-6483 (The vulnerability exists in ADiTaaS (Allied Digital Integrated To NOT-FOR-US: ADiTaaS (Allied Digital Integrated Tool-as-a-Service) CVE-2023-50981 (ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows atta ...) - libcrypto++ (bug #1059312) + [bookworm] - libcrypto++ (Minor issue) + [bullseye] - libcrypto++ (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/1249 CVE-2023-50980 (gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to ...) - libcrypto++ (bug #1059311) + [bookworm] - libcrypto++ (Minor issue) + [bullseye] - libcrypto++ (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/1248 CVE-2023-50979 (Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during ...) - libcrypto++ (bug #1059310) + [bookworm] - libcrypto++ (Minor issue) + [bullseye] - libcrypto++ (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/1247 CVE-2023-50976 (Redpanda before 23.1.21 and 23.2.x before 23.2.18 has missing authoriz ...) NOT-FOR-US: Redpanda @@ -3989,6 +4002,8 @@ CVE-2023-50782 [Bleichenbacher timing oracle attack against RSA decryption - inc NOTE: CVE is for incomplete fix of CVE-2020-25659 CVE-2023-50781 [Bleichenbacher timing attacks in the RSA decryption API - incomplete fix for CVE-2020-25657] - m2crypto (bug #1059292) + [bookworm] - m2crypto (Minor issue) + [bullseye] - m2crypto (Minor issue) [buster] - m2crypto (Minor issue; it's an incomplete fix of CVE-2020-25657) NOTE: https://gitlab.com/m2crypto/m2crypto/-/issues/342 NOTE: https://people.redhat.com/~hkario/marvin/ @@ -13161,6 +13176,8 @@ CVE-2023-45805 (pdm is a Python package and dependency manager supporting the la NOTE: https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831 CVE-2023-44483 (All versions of Apache Santuario - XML Security for Java prior to 2.2. ...) - libxml-security-java (bug #1059313) + [bookworm] - libxml-security-java (Minor issue) + [bullseye] - libxml-security-java (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/10/20/5 NOTE: https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55 NOTE: https://santuario.apache.org/secadv.data/CVE-2023-44483.txt.asc @@ -18706,6 +18723,8 @@ CVE-2023-37611 (Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allow NOT-FOR-US: Neos CMS CVE-2023-4237 (A flaw was found in the Ansible Automation Platform. When creating a n ...) - ansible (bug #1055300) + [bookworm] - ansible (Minor issue) + [bullseye] - ansible (Minor issue) [buster] - ansible (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2229979 NOTE: https://github.com/advisories/GHSA-ww3m-ffrm-qvqv = data/dsa-needed.txt = @@ -48,6 +48,8 @@ python3.11/stable (carnil) -- python3.9/oldstable -- +python-asyncssh +-- redmine/stable -- ring View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/baf179734b0fede4b1a1c6cf53b59b1721456257 -- View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b690b335 by Moritz Muehlenhoff at 2023-12-12T16:48:39+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -262,6 +262,8 @@ CVE-2023-6356 [NULL pointer dereference in nvmet_tcp_build_iovec] NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2254054 CVE-2023-39804 [Incorrectly handled extension attributes in PAX archives can lead to a crash] - tar (bug #1058079) + [bookworm] - tar (Minor issue) + [bullseye] - tar (Minor issue) NOTE: Fixed by: https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4 (v1.35) CVE-2023-6679 (A null pointer dereference vulnerability was found in dpll_pin_parent_ ...) - linux (Vulnerable code not present) @@ -2480,7 +2482,9 @@ CVE-2023-34055 (In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3 NOT-FOR-US: Spring Boot CVE-2023-46589 (Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 1 ...) - tomcat10 10.1.16-1 (bug #1057082) + [bookworm] - tomcat10 (Minor issue, fix along in next DSA) - tomcat9 9.0.70-2 + [bullseye] - tomcat9 (Minor issue, fix along in next DSA) - tomcat8 NOTE: https://www.openwall.com/lists/oss-security/2023/11/28/2 NOTE: https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08 (10.1.16) @@ -15728,6 +15732,8 @@ CVE-2023-39514 (Cacti is an open source operational monitoring and fault managem NOTE: Introduced by: https://github.com/Cacti/cacti/commit/75c147b70493d188ad85313569f86e33e13988b2 (release/1.2.17) CVE-2023-39513 (Cacti is an open source operational monitoring and fault management fr ...) - cacti 1.2.25+ds1-1 + [bookworm] - cacti (Minor issue) + [bullseye] - cacti (Minor issue) NOTE: https://github.com/Cacti/cacti/security/advisories/GHSA-9fj7-8f2j-2rw2 NOTE: Initial fix: https://github.com/Cacti/cacti/commit/976f44dd8dfb2410e0dba00de9c4bbca17ee8910 (release/1.2.25) NOTE: Final fix: https://github.com/Cacti/cacti/commit/23abb0e0a9729bd056b56f4fb5a6fc8e7ebda523 (release/1.2.25) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b690b335635f0f7a62c96ceca6f210c61812bb39 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b690b335635f0f7a62c96ceca6f210c61812bb39 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e846a8fc by Moritz Muehlenhoff at 2023-12-08T15:48:07+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -99,17 +99,25 @@ CVE-2023-49465 (Libde265 v1.0.14 was discovered to contain a heap-buffer-overflo NOTE: https://github.com/strukturag/libde265/issues/435 CVE-2023-49464 (libheif v1.17.5 was discovered to contain a segmentation violation via ...) - libheif + [bookworm] - libheif (Minor issue) + [bullseye] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/issues/1044 NOTE: https://github.com/strukturag/libheif/pull/1049 NOTE: https://github.com/strukturag/libheif/commit/2bf226a300951e6897ee7267d0dd379ba5ad7287 CVE-2023-49463 (libheif v1.17.5 was discovered to contain a segmentation violation via ...) - libheif + [bookworm] - libheif (Minor issue) + [bullseye] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/issues/1042 CVE-2023-49462 (libheif v1.17.5 was discovered to contain a segmentation violation via ...) - libheif + [bookworm] - libheif (Minor issue) + [bullseye] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/issues/1043 CVE-2023-49460 (libheif v1.17.5 was discovered to contain a segmentation violation via ...) - libheif + [bookworm] - libheif (Minor issue) + [bullseye] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/issues/1046 CVE-2023-49437 (Tenda AX12 V22.03.01.46 has been discovered to contain a command injec ...) NOT-FOR-US: Tenda @@ -157,6 +165,7 @@ CVE-2023-49402 (Tenda W30E V16.01.0.12(4843) was discovered to contain a stack o NOT-FOR-US: Tenda CVE-2023-48958 (gpac 2.3-DEV-rev617-g671976fcc-master contains memory leaks in gf_mpd_ ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in Buster LTS) NOTE: https://github.com/gpac/gpac/issues/2689 NOTE: Fixed by: https://github.com/gpac/gpac/commit/249c9fc18704e6d3cb6a4b173034a41aa570e7e4 @@ -172,6 +181,7 @@ CVE-2023-46974 (Cross Site Scripting vulnerability in Best Courier Management Sy NOT-FOR-US: Best Courier Management System CVE-2023-46871 (GPAC version 2.3-DEV-rev602-ged8424300-master in MP4Box contains a mem ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in Buster LTS) NOTE: https://github.com/gpac/gpac/issues/2658 NOTE: Fixed by: https://github.com/gpac/gpac/commit/03760e34d32e502a0078b20d15ea83ecaf453a5c View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e846a8fc3831d68633483817636e4e9e5402b0a1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e846a8fc3831d68633483817636e4e9e5402b0a1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 30867de7 by Moritz Muehlenhoff at 2023-12-06T10:46:03+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -57,7 +57,9 @@ CVE-2023-39326 [net/http: limit chunked data overhead] - golang-1.21 1.21.5-1 - golang-1.20 1.20.12-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 NOTE: https://go.dev/issue/64433 NOTE: https://github.com/golang/go/commit/ec8c526e4be720e94b98ca509e6364f0efaf28f7 (go1.21.5) @@ -66,7 +68,9 @@ CVE-2023-45285 [cmd/go: go get may unexpectedly fallback to insecure git] - golang-1.21 1.21.5-1 - golang-1.20 1.20.12-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 NOTE: https://go.dev/issue/63845 NOTE: https://github.com/golang/go/commit/23c943e5296c6fa3a6f9433bd929306c4dbf2aa3 (go1.21.5) @@ -152,6 +156,8 @@ CVE-2023-44297 (Dell PowerEdge platforms 16G Intel E5 BIOS and Dell Precision BI NOT-FOR-US: Dell CVE-2023-43628 (An integer overflow vulnerability exists in the NTRIP Stream Parsing f ...) - gpsd + [bookworm] - gpsd (Minor issue) + [bullseye] - gpsd (Minor issue) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1860 NOTE: https://gitlab.com/gpsd/gpsd/-/commit/3e5c6c28c422102dd453e31912e1e79d1f7ff7f2 CVE-2023-43608 (A data integrity vulnerability exists in the BR_NO_CHECK_HASH_FOR func ...) @@ -8775,6 +8781,8 @@ CVE-2023-40682 (IBM App Connect Enterprise 12.0.1.0 through 12.0.8.0 contains an CVE-2023-3 (Exposure of Sensitive Information to an Unauthorized Actor in WordPres ...) {DLA-3658-1} - wordpress 6.3.2+dfsg1-1 + [bookworm] - wordpress (Minor issue) + [bullseye] - wordpress (Minor issue) NOTE: https://wordpress.org/documentation/wordpress-version/version-6-3-2/ NOTE: https://core.trac.wordpress.org/changeset/56843/ CVE-2023-39960 (Nextcloud Server provides data storage for Nextcloud, an open source c ...) @@ -90460,6 +90468,7 @@ CVE-2022-2851 CVE-2022-2850 (A flaw was found In 389-ds-base. When the Content Synchronization plug ...) {DLA-3399-1} - 389-ds-base 2.3.1-1 (bug #1018054) + [bullseye] - 389-ds-base (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2118691 NOTE: https://github.com/389ds/389-ds-base/issues/4711#issuecomment-1205100979 NOTE: https://github.com/389ds/389-ds-base/issues/5418 = data/dsa-needed.txt = @@ -26,6 +26,8 @@ gpac/oldstable -- h2o (jmm) -- +haproxy +-- libreswan (jmm) Maintainer prepared bookworm-security update, but needs work on bullseye-security backports -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30867de72c030a7ee243172c7b235dbf4b2e4ae9 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/30867de72c030a7ee243172c7b235dbf4b2e4ae9 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 336fe7c2 by Moritz Muehlenhoff at 2023-12-05T12:14:40+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -57,11 +57,10 @@ CVE-2023-49284 (fish is a smart and user-friendly command line shell for macOS, CVE-2023-49280 (XWiki Change Request is an XWiki application allowing to request chang ...) NOT-FOR-US: XWiki CVE-2023-49080 (The Jupyter Server provides the backend (i.e. the core services, APIs, ...) - - jupyter-server (bug #1057454) - [bookworm] - jupyter-server (Minor issue) - [bullseye] - jupyter-server (Minor issue) + - jupyter-server (unimportant; bug #1057454) NOTE: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-h56g-gq9v-vc8r NOTE: https://github.com/jupyter-server/jupyter_server/commit/0056c3aa52cbb28b263a7a609ae5f17618b36652 (v2.11.2) + NOTE: Path disclosure has no security impact as packaged in Debian CVE-2023-48698 (Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded st ...) NOT-FOR-US: Azure RTOS USBX CVE-2023-48697 (Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded st ...) @@ -129524,6 +129523,7 @@ CVE-2022-24688 (An issue was discovered in DSK DSKNet 2.16.136.0 and 2.17.136.5. NOT-FOR-US: DSK DSKNet CVE-2022-24687 (HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, a ...) - consul 1.9.17+dfsg2-1 (bug #1006487) + [bullseye] - consul (EOL in Bullseye) [buster] - consul (Vulnerable Code not present) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/ NOTE: https://github.com/hashicorp/consul/commit/d35c6a97cbdff252f5238d6b52f49786f896566a (v1.9.15) @@ -167120,6 +167120,7 @@ CVE-2021-37220 (MuPDF through 1.18.1 has an out-of-bounds write because the cach NOTE: On Stretch, an earlier version of the code exits early instead of crashing. CVE-2021-37219 (HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows no ...) - consul 1.8.7+dfsg1-6 (bug #1015218) + [bullseye] - consul (EOL in Bullseye) [buster] - consul (Minor issue; intrusive to backport) NOTE: https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024 NOTE: https://github.com/hashicorp/consul/commit/ccf8eb1947357434eb6e66303ddab79f4c9d4103 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/336fe7c2f133a9cf2c10cec3ac8c72934c413554 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/336fe7c2f133a9cf2c10cec3ac8c72934c413554 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: aac75138 by Moritz Muehlenhoff at 2023-12-04T16:22:52+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -376,8 +376,9 @@ CVE-2023-4658 (An issue has been discovered in GitLab EE affecting all versions CVE-2023-4317 (An issue has been discovered in GitLab affecting all versions starting ...) - gitlab CVE-2023-49735 (** UNSUPPORTED WHEN ASSIGNED ** The value set as the DefaultLocaleRes ...) - - tiles (bug #1057315) + - tiles (unimportant; bug #1057315) NOTE: https://lists.apache.org/thread/8ktm4vxr6vvc1qsxh6ft8jzmom1zl65p + NOTE: Negligible security impact as packaged in Debian CVE-2023-48894 (Incorrect Access Control vulnerability in jshERP V3.3 allows attackers ...) NOT-FOR-US: jshERP CVE-2023-48016 (Restaurant Table Booking System V1.0 is vulnerable to SQL Injection in ...) @@ -855,6 +856,8 @@ CVE-2023-49090 (CarrierWave is a solution for file uploads for Rails, Sinatra an NOT-FOR-US: CarrierWave CVE-2023-49083 (cryptography is a package designed to expose cryptographic primitives ...) - python-cryptography (bug #1057108) + [bookworm] - python-cryptography (Minor issue) + [bullseye] - python-cryptography (Minor issue) NOTE: https://github.com/pyca/cryptography/security/advisories/GHSA-jfhm-5ghh-2f97 NOTE: https://github.com/pyca/cryptography/pull/9926 NOTE: https://github.com/pyca/cryptography/commit/1e7b4d074e14c4e694d3ce69ad6754a6039fd6ff (main) @@ -59994,7 +59997,9 @@ CVE-2023-22085 (Vulnerability in the Hospitality OPERA 5 Property Services produ NOT-FOR-US: Oracle CVE-2023-22084 (Vulnerability in the MySQL Server product of Oracle MySQL (component: ...) - mariadb 1:10.11.6-1 + [bookworm] - mariadb (Minor issue, will be fixed via point update) - mariadb-10.5 + [bullseye] - mariadb-10.5 (Minor issue, will be fixed via point update) - mariadb-10.3 - mysql-8.0 8.0.35-1 (bug #1055034) NOTE: Fixed in MariaDB: 11.2.2, 11.1.3, 11.0.4, 10.11.6, 10.10.7, 10.6.16, 10.5.23, 10.4.32 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aac75138bca9bd8c5b3d31abb68c4972fee9f4fc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aac75138bca9bd8c5b3d31abb68c4972fee9f4fc You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b437c9cb by Moritz Muehlenhoff at 2023-12-04T11:07:03+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -779,27 +779,43 @@ CVE-2023-49052 (File Upload vulnerability in Microweber v.2.0.4 allows a remote NOT-FOR-US: microweber CVE-2023-48952 (An issue in the box_deserialize_reusing function in openlink virtuoso- ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1175 CVE-2023-48951 (An issue in the box_equal function in openlink virtuoso-opensource v7. ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1177 CVE-2023-48950 (An issue in the box_col_len function in openlink virtuoso-opensource v ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1174 CVE-2023-48949 (An issue in the box_add function in openlink virtuoso-opensource v7.2. ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1173 CVE-2023-48948 (An issue in the box_div function in openlink virtuoso-opensource v7.2. ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1176 CVE-2023-48947 (An issue in the cha_cmp function of openlink virtuoso-opensource v7.2. ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1179 CVE-2023-48946 (An issue in the box_mpy function of openlink virtuoso-opensource v7.2. ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1178 CVE-2023-48945 (A stack overflow in openlink virtuoso-opensource v7.2.11 allows attack ...) - virtuoso-opensource + [bookworm] - virtuoso-opensource (Minor issue) + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1172 CVE-2023-47464 (Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 bef ...) NOT-FOR-US: GL.iNet AX1800 @@ -1048,15 +1064,23 @@ CVE-2023-46349 (In the module "Product Catalog (CSV, Excel) Export/Update" (upda NOT-FOR-US: PrestaShop module CVE-2023-42366 (A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in the next_ ...) - busybox + [bookworm] - busybox (Minor issue) + [bullseye] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15874 CVE-2023-42365 (A use-after-free vulnerability was discovered in BusyBox v.1.36.1 via ...) - busybox + [bookworm] - busybox (Minor issue) + [bullseye] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15871 CVE-2023-42364 (A use-after-free vulnerability in BusyBox v.1.36.1 allows attackers to ...) - busybox + [bookworm] - busybox (Minor issue) + [bullseye] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15868 CVE-2023-42363 (A use-after-free vulnerability was discovered in xasprintf function in ...) - busybox + [bookworm] - busybox (Minor issue) + [bullseye] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15865 CVE-2023-3545 (Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo ...) NOT-FOR-US: Chamilo LMS = data/dsa-needed.txt = @@ -81,8 +81,6 @@ squid -- varnish -- -xen (jmm) --- zbar unfixed upstream, initial aproaches are overly strict and cause zbar's tests to fail, some caution is in order -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b437c9cbfa47566bc2939bd89f582206d7e51e15 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b437c9cbfa47566bc2939bd89f582206d7e51e15 You're receiving
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a181c888 by Moritz Muehlenhoff at 2023-12-01T21:54:01+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -11249,6 +11249,7 @@ CVE-2023-5115 [malicious role archive can cause ansible-galaxy to overwrite arbi [bookworm] - ansible-core (Minor issue) [bullseye] - ansible-core (Minor issue) - ansible 5.4.0-1 + [bullseye] - ansible (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2233810 NOTE: https://github.com/ansible/ansible/pull/81780 NOTE: https://github.com/ansible/ansible/commit/ddf0311c63287e2d5334770377350c1e0cbfff28 @@ -14847,6 +14848,8 @@ CVE-2023-41537 (phpjabbers Business Directory Script 3.2 is vulnerable to Cross NOT-FOR-US: PHPJabbers CVE-2023-41039 (RestrictedPython is a restricted execution environment for Python to r ...) - restrictedpython 6.2-1 + [bookworm] - restrictedpython (Minor issue) + [bullseye] - restrictedpython (Minor issue) NOTE: https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-xjw2-6jm9-rf67 NOTE: Fixed by: https://github.com/zopefoundation/RestrictedPython/commit/4134aedcff17c977da7717693ed89ce56d54c120 CVE-2023-40848 (Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Bu ...) @@ -20928,6 +20931,8 @@ CVE-2023-36818 (Discourse is an open source discussion platform. In affected ver NOT-FOR-US: Discourse CVE-2023-36811 (borgbackup is an opensource, deduplicating archiver with compression a ...) - borgbackup 1.2.5-1 + [bookworm] - borgbackup (Minor issue) + [bullseye] - borgbackup (Minor issue) NOTE: https://github.com/borgbackup/borg/security/advisories/GHSA-8fjr-hghr-4m99 NOTE: https://github.com/borgbackup/borg/commit/a2ee13fd341dcd004b4a06b17d6f2fc759327861 NOTE: https://github.com/borgbackup/borg/commit/bfead4b288833f890523d8881797ff6b345edaf9 @@ -21654,6 +21659,8 @@ CVE-2023-37280 (Pimcore Admin Classic Bundle provides a Backend UI for Pimcore b NOT-FOR-US: Pimcore Admin Classic Bundle CVE-2023-37271 (RestrictedPython is a tool that helps to define a subset of the Python ...) - restrictedpython 6.2-1 (bug #1041429) + [bookworm] - restrictedpython (Minor issue) + [bullseye] - restrictedpython (Minor issue) NOTE: https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-wqc8-x2pr-7jqh NOTE: https://github.com/zopefoundation/RestrictedPython/commit/c8eca66ae49081f0016d2e1f094c3d72095ef531 (master) NOTE: https://github.com/zopefoundation/RestrictedPython/commit/d8c5aa72c5d0ec8eceab635d93d6bc8321116002 (5.3) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a181c8882ebcafac3889b7aa189520e9c023ec14 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a181c8882ebcafac3889b7aa189520e9c023ec14 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9afdec9f by Moritz Muehlenhoff at 2023-11-28T16:59:29+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/next-oldstable-point-update.txt Changes: = data/CVE/list = @@ -7320,6 +7320,8 @@ CVE-2023-5554 (Lack of TLS certificate verification in log transmission of a fin NOT-FOR-US: LINE CVE-2023-5072 (Denial of Service in JSON-Java versions up to and including 20230618. ...) - libjson-java (bug #1053882) + [bookworm] - libjson-java (Minor issue) + [bullseye] - libjson-java (Minor issue) [buster] - libjson-java (Minor issue) - jenkins-json (bug #1053883) [bookworm] - jenkins-json (Minor issue) @@ -71351,9 +71353,13 @@ CVE-2022-44012 (An issue was discovered in /DS/LM_API/api/SelectionService/Inser NOT-FOR-US: Simmeth Lieferantenmanager CVE-2022-44011 (An issue was discovered in ClickHouse before 22.9.1.2603. An authentic ...) - clickhouse + [bookworm] - clickhouse (Minor issue) + [bullseye] - clickhouse (Minor issue) NOTE: https://github.com/ClickHouse/ClickHouse/pull/40241 CVE-2022-44010 (An issue was discovered in ClickHouse before 22.9.1.2603. An attacker ...) - clickhouse + [bookworm] - clickhouse (Minor issue) + [bullseye] - clickhouse (Minor issue) NOTE: https://github.com/ClickHouse/ClickHouse/pull/40292 CVE-2022-44009 (Improper access control in Key-Value RBAC in StackStorm version 3.7.0 ...) NOT-FOR-US: StackStorm = data/next-oldstable-point-update.txt = @@ -100,4 +100,3 @@ CVE-2023-43887 [bullseye] - libde265 1.0.11-0+deb11u2 CVE-2023-47471 [bullseye] - libde265 1.0.11-0+deb11u2 -CVE-2022-27240 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9afdec9f7f782cfd87ba68516b73cb4f3910a5ac -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9afdec9f7f782cfd87ba68516b73cb4f3910a5ac You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 35cf6256 by Moritz Muehlenhoff at 2023-11-27T17:11:29+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2943,6 +2943,8 @@ CVE-2023-47004 (Buffer Overflow vulnerability in Redis RedisGraph v.2.x through NOT-FOR-US: RedisGraph CVE-2023-46998 (Cross Site Scripting vulnerability in BootBox Bootbox.js v.3.2 through ...) - libjs-bootbox (bug #1055612) + [bookworm] - libjs-bootbox (Minor issue) + [bullseye] - libjs-bootbox (Minor issue) NOTE: https://github.com/bootboxjs/bootbox/issues/661 CVE-2023-46845 (EC-CUBE 3 series (3.0.0 to 3.0.18-p6) and 4 series (4.0.0 to 4.0.6-p3, ...) NOT-FOR-US: EC-CUBE @@ -6489,6 +6491,7 @@ CVE-2023-42497 (Reflected cross-site scripting (XSS) vulnerability on the Export NOT-FOR-US: Liferay Portal CVE-2023-42459 (Fast DDS is a C++ implementation of the DDS (Data Distribution Service ...) - fastdds 2.11.2+ds-6 (bug #1054163) + [bullseye] - fastdds (Vulnerable code not present) NOTE: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-gq8g-fj58-22gm NOTE: https://github.com/eProsima/Fast-DDS/issues/3207 NOTE: https://github.com/eProsima/Fast-DDS/pull/3824 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/35cf6256accda513d05dc3bac764eff195fe21ad -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/35cf6256accda513d05dc3bac764eff195fe21ad You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 63c2ddcc by Moritz Muehlenhoff at 2023-11-27T11:26:48+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -56,6 +56,8 @@ CVE-2023-6293 (Prototype Pollution in GitHub repository robinbuschmann/sequelize NOT-FOR-US: sequelize-typescript CVE-2023-6277 (An out-of-memory flaw was found in libtiff. Passing a crafted tiff fil ...) - tiff 4.5.1+git230720-2 (bug #1056751) + [bookworm] - tiff (Minor issue) + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/614 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/545 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/5320c9d89c054fa805d037d84c57da874470b01a = data/dsa-needed.txt = @@ -16,8 +16,9 @@ cryptojs -- dnsdist (jmm) -- -fastdds - Awaiting feedback from maintainer on bullseye status +fastdds (jmm) +-- +freeimage (jmm) -- frr -- @@ -81,6 +82,8 @@ samba/oldstable -- squid -- +varnish +-- xen (jmm) -- zbar View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/63c2ddccd503001d583047ce4b7db7e17d270d9f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/63c2ddccd503001d583047ce4b7db7e17d270d9f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6718b1f7 by Moritz Muehlenhoff at 2023-11-22T17:02:18+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1149,6 +1149,8 @@ CVE-2023-1 [GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Exe - gimp 2.10.36-1 (bug #1055984) [buster] - gimp (DDS plugin added in 2.10.10) - gimp-dds + [bookworm] - gimp-dds (Obsoleted by src:gimp, should get dropped via Breaks) + [bullseye] - gimp-dds (Obsoleted by src:gimp, should get dropped via Breaks) NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1592/ NOTE: https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/7db71cd0b6e36c454aa0d2d3efeec7e636db4dbc (GIMP_2_10_36) @@ -6569,6 +6571,8 @@ CVE-2023-5563 (The SJA1000 CAN controller driver backend automatically attempt t NOT-FOR-US: Zephyr RTOS (unrelated to src:zephyr) CVE-2023-5557 (A flaw was found in the tracker-miners package. A weakness in the sand ...) - tracker-miners 3.4.5-1 (bug #1053881) + [bookworm] - tracker-miners (Minor issue) + [bullseye] - tracker-miners (Minor issue) NOTE: https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/#tracker-miners-seccomp-sandbox-escape NOTE: https://gitlab.gnome.org/GNOME/tracker-miners/-/issues/277 NOTE: https://gitlab.gnome.org/GNOME/tracker-miners/-/merge_requests/480 @@ -43353,6 +43357,8 @@ CVE-2023-26142 (All versions of the package crow are vulnerable to HTTP Response NOT-FOR-US: Crow CVE-2023-26141 (Versions of the package sidekiq before 7.1.3 are vulnerable to Denial ...) - ruby-sidekiq + [bookworm] - ruby-sidekiq (Minor issue) + [bullseye] - ruby-sidekiq (Minor issue) [buster] - ruby-sidekiq (Minor issue, DoS still possible) NOTE: https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107 NOTE: https://github.com/sidekiq/sidekiq/commit/62c90d7c5a7d8a378d79909859d87c2e0702bf89 (v7.1.3) @@ -229819,15 +229825,23 @@ CVE-2020-24296 RESERVED CVE-2020-24295 (Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in Fre ...) - freeimage + [bookworm] - freeimage (Revisit when patches are available) + [bullseye] - freeimage (Revisit when patches are available) NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24294 (Buffer Overflow vulnerability in psdParser::UnpackRLE function in PSDP ...) - freeimage + [bookworm] - freeimage (Revisit when patches are available) + [bullseye] - freeimage (Revisit when patches are available) NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24293 (Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp i ...) - freeimage + [bookworm] - freeimage (Revisit when patches are available) + [bullseye] - freeimage (Revisit when patches are available) NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24292 (Buffer Overflow vulnerability in load function in PluginICO.cpp in Fre ...) - freeimage + [bookworm] - freeimage (Revisit when patches are available) + [bullseye] - freeimage (Revisit when patches are available) NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24291 RESERVED @@ -481417,11 +481431,15 @@ CVE-2016-1245 (It was discovered that the zebra daemon in Quagga before 1.0.2016 CVE-2016-1244 (The extractTree function in unADF allows remote attackers to execute a ...) {DSA-3676-1 DLA-631-1} - unadf (bug #838248) + [bookworm] - unadf (Minor issue) + [bullseye] - unadf (Minor issue) NOTE: Fixed by: https://github.com/lclevy/ADFlib/commit/8e973d7b894552c3a3de0ccd2d1e9cb0b8e618dd NOTE: The changes between 0.7.11a-3 and 0.7.11a-4 did not include the upstream fix. CVE-2016-1243 (Stack-based buffer overflow in the extractTree function in unADF allow ...) {DSA-3676-1 DLA-631-1} - unadf (bug #838248) + [bookworm] - unadf (Minor issue) + [bullseye] - unadf (Minor issue) NOTE: Fixed by: https://github.com/lclevy/ADFlib/commit/8e973d7b894552c3a3de0ccd2d1e9cb0b8e618dd NOTE: The changes between 0.7.11a-3 and 0.7.11a-4 did not include the upstream fix. CVE-2016-1242 (file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6718b1f7011e963f7d1ed317be9f222859974ee4 -- View it on
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1a0109c5 by Moritz Muehlenhoff at 2023-11-22T10:59:25+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -76,9 +76,10 @@ CVE-2023-6238 (A buffer overflow vulnerability was found in the NVM Express (NVM CVE-2023-6235 (An uncontrolled search path element vulnerability has been found in th ...) NOT-FOR-US: Duet Display for Windows CVE-2023-6228 [heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c] - - tiff + - tiff (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/606 NOTE: Fixed by: https://gitlab.com/libtiff/libtiff/-/commit/1e7d217a323eac701b134afc4ae39b6bdfdbc96a + NOTE: Crash in CLI tool, no security impact CVE-2023-6213 (Memory safety bugs present in Firefox 119. Some of these bugs showed e ...) - firefox 120.0-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6213 @@ -1536,9 +1537,13 @@ CVE-2023-47117 (Label Studio is an open source data labeling tool. In all curren NOT-FOR-US: Label Studio CVE-2023-46446 (An issue in AsyncSSH v2.14.0 and earlier allows attackers to control t ...) - python-asyncssh (bug #1055999) + [bookworm] - python-asyncssh (Minor issue) + [bullseye] - python-asyncssh (Minor issue) NOTE: https://github.com/ronf/asyncssh/security/advisories/GHSA-c35q-ffpf-5qpm CVE-2023-46445 (An issue in AsyncSSH v2.14.0 and earlier allows attackers to control t ...) - python-asyncssh (bug #1056000) + [bookworm] - python-asyncssh (Minor issue) + [bullseye] - python-asyncssh (Minor issue) NOTE: https://github.com/ronf/asyncssh/security/advisories/GHSA-cfc2-wr2v-gxm5 CVE-2023-46021 (SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank ...) NOT-FOR-US: Code-Projects Blood Bank @@ -4573,6 +4578,8 @@ CVE-2023-46119 (Parse Server is an open source backend that can be deployed to a NOT-FOR-US: Parse Server CVE-2023-46118 (RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API ...) - rabbitmq-server + [bookworm] - rabbitmq-server (Minor issue) + [bullseye] - rabbitmq-server (Minor issue) NOTE: https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-w6cq-9cf4-gqpg NOTE: https://github.com/rabbitmq/rabbitmq-server/pull/9708 CVE-2023-4 (File Upload vulnerability in zzzCMS v.2.1.9 allows a remote attacker t ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a0109c5a3b29c102ddc93d794e6c0ba32b7e007 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1a0109c5a3b29c102ddc93d794e6c0ba32b7e007 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: c8df1691 by Moritz Muehlenhoff at 2023-11-20T22:22:29+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -6542,8 +6542,12 @@ CVE-2023-32724 (Memory pointer is in a property of the Ducktape object. This lea - zabbix (bug #1053877) [buster] - zabbix (vulnerable code introduced later) NOTE: https://support.zabbix.com/browse/ZBX-23391 + NOTE: https://github.com/zabbix/zabbix/commit/7266d0ac709b68ccb4d69d28253488670b8b4eb7 (release/5.0) + NOTE: https://github.com/zabbix/zabbix/commit/b28bf2f7081cffaeecbfb797d6e625e72679c06e (release/6.0) CVE-2023-32723 (Request to LDAP is sent before user permissions are checked.) - zabbix (bug #1053877) + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-23230 NOTE: very likely commit https://github.com/zabbix/zabbix/commit/3576afe9b87d8ad1ba92a13c28ba904671087688 (for 4.0.x) CVE-2023-32722 (The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow ...) @@ -10995,6 +10999,7 @@ CVE-2023-4568 (PaperCut NG allows for unauthenticated XMLRPC commands to be run NOT-FOR-US: PaperCut CVE-2023-42503 (Improper Input Validation, Uncontrolled Resource Consumption vulnerabi ...) - libcommons-compress-java 1.24.0-1 (bug #1052065) + [bookworm] - libcommons-compress-java (Minor issue) [bullseye] - libcommons-compress-java (Vulnerable code introduced later) [buster] - libcommons-compress-java (Vulnerable code introduced later) NOTE: https://lists.apache.org/thread/5xwcyr600mn074vgxq92tjssrchmc93c @@ -51544,6 +51549,7 @@ CVE-2023-23457 (A Segmentation fault was found in UPX in PackLinuxElf64::invert_ NOTE: https://github.com/upx/upx/issues/631 CVE-2023-23456 (A heap-based buffer overflow issue was discovered in UPX in PackTmt::p ...) - upx-ucl (bug #1033258) + [bullseye] - upx-ucl (Minor issue) [buster] - upx-ucl (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2160381 NOTE: https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4 @@ -62772,6 +62778,8 @@ CVE-2022-41985 (An authentication bypass vulnerability exists in the Authenticat NOT-FOR-US: uC-FTPs CVE-2022-46337 (A cleverly devised username might bypass LDAP authentication checks. I ...) - derby + [bookworm] - derby (Minor issue) + [bullseye] - derby (Minor issue) NOTE: https://issues.apache.org/jira/browse/DERBY-7147 NOTE: https://www.openwall.com/lists/oss-security/2023/11/19/3 CVE-2022-46336 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8df16913c86b0c6997fa87f1eb455d033b86d59 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8df16913c86b0c6997fa87f1eb455d033b86d59 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7c17f80f by Moritz Muehlenhoff at 2023-11-17T10:12:46+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -17,33 +17,40 @@ CVE-2023-48649 (Concrete CMS before 8.5.13 and 9.x before 9.2.2 allows stored XS CVE-2023-48648 (Concrete CMS before 8.5.13 and 9.x before 9.2.2 allows unauthorized ac ...) NOT-FOR-US: Concrete CMS CVE-2023-48237 (Vim is an open source command line text editor. In affected versions w ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87 NOTE: https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e (v9.0.2112) + NOTE: Self-inflicted crash, no security impact CVE-2023-48236 (Vim is an open source command line text editor. When using the z= comm ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5 NOTE: https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968 (v9.0.2111) + NOTE: Self-inflicted crash, no security impact CVE-2023-48235 (Vim is an open source command line text editor. When parsing relative ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g NOTE: https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 (v9.0.2110) + NOTE: Self-inflicted crash, no security impact CVE-2023-48234 (Vim is an open source command line text editor. When getting the count ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq NOTE: https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca (v9.0.2109) + NOTE: Self-inflicted crash, no security impact CVE-2023-48233 (Vim is an open source command line text editor. If the count after the ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj NOTE: https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78 (v9.0.2108) + NOTE: Self-inflicted crash, no security impact CVE-2023-48232 (Vim is an open source command line text editor. A floating point excep ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw NOTE: https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce (v9.0.2107) + NOTE: Self-inflicted crash, no security impact CVE-2023-48231 (Vim is an open source command line text editor. When closing a window, ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765 NOTE: https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a (v9.0.2106) + NOTE: Self-inflicted crash, no security impact CVE-2023-48222 (Rundeck is an open source automation service with a web console, comma ...) TODO: check CVE-2023-48078 (SQL Injection vulnerability in add.php in Simple CRUD Functionality v1 ...) = data/dsa-needed.txt = @@ -19,12 +19,16 @@ dnsdist (jmm) fastdds Awaiting feedback from maintainer on bullseye status -- +frr +-- gimp (carnil) -- gpac/oldstable -- gst-plugins-bad1.0 (carnil) -- +h2o (jmm) +-- intel-microcode (carnil) wait for exposure of update in unstable -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c17f80f6ed5b997c00b5567c23d35b9b25aba15 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c17f80f6ed5b997c00b5567c23d35b9b25aba15 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b8b4809a by Moritz Muehlenhoff at 2023-11-16T22:07:05+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6,6 +6,7 @@ CVE-2023-6176 (A null pointer dereference flaw was found in the Linux kernel API NOTE: https://git.kernel.org/linus/cfaa80c91f6f99b9342b6557f0f0e1143e434066 (6.6-rc2) CVE-2023-6174 (SSH dissector crash in Wireshark 4.0.0 to 4.0.10 allows denial of serv ...) - wireshark + [bullseye] - wireshark (Only affects 4.x) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-28.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19369 CVE-2023-6121 (An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsy ...) @@ -12492,6 +12493,8 @@ CVE-2023-40316 - moodle CVE-2023-38037 [Active Support Possibly Discloses Locally Encrypted Files] - rails (bug #1051057) + [bookworm] - rails (Minor issue) + [bullseye] - rails (Minor issue) NOTE: https://github.com/advisories/GHSA-cr5q-6q9f-rq6q NOTE: https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2023-38037.yml NOTE: https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731 (v7.0.7.1) @@ -36216,6 +36219,8 @@ CVE-2023-28363 CVE-2023-28362 [Possible XSS via User Supplied Values to redirect_to] RESERVED - rails (bug #1051058) + [bookworm] - rails (Minor issue) + [bullseye] - rails (Minor issue) NOTE: https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132 NOTE: https://github.com/rails/rails/commit/69e37c84e3f77d75566424c7d0015172d6a6fac5 (main) NOTE: https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441 (v6.1.7.4) = data/dsa-needed.txt = @@ -92,6 +92,8 @@ tor (jmm) -- webkit2gtk (berto) -- +wireshark/stable +-- xen (jmm) -- zbar View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b8b4809a931283d31c3f6f9c86a82f8e20858468 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b8b4809a931283d31c3f6f9c86a82f8e20858468 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1acf5ec2 by Moritz Muehlenhoff at 2023-11-16T21:27:57+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2192,6 +2192,8 @@ CVE-2023-5707 (The SEO Slider plugin for WordPress is vulnerable to Stored Cross NOT-FOR-US: WordPress plugin CVE-2023-5088 (A bug in QEMU could cause a guest I/O operation otherwise addressed to ...) - qemu 1:8.1.1+ds-2 + [bookworm] - qemu (Minor issue) + [bullseye] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2247283 NOTE: https://lore.kernel.org/all/20230921160712.99521-1-simon.r...@nutanix.com/T/ NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2023-09/msg01011.html @@ -28708,9 +28710,13 @@ CVE-2023-2089 (A vulnerability was found in SourceCodester Complaint Management NOT-FOR-US: SourceCodester Complaint Management System CVE-2023-2088 (A flaw was found in OpenStack due to an inconsistency between Cinder a ...) - cinder 2:21.1.0-3 (bug #1035961) + [bullseye] - cinder (Minor issue) - python-glance-store 4.1.0-4 (bug #1035962; bug #1035978) + [bullseye] - python-glance-store (Minor issue) - nova 2:26.1.0-4 (bug #1035963; bug #1035981) + [bullseye] - nova (Minor issue) - python-os-brick 4.1.0-3 (bug #1035932) + [bullseye] - python-os-brick (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/05/10/5 NOTE: https://bugs.launchpad.net/nova/+bug/2004555 CVE-2023-2087 (The Essential Blocks plugin for WordPress is vulnerable to Cross-Site ...) = data/dsa-needed.txt = @@ -11,8 +11,6 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. --- -cinder/oldstable -- cryptojs -- @@ -23,7 +21,7 @@ fastdds -- gimp (carnil) -- -gpac/oldstable (jmm) +gpac/oldstable -- gst-plugins-bad1.0 (carnil) -- @@ -47,8 +45,6 @@ nghttp2 nodejs maintainer proposed to follow the upstream 18.x LTS branch -- -nova/oldstable --- php-cas/oldstable -- php-horde-mime-viewer/oldstable @@ -63,10 +59,6 @@ python3.11/stable -- python3.9/oldstable -- -python-glance-store/oldstable --- -python-os-brick/oldstable --- redmine/stable -- ring @@ -96,7 +88,7 @@ squid -- tiff (aron) -- -tor +tor (jmm) -- webkit2gtk (berto) -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1acf5ec2fd721052131499f888e5501c18634f1c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1acf5ec2fd721052131499f888e5501c18634f1c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f01e3f85 by Moritz Muehlenhoff at 2023-11-16T12:44:50+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -28,6 +28,8 @@ CVE-2023-47638 REJECTED CVE-2023-47471 (Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a ...) - libde265 + [bookworm] - libde265 (Minor issue) + [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/426 NOTE: https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 CVE-2023-47470 (Buffer Overflow vulnerability in Ffmpeg before github commit 456574705 ...) @@ -416,7 +418,7 @@ CVE-2023-46096 (A vulnerability has been identified in SIMATIC PCS neo (All vers CVE-2023-45794 (A vulnerability has been identified in Mendix Applications using Mendi ...) NOT-FOR-US: Siemens CVE-2023-45684 (Northern.tech CFEngine Enterprise before 3.21.3 allows SQL Injection. ...) - - cfengine3 + - cfengine3 (Only affects CFEngine Enterprise) NOTE: https://cfengine.com/blog/2023/cve-2023-45684/ CVE-2023-45585 (An insertion of sensitive information into log file vulnerability [CWE ...) NOT-FOR-US: FortiGuard = data/dsa-needed.txt = @@ -14,6 +14,10 @@ If needed, specify the release by adding a slash after the name of the source pa -- cinder/oldstable -- +cryptojs +-- +dnsdist (jmm) +-- fastdds Awaiting feedback from maintainer on bullseye status -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f01e3f858260623a2b8e5ef899e6da388c48085d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f01e3f858260623a2b8e5ef899e6da388c48085d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cbf5d52a by Moritz Muehlenhoff at 2023-11-16T11:57:11+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -32,9 +32,13 @@ CVE-2023-47471 (Buffer Overflow vulnerability in strukturag libde265 v1.10.12 al NOTE: https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7 CVE-2023-47470 (Buffer Overflow vulnerability in Ffmpeg before github commit 456574705 ...) - ffmpeg 7:6.1-1 + [bookworm] - ffmpeg (Vulnerable code not present) + [bullseye] - ffmpeg (Vulnerable code not present) + [buster] - ffmpeg (Vulnerable code not present) NOTE: https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 (n6.1) NOTE: https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael%40niedermayer.cc/ NOTE: https://github.com/goldds96/Report/tree/main/FFmpeg + NOTE: Introduced in https://github.com/FFmpeg/FFmpeg/commit/34e4f18360c4ecb8e5979cab8f389478d8cd7819 CVE-2023-47444 (An issue discovered in OpenCart 4.0.0.0 to 4.0.2.3 allows authenticate ...) TODO: check CVE-2023-47347 (Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cau ...) @@ -5928,6 +5932,8 @@ CVE-2023-32723 (Request to LDAP is sent before user permissions are checked.) NOTE: very likely commit https://github.com/zabbix/zabbix/commit/3576afe9b87d8ad1ba92a13c28ba904671087688 (for 4.0.x) CVE-2023-32722 (The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow ...) - zabbix (bug #1053877) + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) [buster] - zabbix (vulnerable code introduced later) NOTE: https://support.zabbix.com/browse/ZBX-23390 CVE-2023-32721 (A stored XSS has been found in the Zabbix web application in the Maps ...) @@ -33638,6 +33644,7 @@ CVE-2023-29001 RESERVED CVE-2023-29000 (The Nextcloud Desktop Client is a tool to synchronize files from Nextc ...) - nextcloud-desktop 3.7.0-1 + [bullseye] - nextcloud-desktop (Minor issue) [buster] - nextcloud-desktop (Minor issue) NOTE: https://github.com/nextcloud/desktop/pull/4949 NOTE: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534 @@ -33651,11 +33658,13 @@ CVE-2023-28999 (Nextcloud is an open-source productivity platform. In Nextcloud NOTE: https://github.com/nextcloud/desktop/pull/5560 CVE-2023-28998 (The Nextcloud Desktop Client is a tool to synchronize files from Nextc ...) - nextcloud-desktop 3.7.0-1 + [bullseye] - nextcloud-desktop (Minor issue) [buster] - nextcloud-desktop (Minor issue) NOTE: https://github.com/nextcloud/desktop/pull/5323 NOTE: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr CVE-2023-28997 (The Nextcloud Desktop Client is a tool to synchronize files from Nextc ...) - nextcloud-desktop 3.7.0-1 + [bullseye] - nextcloud-desktop (Minor issue) [buster] - nextcloud-desktop (Minor issue) NOTE: https://github.com/nextcloud/desktop/pull/5324 NOTE: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc @@ -113225,6 +113234,7 @@ CVE-2022-29154 (An issue was discovered in rsync before 3.2.5 that allows malici NOTE: https://git.samba.org/?p=rsync.git;a=commit;h=2f7c583143bc6e80902139c23d9d7283f88fbc6a (v3.2.5pre1) CVE-2022-29153 (HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11. ...) - consul 1.9.17+dfsg2-1 (bug #1017982) + [bullseye] - consul (Minor issue) [buster] - consul (Intrusive to backport) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393 NOTE: https://github.com/hashicorp/consul/commit/72e1ce6317d6a4b28c73cd15f3976eb2c362be19 (v1.9.17) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbf5d52a8fe0533e9eab8b136fa191c981b16ef3 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbf5d52a8fe0533e9eab8b136fa191c981b16ef3 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5c174d13 by Moritz Muehlenhoff at 2023-11-15T11:26:23+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -18,6 +18,8 @@ CVE-2023-47678 (An improper access control vulnerability exists in RT-AC87U all NOT-FOR-US: ASUSTeK CVE-2023-47641 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...) - python-aiohttp 3.8.1-2 + [bookworm] - python-aiohttp (Minor issue) + [bullseye] - python-aiohttp (Minor issue) NOTE: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j NOTE: https://github.com/aio-libs/aiohttp/commit/f016f0680e4ace6742b03a70cb0382ce86abe371 (v3.8.0b0) CVE-2023-47640 (DataHub is an open-source metadata platform. The HMAC signature for Da ...) @@ -28,6 +30,8 @@ CVE-2023-47630 (Kyverno is a policy engine designed for Kubernetes. An issue was NOT-FOR-US: Kyverno CVE-2023-47627 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...) - python-aiohttp 3.8.6-1 + [bookworm] - python-aiohttp (Minor issue) + [bullseye] - python-aiohttp (Minor issue) NOTE: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-gfw2-4jvh-wgfg NOTE: https://github.com/aio-libs/aiohttp/commit/d5c12ba890557a575c313bb3017910d7616fce3d (v3.8.6) CVE-2023-47586 (Multiple heap-based buffer overflow vulnerabilities exist in V-Server ...) @@ -1110,6 +1114,8 @@ CVE-2023-45875 (An issue was discovered in Couchbase Server 7.2.0. There is a pr NOT-FOR-US: Couchbase Server CVE-2023-45857 (An issue discovered in Axios 1.5.1 inadvertently reveals the confident ...) - node-axios + [bookworm] - node-axios (Minor issue) + [bullseye] - node-axios (Minor issue) NOTE: https://github.com/axios/axios/issues/6006 CVE-2023-45225 (Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, ...) NOT-FOR-US: Zavio = data/dsa-needed.txt = @@ -19,6 +19,8 @@ cinder/oldstable fastdds Awaiting feedback from maintainer on bullseye status -- +gimp +-- gpac/oldstable (jmm) -- intel-microcode (carnil) @@ -92,6 +94,8 @@ squid -- tiff (aron) -- +tor +-- xen (jmm) -- zbar View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5c174d13cb3c42bf2643b125d0e78af75826a749 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5c174d13cb3c42bf2643b125d0e78af75826a749 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f48e587f by Moritz Muehlenhoff at 2023-11-14T17:18:56+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -261,10 +261,14 @@ CVE-2023-47122 (Gitsign is software for keyless Git signing using Sigstore. In v - gitsign (bug #1019518) CVE-2023-46850 (Use after free in OpenVPN version 2.6.0 to 2.6.6 may lead to undefined ...) - openvpn 2.6.7-1 (bug #1055805) + [bullseye] - openvpn (Vulnerable code not present) + [buster] - openvpn (Vulnerable code not present) NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2023-46850 NOTE: https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/ CVE-2023-46849 (Using the --fragment option in certain configuration setups OpenVPN ve ...) - openvpn 2.6.7-1 (bug #1055805) + [bullseye] - openvpn (Vulnerable code not present) + [buster] - openvpn (Vulnerable code not present) NOTE: https://community.openvpn.net/openvpn/wiki/CVE-2023-46849 NOTE: https://openvpn.net/security-advisory/access-server-security-update-cve-2023-46849-cve-2023-46850/ CVE-2023-6076 (A vulnerability classified as problematic was found in PHPGurukul Rest ...) @@ -5252,6 +5256,8 @@ CVE-2023-32722 (The zabbix/src/libs/zbxjson module is vulnerable to a buffer ove NOTE: https://support.zabbix.com/browse/ZBX-23390 CVE-2023-32721 (A stored XSS has been found in the Zabbix web application in the Maps ...) - zabbix (bug #1053877) + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-23389 NOTE: possible upstream fix (4.0.x) https://github.com/zabbix/zabbix/commit/d05854bc0e638bbc0c2077ded09797648dba0911 CVE-2023-5535 (Use After Free in GitHub repository vim/vim prior to v9.0.2010.) @@ -13371,6 +13377,8 @@ CVE-2023-4427 (Out of bounds memory access in V8 in Google Chrome prior to 116.0 [buster] - chromium (see DSA 5046) CVE-2023-40175 (Puma is a Ruby/Rack web server built for parallelism. Prior to version ...) - puma 5.6.7-1 (bug #1050079) + [bookworm] - puma (Minor issue) + [bullseye] - puma (Minor issue) [buster] - puma (invasive to backport) NOTE: https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8 NOTE: https://github.com/puma/puma/commit/690155e7d644b80eeef0a6094f9826ee41f1080a (master) = data/dsa-needed.txt = @@ -38,6 +38,8 @@ nodejs -- nova/oldstable -- +openvpn (jmm) +-- php-cas/oldstable -- php-horde-mime-viewer/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f48e587f848d5df04942cd885d8ae7e736fc55e6 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f48e587f848d5df04942cd885d8ae7e736fc55e6 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 24e76af0 by Moritz Muehlenhoff at 2023-11-12T19:34:58+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3152,6 +3152,8 @@ CVE-2023-46602 (In International Color Consortium DemoIccMAX 79ecb74, there is a NOT-FOR-US: International Color Consortium DemoIccMAX CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataS ...) - wabt (bug #1055299) + [bookworm] - wabt (Minor issue) + [bullseye] - wabt (Minor issue) NOTE: https://github.com/WebAssembly/wabt/issues/2311 CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegm ...) - wabt (unimportant) @@ -9608,6 +9610,8 @@ CVE-2023-4913 (Cross-site Scripting (XSS) - Reflected in GitHub repository cecil NOT-FOR-US: cecil.app CVE-2023-4759 (Arbitrary File Overwrite in Eclipse JGit <= 6.6.0 In Eclipse JGit, al ...) - jgit + [bookworm] - jgit (Minor issue) + [bullseye] - jgit (Minor issue) [buster] - jgit (Minor issue. Only case-insensitive filesystems are affected) NOTE: https://git.eclipse.org/c/jgit/jgit.git/commit/?id=9072103f3b3cf64dd12ad2949836ab98f62dabf1 (v6.6.1.202309021850-r) NOTE: https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/11 @@ -43093,7 +43097,6 @@ CVE-2022-4907 (Uninitialized Use in FFmpeg in Google Chrome prior to 108.0.5359. - chromium 108.0.5359.71-1 [buster] - chromium (see DSA 5046) - ffmpeg 7:6.0-4 - [bookworm] - ffmpeg (Minor issue, wait until it lands in 5.1.x) [bullseye] - ffmpeg (Vulnerable code introduced later) [buster] - ffmpeg (Vulnerable code introduced later) NOTE: Fixed by: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/e601ec3c1991ee09ff45db3be4d894e5774f6f2b (n6.0) = data/dsa-needed.txt = @@ -17,6 +17,8 @@ cinder/oldstable fastdds Awaiting feedback from maintainer on bullseye status -- +ffmpeg/stable (jmm) +-- gpac/oldstable (jmm) -- libreswan (jmm) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24e76af012b54053a8763f2746c36fb7ac797e69 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24e76af012b54053a8763f2746c36fb7ac797e69 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 34647b7b by Moritz Muehlenhoff at 2023-11-09T10:12:09+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -8006,6 +8006,8 @@ CVE-2023-43644 (Sing-box is an open source proxy system. Affected versions are s NOT-FOR-US: sing-box CVE-2023-43642 (snappy-java is a Java port of the snappy, a fast C++ compresser/decomp ...) - snappy-java 1.1.10.5-1 (bug #1053474) + [bookworm] - snappy-java (Minor issue) + [bullseye] - snappy-java (Minor issue) NOTE: https://github.com/xerial/snappy-java/commit/9f8c3cf74223ed0a8a834134be9c917b9f10ceb5 (v1.1.10.4) NOTE: https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv CVE-2023-43458 (Cross Site Scripting (XSS) vulnerability in Resort Reservation System ...) @@ -125639,7 +125641,7 @@ CVE-2022-24576 (GPAC 1.0.1 is affected by Use After Free through MP4Box.) NOTE: https://github.com/gpac/gpac/commit/96699aabae042f8f55cf8a85fa5758e3db752bae (v2.0.0) CVE-2022-24575 (GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box ...) - gpac 2.0.0+dfsg1-2 - [bullseye] - gpac (Minor issue) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2058 @@ -136976,7 +136978,7 @@ CVE-2021-45289 (A vulnerability exists in GPAC 1.0.1 due to an omission of secur NOTE: https://github.com/gpac/gpac/commit/5e1f084e0c6ad2736c9913715c4abb57c554209d (v2.0.0) CVE-2021-45288 (A Double Free vulnerability exists in filedump.c in GPAC 1.0.1, which ...) - gpac 2.0.0+dfsg1-2 - [bullseye] - gpac (Minor issue) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1956 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/34647b7b70c7b1c853f012b5af50ee250a880780 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/34647b7b70c7b1c853f012b5af50ee250a880780 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1845b22c by Moritz Muehlenhoff at 2023-11-08T12:36:28+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -926,6 +926,7 @@ CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP NOTE: https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8 CVE-2023-46928 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...) - gpac (bug #1055298) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2661 NOTE: https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1 @@ -3802,6 +3803,7 @@ CVE-2011-10004 (A vulnerability was found in reciply Plugin up to 1.1.7 on WordP NOT-FOR-US: WordPress plugin CVE-2023-5595 (Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV.) - gpac (bug #1055125) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e NOTE: https://github.com/gpac/gpac/issues/2633 @@ -4469,6 +4471,7 @@ CVE-2023-44187 (An Exposure of Sensitive Information vulnerability in the 'file NOT-FOR-US: Juniper CVE-2023-42298 (An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to ca ...) - gpac (bug #1053878) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2567 NOTE: https://github.com/gpac/gpac/commit/16c4fafc2881112eba7051cac48f922eb2b94e06 @@ -10633,6 +10636,7 @@ CVE-2023-4718 (The Font Awesome 4 Menus plugin for WordPress is vulnerable to St NOT-FOR-US: Font Awesome 4 Menus plugin for WordPress CVE-2023-4722 (Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to ...) - gpac (bug #1051740) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/commit/de7f3a852bef72a52825fd307cf4e8f486401a76 NOTE: https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830 = data/dsa-needed.txt = @@ -60,6 +60,8 @@ python-glance-store/oldstable -- python-os-brick/oldstable -- +redmine/stable +-- ring might make sense to rebase to current version -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1845b22cc9848cecd3ab90e9732084e7787a9650 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1845b22cc9848cecd3ab90e9732084e7787a9650 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 4c5363e5 by Moritz Muehlenhoff at 2023-11-07T20:32:55+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -18019,6 +18019,8 @@ CVE-2023-29156 (DroneScout ds230 Remote ID receiver from BlueMark Innovationsis NOT-FOR-US: Rockwell CVE-2022-48521 (An issue was discovered in OpenDKIM through 2.10.3, and 2.11.x through ...) - opendkim (bug #1041107) + [bookworm] - opendkim (Minor issue) + [bullseye] - opendkim (Minor issue) NOTE: https://github.com/trusteddomainproject/OpenDKIM/issues/148 CVE-2023-36543 (Apache Airflow, versions before 2.6.3, has a vulnerability where an au ...) - airflow (bug #819700) @@ -18898,6 +18900,7 @@ CVE-2023-36608 (The affected TBox RTUs store hashed passwords using MD5 encrypti NOT-FOR-US: TBox CVE-2023-36377 (Buffer Overflow vulnerability in mtrojnar osslsigncode v.2.3 and befor ...) - osslsigncode 2.3.0-1 (bug #1035875) + [bullseye] - osslsigncode (Minor issue) NOTE: https://github.com/mtrojnar/osslsigncode/releases/tag/2.3 CVE-2023-36291 (Cross Site Scripting vulnerability in Maxsite CMS v.108.7 allows a rem ...) NOT-FOR-US: Maxsite CMS @@ -82631,18 +82634,21 @@ CVE-2022-39252 (matrix-rust-sdk is an implementation of a Matrix client-server l NOT-FOR-US: matrix-rust-sdk CVE-2022-39251 (Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. ...) - node-matrix-js-sdk (bug #1021136) + [bullseye] - node-matrix-js-sdk (Incompatible with current Matrix implementations) [buster] - node-matrix-js-sdk (Can wait for next update) NOTE: https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c NOTE: https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76 NOTE: https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients CVE-2022-39250 (Matrix JavaScript SDK is the Matrix Client-Server software development ...) - node-matrix-js-sdk (bug #1021136) + [bullseye] - node-matrix-js-sdk (Incompatible with current Matrix implementations) [buster] - node-matrix-js-sdk (Can wait for next update) NOTE: https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-5w8r-8pgj-5jmf NOTE: https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76 NOTE: https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients CVE-2022-39249 (Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. ...) - node-matrix-js-sdk (bug #1021136) + [bullseye] - node-matrix-js-sdk (Incompatible with current Matrix implementations) [buster] - node-matrix-js-sdk (Can wait for next update) NOTE: https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg NOTE: https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76 @@ -82684,6 +82690,7 @@ CVE-2022-39237 (syslabs/sif is the Singularity Image Format (SIF) reference impl NOTE: https://github.com/sylabs/sif/commit/a854038ce1f18237b81d505a1c3be6a60505db52 (v2.8.1) CVE-2022-39236 (Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. ...) - node-matrix-js-sdk (bug #1021136) + [bullseye] - node-matrix-js-sdk (Incompatible with current Matrix implementations) [buster] - node-matrix-js-sdk (Minor issue) NOTE: https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x NOTE: https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76 = data/dsa-needed.txt = @@ -73,6 +73,8 @@ ruby-nokogiri/oldstable -- ruby-rails-html-sanitizer -- +ruby-sanitize +-- ruby-sinatra/oldstable Maintainer posted packaging repository link with proposed changes for review -- @@ -88,3 +90,6 @@ tiff (aron) -- xen (jmm) -- +zbar + unfixed upstream +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4c5363e59507a38b049fa27f1f0ea7731faee9de -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4c5363e59507a38b049fa27f1f0ea7731faee9de You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8b140a47 by Moritz Muehlenhoff at 2023-11-06T23:38:48+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2265,9 +2265,7 @@ CVE-2023-44760 (Multiple Cross Site Scripting (XSS) vulnerabilities in Concrete CVE-2023-43358 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a ...) NOT-FOR-US: CMSmadesimple CVE-2023-43281 (Double Free vulnerability in Nothings Stb Image.h v.2.28 allows a remo ...) - - libstb - NOTE: https://github.com/peccc/double-stb - TODO: check, is this duplicate of CVE-2023-45664? + NOTE: Duplicate of CVE-2023-45664 CVE-2023-39817 REJECTED CVE-2023-39816 @@ -3970,6 +3968,8 @@ CVE-2023-5554 (Lack of TLS certificate verification in log transmission of a fin CVE-2023-5072 (Denial of Service in JSON-Java versions up to and including 20230618. ...) - libjson-java (bug #1053882) - jenkins-json (bug #1053883) + [bookworm] - jenkins-json (Minor issue) + [bullseye] - jenkins-json (Minor issue) - libjettison-java (bug #1053884) [bookworm] - libjettison-java (Minor issue) [bullseye] - libjettison-java (Minor issue) @@ -5715,6 +5715,8 @@ CVE-2023-33268 (An issue was discovered in DTS Monitoring 3.57.0. The parameter NOT-FOR-US: DTS Monitoring CVE-2023-5366 (A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertise ...) - openvswitch 3.1.2-1 + [bookworm] - openvswitch (Minor issue) + [bullseye] - openvswitch (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2006347 NOTE: https://github.com/openvswitch/ovs/commit/694c7b4e097c4d89e23ea9b3c7b677b4fcbe0459 (v3.1.2) NOTE: https://github.com/openvswitch/ovs/commit/489553b1c21692063931a9f50b6849b23128443c (v3.2.0) @@ -14293,6 +14295,8 @@ CVE-2023-38698 (Ethereum Name Service (ENS) is a distributed, open, and extensib NOT-FOR-US: Ethereum Name Service (ENS) CVE-2023-38697 (protocol-http1 provides a low-level implementation of the HTTP/1 proto ...) - ruby-protocol-http1 (bug #1043432) + [bookworm] - ruby-protocol-http1 (Minor issue) + [bullseye] - ruby-protocol-http1 (Minor issue) NOTE: https://github.com/socketry/protocol-http1/pull/20 NOTE: https://www.rfc-editor.org/rfc/rfc9112#name-chunked-transfer-coding NOTE: https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj @@ -21437,6 +21441,8 @@ CVE-2020-36705 (The Adning Advertising plugin for WordPress is vulnerable to arb CVE-2023-33865 (RenderDoc before 1.27 allows local privilege escalation via a symlink ...) {DLA-3501-1} - renderdoc (bug #1037208) + [bookworm] - renderdoc (Minor issue) + [bullseye] - renderdoc (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3 NOTE: https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856 (v1.27) NOTE: https://github.com/baldurk/renderdoc/commit/e0464fea4f9a7f149c4ee1d84e5ac57839a4a862 (v1.27) @@ -21446,6 +21452,8 @@ CVE-2023-33865 (RenderDoc before 1.27 allows local privilege escalation via a sy CVE-2023-33864 (StreamReader::ReadFromExternal in RenderDoc before 1.27 allows an Inte ...) {DLA-3501-1} - renderdoc (bug #1037208) + [bookworm] - renderdoc (Minor issue) + [bullseye] - renderdoc (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3 NOTE: https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856 (v1.27) NOTE: https://github.com/baldurk/renderdoc/commit/e0464fea4f9a7f149c4ee1d84e5ac57839a4a862 (v1.27) @@ -21455,6 +21463,8 @@ CVE-2023-33864 (StreamReader::ReadFromExternal in RenderDoc before 1.27 allows a CVE-2023-33863 (SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow wit ...) {DLA-3501-1} - renderdoc (bug #1037208) + [bookworm] - renderdoc (Minor issue) + [bullseye] - renderdoc (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/06/06/3 NOTE: https://github.com/baldurk/renderdoc/commit/601ed56111ce3803d8476d438ade1c92d6092856 (v1.27) NOTE: https://github.com/baldurk/renderdoc/commit/e0464fea4f9a7f149c4ee1d84e5ac57839a4a862 (v1.27) @@ -130847,6 +130857,7 @@ CVE-2022-22996 (The G-RAID 4/8 Software Utility setups for Windows were affected NOT-FOR-US: Western Digital Windows setup CVE-2022-22995 (The combination of primitives offered by SMB and AFP in their default ...) - netatalk 3.1.18~ds-1 (bug #1053545) + [bullseye] - netatalk (Minor issue) NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1cf10d84 by Moritz Muehlenhoff at 2023-11-05T17:51:49+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -768,6 +768,8 @@ CVE-2023-46451 (Best Courier Management System v1.0 is vulnerable to Cross Site NOT-FOR-US: Best Courier Management System CVE-2023-46361 (Artifex Software jbig2dec v0.20 was discovered to contain a SEGV vulne ...) - jbig2dec (bug #1055387) + [bookworm] - jbig2dec (Minor issue) + [bullseye] - jbig2dec (Minor issue) NOTE: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/jbig2dec-SEGV/jbig2dec-SEGV.md NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=707308 CVE-2023-46356 (In the module "CSV Feeds PRO" (csvfeeds) before 2.6.1 from Bl Modules ...) @@ -10546,6 +10548,8 @@ CVE-2023-40582 (find-exec is a utility to discover available shell commands. Ver CVE-2023-40188 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) {DLA-3606-1} - freerdp2 2.11.2+dfsg1-1 (bug #1051638) + [bookworm] - freerdp2 (Minor issue) + [bullseye] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9w28-wwj5-p4xq NOTE: https://github.com/FreeRDP/FreeRDP/commit/bdb3909a7713fb0b3d94c9676fe44d19de80eb4b (2.11.0) CVE-2023-40187 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) @@ -10556,6 +10560,8 @@ CVE-2023-40187 (FreeRDP is a free implementation of the Remote Desktop Protocol CVE-2023-40186 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) {DLA-3606-1} - freerdp2 2.11.2+dfsg1-1 (bug #1051638) + [bookworm] - freerdp2 (Minor issue) + [bullseye] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v NOTE: https://github.com/FreeRDP/FreeRDP/commit/d8a1ac342ae375644c70579c33b5cf38fb43b083 (2.11.0) CVE-2023-40184 (xrdp is an open source remote desktop protocol (RDP) server. In versio ...) @@ -10568,6 +10574,8 @@ CVE-2023-40184 (xrdp is an open source remote desktop protocol (RDP) server. In CVE-2023-40181 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) {DLA-3606-1} - freerdp2 2.11.2+dfsg1-1 (bug #1051638) + [bookworm] - freerdp2 (Minor issue) + [bullseye] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxp4-rx7x-h2g8 NOTE: https://github.com/FreeRDP/FreeRDP/commit/c23cbdc4a5756bd723223c7139654de7439fdcc0 (2.11.0) CVE-2023-3992 (The PostX WordPress plugin before 3.0.6 does not sanitise and escape a ...) @@ -11253,6 +11261,8 @@ CVE-2023-40570 (Datasette is an open source multi-tool for exploring and publish CVE-2023-40569 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) {DLA-3606-1} - freerdp2 (bug #1051638) + [bookworm] - freerdp2 (Minor issue) + [bullseye] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp NOTE: https://github.com/FreeRDP/FreeRDP/commit/23c3daeca1598393f8c93f563f7847a4d67919f1 (2.11.0) CVE-2023-40568 @@ -11260,6 +11270,8 @@ CVE-2023-40568 CVE-2023-40567 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) {DLA-3606-1} - freerdp2 2.11.2+dfsg1-1 (bug #1051638) + [bookworm] - freerdp2 (Minor issue) + [bullseye] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2w9f-8wg4-8jfp NOTE: https://github.com/FreeRDP/FreeRDP/commit/bacb8c016ef72aa767760b6b01d15500aee9d59a (2.11.0) CVE-2023-40530 (Improper authorization in handler for custom URL scheme issue in 'Skyl ...) @@ -29909,9 +29921,8 @@ CVE-2023-29454 (Stored or persistent cross-site scripting (XSS) is a type of XSS [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-22985 CVE-2023-29453 (Templates do not properly consider backticks (`) as Javascript string ...) - - zabbix (bug #1055175) - [buster] - zabbix (buster does not have the Go agent) - NOTE: https://support.zabbix.com/browse/ZBX-23388 + - zabbix (unimportant) + NOTE: Zabbix in Debian uses Debian Go package CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> Geograph ...) - zabbix (bug #1055175) [bookworm] - zabbix (Minor issue) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1cf10d84e2381d0bb9184344c61a78c028532647 -- View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 18707d01 by Moritz Muehlenhoff at 2023-11-03T20:19:20+01:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -285,11 +285,13 @@ CVE-2023-4452 (A vulnerability has been identified in the EDR-810, EDR-G902, and NOT-FOR-US: Moxa CVE-2023-46931 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2664 NOTE: https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2666 NOTE: https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8 @@ -1645,6 +1647,8 @@ CVE-2023-46158 (IBM WebSphere Application Server Liberty 23.0.0.9 through 23.0.0 NOT-FOR-US: IBM CVE-2023-46136 (Werkzeug is a comprehensive WSGI web application library. If an upload ...) - python-werkzeug (bug #1054553) + [bookworm] - python-werkzeug (Minor issue) + [bullseye] - python-werkzeug (Minor issue) NOTE: https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw NOTE: https://github.com/pallets/werkzeug/commit/b1916c0c083e0be1c9d887ee2f3d696922bfc5c1 (3.0.1) CVE-2023-46135 (rs-stellar-strkey is a Rust lib for encode/decode of Stellar Strkeys. ...) @@ -3001,6 +3005,8 @@ CVE-2023-45901 (Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Reques NOT-FOR-US: Dreamer CMS CVE-2023-45803 (urllib3 is a user-friendly HTTP client library for Python. urllib3 pre ...) - python-urllib3 1.26.18-1 (bug #1054226) + [bookworm] - python-urllib3 (Minor issue) + [bullseye] - python-urllib3 (Minor issue) NOTE: https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 NOTE: https://github.com/urllib3/urllib3/commit/b594c5ceaca38e1ac215f916538fb128e3526a36 (1.26.18) CVE-2023-45010 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alex ...) @@ -5271,6 +5277,8 @@ CVE-2023-43838 (An arbitrary file upload vulnerability in Personal Management Sy CVE-2023-43804 (urllib3 is a user-friendly HTTP client library for Python. urllib3 doe ...) {DLA-3610-1} - python-urllib3 1.26.17-1 (bug #1053626) + [bookworm] - python-urllib3 (Minor issue) + [bullseye] - python-urllib3 (Minor issue) NOTE: https://github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f NOTE: https://github.com/urllib3/urllib3/commit/01220354d389cd05474713f8c982d05c9b17aafb (1.26.17) CVE-2023-43261 (An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 b ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18707d0185d0a283ce345688c203dd9dd00de0ce -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18707d0185d0a283ce345688c203dd9dd00de0ce You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9525575f by Moritz Muehlenhoff at 2023-11-03T13:18:54+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3657,6 +3657,8 @@ CVE-2023-5072 (Denial of Service in JSON-Java versions up to and including 2023 - libjson-java (bug #1053882) - jenkins-json (bug #1053883) - libjettison-java (bug #1053884) + [bookworm] - libjettison-java (Minor issue) + [bullseye] - libjettison-java (Minor issue) NOTE: https://github.com/stleary/JSON-java/issues/758 NOTE: https://github.com/stleary/JSON-java/issues/771 NOTE: https://github.com/stleary/JSON-java/pull/772/ = data/dsa-needed.txt = @@ -34,6 +34,8 @@ linux (carnil) nbconvert/oldstable Guilhem Moulin proposed an update ready for review -- +netty +-- nghttp2 -- nodejs @@ -42,6 +44,7 @@ nodejs nova/oldstable -- openjdk-17 (jmm) + needs a fixed jtreg6, will also be release via the security archive -- php-cas/oldstable -- @@ -86,9 +89,7 @@ squid -- tiff (aron) -- -trafficserver --- -wpewebkit/oldstable +trafficserver (jmm) -- xen (jmm) -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9525575f4dcd17c5d0f4cde6e61a2a7ea4844779 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9525575f4dcd17c5d0f4cde6e61a2a7ea4844779 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 96bead19 by Moritz Mühlenhoff at 2023-10-30T12:13:05+01:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -479,6 +479,8 @@ CVE-2023-46232 (era-compiler-vyper is the EraVM Vyper compiler for zkSync Era, a NOT-FOR-US: era-compiler-vyper CVE-2023-46137 (Twisted is an event-based framework for internet applications. Prior t ...) - twisted (bug #1054913) + [bookworm] - twisted (Minor issue) + [bullseye] - twisted (Minor issue) NOTE: https://github.com/twisted/twisted/security/advisories/GHSA-xc8x-vp79-p3wm CVE-2023-46134 (D-Tale is the combination of a Flask back-end and a React front-end to ...) NOT-FOR-US: D-Tale = data/dsa-needed.txt = @@ -101,6 +101,6 @@ wpewebkit/oldstable -- xen (jmm) -- -zookeeper +zookeeper (jmm) Pierre Gruet proposed debdiff, reviewed, question asked back -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96bead19d3019e56bcbe9ab522aeb06bf953c732 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/96bead19d3019e56bcbe9ab522aeb06bf953c732 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e730a4f0 by Moritz Muehlenhoff at 2023-10-28T14:43:05+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -104,9 +104,13 @@ CVE-2023-4967 (Denial of Service in NetScaler ADC and NetScaler Gateway when con NOT-FOR-US: Citrix CVE-2023-46853 (In Memcached before 1.6.22, an off-by-one error exists when processing ...) - memcached 1.6.22-1 + [bookworm] - memcached (Minor issue) + [bullseye] - memcached (Minor issue) NOTE: https://github.com/memcached/memcached/commit/6987918e9a3094ec4fc8976f01f769f624d790fa (1.6.22) CVE-2023-46852 (In Memcached before 1.6.22, a buffer overflow exists when processing m ...) - memcached 1.6.22-1 + [bookworm] - memcached (Minor issue) + [bullseye] - memcached (Minor issue) NOTE: https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767 (1.6.22) CVE-2023-46604 (Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerabili ...) TODO: check @@ -5199,6 +5203,8 @@ CVE-2023-5256 (In certain scenarios, Drupal's JSON:API module will output error - drupal7 CVE-2023-5215 (A flaw was found in libnbd. A server can reply with a block size large ...) - libnbd 1.16.5-1 + [bookworm] - libnbd (Minor issue) + [bullseye] - libnbd (Minor issue) NOTE: https://listman.redhat.com/archives/libguestfs/2023-September/032635.html NOTE: Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/0f8ee8c6bd6dd93de771e6d4da87ec5a59504aae (v1.18.0) NOTE: Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/f03330181229360a1a97a264aa956fea54c657de (v1.16.5) @@ -13374,6 +13380,8 @@ CVE-2023-4067 (The Bus Ticket Booking with Seat Reservation plugin for WordPress NOT-FOR-US: Bus Ticket Booking with Seat Reservation plugin for WordPress CVE-2023-3978 (Text nodes not in the HTML namespace are incorrectly literally rendere ...) - golang-golang-x-net 1:0.14.0-1 (bug #1043163) + [bookworm] - golang-golang-x-net (Minor issue) + [bullseye] - golang-golang-x-net (Minor issue) - golang-golang-x-net-dev [buster] - golang-golang-x-net-dev (Limited support, follow bullseye DSAs/point-releases) NOTE: https://go.dev/cl/514896 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e730a4f0cf1bc421d202ffc2e99341fbd9021c98 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e730a4f0cf1bc421d202ffc2e99341fbd9021c98 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 756240f9 by Moritz Muehlenhoff at 2023-10-26T14:14:21+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -331,6 +331,8 @@ CVE-2023-5758 (When opening a page in reader mode, the redirect URL could have c NOTE: https://www.mozilla.org/security/advisories/mfsa2023-48/ CVE-2023-5752 (When installing a package from a Mercurial VCS URL (ie "pip install ...) - python-pip 23.3+dfsg-1 + [bookworm] - python-pip (Minor issue) + [bullseye] - python-pip (Minor issue) NOTE: https://github.com/pypa/pip/pull/12306 NOTE: https://mail.python.org/archives/list/security-annou...@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/ CVE-2023-5311 (The WP EXtra plugin for WordPress is vulnerable to unauthorized modifi ...) @@ -705,8 +707,9 @@ CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in - wabt NOTE: https://github.com/WebAssembly/wabt/issues/2311 CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegm ...) - - wabt + - wabt (unimportant) NOTE: https://github.com/WebAssembly/wabt/issues/2310 + NOTE: Crash in CLI tool, no security impact CVE-2023-46127 (Frappe is a full-stack web application framework that uses Python and ...) NOT-FOR-US: Frappe Framework CVE-2023-46122 (sbt is a build tool for Scala, Java, and others. Given a specially cra ...) @@ -895,6 +898,8 @@ CVE-2023-38275 (IBM Cognos Dashboards on Cloud Pak for Data 4.7.0 exposes sensit CVE-2023-5349 [memory leak] {DLA-3625-1} - ruby-rmagick 5.3.0-1 + [bookworm] - ruby-rmagick (Minor issue) + [bullseye] - ruby-rmagick (Minor issue) NOTE: https://github.com/rmagick/rmagick/pull/1406 NOTE: https://github.com/rmagick/rmagick/commit/fec7a7e639ae565386f7615155dbcf49b957b64a (RMagick_5-3-0) CVE-2023-5684 (A vulnerability was found in Beijing Baichuo Smart S85F Management Pla ...) @@ -1201,6 +1206,8 @@ CVE-2023-4021 (The Modern Events Calendar lite plugin for WordPress is vulnerabl NOT-FOR-US: WordPress plugin CVE-2023-46277 (please (aka pleaser) through 0.5.4 allows privilege escalation through ...) - rust-pleaser (bug #1054289) + [bookworm] - rust-pleaser (Minor issue) + [bullseye] - rust-pleaser (Minor issue) NOTE: https://gitlab.com/edneville/please/-/issues/13 NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0066.html CVE-2023-46267 @@ -4780,6 +4787,8 @@ CVE-2023-43739 (The 'bookisbn' parameter of the cart.php resource does not vali NOT-FOR-US: Online Book Store Project CVE-2023-43665 [Denial-of-service possibility in django.utils.text.Truncator] - python-django 3:4.2.6-1 (bug #1053475) + [bookworm] - python-django (Minor issue, fix along in future update) + [bullseye] - python-django (Minor issue, fix along in future update) NOTE: https://www.openwall.com/lists/oss-security/2023/10/04/6 NOTE: https://www.djangoproject.com/weblog/2023/oct/04/security-releases/ NOTE: https://github.com/django/django/commit/17b51094d778b421bb2b3aae0c270894b050455d (main) @@ -5512,6 +5521,8 @@ CVE-2023-5157 (A vulnerability was found in MariaDB. An OpenVAS port scan on por - galera-4 26.4.13-1 [bullseye] - galera-4 (Minor issue; can be fixed via point release) - galera-3 (bug #1053476) + [bookworm] - galera-3 (Minor issue) + [bullseye] - galera-3 (Minor issue) NOTE: https://jira.mariadb.org/browse/MDEV-25068 CVE-2023-5115 [malicious role archive can cause ansible-galaxy to overwrite arbitrary files] - ansible-core 2.14.11-1 (bug #1053693) @@ -28611,12 +28622,16 @@ CVE-2023-29409 (Extremely large RSA keys in certificate chains can cause a clien NOTE: https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI CVE-2023-29408 (The TIFF decoder does not place a limit on the size of compressed tile ...) - golang-golang-x-image (bug #1043159) + [bookworm] - golang-golang-x-image (Minor issue) + [bullseye] - golang-golang-x-image (Minor issue) [buster] - golang-golang-x-image (Limited support, minor issue, DoS) NOTE: https://go.dev/issue/61582 NOTE: https://go.dev/cl/514897 NOTE: https://github.com/golang/image/commit/cb227cd2c919b27c6206fe0c1041a8bcc677949d (v0.10.0) CVE-2023-29407 (A maliciously-crafted image can cause excessive CPU consumption in dec ...) - golang-golang-x-image (bug #1043159) + [bookworm] - golang-golang-x-image (Minor issue) + [bullseye] - golang-golang-x-image (Minor issue) [buster] - golang-golang-x-image (Limited support,
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a159b1c2 by Moritz Muehlenhoff at 2023-10-23T20:45:06+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -32,6 +32,8 @@ CVE-2023-46319 (WALLIX Bastion 9.x before 9.0.9 and 10.x before 10.0.5 allows un NOT-FOR-US: WALLIX Bastion CVE-2023-46317 (Knot Resolver before 5.7.0 performs many TCP reconnections upon receiv ...) - knot-resolver 5.7.0-1 + [bookworm] - knot-resolver (Minor issue) + [bullseye] - knot-resolver (Minor issue) NOTE: https://www.knot-resolver.cz/2023-08-22-knot-resolver-5.7.0.html NOTE: https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1448 CVE-2023-46315 (The zanllp sd-webui-infinite-image-browsing (aka Infinite Image Browsi ...) @@ -99,6 +101,8 @@ CVE-2023-39333 NOTE: https://github.com/nodejs/node/commit/eaf9083cf1e43bd897ac8244dcc0f4e3500150ca CVE-2023-5388 - nss + [bookworm] - nss (Minor issue, revisit once fixed upstream) + [bullseye] - nss (Minor issue, revisit once fixed upstream) NOTE: https://people.redhat.com/~hkario/marvin/ CVE-2023-5551 - moodle @@ -303,6 +307,7 @@ CVE-2023-46117 (reconFTW is a tool designed to perform automated recon on a targ NOT-FOR-US: reconFTW CVE-2023-45805 (pdm is a Python package and dependency manager supporting the latest P ...) - pdm + [bookworm] - pdm (Minor issue) NOTE: https://github.com/pdm-project/pdm/security/advisories/GHSA-j44v-mmf2-xvm9 NOTE: https://github.com/pdm-project/pdm/commit/6853e2642dfa281d4a9958fbc6c95b7e32d84831 CVE-2023-44483 (All versions of Apache Santuario - XML Security for Java prior to 2.2. ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a159b1c2ddd92aa5a4e7578c83e3e06329280710 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a159b1c2ddd92aa5a4e7578c83e3e06329280710 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 76be03cc by Moritz Muehlenhoff at 2023-10-23T15:40:56+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -201,22 +201,40 @@ CVE-2023-45675 (stb_vorbis is a single file MIT licensed library for processing NOTE: https://github.com/nothings/stb/pull/1553 CVE-2023-45667 (stb_image is a single file MIT licensed library for processing images. ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 7) + NOTE: https://github.com/nothings/stb/pull/1551 CVE-2023-45666 (stb_image is a single file MIT licensed library for processing images. ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 6) + NOTE: https://github.com/nothings/stb/pull/1549 CVE-2023-45664 (stb_image is a single file MIT licensed library for processing images. ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 4) + NOTE: https://github.com/nothings/stb/pull/1545 CVE-2023-45663 (stb_image is a single file MIT licensed library for processing images. ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 3) + NOTE: https://github.com/nothings/stb/pull/1543 CVE-2023-45662 (stb_image is a single file MIT licensed library for processing images. ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 2) + NOTE: https://github.com/nothings/stb/pull/1541 CVE-2023-45661 (stb_image is a single file MIT licensed library for processing images. ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 1) + NOTE: https://github.com/nothings/stb/pull/1539 CVE-2023-43357 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a ...) NOT-FOR-US: CMSmadesimple CVE-2023-43356 (Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a ...) @@ -1876,7 +1894,9 @@ CVE-2023-39325 (A malicious HTTP/2 client which rapidly creates requests and imm - golang-1.21 1.21.3-1 - golang-1.20 1.20.10-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 NOTE: https://github.com/golang/go/issues/63417 CVE-2023-5473 (Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed ...) @@ -3888,6 +3908,8 @@ CVE-2023-43909 (Hospital Management System thru commit 4770d was discovered to c NOT-FOR-US: Hospital Management System CVE-2023-43655 (Composer is a dependency manager for PHP. Users publishing a composer. ...) - composer 2.6.4-1 + [bookworm] - composer (Minor issue) + [bullseye] - composer (Minor issue) [buster] - composer (Minor issue, only a problem when configured improperly) NOTE: https://github.com/composer/composer/security/advisories/GHSA-jm6m-4632-36hf NOTE: https://github.com/composer/composer/commit/4fce14795aba98e40b6c4f5047305aba17a6120d (1.10.27) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76be03cce30e752219a2e04c9ba69d4134cea2d5 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76be03cce30e752219a2e04c9ba69d4134cea2d5 You're receiving this email because of your account on salsa.debian.org.
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: daaa8d06 by Moritz Muehlenhoff at 2023-10-23T11:30:13+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -153,28 +153,52 @@ CVE-2023-46003 (I-doit pro 25 and below is vulnerable to Cross Site Scripting (X NOT-FOR-US: I-doit pro CVE-2023-45682 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 15) + NOTE: https://github.com/nothings/stb/pull/1560 CVE-2023-45681 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 14) + NOTE: https://github.com/nothings/stb/pull/1559 CVE-2023-45680 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 13) + NOTE: https://github.com/nothings/stb/pull/1558 CVE-2023-45679 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 12) + NOTE: https://github.com/nothings/stb/pull/1557 CVE-2023-45678 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 11) + NOTE: https://github.com/nothings/stb/pull/1556 CVE-2023-45677 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 10) + NOTE: https://github.com/nothings/stb/pull/1555 CVE-2023-45676 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 9) + NOTE: https://github.com/nothings/stb/pull/1554 CVE-2023-45675 (stb_vorbis is a single file MIT licensed library for processing ogg vo ...) - libstb - NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ + [bookworm] - libstb (Minor issue) + [bullseye] - libstb (Minor issue) + NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ (issue 8) + NOTE: https://github.com/nothings/stb/pull/1553 CVE-2023-45667 (stb_image is a single file MIT licensed library for processing images. ...) - libstb NOTE: https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ @@ -235,6 +259,8 @@ CVE-2023-5618 (The Modern Footnotes plugin for WordPress is vulnerable to Stored NOT-FOR-US: WordPress plugin CVE-2023-46287 (XSS exists in NagVis before 1.9.38 via the select function in share/se ...) - nagvis 1:1.9.38-1 + [bookworm] - nagvis (Minor issue) + [bullseye] - nagvis (Minor issue) NOTE: https://github.com/NagVis/nagvis/pull/356 NOTE: https://github.com/NagVis/nagvis/commit/093c2b0b31001bb74c78452858a0a9d27fa0a9b5 (nagvis-1.9.38) CVE-2023-46117 (reconFTW is a tool designed to perform automated recon on a target dom ...) @@ -2795,6
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 009104d1 by Moritz Muehlenhoff at 2023-10-10T11:52:30+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -142,6 +142,8 @@ CVE-2023-43696 (Improper Access Control in SICK APU allows an unprivileged remot NOT-FOR-US: SICK CVE-2023-43643 (AntiSamy is a library for performing fast, configurable cleansing of H ...) - libowasp-antisamy-java + [bookworm] - libowasp-antisamy-java (Minor issue) + [bullseye] - libowasp-antisamy-java (Minor issue) NOTE: https://github.com/nahsra/antisamy/security/advisories/GHSA-pcf2-gh6g-h5r2 NOTE: https://github.com/nahsra/antisamy/commit/05c52b98bb845b8175b8406bd2f391ce334a05d6 (v1.7.4) CVE-2023-42455 (Wazuh is a security detection, visibility, and compliance open source ...) @@ -1835,6 +1837,8 @@ CVE-2023-43124 (BIG-IP APM clients may send IP traffic outside of the VPN tunnel NOT-FOR-US: F5 BIG-IP CVE-2023-42822 (xrdp is an open source remote desktop protocol server. Access to the f ...) - xrdp (bug #1053284) + [bookworm] - xrdp (Minor issue) + [bullseye] - xrdp (Minor issue) NOTE: https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-2hjx-rm4f-r9hw NOTE: https://github.com/neutrinolabs/xrdp/commit/73acbe1f7957c65122b00de4d6f57a8d0d257c40 CVE-2023-42657 (In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a directory traver ...) = data/dsa-needed.txt = @@ -25,6 +25,8 @@ gpac/oldstable (jmm) -- gst-plugins-bad1.0 (carnil) -- +libcue (jmm) +-- libreswan (jmm) Maintainer prepared bookworm-security update, but needs work on bullseye-security backports -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/009104d18850e65a51d811e0cff2fc697ed4ae8d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/009104d18850e65a51d811e0cff2fc697ed4ae8d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 06c9a8c7 by Moritz Muehlenhoff at 2023-10-09T16:24:47+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -346,23 +346,33 @@ CVE-2023-35803 (IQ Engine before 10.6r2 on Extreme Network AP devices has a Buff NOT-FOR-US: IQ Engine CVE-2023-3430 - openimageio 2.4.13.0+dfsg-1 + [bookworm] - openimageio (Minor issue) + [bullseye] - openimageio (Minor issue) NOTE: https://github.com/OpenImageIO/oiio/issues/3840 NOTE: https://github.com/AcademySoftwareFoundation/OpenImageIO/pull/3841 NOTE: https://github.com/OpenImageIO/oiio/commit/5ff2c56dd28e96f67ed8f80d8a3d1235e51f9957 (v2.4.12.0) CVE-2023-38473 - avahi + [bookworm] - avahi (Minor issue) + [bullseye] - avahi (Minor issue) NOTE: https://github.com/lathiat/avahi/issues/451 NOTE: https://www.openwall.com/lists/oss-security/2023/10/06/4 CVE-2023-38472 - avahi + [bookworm] - avahi (Minor issue) + [bullseye] - avahi (Minor issue) NOTE: https://github.com/lathiat/avahi/issues/452 NOTE: https://www.openwall.com/lists/oss-security/2023/10/06/4 CVE-2023-38471 - avahi + [bookworm] - avahi (Minor issue) + [bullseye] - avahi (Minor issue) NOTE: https://github.com/lathiat/avahi/issues/453 NOTE: https://www.openwall.com/lists/oss-security/2023/10/06/4 CVE-2023-38470 - avahi + [bookworm] - avahi (Minor issue) + [bullseye] - avahi (Minor issue) NOTE: https://github.com/lathiat/avahi/issues/454 NOTE: https://github.com/lathiat/avahi/pull/457 NOTE: https://github.com/lathiat/avahi/commit/94cb6489114636940ac683515417990b55b5d66c @@ -2005,6 +2015,8 @@ CVE-2023-5157 (A vulnerability was found in MariaDB. An OpenVAS port scan on por NOTE: https://jira.mariadb.org/browse/MDEV-25068 CVE-2023-5115 [malicious role archive can cause ansible-galaxy to overwrite arbitrary files] - ansible-core (bug #1053693) + [bookworm] - ansible-core (Minor issue) + [bullseye] - ansible-core (Minor issue) - ansible 5.4.0-1 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2233810 NOTE: https://github.com/ansible/ansible/pull/81780 @@ -6362,6 +6374,8 @@ CVE-2023-40217 (An issue was discovered in Python before 3.8.18, 3.9.x before 3. - python2.7 [bullseye] - python2.7 2.7.18-8+deb11u1 - pypy3 7.3.13+dfsg-1 + [bookworm] - pypy3 (Minor issue) + [bullseye] - pypy3 (Minor issue) NOTE: https://mail.python.org/archives/list/security-annou...@python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/ NOTE: https://github.com/python/cpython/issues/108310 NOTE: https://github.com/python/cpython/pull/108315 @@ -37600,7 +37614,7 @@ CVE-2023-25516 (NVIDIA GPU Display Driver for Linux contains a vulnerability in [bookworm] - nvidia-graphics-drivers-tesla 525.125.06-1~deb12u1 - nvidia-graphics-drivers-tesla-470 470.199.02-1 (bug #1039684) [bookworm] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb12u1 - [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1 + [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb11u1 - nvidia-graphics-drivers-tesla-460 460.106.00-3 (bug #1039683) [bullseye] - nvidia-graphics-drivers-tesla-460 (Non-free not supported) NOTE: 460.106.00-3 turned the package into a metapackage to aid switching to nvidia-graphics-drivers-tesla-470 @@ -37625,7 +37639,7 @@ CVE-2023-25515 (NVIDIA GPU Display Driver for Windows and Linux contains a vulne [bookworm] - nvidia-graphics-drivers-tesla 525.125.06-1~deb12u1 - nvidia-graphics-drivers-tesla-470 470.199.02-1 (bug #1039684) [bookworm] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb12u1 - [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1 + [bullseye] - nvidia-graphics-drivers-tesla-470 470.199.02-1~deb11u1 - nvidia-graphics-drivers-tesla-460 460.106.00-3 (bug #1039683) [bullseye] - nvidia-graphics-drivers-tesla-460 (Non-free not supported) NOTE: 460.106.00-3 turned the package into a metapackage to aid switching to nvidia-graphics-drivers-tesla-470 = data/dsa-needed.txt = @@ -19,6 +19,8 @@ cacti -- cinder/oldstable -- +curl (jmm) +-- gpac/oldstable (jmm) -- gst-plugins-bad1.0 (carnil) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/06c9a8c793683242bd0cf3a109148e5542dae21b -- View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f35d7aa3 by Moritz Muehlenhoff at 2023-10-04T14:21:50+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -248,6 +248,8 @@ CVE-2023-5345 (A use-after-free vulnerability in the Linux kernel's fs/smb/clien NOTE: https://kernel.dance/#e6e43b8aa7cd3c3af686caf0c2e11819a886d705 CVE-2023-5344 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - vim + [bookworm] - vim (Minor issue) + [bullseye] - vim (Minor issue) NOTE: https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04 NOTE: https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf CVE-2023-5334 (The WP Responsive header image slider plugin for WordPress is vulnerab ...) @@ -457,8 +459,9 @@ CVE-2023-5112 (Os Commerce is currently susceptible to a Cross-Site Scripting (X CVE-2023-5111 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...) NOT-FOR-US: Os Commerce CVE-2023-43907 (OptiPNG v0.7.7 was discovered to contain a global buffer overflow via ...) - - optipng + - optipng (unimportant) NOTE: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md + NOTE: Crash in CLI tool, no security impact CVE-2023-43735 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...) NOT-FOR-US: Os Commerce CVE-2023-43734 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...) @@ -561,6 +564,8 @@ CVE-2023-5201 (The OpenHook plugin for WordPress is vulnerable to Remote Code Ex NOT-FOR-US: OpenHook plugin for WordPress CVE-2023-44270 (An issue was discovered in PostCSS before 8.4.31. It affects linters u ...) - node-postcss (bug #1053282) + [bookworm] - node-postcss (Minor issue) + [bullseye] - node-postcss (Minor issue) NOTE: https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5 (8.4.31) CVE-2023-43711 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...) NOT-FOR-US: Os Commerce @@ -1475,6 +1480,8 @@ CVE-2023-43775 (Denial-of-service vulnerability in the web server of the Eaton S NOT-FOR-US: Eaton CVE-2023-43646 (get-func-name is a module to retrieve a function's name securely and c ...) - node-get-func-name (bug #1053262) + [bookworm] - node-get-func-name (Minor issue) + [bullseye] - node-get-func-name (Minor issue) NOTE: https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5 NOTE: https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69 (v2.0.1) CVE-2023-43614 (Cross-site scripting vulnerability in Order Data Edit page of Welcart ...) @@ -4042,8 +4049,8 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x NOTE: https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 CVE-2023-34322 [top-level shadow reference dropped too early for 64-bit PV guests] - xen - [bookworm] - xen (Minor issue, fix along in future DSA or point release) - [bullseye] - xen (Minor issue, fix along in future DSA or point release) + [bookworm] - xen (Minor issue, fix along in future DSA or point release) + [bullseye] - xen (Minor issue, fix along in future DSA or point release) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-438.html CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated] @@ -24821,6 +24828,8 @@ CVE-2023-29338 (Visual Studio Code Information Disclosure Vulnerability) NOT-FOR-US: Microsoft CVE-2023-29337 (NuGet Client Remote Code Execution Vulnerability) - nuget (bug #1050835) + [bookworm] - nuget (Minor issue) + [bullseye] - nuget (Minor issue) [buster] - nuget (Can wait for next update) NOTE: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337 CVE-2023-29336 (Win32k Elevation of Privilege Vulnerability) @@ -62647,6 +62656,8 @@ CVE-2023-20588 (A division-by-zero error on some AMD processors can potentially {DSA-5492-1 DSA-5480-1} - linux 6.4.13-1 - xen + [bookworm] - xen (Minor issue, fix along in future DSA or point release) + [bullseye] - xen (Minor issue, fix along in future DSA or point release) [buster] - xen (DSA 4677-1) NOTE: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html NOTE: https://git.kernel.org/linus/77245f1c3c6495521f6a3af082696ee2f8ce3921 =
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 252b4ef2 by Moritz Muehlenhoff at 2023-09-26T21:34:07+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -514,16 +514,28 @@ CVE-2023-43477 (The ping_from parameter of ping_tracerte.cgi in the web UI of Te NOT-FOR-US: Telstra Smart Modem Gen 2 (Arcadyan LH1000) firmware CVE-2023-43377 (A cross-site scripting (XSS) vulnerability in /hoteldruid/visualizza_c ...) - hoteldruid (bug #1052572) + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) CVE-2023-43376 (A cross-site scripting (XSS) vulnerability in /hoteldruid/clienti.php ...) - hoteldruid (bug #1052572) + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) CVE-2023-43375 (Hoteldruid v3.0.5 was discovered to contain multiple SQL injection vul ...) - hoteldruid (bug #1052572) + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) CVE-2023-43374 (Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerabil ...) - hoteldruid (bug #1052572) + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) CVE-2023-43373 (Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerabil ...) - hoteldruid (bug #1052572) + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) CVE-2023-43371 (Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerabil ...) - hoteldruid (bug #1052572) + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) CVE-2023-43207 (D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command ...) NOT-FOR-US: D-Link CVE-2023-43206 (D-LINK DWL-6610 FW_v_4.3.0.8B003C was discovered to contain a command ...) = data/dsa-needed.txt = @@ -23,6 +23,8 @@ firefox-esr (jmm) -- gpac/oldstable (jmm) -- +jetty9 +-- libreswan (jmm) Maintainer prepared bookworm-security update, but needs work on bullseye-security backports -- @@ -30,6 +32,8 @@ linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y and 6.1.y versions -- +mosquitto +-- nbconvert/oldstable Guilhem Moulin proposed an update ready for review -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/252b4ef2ee10a12cb552e54ce10713cf33f54113 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/252b4ef2ee10a12cb552e54ce10713cf33f54113 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6e0c5676 by Moritz Muehlenhoff at 2023-09-26T10:52:06+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -244,6 +244,7 @@ CVE-2023-43144 (Projectworldsl Assets-management-system-in-php 1.0 is vulnerable NOT-FOR-US: Projectworldsl Assets-management-system-in-php CVE-2023-42821 (The package `github.com/gomarkdown/markdown` is a Go library for parsi ...) - golang-github-gomarkdown-markdown + [bookworm] - golang-github-gomarkdown-markdown (Minor issue) NOTE: https://github.com/gomarkdown/markdown/commit/14b16010c2ee7ff33a940a541d993bd043a88940 NOTE: https://github.com/gomarkdown/markdown/security/advisories/GHSA-m9xq-6h2j-65r2 CVE-2023-42812 (Galaxy is an open-source platform for FAIR data analysis. Prior to ver ...) @@ -360,6 +361,7 @@ CVE-2023-42806 (Hydra is the layer-two scalability solution for Cardano. Prior t TODO: check CVE-2023-42805 (quinn-proto is a state machine for the QUIC transport protocol. Prior ...) - rust-quinn-proto (bug #1052546) + [bookworm] - rust-quinn-proto (Minor issue) NOTE: https://github.com/quinn-rs/quinn/pull/1667 NOTE: https://github.com/quinn-rs/quinn/pull/1668 NOTE: https://github.com/quinn-rs/quinn/pull/1669 @@ -864,6 +866,7 @@ CVE-2023-3025 (The Dropbox Folder Share plugin for WordPress is vulnerable to Se NOT-FOR-US: Dropbox Folder Share plugin for WordPress CVE-2023-43091 [Code injection via service.json file] - gnome-maps 45~rc-1 + [bookworm] - gnome-maps (Minor issue) [bullseye] - gnome-maps (Vulnerable code not present) [buster] - gnome-maps (Vulnerable code not present) NOTE: https://gitlab.gnome.org/GNOME/gnome-maps/-/issues/588 @@ -988,10 +991,12 @@ CVE-2023-41889 (SHIRASAGI is a Content Management System. Prior to version 1.18. NOT-FOR-US: SHIRASAGI CVE-2023-41887 (OpenRefine is a powerful free, open source tool for working with messy ...) - openrefine 3.7.5-1 + [bookworm] - openrefine (Minor issue) NOTE: https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-p3r5-x3hr-gpg5 NOTE: https://github.com/OpenRefine/OpenRefine/commit/693fde606d4b5b78b16391c29d110389eb605511 (3.7.5) CVE-2023-41886 (OpenRefine is a powerful free, open source tool for working with messy ...) - openrefine 3.7.5-1 + [bookworm] - openrefine (Minor issue) NOTE: https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-qqh2-wvmv-h72m NOTE: https://github.com/OpenRefine/OpenRefine/commit/2de1439f5be63d9d0e89bbacbd24fa28c8c3e29d (master) NOTE: https://github.com/OpenRefine/OpenRefine/commit/693fde606d4b5b78b16391c29d110389eb605511 (3.7.5) @@ -1235,6 +1240,7 @@ CVE-2023-39915 (NLnet Labs\u2019 Routinator up to and including version 0.12.1 m - routinator (bug #929024) CVE-2023-39914 (NLnet Labs\u2019 bcder library up to and including version 0.7.2 panic ...) - rust-bcder (bug #1052176) + [bookworm] - rust-bcder (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0062.html NOTE: https://nlnetlabs.nl/downloads/bcder/CVE-2023-39914.txt NOTE: https://github.com/NLnetLabs/bcder/pull/74 @@ -1306,6 +1312,7 @@ CVE-2023-3865 [ksmbd: fix out-of-bound read in smb2_write] NOTE: https://git.kernel.org/linus/5fe7f7b78290638806211046a99f031ff26164e1 (6.4) CVE-2023-4813 (A flaw was found in glibc. In an uncommon situation, the gaih_inet fun ...) - glibc 2.36-3 + [bullseye] - glibc (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28931 NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215 (glibc-2.36) CVE-2023-4806 (A flaw was found in glibc. In an extremely rare situation, the getaddr ...) @@ -33046,6 +33053,7 @@ CVE-2023-26145 RESERVED CVE-2023-26144 (Versions of the package graphql from 16.3.0 and before 16.8.1 are vuln ...) - node-graphql + [bookworm] - node-graphql (Minor issue) NOTE: https://security.snyk.io/vuln/SNYK-JS-GRAPHQL-5905181 NOTE: https://github.com/graphql/graphql-js/pull/3972 NOTE: https://github.com/graphql/graphql-js/issues/3955 @@ -53994,6 +54002,8 @@ CVE-2022-4133 CVE-2022-4132 [Tomcat: Memory leak in JSS] RESERVED - jss (bug #1052575) + [bookworm] - jss (Minor issue) + [bullseye] - jss (Minor issue) [buster] - jss (The vulnerable code was introduced later) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2147372 NOTE: Triggered by: https://github.com/dogtagpki/jss/pull/928 @@ -102215,10 +102225,7 @@ CVE-2022-29656
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9c021404 by Moritz Muehlenhoff at 2023-09-20T09:13:55+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -156,6 +156,8 @@ CVE-2020-36766 (An issue was discovered in the Linux kernel before 5.8.6. driver NOTE: https://git.kernel.org/linus/6c42227c3467549ddc65efe99c869021d2f4a570 (5.9-rc1) CVE-2023- [cross-site scripting (XSS) vulnerability in handling of linkrefs in plain text messages] - roundcube 1.6.3+dfsg-1 (bug #1052059) + [bookworm] - roundcube (Minor issue) + [bullseye] - roundcube (Minor issue) NOTE: https://roundcube.net/news/2023/09/15/security-update-1.6.3-released NOTE: Fixed by: https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b (1.6.3) CVE-2023-5036 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos ...) @@ -587,6 +589,8 @@ CVE-2023-41892 (Craft CMS is a platform for creating digital experiences. This i NOT-FOR-US: Craft CMS CVE-2023-41081 (The mod_jk component of Apache Tomcat Connectorsin some circumstances, ...) - libapache-mod-jk 1:1.2.49-1 (bug #1051956) + [bookworm] - libapache-mod-jk (Minor issue) + [bullseye] - libapache-mod-jk (Minor issue) NOTE: https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b NOTE: http://www.openwall.com/lists/oss-security/2023/09/13/2 NOTE: https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.49 @@ -683,6 +687,8 @@ CVE-2023-4813 (A flaw was found in glibc. In an uncommon situation, the gaih_ine NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215 (glibc-2.36) CVE-2023-4806 (A flaw was found in glibc. In an extremely rare situation, the getaddr ...) - glibc 2.37-10 + [bookworm] - glibc (Minor issue) + [bullseye] - glibc (Minor issue) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30843 CVE-2023-4527 (A flaw was found in glibc. When the getaddrinfo function is called wit ...) - glibc 2.37-9 (bug #1051958) @@ -1968,6 +1974,8 @@ CVE-2023-2813 (All of the above Aapna WordPress theme through 1.3, Anand WordPre CVE-2023-41164 {DLA-3558-1} - python-django 3:3.2.21-1 (bug #1051226) + [bookworm] - python-django (Minor issue, fix along in future update) + [bullseye] - python-django (Minor issue, fix along in future update) NOTE: https://www.openwall.com/lists/oss-security/2023/09/04/1 NOTE: https://www.djangoproject.com/weblog/2023/sep/04/security-releases/ NOTE: https://github.com/django/django/commit/3f41d6d62929dfe53eda8109b3b836f26645bdce (main) @@ -7306,6 +7314,8 @@ CVE-2023-38410 (The issue was addressed with improved checks. This issue is fixe NOT-FOR-US: Apple CVE-2023-38285 (Trustwave ModSecurity 3.x before 3.0.10 has Inefficient Algorithmic Co ...) - modsecurity 3.0.10-1 (bug #1042475) + [bookworm] - modsecurity (Minor issue) + [bullseye] - modsecurity (Minor issue) NOTE: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-v3-dos-vulnerability-in-four-transformations-cve-2023-38285/ CVE-2023-38261 (The issue was addressed with improved memory handling. This issue is f ...) NOT-FOR-US: Apple = data/dsa-needed.txt = @@ -33,6 +33,8 @@ lldpd (carnil) nbconvert/oldstable Guilhem Moulin proposed an update ready for review -- +netatalk/oldstable (jmm) +-- nodejs maintainer proposed to follow the upstream 18.x LTS branch -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9c021404e462f119daeb92be61dc95566a140cdc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9c021404e462f119daeb92be61dc95566a140cdc You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2b2424b6 by Moritz Muehlenhoff at 2023-09-17T23:22:36+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/dsa-needed.txt Changes: = data/dsa-needed.txt = @@ -23,9 +23,11 @@ cinder/oldstable -- flac/oldstable (jmm) -- -gnome-shell +gnome-shell (jmm) Maintainer preparing updates -- +gpac/oldstable (jmm) +-- libreswan (jmm) Maintainer prepared bookworm-security update, but needs work on bullseye-security backports -- @@ -33,6 +35,8 @@ linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y and 6.1.y versions -- +lldpd +-- nbconvert/oldstable Guilhem Moulin proposed an update ready for review -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2b2424b6f08917cb6c499f9462923571f817680c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2b2424b6f08917cb6c499f9462923571f817680c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8007d715 by Moritz Muehlenhoff at 2023-09-15T14:09:12+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -104,6 +104,8 @@ CVE-2023-4801 (An improper certification validation vulnerability in the Insider NOT-FOR-US: Insider Threat Management (ITM) Server CVE-2023-4785 (Lack of error handling in the TCP server in Google's gRPC starting ver ...) - grpc + [bookworm] - grpc (Minor issue) + [bullseye] - grpc (Minor issue) NOTE: https://github.com/grpc/grpc/pull/33656 NOTE: https://github.com/grpc/grpc/pull/33667 NOTE: https://github.com/grpc/grpc/pull/33669 @@ -157,9 +159,13 @@ CVE-2023-34984 (A protection mechanism failure in Fortinet FortiWeb 7.2.0 throug CVE-2023-4039 (A failure in the -fstack-protector feature in GCC-based toolchains th ...) - gcc-13 13.2.0-4 - gcc-12 12.3.0-9 + [bookworm] - gcc-12 (Minor issue) - gcc-11 11.4.0-4 + [bookworm] - gcc-11 (Minor issue) - gcc-10 + [bullseye] - gcc-10 (Minor issue) - gcc-9 + [bullseye] - gcc-9 (Minor issue) - gcc-8 - gcc-7 NOTE: https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf @@ -1743,6 +1749,7 @@ CVE-2023-41364 (In tine through 2023.01.14.325, the sort parameter of the /index NOT-FOR-US: Tine groupware CVE-2023-41051 (In a typical Virtual Machine Monitor (VMM) there are several component ...) - rust-vm-memory 0.12.2-1 (bug #1051101) + [bookworm] - rust-vm-memory (Minor issue) [bullseye] - rust-vm-memory (Minor issue) NOTE: https://github.com/rust-vmm/vm-memory/security/advisories/GHSA-49hh-fprx-m68g NOTE: https://github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8 (v0.12.2) @@ -216800,6 +216807,7 @@ CVE-2020-24905 RESERVED CVE-2020-24904 (An issue was discovered in attach parameter in GNOME Gmail version 2.5 ...) - viagee (bug #1051726) + [bookworm] - viagee (Minor issue) - gnome-gmail [bullseye] - gnome-gmail (Minor issue) [buster] - gnome-gmail (Minor issue) = data/dsa-needed.txt = @@ -26,6 +26,8 @@ flac/oldstable libreswan (jmm) Maintainer prepared bookworm-security update, but needs work on bullseye-security backports -- +libwebp/oldstable (jmm) +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y and 6.1.y versions @@ -80,6 +82,8 @@ salt/oldstable -- samba/oldstable -- +thunderbird (jmm) +-- tiff (aron) -- trafficserver View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8007d715cb1457755a1282c418cc1d91019f599d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8007d715cb1457755a1282c418cc1d91019f599d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9a82bd9a by Moritz Muehlenhoff at 2023-09-12T10:52:16+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1237,6 +1237,7 @@ CVE-2023-41364 (In tine through 2023.01.14.325, the sort parameter of the /index NOT-FOR-US: Tine groupware CVE-2023-41051 (In a typical Virtual Machine Monitor (VMM) there are several component ...) - rust-vm-memory 0.12.2-1 (bug #1051101) + [bullseye] - rust-vm-memory (Minor issue) NOTE: https://github.com/rust-vmm/vm-memory/security/advisories/GHSA-49hh-fprx-m68g NOTE: https://github.com/rust-vmm/vm-memory/commit/aff1dd4a5259f7deba56692840f7a2d9ca34c9c8 (v0.12.2) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0056.html @@ -21129,7 +21130,9 @@ CVE-2023-39319 (The html/template package does not apply the proper rules for ha - golang-1.21 1.21.1-1 - golang-1.20 1.20.8-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 NOTE: https://go.dev/issue/62197 NOTE: https://github.com/golang/go/commit/bbd043ff0d6d59f1a9232d31ecd5eacf6507bf6a (go1.21.1) @@ -21139,7 +21142,9 @@ CVE-2023-39318 (The html/template package does not properly handle HTML-like "" - golang-1.21 1.21.1-1 - golang-1.20 1.20.8-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 NOTE: https://go.dev/issue/62196 NOTE: https://github.com/golang/go/commit/b0e1d3ea26e8e8fce7726690c9ef0597e60739fb (go1.21.1) @@ -221516,6 +221521,7 @@ CVE-2020-22525 CVE-2020-22524 (Buffer Overflow vulnerability in FreeImage_Load function in FreeImage ...) - freeimage NOTE: https://sourceforge.net/p/freeimage/bugs/319/ + NOTE: Fixed with r1848 from http://svn.code.sf.net/p/freeimage/svn/FreeImage/ CVE-2020-22523 RESERVED CVE-2020-22522 = data/dsa-needed.txt = @@ -14,7 +14,7 @@ If needed, specify the release by adding a slash after the name of the source pa -- cacti -- -chromium +chromium (jmm) -- cinder/oldstable -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a82bd9ac77bacf2f10ebc192c69d934630176c7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9a82bd9ac77bacf2f10ebc192c69d934630176c7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 51837e30 by Moritz Muehlenhoff at 2023-09-12T09:02:40+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -29,6 +29,7 @@ CVE-2023-41103 (Interact 7.9.79.5 allows stored Cross-site Scripting (XSS) attac NOT-FOR-US: Interact CVE-2023-41000 (GPAC through 2.2.1 has a use-after-free vulnerability in the function ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2550 NOTE: Fixed by: https://github.com/gpac/gpac/commit/0018b5e4e07a1465287e7dff69b387929f5a75fa CVE-2023-40946 (Schoolmate 1.3 is vulnerable to SQL Injection in the variable $usernam ...) @@ -43,6 +44,7 @@ CVE-2023-40150 (Softneta MedDream PACS does not perform an authentication check NOT-FOR-US: Softneta MedDream PACS CVE-2023-40032 (libvips is a demand-driven, horizontally threaded image processing lib ...) - vips 8.14.4-1 + [bookworm] - vips (Minor issue) [bullseye] - vips (Vulnerable code not present) [buster] - vips (Vulnerable code not present) NOTE: https://github.com/libvips/libvips/pull/3604 @@ -61,7 +63,7 @@ CVE-2023-39780 (ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an aut CVE-2023-39227 (Softneta MedDream PACSstores usernames and passwords in plaintext. The ...) NOT-FOR-US: Softneta MedDream PACS CVE-2023-39070 (An issue in Cppcheck 2.12 dev allows a local attacker to execute arbit ...) - - cppcheck + - cppcheck (unimportant) NOTE: https://sourceforge.net/p/cppcheck/discussion/general/thread/fa43fb8ab1/ CVE-2023-39068 (Buffer Overflow vulnerability in NBD80S09S-KLC v.YK_HZXM_NBD80S09S-KLC ...) TODO: check @@ -95,6 +97,8 @@ CVE-2023-42470 (The Imou Life com.mm.android.smartlifeiot application through 6. NOT-FOR-US: Imou Life com.mm.android.smartlifeiot application CVE-2023-42467 (QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset ...) - qemu + [bookworm] - qemu (Minor issue) + [bullseye] - qemu (Minor issue) NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1813 CVE-2023-40040 (An issue was discovered in the MyCrops HiGrade "THC Testing & Cannabi" ...) NOT-FOR-US: MyCrops HiGrade "THC Testing & Cannabi" application @@ -2065,6 +2069,7 @@ CVE-2023-39578 (A stored cross-site scripting (XSS) vulnerability in the Create NOT-FOR-US: Zenario CMS CVE-2023-39562 (GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a hea ...) - gpac (bug #1051740) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2537 NOTE: https://github.com/gpac/gpac/commit/9024531ee8e6ae8318a8fe0cbb64710d1acc31f6 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51837e301a0e976499cc2b9e6c5d26bca1c24a96 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/51837e301a0e976499cc2b9e6c5d26bca1c24a96 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 95731b3f by Moritz Muehlenhoff at 2023-09-07T12:11:29+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -436,6 +436,8 @@ CVE-2023-4587 (An IDOR vulnerability has been found in ZKTeco ZEM800 product aff NOT-FOR-US: ZKTeco ZEM800 product CVE-2023-4540 (Improper Handling of Exceptional Conditions vulnerability in Daurnimat ...) - lua-http + [bookworm] - lua-http (Minor issue) + [bullseye] - lua-http (Minor issue) NOTE: Fixed by: https://github.com/daurnimator/lua-http/commit/ddab2835c583d45dec62680ca8d3cbde55e0bae6 CVE-2023-4298 (The 123.chat WordPress plugin before 1.3.1 does not sanitise and escap ...) NOT-FOR-US: WordPress plugin @@ -705,9 +707,10 @@ CVE-2023-32806 (In wlan driver, there is a possible out of bounds write due to i CVE-2023-32805 (In power, there is a possible out of bounds write due to an insecure d ...) NOT-FOR-US: MediaTek CVE-2023-4751 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - - vim + - vim (unimportant) NOTE: https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b (v9.0.1331) NOTE: https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378 + NOTE: Crash in CLI tool, no security impact CVE-2023-4740 (A vulnerability, which was classified as critical, was found in IBOS O ...) NOT-FOR-US: IBOS OA CVE-2023-4739 (A vulnerability, which was classified as critical, has been found in B ...) @@ -1413,6 +1416,8 @@ CVE-2023-39678 (A cross-site scripting (XSS) vulnerability in the device web int NOT-FOR-US: BDCOM OLT P3310D-2AC CVE-2023-39663 (Mathjax up to v2.7.9 was discovered to contain two Regular expression ...) - mathjax + [bookworm] - mathjax (Minor issue) + [bullseye] - mathjax (Minor issue) NOTE: https://github.com/mathjax/MathJax/issues/3074 CVE-2023-39616 (AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid read mem ...) [experimental] - aom 3.7.0-1~exp1 = data/dsa-needed.txt = @@ -38,6 +38,8 @@ nodejs -- nova/oldstable -- +open-vm-tools (jmm) +-- openjdk-17/oldstable (jmm) -- php-cas/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95731b3fce160a20d0d1d246a2e985aa76671f84 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95731b3fce160a20d0d1d246a2e985aa76671f84 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 75ddbc45 by Moritz Muehlenhoff at 2023-09-06T11:29:19+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -54,10 +54,13 @@ CVE-2023-36851 NOT-FOR-US: Juniper CVE-2023-4781 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - vim + [bookworm] - vim (Minor issue) + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883/ NOTE: https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93 (v9.0.1873) CVE-2023-4778 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397/ NOTE: https://github.com/gpac/gpac/commit/d553698050af478049e1a09e44a15ac884f223ed @@ -184,20 +187,25 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x NOTE: https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210 CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated] - xen + [bookworm] - xen (Minor issue, fix along in future DSA) + [bullseye] - xen (Minor issue, fix along in future DSA) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-437.html CVE-2023-4758 (Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV.) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86 NOTE: https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6 CVE-2023-4756 (Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2. ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/commit/6914d016e2b540bac2c471c4aea156ddef8e8e01 NOTE: https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05 CVE-2023-4755 (Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV.) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a NOTE: https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3 @@ -208,18 +216,22 @@ CVE-2023-4754 (Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-D NOTE: https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c CVE-2023-4752 (Use After Free in GitHub repository vim/vim prior to 9.0.1858.) - vim + [bookworm] - vim (Minor issue) + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757/ NOTE: https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139 (v9.0.1858) CVE-2023-4750 (Use After Free in GitHub repository vim/vim prior to 9.0.1857.) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea/ NOTE: https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed (v9.0.1857) + NOTE: Crash in CLI tool, no security impact CVE-2023-4748 (A vulnerability, which was classified as critical, has been found in Y ...) NOT-FOR-US: Yongyou UFIDA-NC CVE-2023-4733 (Use After Free in GitHub repository vim/vim prior to 9.0.1840.) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217/ NOTE: https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c (v9.0.1840) + NOTE: Crash in CLI tool, no security impact CVE-2023-4636 (The WordPress File Sharing Plugin plugin for WordPress is vulnerable t ...) NOT-FOR-US: WordPress File Sharing Plugin plugin for WordPress CVE-2023-4616 (This vulnerability allows remote attackers to disclose sensitive infor ...) = data/dsa-needed.txt = @@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +cacti -- chromium -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75ddbc4597f0d393e6017696d1567a8623c2ce1d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/75ddbc4597f0d393e6017696d1567a8623c2ce1d You're receiving this email because of
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6f2cbdbb by Moritz Muehlenhoff at 2023-09-03T21:02:13+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,19 +1,23 @@ CVE-2023-4738 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - vim + [bookworm] - vim (Minor issue) + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/9fc7dced-a7bb-4479-9718-f956df20f612/ NOTE: https://github.com/vim/vim/commit/ced2c7394aafdc90fb7845e09b3a3fee23d48cb1 (v9.0.1848) CVE-2023-4736 (Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833.) - - vim + - vim (Windows-specific) NOTE: https://huntr.dev/bounties/e1ce0995-4df4-4dec-9cd7-3136ac3e8e71/ NOTE: https://github.com/vim/vim/commit/816fbcc262687b81fc46f82f7bbeb1453addfe0c (v9.0.1833) CVE-2023-4735 (Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51/ NOTE: https://github.com/vim/vim/commit/889f6af37164775192e33b233a90e86fd3df0f57 (v9.0.1847) + NOTE: Crash in CLI tool, no security impact CVE-2023-4734 (Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9 ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217/ NOTE: https://github.com/vim/vim/commit/4c6fe2e2ea62469642ed1d80b16d39e616b25cf5 (v9.0.1846) + NOTE: Crash in CLI tool, no security impact CVE-2023-39983 (A vulnerability that poses a potential risk of polluting the MXsecurit ...) NOT-FOR-US: MXsecurity CVE-2023-39982 (A vulnerability has been identified in MXsecurity versions prior to v1 ...) @@ -1276,6 +1280,8 @@ CVE-2023-40217 (An issue was discovered in Python before 3.8.18, 3.9.x before 3. NOTE: 2. https://github.com/python/cpython/commit/592bacb6fc086c0453e818e9b95016e9fd47 CVE-2023-4380 - ansible + [bookworm] - ansible (Minor issue) + [bullseye] - ansible (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2232324 CVE-2023-4420 (A remote unprivileged attacker can intercept the communication via e.g ...) NOT-FOR-US: SICK LMS5xx @@ -5762,11 +5768,13 @@ CVE-2023-3779 (The Essential Addons For Elementor plugin for WordPress is vulner NOT-FOR-US: WordPress plugin CVE-2023-3300 (HashiCorp Nomad and Nomad Enterprise 0.11.0 up to 1.5.6 and 1.4.1 HTTP ...) - nomad + [bullseye] - nomad (Will be removed in Bullseye 11.8) NOTE: https://discuss.hashicorp.com/t/hcsec-2023-22-nomad-search-api-leaks-information-about-csi-plugins/56272 CVE-2023-3299 (HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies ...) - nomad (Specific to Nomad Enterprise) CVE-2023-3072 (HashiCorp Nomad and Nomad Enterprise 0.7.0 up to 1.5.6 and 1.4.10 ACL ...) - nomad + [bullseye] - nomad (Will be removed in Bullseye 11.8) NOTE: https://discuss.hashicorp.com/t/hcsec-2023-20-nomad-acl-policies-without-label-are-applied-to-unexpected-resources/56270 CVE-2023-37362 (Weintek Weincloud v0.13.6 could allow an attacker to abuse the reg ...) NOT-FOR-US: Weincloud @@ -19742,11 +19750,15 @@ CVE-2023-29451 (Specially crafted string can cause a buffer overrun in the JSON CVE-2023-29450 (JavaScript pre-processing can be used by the attacker to gain access t ...) {DLA-3538-1} - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-22588 NOTE: Patch for 5.0.32rc1: https://github.com/zabbix/zabbix/commit/c3f1543e4 NOTE: Patch for 6.0.14rc2: https://github.com/zabbix/zabbix/commit/76f6a80cb CVE-2023-29449 (JavaScript preprocessing, webhooks and global scripts can cause uncont ...) - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) [buster] - zabbix (vulnerable code introduced later) NOTE: https://support.zabbix.com/browse/ZBX-22589 NOTE: Upstream patch for 5.0.32: https://github.com/zabbix/zabbix/commit/e90b8a3c62 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2cbdbbbd71480032bd068740a244e3cae0520c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6f2cbdbbbd71480032bd068740a244e3cae0520c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ac3dd65a by Moritz Muehlenhoff at 2023-09-02T20:08:57+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -95,6 +95,8 @@ CVE-2023-37826 (A cross-site scripting (XSS) vulnerability in General Solutions NOT-FOR-US: General Solutions Steiner GmbH CASE 3 Taskmanagement CVE-2023-36328 (Integer Overflow vulnerability in mp_grow in libtom libtommath before ...) - libtommath + [bookworm] - libtommath (Minor issue) + [bullseye] - libtommath (Minor issue) NOTE: https://github.com/libtom/libtommath/pull/546 NOTE: https://github.com/libtom/libtommath/commit/beba892bc0d4e4ded4d667ab1d2a94f4d75109a9 CVE-2023-36327 (Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba424 ...) @@ -466,6 +468,8 @@ CVE-2023-40186 (FreeRDP is a free implementation of the Remote Desktop Protocol NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hcj4-3c3r-5j3v CVE-2023-40184 (xrdp is an open source remote desktop protocol (RDP) server. In versio ...) - xrdp (bug #1051061) + [bookworm] - xrdp (Minor issue) + [bullseye] - xrdp (Minor issue) NOTE: https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-f489-557v-47jq NOTE: https://github.com/neutrinolabs/xrdp/commit/25a1fab5b6c5ef2a8bb109232b765cb8b332ce5e CVE-2023-40181 (FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), ...) @@ -623,6 +627,7 @@ CVE-2023-39663 (Mathjax up to v2.7.9 was discovered to contain two Regular expre TODO: check CVE-2023-39616 (AOMedia v3.0.0 to v3.5.0 was discovered to contain an invalid read mem ...) - aom 3.7.0~rc3-1 + [bookworm] - aom (Minor issue) [bullseye] - aom (Vulnerable code introduced later) [buster] - aom (Vulnerable code introduced later) NOTE: https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3 @@ -1989,6 +1994,8 @@ CVE-2023-39743 (lrzip-next LZMA v23.01 was discovered to contain an access viola - lrzip-next (bug #1042088) CVE-2023-39741 (lrzip v0.651 was discovered to contain a heap overflow via the libzpaq ...) - lrzip + [bookworm] - lrzip (Minor issue) + [bullseye] - lrzip (Minor issue) NOTE: https://github.com/ckolivas/lrzip/issues/246 CVE-2023-38905 (SQL injection vulnerability in Jeecg-boot v.3.5.0 and before allows a ...) NOT-FOR-US: JeecgBoot @@ -6165,6 +6172,7 @@ CVE-2023-37479 (Open Enclave is a hardware-agnostic open source library for deve NOT-FOR-US: Open Enclave CVE-2023-37476 (OpenRefine is a free, open source tool for data processing. A carefull ...) - openrefine 3.6.2-3 (bug #1041422) + [bookworm] - openrefine (Minor issue) NOTE: https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq NOTE: https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e (master) NOTE: https://github.com/OpenRefine/OpenRefine/commit/c40c84d8170c4d61c6a0926531b552a50caa5651 (3.7.4) @@ -22207,6 +22215,8 @@ CVE-2023-28756 (A ReDoS issue was discovered in the Time component through 0.2.1 CVE-2023-28755 (A ReDoS issue was discovered in the URI component through 0.12.0 in Ru ...) {DLA-3447-1 DLA-3408-1} - rubygems + [bookworm] - rubygems (Minor issue) + [bullseye] - rubygems (Minor issue) - ruby3.1 (bug #1038408) - ruby2.7 - ruby2.5 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac3dd65ac6eac8ffc0729eb262b40827d8b0ec88 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac3dd65ac6eac8ffc0729eb262b40827d8b0ec88 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 36af2a11 by Moritz Muehlenhoff at 2023-09-01T10:01:06+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1,5 +1,6 @@ CVE-2023-4683 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-D ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/commit/112767e8b178fc82dec3cf82a1ca14d802cdb8ec NOTE: https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922 CVE-2023-4682 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3 ...) @@ -8,10 +9,12 @@ CVE-2023-4682 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior t NOTE: https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c CVE-2023-4681 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-D ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c NOTE: https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e CVE-2023-4678 (Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV.) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/commit/4607052c482a51dbdacfe1ade10645c181d07b07 NOTE: https://huntr.dev/bounties/688a4a01-8c18-469d-8cbe-a2e79e80c877 CVE-2023-41748 (Remote command execution due to improper input validation. The followi ...) @@ -110,6 +113,8 @@ CVE-2023-4649 (Session Fixation in GitHub repository instantsoft/icms2 prior to NOT-FOR-US: icms2 CVE-2023-4641 [gpasswd(1) password leak] - shadow + [bookworm] - shadow (Minor issue) + [bullseye] - shadow (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2215945 NOTE: https://github.com/shadow-maint/shadow/commit/65c88a43a23c2391dcc90c0abda3e839e9c57904 (4.14.0-rc1) CVE-2023-4500 (The Order Tracking Pro plugin for WordPress is vulnerable to Stored Cr ...) @@ -19504,6 +19509,7 @@ CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> Ge CVE-2023-29451 (Specially crafted string can cause a buffer overrun in the JSON parser ...) {DLA-3538-1} - zabbix + [bookworm] - zabbix (Minor issue) [bullseye] - zabbix (5.x not affected) NOTE: https://support.zabbix.com/browse/ZBX-22587 CVE-2023-29450 (JavaScript pre-processing can be used by the attacker to gain access t ...) @@ -2,6 +30005,8 @@ CVE-2023-0923 NOT-FOR-US: Red Hat OpenShift Data Science CVE-2023-0922 (The Samba AD DC administration tool, when operating against a remote L ...) - samba 2:4.17.7+dfsg-1 + [bullseye] - samba (Domain controller functionality is EOLed, see DSA DSA-5477-1) + [buster] - samba (Domain controller functionality is EOLed, see DSA-5015-1) NOTE: https://www.samba.org/samba/security/CVE-2023-0922.html CVE-2023-0921 (A lack of length validation in GitLab CE/EE affecting all versions fro ...) - gitlab 15.10.8+ds1-2 @@ -117984,15 +117992,18 @@ CVE-2022-23517 (rails-html-sanitizer is responsible for sanitizing HTML fragment NOTE: https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979 CVE-2022-23516 (Loofah is a general library for manipulating and transforming HTML/XML ...) - ruby-loofah 2.19.1-1 (bug #1026083) + [bullseye] - ruby-loofah (Minor issue) [buster] - ruby-loofah (Minor issue) NOTE: https://github.com/flavorjones/loofah/security/advisories/GHSA-3x8r-x6xp-q4vm NOTE: https://github.com/flavorjones/loofah/commit/86f7f6364491b0099d215db858ecdc0c89ded040 CVE-2022-23515 (Loofah is a general library for manipulating and transforming HTML/XML ...) - ruby-loofah 2.19.1-1 (bug #1026083) + [bullseye] - ruby-loofah (Minor issue) NOTE: https://github.com/flavorjones/loofah/security/advisories/GHSA-228g-948r-83gx NOTE: https://github.com/flavorjones/loofah/commit/415677f3cf7f9254f42f811e784985cd63c7407f CVE-2022-23514 (Loofah is a general library for manipulating and transforming HTML/XML ...) - ruby-loofah 2.19.1-1 (bug #1026083) + [bullseye] - ruby-loofah (Minor issue) [buster] - ruby-loofah (Minor issue) NOTE: https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh NOTE: https://github.com/flavorjones/loofah/commit/a6e0a1ab90675a17b1b2be189129d94139e4b143 @@ -150154,7 +150165,7 @@ CVE-2021-3670 (MaxQueryDuration not honoured in Samba AD DC LDAP) [buster] - ldb (Minor issue) [stretch] - ldb (Minor issue) - samba 2:4.16.0+dfsg-2 - [bullseye] - samba (Minor
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 058a607b by Moritz Muehlenhoff at 2023-08-28T13:38:08+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -64,10 +64,11 @@ CVE-2023-41080 (URL Redirection to Untrusted Site ('Open Redirect') vulnerabilit NOTE: Starting with 9.0.70-2 Tomcat9 no longer ships the server stack, using that as the fixed version CVE-2023-40587 (Pyramid is an open source Python web framework. A path traversal vulne ...) - python-pyramid + [bookworm] - python-pyramid (Minor issue) + [bullseye] - python-pyramid (Python version in Bullseye is not affected) NOTE: https://github.com/Pylons/pyramid/security/advisories/GHSA-j8g2-6fc7-q8f8 NOTE: https://github.com/Pylons/pyramid/commit/347d7750da6f45c7436dd0c31468885cc9343c85 (2.0.2) NOTE: Underlying issue fixed in Python 3.11 and 3.12. - TODO: check, claimed to be only affecting >= 2.0 CVE-2023-40586 (OWASP Coraza WAF is a golang modsecurity compatible web application fi ...) NOT-FOR-US: OWASP Coraza WAF CVE-2023-40585 (ironic-image is a container image to run OpenStack Ironic as part of M ...) @@ -149,6 +150,7 @@ CVE-2023-40579 (OpenFGA is an authorization/permission engine built for develope CVE-2023-40577 (Alertmanager handles alerts sent by client applications such as the Pr ...) - prometheus-alertmanager 0.26.0+ds-1 (bug #1050558) NOTE: https://github.com/prometheus/alertmanager/security/advisories/GHSA-v86x-5fm3-5p7j + NOTE: https://github.com/prometheus/alertmanager/commit/8b9f2fd20c25e0d1e76aa0b407f7e354996d8e72 (release-0.25) CVE-2023-40570 (Datasette is an open source multi-tool for exploring and publishing da ...) NOT-FOR-US: Datasette CVE-2023-40568 @@ -142855,6 +142857,7 @@ CVE-2021-40212 (An exploitable out-of-bounds write vulnerability in PotPlayer 1. NOT-FOR-US: PotPlayer CVE-2021-40211 (An issue was discovered with ImageMagick 7.1.0-4 via Division by zero ...) - imagemagick 8:6.9.11.60+dfsg-1.5 + [bullseye] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/issues/4097 NOTE: https://github.com/ImageMagick/ImageMagick/commit/0fb77f2a231038efdc38dcceddae6952ebdfb000 (7.1.0-5) NOTE: https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa#diff-9509dd2616f8c0aab419100d616e5e926099cc61bdfde60f2ae408f02f43472a (6.9.12-43) @@ -219738,6 +219741,7 @@ CVE-2020-22219 (Buffer Overflow vulnerability in function bitwriter_grow_ in fla NOTE: https://github.com/xiph/flac/pull/419 (1.4.0) CVE-2020-22218 (An issue was discovered in function _libssh2_packet_add in libssh2 1.1 ...) - libssh2 1.10.0-2 + [bullseye] - libssh2 (Minor issue) NOTE: https://github.com/libssh2/libssh2/pull/476 NOTE: https://github.com/libssh2/libssh2/commit/642eec48ff3adfdb7a9e562b6d7fc865d1733f45 (libssh2-1.10.0) CVE-2020-22217 (Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via ...) @@ -220868,12 +220872,18 @@ CVE-2020-21725 (OpenSNS v6.1.0 contains a blind SQL injection vulnerability in / NOT-FOR-US: OpenSNS CVE-2020-21724 (Buffer Overflow vulnerability in ExtractorInformation function in stre ...) - oggvideotools + [bookworm] - oggvideotools (Minor issue) + [bullseye] - oggvideotools (Minor issue) NOTE: https://sourceforge.net/p/oggvideotools/bugs/9/ CVE-2020-21723 (A Segmentation Fault issue discovered StreamSerializer::extractStreams ...) - oggvideotools + [bookworm] - oggvideotools (Minor issue) + [bullseye] - oggvideotools (Minor issue) NOTE: https://sourceforge.net/p/oggvideotools/bugs/10/ CVE-2020-21722 (Buffer Overflow vulnerability in oggvideotools 0.9.1 allows remote att ...) - oggvideotools + [bookworm] - oggvideotools (Minor issue) + [bullseye] - oggvideotools (Minor issue) NOTE: https://sourceforge.net/p/oggvideotools/bugs/11/ CVE-2020-21721 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/058a607ba3bdd8473c997fc8757d2fffd1989027 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/058a607ba3bdd8473c997fc8757d2fffd1989027 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 616b8997 by Moritz Muehlenhoff at 2023-08-28T11:52:30+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -54,7 +54,9 @@ CVE-2023-41121 (Array AG OS before 9.4.0.499 allows denial of service: remote at NOT-FOR-US: Array AG OS CVE-2023-41080 (URL Redirection to Untrusted Site ('Open Redirect') vulnerability in F ...) - tomcat10 + [bookworm] - tomcat10 (Minor issue, fix along with future update) - tomcat9 9.0.70-2 + [bullseye] - tomcat9 (Minor issue, fix along with future update) - tomcat8 NOTE: https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f NOTE: https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27 (10.1.13) @@ -46229,8 +46231,11 @@ CVE-2022-47023 RESERVED CVE-2022-47022 (An issue was discovered in open-mpi hwloc 2.1.0 allows attackers to ca ...) - hwloc + [bookworm] - hwloc (Minor issue) + [bullseye] - hwloc (Minor issue) NOTE: https://github.com/open-mpi/hwloc/issues/544 - TODO: check, additionally openmpi and mpich embedd hwloc, but issue seems negligible + NOTE: https://github.com/open-mpi/hwloc/commit/eec84f84d4c4a7af6ed2c57ba95a9256e56e73b4 + NOTE: Additionally openmpi and mpich embedd hwloc, but issue seems negligible CVE-2022-47021 (A null pointer dereference issue was discovered in functions op_get_da ...) - opusfile 0.12-4 (bug #1030049) [bullseye] - opusfile (Minor issue) @@ -59984,6 +59989,8 @@ CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function S NOTE: https://github.com/sass/libsass/issues/3178 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function Sass::Co ...) - libsass + [bookworm] - libsass (Minor issue) + [bullseye] - libsass (Minor issue) NOTE: https://github.com/sass/libsass/issues/3177 CVE-2022-43356 RESERVED @@ -68800,6 +68807,7 @@ CVE-2022-40091 (Online Tours & Travels Management System v1.0 was discovered to NOT-FOR-US: Online Tours & Travels Management System CVE-2022-40090 (An issue was discovered in function TIFFReadDirectory libtiff before 4 ...) - tiff 4.5.0-2 + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/455 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/386 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/d093eb5d961e21ba51420bc22382c514683a4d91 (v4.5.0rc1) @@ -107155,6 +107163,8 @@ CVE-2022-26593 (Cross-site scripting (XSS) vulnerability in the Asset module's a NOT-FOR-US: Liferay CVE-2022-26592 (Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector ...) - libsass + [bookworm] - libsass (Minor issue) + [bullseye] - libsass (Minor issue) NOTE: https://github.com/sass/libsass/issues/3174 CVE-2022-26591 (FANTEC GmbH MWiD25-DS Firmware v2.000.030 allows unauthenticated attac ...) NOT-FOR-US: FANTEC GmbH MWiD25-DS Firmware @@ -118015,6 +118025,8 @@ CVE-2021-46313 (The binary MP4Box in GPAC v1.0.1 was discovered to contain a seg NOTE: https://github.com/gpac/gpac/commit/ee969d3c4c425ecb25999eb68ada616925b58eba (v2.0.0) CVE-2021-46312 (An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ...) - djvulibre + [bookworm] - djvulibre (Minor issue) + [bullseye] - djvulibre (Minor issue) NOTE: https://sourceforge.net/p/djvu/bugs/344/ CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the ...) - gpac 2.0.0+dfsg1-2 @@ -118025,6 +118037,8 @@ CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 v NOTE: https://github.com/gpac/gpac/commit/ad19e0c4504a89ca273442b1b1483ae7adfb9491 (v2.0.0) CVE-2021-46310 (An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ...) - djvulibre + [bookworm] - djvulibre (Minor issue) + [bullseye] - djvulibre (Minor issue) NOTE: https://sourceforge.net/p/djvu/bugs/345/ CVE-2021-46309 (An SQL Injection vulnerability exists in Sourcecodester Employee and V ...) NOT-FOR-US: Sourcecodester @@ -221395,10 +221409,11 @@ CVE-2020-21529 (fig2dev 3.2.7b contains a stack buffer overflow in the bezier_sp NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/d70e4ba6308046f71cb51f67db8412155af52411/ (3.2.8) NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/e3cee2576438f47a3b8678c6960472e625f8f7d7/ (3.2.8) CVE-2020-21528 (A Segmentation Fault issue discovered in in ieee_segment function in o ...) - - nasm 2.16.01-1 + - nasm 2.16.01-1 (unimportant) NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 41e7aa64 by Moritz Muehlenhoff at 2023-08-28T09:58:58+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -73,6 +73,8 @@ CVE-2023-4520 (The FV Flowplayer Video Player plugin for WordPress is vulnerable NOT-FOR-US: FV Flowplayer Video Player plugin for WordPress CVE-2023-4508 (A user able to control file input to Gerbv, between versions 2.4.0 and ...) - gerbv 2.10.0-1 (bug #1050560) + [bookworm] - gerbv (Minor issue) + [bullseye] - gerbv (Minor issue) NOTE: https://github.com/gerbv/gerbv/issues/191 NOTE: https://github.com/gerbv/gerbv/pull/192 NOTE: https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a (v2.10.0-rc.1) @@ -227170,6 +227172,8 @@ CVE-2020-18771 (Exiv2 0.27.99.0 has a global buffer over-read in Exiv2::Internal NOTE: https://github.com/Exiv2/exiv2/issues/756 CVE-2020-18770 (An issue was discovered in function zzip_disk_entry_to_file_header in ...) - zziplib + [bookworm] - zziplib (Minor issue) + [bullseye] - zziplib (Minor issue) NOTE: https://github.com/gdraheim/zziplib/issues/69 CVE-2020-18769 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41e7aa64ec76e0cfc22c421b71f66c289411153e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41e7aa64ec76e0cfc22c421b71f66c289411153e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b91c790d by Moritz Muehlenhoff at 2023-08-25T18:39:58+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -159586,13 +159586,15 @@ CVE-2021-33391 (An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute a NOTE: https://github.com/htacg/tidy-html5/issues/946 NOTE: https://github.com/htacg/tidy-html5/commit/efa61528aa500a1efbd2768121820742d3bb709b CVE-2021-33390 (dpic 2021.04.10 has a use-after-free in thedeletestringbox() function ...) - - dpic 2021.11.01-1 + - dpic 2021.11.01-1 (unimportant) NOTE: https://gitlab.com/aplevich/dpic/-/issues/10 NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/32c26bb3996511662029c961f5e83fb696c087d4 + NOTE: Crash in CLI tool, no security impact CVE-2021-33389 RESERVED CVE-2021-33388 (dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() function in ...) - dpic 2021.11.01-1 + [bullseye] - dpic (Minor issue) NOTE: https://gitlab.com/aplevich/dpic/-/issues/8 NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/32c26bb3996511662029c961f5e83fb696c087d4 CVE-2021-33387 (Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows attacker t ...) @@ -162214,15 +162216,18 @@ CVE-2021-32424 (In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session CVE-2021-32423 RESERVED CVE-2021-32422 (dpic 2021.01.01 has a Global buffer overflow in theyylex() function in ...) - - dpic 2021.11.01-1 + - dpic 2021.11.01-1 (unimportant) NOTE: https://gitlab.com/aplevich/dpic/-/issues/6 NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf + NOTE: Crash in CLI tool, no security impact CVE-2021-32421 (dpic 2021.01.01 has a Heap Use-After-Free in thedeletestringbox() func ...) - - dpic 2021.11.01-1 + - dpic 2021.11.01-1 (unimportant) NOTE: https://gitlab.com/aplevich/dpic/-/issues/7 NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf + NOTE: Crash in CLI tool, no security impact CVE-2021-32420 (dpic 2021.01.01 has a Heap-based Buffer Overflow in thestorestring fun ...) - dpic 2021.11.01-1 + [bullseye] - dpic (Minor issue) NOTE: https://gitlab.com/aplevich/dpic/-/issues/5 NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf CVE-2021-32419 (An issue in Schism Tracker v20200412 fixed in v.20200412 allows attack ...) = data/dsa-needed.txt = @@ -52,6 +52,10 @@ php-horde-turba/oldstable -- py7zr/oldstable -- +python3.11/stable +-- +python3.9/oldstable +-- python-glance-store/oldstable -- python-os-brick/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b91c790df6aa973246eeb72b286a0bb13255687a -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b91c790df6aa973246eeb72b286a0bb13255687a You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9625bc10 by Moritz Muehlenhoff at 2023-08-25T11:33:30+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -79,14 +79,20 @@ CVE-2023- [tryton-server lack of record validation] NOTE: https://discuss.tryton.org/t/security-release-for-issue-12428 CVE-2023-4513 (BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to ...) - wireshark 4.0.8-1 + [bookworm] - wireshark (Minor issue) + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19259 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-25.html CVE-2023-4512 (CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of serv ...) - wireshark 4.0.8-1 + [bookworm] - wireshark (Minor issue) + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19144 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-23.html CVE-2023-4511 (BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 t ...) - wireshark 4.0.8-1 + [bookworm] - wireshark (Minor issue) + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19258 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-24.html CVE-2023-4230 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) @@ -1715,6 +1721,7 @@ CVE-2023-32560 (An attacker can send a specially crafted message to the Wavelink NOT-FOR-US: Ivanti CVE-2023-39418 (A vulnerability was found in PostgreSQL with the use of the MERGE comm ...) - postgresql-15 15.4-1 + [bookworm] - postgresql-15 (Minor issue, fix along with next round of updates) - postgresql-13 (Only affects 15.x) - postgresql-11 (Only affects 15.x) NOTE: https://www.postgresql.org/support/security/CVE-2023-39418/ @@ -1722,7 +1729,9 @@ CVE-2023-39418 (A vulnerability was found in PostgreSQL with the use of the MERG NOTE: https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=cb2ae5741f2458a474ed3c31458d242e678ff229 (REL_15_4) CVE-2023-39417 (IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in Po ...) - postgresql-15 15.4-1 + [bookworm] - postgresql-15 (Minor issue, fix along with next round of updates) - postgresql-13 + [bullseye] - postgresql-13 (Minor issue, fix along with next round of updates) - postgresql-11 NOTE: https://www.postgresql.org/support/security/CVE-2023-39417/ NOTE: https://www.postgresql.org/about/news/postgresql-154-149-1312-1216-1121-and-postgresql-16-beta-3-released-2689/ @@ -50311,6 +50320,8 @@ CVE-2022-45583 RESERVED CVE-2022-45582 (Open Redirect vulnerability in Horizon Web Dashboard 19.4.0 thru 20.1. ...) - horizon 3:23.1.0-3 + [bookworm] - horizon (Minor issue) + [bullseye] - horizon (Minor issue) NOTE: https://bugs.launchpad.net/horizon/+bug/1982676 NOTE: https://opendev.org/openstack/horizon/commit/beed6bf6f6f83df9972db5fb539d64175ce12ce9 (19.4.0) NOTE: https://opendev.org/openstack/horizon/commit/2f600272bfffb3024e6f06a369f9b4768dd1a0b0 (20.1.4) @@ -65091,6 +65102,7 @@ CVE-2022-41445 (A cross-site scripting (XSS) vulnerability in Record Management NOT-FOR-US: Record Management System CVE-2022-41444 (Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted P ...) - cacti 1.2.22+ds1-1 + [bullseye] - cacti (Minor issue) NOTE: https://gist.github.com/enferas/9079535112e4f4ff2c1d2ce1c099d4c2 NOTE: Fixed by: https://github.com/Cacti/cacti/commit/ccb8b62de0f27f59d5e6073c2ae577a9ca7adaf8 (release/1.2.22) CVE-2022-41443 (phpipam v1.5.0 was discovered to contain a header injection vulnerabil ...) @@ -142406,18 +142418,28 @@ CVE-2021-40267 RESERVED CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vul ...) - freeimage + [bookworm] - freeimage (Minor issue) + [bullseye] - freeimage (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/334/ CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...) - freeimage + [bookworm] - freeimage (Minor issue) + [bullseye] - freeimage (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/337/ CVE-2021-40264 (NULL pointer dereference vulnerability in FreeImage before 1.18.0 via ...) - freeimage + [bookworm] - freeimage (Minor issue) + [bullseye] - freeimage (Minor issue) NOTE: https://sourceforge.net/p/freeimage/bugs/335/
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 295a6867 by Moritz Muehlenhoff at 2023-08-24T10:58:32+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -113,6 +113,7 @@ CVE-2023-4041 (Buffer Copy without Checking Size of Input ('Classic Buffer Overf CVE-2023-41105 (An issue was discovered in Python 3.11 through 3.11.4. If a path conta ...) - python3.12 - python3.11 + [bookworm] - python3.11 (Minor issue) - python3.10 (Vulnerable code introduced in 3.11.y) - python3.9 (Vulnerable code introduced in 3.11.y) - python3.7 (Vulnerable code introduced in 3.11.y) @@ -238,6 +239,8 @@ CVE-2022-48571 (memcached 1.6.7 allows a Denial of Service via multi-packet uplo NOTE: Fixed by: https://github.com/memcached/memcached/commit/6b319c8c7a29e9c353dec83dc92f01905f6c8966 (1.6.8) CVE-2022-48570 (Crypto++ through 8.4 contains a timing side channel in ECDSA signature ...) - libcrypto++ + [bookworm] - libcrypto++ (Minor issue) + [bullseye] - libcrypto++ (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/992 NOTE: This issue exists because the CVE-2019-14318 fix was intentionally removed for NOTE: functionality reasons. @@ -308,6 +311,7 @@ CVE-2023- [RUSTSEC-2023-0053: rustls-webpki: CPU denial of service in certif NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023- [RUSTSEC-2023-0052 webpki: CPU denial of service in certificate path building] - rust-webpki (bug #1050299) + [bookworm] - rust-webpki (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0052.html NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023-32184 @@ -18260,6 +18264,7 @@ CVE-2023-29453 RESERVED CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> Geograph ...) - zabbix + [bookworm] - zabbix (Minor issue) [bullseye] - zabbix (vulnerable code introduced later) [buster] - zabbix (vulnerable code introduced later) NOTE: https://support.zabbix.com/browse/ZBX-22981 @@ -40763,6 +40768,8 @@ CVE-2022-48175 (Rukovoditel v3.2.1 was discovered to contain a remote code execu NOT-FOR-US: Rukovoditel CVE-2022-48174 (There is a stack overflow vulnerability in ash.c:6030 in busybox befor ...) - busybox + [bookworm] - busybox (Minor issue) + [bullseye] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15216 NOTE: https://git.busybox.net/busybox/commit/?id=d417193cf37ca1005830d7e16f5fa7e1d8a44209 CVE-2022-48173 @@ -59580,6 +59587,8 @@ CVE-2022-43359 (Gifdec commit 1dcbae19363597314f6623010cc80abad4e47f7c was disco NOT-FOR-US: Gifdec CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function Sass::C ...) - libsass + [bookworm] - libsass (Minor issue) + [bullseye] - libsass (Minor issue) NOTE: https://github.com/sass/libsass/issues/3178 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function Sass::Co ...) TODO: check @@ -131765,7 +131774,7 @@ CVE-2021-43400 (An issue was discovered in gatt-database.c in BlueZ 5.61. A use- CVE-2021-43399 (The Yubico YubiHSM YubiHSM2 library 2021.08, included in the yubihsm-s ...) NOT-FOR-US: yubihsm-shell CVE-2021-43398 (Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in ...) - - libcrypto++ (unimportant; bug #1000227) + NOTE: Disputed Crypto++ issue, also see #1000227 NOTE: https://github.com/weidai11/cryptopp/issues/1080 NOTE: As per upstream believed to be the expected behaviour: NOTE: https://github.com/weidai11/cryptopp/issues/1080#issuecomment-99649 = data/dsa-needed.txt = @@ -78,6 +78,8 @@ samba/oldstable -- tiff -- +trafficserver +-- wpewebkit/oldstable -- xrdp/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 42035754 by Moritz Muehlenhoff at 2023-08-23T20:08:10+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -76583,6 +76583,7 @@ CVE-2022-37051 (An issue was discovered in Poppler 22.07.0. There is a reachable NOTE: Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/4631115647c1e4f0482ffe0491c2f38d2231337b (poppler-22.08.0) CVE-2022-37050 (In Poppler 22.07.0, PDFDoc::savePageAs in PDFDoc.c callows attackers t ...) - poppler 22.08.0-2 + [bullseye] - poppler (Minor issue) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1274 NOTE: Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/dcd5bd8238ea448addd102ff045badd0aca1b990 (poppler-22.08.0) CVE-2022-37049 (The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/420357547f16bdae35d1d5d5c11c0feac392a446 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/420357547f16bdae35d1d5d5c11c0feac392a446 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6768eaac by Moritz Muehlenhoff at 2023-08-23T14:38:29+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -59,16 +59,19 @@ CVE-2023-38906 (An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo CVE-2023-38732 (IBM Robotic Process Automation 21.0.0 through 21.0.7 server could allo ...) NOT-FOR-US: IBM CVE-2023-38668 (Stack-based buffer over-read in disasm in nasm 2.16 allows attackers t ...) - - nasm + - nasm (unimportant) NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392811 + NOTE: Crash in CLI tool, no security impact CVE-2023-38667 (Stack-based buffer over-read in function disasm in nasm 2.16 allows at ...) - - nasm + - nasm (unimportant) NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392812 + NOTE: Crash in CLI tool, no security impact CVE-2023-38666 (Bento4 v1.6.0-639 was discovered to contain a segmentation violation v ...) NOT-FOR-US: Bento4 CVE-2023-38665 (Null pointer dereference in ieee_write_file in nasm 2.16rc0 allows att ...) - - nasm + - nasm (unimportant) NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392818 + NOTE: Crash in CLI tool, no security impact CVE-2023-37440 (A vulnerability in the web-based management interfaceof EdgeConnect SD ...) NOT-FOR-US: Aruba CVE-2023-37439 (Multiple vulnerabilities in the web-based managementinterface of EdgeC ...) @@ -219,6 +222,7 @@ CVE-2023-38976 (An issue in weaviate v.1.20.0 allows a remote attacker to cause NOT-FOR-US: weaviate CVE-2023-38961 (Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0 ...) - iotjs + [bullseye] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/5092 CVE-2023-38899 (SQL injection vulnerability in berkaygediz O_Blog v.1.0 allows a local ...) NOT-FOR-US: berkaygediz O_Blog View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6768eaac994a336a215479bc645a202cbee8f4ba -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6768eaac994a336a215479bc645a202cbee8f4ba You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9784d119 by Moritz Muehlenhoff at 2023-08-23T13:13:39+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -73177,6 +73177,7 @@ CVE-2022-38350 RESERVED CVE-2022-38349 (An issue was discovered in Poppler 22.08.0. There is a reachable asser ...) - poppler 22.12.0-2 + [bullseye] - poppler (Minor issue) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1282 NOTE: Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/4564a002bcb6094cc460bc0d5ddff9423fe6dd28 (poppler-22.09.0) CVE-2022-38348 @@ -76566,10 +76567,12 @@ CVE-2022-37053 (TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection vi NOT-FOR-US: Trendnet CVE-2022-37052 (A reachable Object::getString assertion in Poppler 22.07.0 allows atta ...) - poppler 22.08.0-2 + [bullseye] - poppler (Minor issue) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1278 NOTE: Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/8677500399fc2548fa816b619580c2c07915a98c (poppler-22.08.0) CVE-2022-37051 (An issue was discovered in Poppler 22.07.0. There is a reachable abort ...) - poppler 22.08.0-2 + [bullseye] - poppler (Minor issue) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1276 NOTE: Fixed by: https://gitlab.freedesktop.org/poppler/poppler/-/commit/4631115647c1e4f0482ffe0491c2f38d2231337b (poppler-22.08.0) CVE-2022-37050 (In Poppler 22.07.0, PDFDoc::savePageAs in PDFDoc.c callows attackers t ...) @@ -77653,6 +77656,8 @@ CVE-2022-36649 RESERVED CVE-2022-36648 (The hardware emulation in the of_dpa_cmd_add_l2_flood of rocker device ...) - qemu + [bookworm] - qemu (Minor issue, revisit when fixed upstream) + [bullseye] - qemu (Minor issue, revisit when fixed upstream) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.html CVE-2022-36647 (PKUVCL davs2 v1.6.205 was discovered to contain a global buffer overfl ...) - davs2 (bug #1019358) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9784d1197bea2444c63c6db292da3f297cffbea8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9784d1197bea2444c63c6db292da3f297cffbea8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ab4493a4 by Moritz Muehlenhoff at 2023-08-23T12:28:33+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -18085,6 +18085,8 @@ CVE-2023-29459 (The laola.redbull application through 5.1.9-R for Android expose NOT-FOR-US: laola.redbull CVE-2023-29458 (Duktape is an 3rd-party embeddable JavaScript engine, with a focus on ...) - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) [buster] - zabbix (vulnerable code introduced later) NOTE: This appears to be bug in Zabbix's use of duktape, not an issue in src:duktape per se NOTE: https://support.zabbix.com/browse/ZBX-22989 @@ -18092,18 +18094,26 @@ CVE-2023-29458 (Duktape is an 3rd-party embeddable JavaScript engine, with a foc CVE-2023-29457 (Reflected XSS attacks, occur when a malicious script is reflected off ...) {DLA-3538-1} - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-22988 CVE-2023-29456 (URL validation scheme receives input from a user and then parses it to ...) {DLA-3538-1} - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-22987 CVE-2023-29455 (Reflected XSS attacks, also known as non-persistent attacks, occur whe ...) {DLA-3538-1} - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-22986 CVE-2023-29454 (Stored or persistent cross-site scripting (XSS) is a type of XSS where ...) {DLA-3538-1} - zabbix + [bookworm] - zabbix (Minor issue) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-22985 CVE-2023-29453 RESERVED @@ -19169,11 +19179,11 @@ CVE-2023-1791 (A vulnerability has been found in SourceCodester Simple Task Allo CVE-2023-1790 (A vulnerability, which was classified as problematic, was found in Sou ...) NOT-FOR-US: SourceCodester Simple Task Allocation System CVE-2023-28938 (Uncontrolled resource consumption in some Intel(R) SSD Tools software ...) - - mdadm + - mdadm NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html TODO: check details, fixes should be somewhere prior to mdadm-4.2-rc2 CVE-2023-28736 (Buffer overflow in some Intel(R) SSD Tools software before version mda ...) - - mdadm + - mdadm NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html TODO: check details, fixes should be somewhere prior to mdadm-4.2-rc2 CVE-2023-28717 @@ -45573,8 +45583,9 @@ CVE-2022-47071 (In NVS365 V01, the background network test function can trigger CVE-2022-47070 (NVS365 V01 is vulnerable to Incorrect Access Control. After entering a ...) NOT-FOR-US: NVS365 V01 CVE-2022-47069 (p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerabi ...) - - p7zip + - p7zip (unimportant) NOTE: https://sourceforge.net/p/p7zip/bugs/241/ + NOTE: Crash in CLI tool, no security impact CVE-2022-47068 RESERVED CVE-2022-47067 @@ -85001,6 +85012,8 @@ CVE-2022-34039 RESERVED CVE-2022-34038 (Etcd v3.5.4 allows remote attackers to cause a denial of service via f ...) - etcd + [bookworm] - etcd (Minor issue) + [bullseye] - etcd (Minor issue) NOTE: https://github.com/etcd-io/etcd/pull/14022 NOTE: https://github.com/etcd-io/etcd/pull/14452 NOTE: Fixed by: https://github.com/etcd-io/etcd/commit/5a315ef88fbfa454e02d27b0b8acb4f89457cd90 @@ -223972,9 +223985,10 @@ CVE-2020-19911 CVE-2020-19910 RESERVED CVE-2020-19909 (Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via cr ...) - - curl 7.66.0-1 + - curl 7.66.0-1 (unimportant) NOTE: https://github.com/curl/curl/pull/4166 NOTE: Fixed by: https://github.com/curl/curl/commit/db0a0dfb0eb41d39273b0590b992df58f38b9a4d (curl-7_66_0) + NOTE: Crash in CLI tool, no security impact CVE-2020-19908 RESERVED CVE-2020-19907 (A command injection vulnerability in the sandcat plugin of Caldera 2.3 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab4493a4a6698de08f74da2a1816649ee55fdc6c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab4493a4a6698de08f74da2a1816649ee55fdc6c You're receiving this email because of your account on salsa.debian.org.
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2731639a by Moritz Muehlenhoff at 2023-08-20T17:06:29+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1270,6 +1270,8 @@ CVE-2023-34545 (A SQL injection vulnerability in CSZCMS 1.3.0 allows remote atta NOT-FOR-US: CSZCMS CVE-2023-33953 (gRPC contains a vulnerability that allows hpack table accounting error ...) - grpc + [bookworm] - grpc (Minor issue) + [bullseye] - grpc (Minor issue) [buster] - grpc (recheck when upstream patch is available/published) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2230890 NOTE: https://cloud.google.com/support/bulletins#gcp-2023-022 @@ -14726,6 +14728,8 @@ CVE-2023-30578 RESERVED CVE-2023-30577 (AMANDA (Advanced Maryland Automatic Network Disk Archiver) before tag- ...) - amanda + [bookworm] - amanda (Minor issue) + [bullseye] - amanda (Minor issue) NOTE: https://github.com/zmanda/amanda/security/advisories/GHSA-crrw-v393-h5q3 NOTE: https://github.com/zmanda/amanda/pull/228 CVE-2023-30576 (Apache Guacamole 0.9.10 through 1.5.1 may continue to reference a free ...) @@ -17923,6 +17927,7 @@ CVE-2023-29410 (A CWE-20: Improper Input Validation vulnerability exists that co CVE-2023-29409 (Extremely large RSA keys in certificate chains can cause a client/serv ...) - golang-1.20 1.20.7-1 - golang-1.19 1.19.12-1 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 [bullseye] - golang-1.15 (Minor issue) - golang-1.11 @@ -63673,6 +63678,7 @@ CVE-2022-41715 (Programs which compile regular expressions from untrusted source - golang-1.18 1.18.7-1 - golang-1.17 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://go.dev/issue/55949 @@ -214441,6 +214447,7 @@ CVE-2020-24188 (Cross-site scripting (XSS) vulnerability in the search functiona NOT-FOR-US: United Planet Intrexx Professional CVE-2020-24187 (An issue was discovered in ecma-helpers.c in jerryscript version 2.3.0 ...) - iotjs + [bullseye] - iotjs (Minor issue) NOTE: https://github.com/jerryscript-project/jerryscript/issues/4076 CVE-2020-24186 (A Remote Code Execution vulnerability exists in the gVectors wpDiscuz ...) NOT-FOR-US: gVectors wpDiscuz plugin for WordPress View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2731639a18ec1ab2c4b4975ebf606fa610544a5f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2731639a18ec1ab2c4b4975ebf606fa610544a5f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 50054c99 by Moritz Muehlenhoff at 2023-08-16T13:22:36+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -440,6 +440,8 @@ CVE-2023-4105 (Mattermost fails to delete the attachments when deleting a messag CVE-2023-40267 (GitPython before 3.1.32 does not block insecure non-multi options in c ...) {DLA-3502-1} - python-git (bug #1043503) + [bookworm] - python-git (Minor issue) + [bullseye] - python-git (Minor issue) NOTE: https://github.com/gitpython-developers/GitPython/pull/1609 NOTE: https://github.com/gitpython-developers/GitPython/commit/5c59e0d63da6180db8a0b349f0ad36fef42aceed (3.1.32) CVE-2023-40260 (EmpowerID before 7.205.0.1 allows an attacker to bypass an MFA (multi ...) @@ -5825,6 +5827,8 @@ CVE-2023-34471 (AMI SPx contains a vulnerability in the BMC where a user may cau NOT-FOR-US: AMI SPx CVE-2023-34457 (MechanicalSoup is a Python library for automating interaction with web ...) - python-mechanicalsoup (bug #1041814) + [bookworm] - python-mechanicalsoup (Minor issue) + [bullseye] - python-mechanicalsoup (Minor issue) NOTE: https://github.com/MechanicalSoup/MechanicalSoup/security/advisories/GHSA-x456-3ccm-m6j4 NOTE: https://github.com/MechanicalSoup/MechanicalSoup/commit/d57c4a269bba3b9a0c5bfa20292955b849006d9e (v1.3.0) CVE-2023-34338 (AMI SPx contains a vulnerability in the BMC where an Attacker may caus ...) @@ -193123,6 +193127,7 @@ CVE-2021-20252 (A flaw was found in Red Hat 3scale API Management Platform 2. Th CVE-2021-20251 (A flaw was found in samba. A race condition in the password lockout co ...) [experimental] - samba 2:4.17.1+dfsg-1 - samba 2:4.17.2+dfsg-3 + [bullseye] - samba (Domain controller functionality is EOLed, see DSA DSA-5477-1) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14611 NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2708 CVE-2021-20250 (A flaw was found in wildfly. The JBoss EJB client has publicly accessi ...) @@ -345053,7 +345058,7 @@ CVE-2018-14629 (A denial of service vulnerability was discovered in Samba's LDAP CVE-2018-14628 (An information leak vulnerability was discovered in Samba's LDAP serve ...) - samba (bug #1034803) [bookworm] - samba (Minor issue, revisit when fixed upstream) - [bullseye] - samba (Minor issue, revisit when fixed upstream) + [bullseye] - samba (Domain controller functionality is EOLed, see DSA DSA-5477-1) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=13595 CVE-2018-14627 (The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not h ...) - wildfly (bug #752018) = data/dsa-needed.txt = @@ -18,6 +18,8 @@ chromium -- cinder/oldstable -- +fastdds +-- frr (aron) maintainer proposed to update to 8.4.4 for bookworm, which might be a good idea -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/50054c991c4e62a7de9dd70a49ffd22507ba5e34 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/50054c991c4e62a7de9dd70a49ffd22507ba5e34 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ef344f17 by Moritz Muehlenhoff at 2023-08-15T18:04:26+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -198729,11 +198729,12 @@ CVE-2020-28842 CVE-2020-28841 (MyDrivers64.sys in DriverGenius 9.61.3708.3054 allows attackers to cau ...) NOT-FOR-US: DriverGenius CVE-2020-28840 (Buffer Overflow vulnerability in jpgfile.c in Matthias-Wandel jhead ve ...) - - jhead 1:3.06.0.1-2 + - jhead 1:3.06.0.1-2 (unimportant) NOTE: https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900820 NOTE: https://github.com/Matthias-Wandel/jhead/commit/4827ed31c226dc5ed93603bd649e0e387a1778da (3.06.0.1) NOTE: https://github.com/Matthias-Wandel/jhead/issues/8 NOTE: https://github.com/Fstark-prog/jhead/security/advisories/GHSA-xh27-xwgj-gqw2 + NOTE: Crash in CLI tool, no security impact CVE-2020-28839 RESERVED CVE-2020-28838 (Cross Site Request Forgery (CSRF) in CART option in OpenCart Ltd. Open ...) @@ -209868,6 +209869,7 @@ CVE-2020-25721 (Kerberos acceptors need easy access to stable AD identifiers (eg CVE-2020-25720 RESERVED - samba 2:4.17.8+dfsg-1 + [bullseye] - samba (Domain controller functionality is EOLed, see DSA DSA-5477-1) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=14810 NOTE: https://gitlab.com/samba-team/samba/-/merge_requests/2514 NOTE: https://gitlab.com/samba-team/samba/-/commit/cc64ea24daa649dc8de4a212c7abfbe111095655 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef344f17682c9467b21654fa7a484cb9d8075521 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef344f17682c9467b21654fa7a484cb9d8075521 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1fd8bdc5 by Moritz Muehlenhoff at 2023-08-15T09:33:37+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -76,6 +76,8 @@ CVE-2023-40305 (GNU indent 2.2.13 has a heap-based buffer overflow in search_bra NOTE: https://savannah.gnu.org/bugs/index.php?64503 CVE-2023-40303 (GNU inetutils through 2.4 may allow privilege escalation because of un ...) - inetutils (bug #1049365) + [bookworm] - inetutils (Minor issue) + [bullseye] - inetutils (Minor issue) NOTE: https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6 NOTE: https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg0.html CVE-2023-40296 (async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in R ...) = data/dsa-needed.txt = @@ -19,6 +19,8 @@ cinder/oldstable frr (aron) maintainer proposed to update to 8.4.4 for bookworm, which might be a good idea -- +libreswan (jmm) +-- librsvg -- linux (carnil) @@ -70,6 +72,8 @@ ruby-tzinfo/oldstable -- salt/oldstable -- +samba/oldstable +-- tiff -- wpewebkit/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1fd8bdc5e4f8292b4ecdea51d6c75c7d501732c7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1fd8bdc5e4f8292b4ecdea51d6c75c7d501732c7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 16f66a18 by Moritz Muehlenhoff at 2023-08-06T23:51:57+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -243,7 +243,11 @@ CVE-2023-33665 (ai-dev aitable before v0.2.2 was discovered to contain a SQL inj NOT-FOR-US: ai-dev aitable CVE-2023-38497 (Cargo downloads the Rust project\u2019s dependencies and compiles the ...) - cargo + [bookworm] - cargo (Minor issue) + [bullseye] - cargo (Minor issue) - rust-cargo + [bookworm] - rust-cargo (Minor issue) + [bullseye] - rust-cargo (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/08/03/2 NOTE: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497 NOTE: https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87 @@ -527,7 +531,7 @@ CVE-2023-33383 (Shelly 4PM Pro four-channel smart switch 0.11.0 allows an attack CVE-2023-33257 (Verint Engagement Management 15.3 Update 2023R2 is vulnerable to HTML ...) NOT-FOR-US: Verint Engagement Management CVE-2023-4016 (Under some circumstances, this weakness allows a user who has access t ...) - - procps (bug #1042887) + - procps (bug #1042887) NOTE: https://gitlab.com/procps-ng/procps/-/issues/297 CVE-2023-3739 (Insufficient validation of untrusted input in Chromad in Google Chrome ...) {DSA-5456-1} @@ -1553,6 +1557,7 @@ CVE-2023-3248 (The All-in-one Floating Contact Form WordPress plugin before 2.1. NOT-FOR-US: WordPress plugin CVE-2023-38060 (Improper Input Validation vulnerability in the ContentType parameter f ...) - znuny 6.5.3-1 + NOTE: https://github.com/znuny/Znuny/commit/355800e68c1560c1d098ec0953ee9940d2d1f836 CVE-2023-38058 (An improper privilege check in the OTRS ticket move action in the agen ...) NOT-FOR-US: OTRS NOTE: Issue is listed as specific to 8.x, so won't affect Znuny which forked from 6.x @@ -1949,6 +1954,8 @@ CVE-2023-37733 (An arbitrary file upload vulnerability in tduck-platform v4.0 al NOT-FOR-US: Grav CMStduck-platform CVE-2023-37276 (aiohttp is an asynchronous HTTP client/server framework for asyncio an ...) - python-aiohttp + [bookworm] - python-aiohttp (Minor issue) + [bullseye] - python-aiohttp (Minor issue) NOTE: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-45c4-8wx5-qw6w NOTE: https://github.com/aio-libs/aiohttp/commit/9337fb3f2ab2b5f38d7e98a194bde6f7e3d16c40 NOTE: https://hackerone.com/reports/2001873 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/16f66a182d0737180f801c002ac8fda900a19a6d -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/16f66a182d0737180f801c002ac8fda900a19a6d You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: c963e58a by Moritz Mühlenhoff at 2023-08-04T20:17:53+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -259,6 +259,8 @@ CVE-2023-3971 NOT-FOR-US: Red Hat Ansible Automation Controller CVE-2023-34320 [arm: Guests can trigger a deadlock on Cortex-A77] - xen + [bookworm] - xen (Minor issue) + [bullseye] - xen (Minor issue) [buster] - xen (DSA 4677-1) NOTE: https://www.openwall.com/lists/oss-security/2023/08/01/1 NOTE: https://xenbits.xen.org/xsa/advisory-436.html @@ -670,6 +672,8 @@ CVE-2023-34916 (Fuge CMS v1.0 contains an Open Redirect vulnerability via /front NOT-FOR-US: Fuge CMS CVE-2023-34872 (A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a re ...) - poppler (bug #1042811) + [bookworm] - poppler (Minor issue) + [bullseye] - poppler (Minor issue) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe (poppler-23.06.0) NOTE: https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399 CVE-2023-34842 (Remote Code Execution vulnerability in DedeCMS through 5.7.109 allows ...) = data/dsa-needed.txt = @@ -16,8 +16,7 @@ aom/oldstable -- chromium (jmm) -- -cjose - Maintainer asked to prepare updates +cjose (jmm) -- cinder/oldstable -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c963e58a842c13ccd133979ce7f28c9dd9d85a8f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c963e58a842c13ccd133979ce7f28c9dd9d85a8f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8fd8ff2d by Moritz Muehlenhoff at 2023-07-31T14:20:22+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -940,6 +940,8 @@ CVE-2023-35134 (Weintek Weincloud v0.13.6 could allow an attacker to reset a p NOT-FOR-US: Weincloud CVE-2023-34478 (Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a ...) - shiro + [bookworm] - shiro (Minor issue) + [bullseye] - shiro (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/07/24/4 CVE-2023-34429 (Weintek Weincloud v0.13.6 could allow an attacker to cause a denia ...) NOT-FOR-US: Weincloud @@ -60322,6 +60324,7 @@ CVE-2022-41725 (A denial of service is possible from excessive resource consumpt [experimental] - golang-1.19 1.19.6-1 - golang-1.19 1.19.6-2 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E @@ -60331,6 +60334,7 @@ CVE-2022-41724 (Large handshake records may cause panics in crypto/tls. Both cli [experimental] - golang-1.19 1.19.6-1 - golang-1.19 1.19.6-2 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 (Vulnerable code introduced later) NOTE: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E NOTE: https://go.dev/issue/58001 @@ -60342,6 +60346,7 @@ CVE-2022-41723 (A maliciously crafted HTTP/2 stream could cause excessive CPU co [experimental] - golang-1.19 1.19.6-1 - golang-1.19 1.19.6-2 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) - golang-golang-x-net 1:0.7.0+dfsg-1 @@ -60381,6 +60386,7 @@ CVE-2022-41717 (An attacker can cause excessive memory growth in a Go server acc - golang-1.19 1.19.4-1 - golang-1.18 1.18.9-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) - golang-golang-x-net 1:0.4.0+dfsg-1 = data/dsa-needed.txt = @@ -21,6 +21,8 @@ cinder/oldstable frr (aron) maintainer proposed to update to 8.4.4 for bookworm, which might be a good idea -- +librsvg +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y and 6.1.y versions @@ -42,7 +44,10 @@ ntpsec (carnil) openjdk-11/oldstable (jmm) needs asmtools backport in bullseye -- +openjdk-17/oldstable (jmm) +-- orthanc (jmm) + needs ca-certificates-java fix for bookworm -- php-cas/oldstable -- @@ -87,7 +92,9 @@ sox all issues unfixed upstream for CVE-2023-34432, rest can be ignored -- -wpewebkit +tiff +-- +wpewebkit/oldstable -- xrdp/oldstable needs some additional clarification, tentatively DSA worthy View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fd8ff2d62d95782afe0e51e5835d12f9cfc63bc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8fd8ff2d62d95782afe0e51e5835d12f9cfc63bc You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 382d6ed2 by Moritz Muehlenhoff at 2023-07-26T22:13:16+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -73,17 +73,17 @@ CVE-2023-39174 (In JetBrains TeamCity before 2023.05.2 a ReDoS attack was possib CVE-2023-39173 (In JetBrains TeamCity before 2023.05.2 a token with limited permission ...) NOT-FOR-US: JetBrains TeamCity CVE-2023-39130 (GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap bu ...) - - gdb + - gdb (unimportant) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30641 - TODO: check details + NOTE: Crash in CLI tool, no security impact CVE-2023-39129 (GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap us ...) - - gdb + - gdb (unimportant) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30640 - TODO: check details + NOTE: Crash in CLI tool, no security impact CVE-2023-39128 (GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack o ...) - - gdb + - gdb (unimportant) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30639 - TODO: check details + NOTE: Crash in CLI tool, no security impact CVE-2023-38555 (Authentication bypass vulnerability in Fujitsu network devices Si-R se ...) NOT-FOR-US: Fujitsu network devices CVE-2023-38503 (Directus is a real-time API and App dashboard for managing SQL databas ...) @@ -85813,6 +85813,7 @@ CVE-2022-32189 (A too-short encoded message can cause a panic in Float.GobDecode - golang-1.18 1.18.5-1 - golang-1.17 1.17.13-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://go.dev/issue/53871 @@ -85917,6 +85918,7 @@ CVE-2022-32148 (Improper exposure of client IP addresses in net/http before Go 1 - golang-1.18 1.18.4-1 - golang-1.17 1.17.13-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/53423 @@ -144286,8 +144288,14 @@ CVE-2021-37819 (PDF Labs pdftk-java v3.2.3 was discovered to contain an infinite [buster] - pdftk-java (Minor issue) - pdftk 2.02-5 - libitext-java + [bookworm] - libitext-java (Minor issue) + [bullseye] - libitext-java (Minor issue) - libitext1-java + [bookworm] - libitext1-java (Minor issue) + [bullseye] - libitext1-java (Minor issue) - libitext5-java + [bookworm] - libitext5-java (Minor issue) + [bullseye] - libitext5-java (Minor issue) NOTE: https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21 NOTE: https://gitlab.com/pdftk-java/pdftk/-/commit/75deacdf5c46fd4eefb310c784eb9dfdc7b9fdc9 (v3.3.0) NOTE: https://gitlab.com/pdftk-java/pdftk/-/commit/9b0cbb76c8434a8505f02ada02a94263dcae9247 (v3.3.0) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/382d6ed28384a98a00745ca2d2647ab82cb9c929 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/382d6ed28384a98a00745ca2d2647ab82cb9c929 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: bb8ce9ac by Moritz Muehlenhoff at 2023-07-24T12:53:10+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -566,6 +566,8 @@ CVE-2018-25088 (A vulnerability, which was classified as critical, was found in NOT-FOR-US: Blue Yonder postgraas_server CVE-2023-3724 (If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor ...) - wolfssl (bug #1041699) + [bookworm] - wolfssl (Minor issue) + [bullseye] - wolfssl (Minor issue) NOTE: https://github.com/wolfSSL/wolfssl/pull/6412 NOTE: https://github.com/wolfSSL/wolfssl/commit/00f1eddee429ff51390b20caadd2eb6afe51e1aa (v5.6.2-stable) CVE-2023-3714 (The ProfileGrid plugin for WordPress is vulnerable to unauthorized mod ...) @@ -696,8 +698,9 @@ CVE-2023-37770 (faust commit ee39a19 was discovered to contain a stack overflow NOTE: Negligible security impact CVE-2023-37769 (stress-test master commit e4c878 was discovered to contain a FPE vulne ...) - pixman + [bookworm] - pixman (Minor issue) + [bullseye] - pixman (Minor issue) NOTE: https://gitlab.freedesktop.org/pixman/pixman/-/issues/76 - TODO: check, not clear if the issue only in the stress-test binary or affecting as well the library CVE-2023-37479 (Open Enclave is a hardware-agnostic open source library for developing ...) NOT-FOR-US: Open Enclave CVE-2023-37476 (OpenRefine is a free, open source tool for data processing. A carefull ...) @@ -5424,6 +5427,8 @@ CVE-2023-3140 (Missing HTTP headers (X-Frame-Options, Content-Security-Policy) i NOT-FOR-US: KNIME Business Hub CVE-2023-34237 (SABnzbd is an open source automated Usenet download tool. A design fla ...) - sabnzbdplus 4.0.2+dfsg-1 (bug #1038949) + [bookworm] - sabnzbdplus (Minor issue) + [bullseye] - sabnzbdplus (Minor issue) NOTE: https://github.com/sabnzbd/sabnzbd/commit/422b4fce7bfd56e95a315be0400cdfdc585df7cc (4.0.2RC2) NOTE: https://github.com/sabnzbd/sabnzbd/commit/e3a722664819d1c7c8fab97144cc299b1c18b429 (4.0.2RC2) NOTE: https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-hhgh-xgh3-985r @@ -65801,6 +65806,7 @@ CVE-2022-39265 (MyBB is a free and open source forum software. The _Mail Setting NOT-FOR-US: MyBB CVE-2022-39264 (nheko is a desktop client for the Matrix communication application. Al ...) - nheko 0.10.2-1 + [bullseye] - nheko (Vulnerable code not present) [buster] - nheko (Vulnerable code not present) NOTE: https://github.com/Nheko-Reborn/nheko/security/advisories/GHSA-8jcp-8jq4-5mm7 NOTE: https://github.com/Nheko-Reborn/nheko/commit/67bee15a389f9b8a9f6c3a340558d1e2319e7199 (v0.10.2) @@ -97668,6 +97674,7 @@ CVE-2022-28132 CVE-2022-28131 (Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17. ...) - golang-1.18 1.18.4-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://github.com/golang/go/issues/53614 = data/dsa-needed.txt = @@ -55,6 +55,8 @@ php-horde-turba/oldstable -- py7zr/oldstable -- +python-django (jmm) +-- python-glance-store/oldstable -- python-os-brick/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb8ce9ace77483ce137fb502a9265477525637cf -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb8ce9ace77483ce137fb502a9265477525637cf You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 119aca37 by Moritz Muehlenhoff at 2023-07-16T21:14:44+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -322,6 +322,8 @@ CVE-2023-3319 (Improper Neutralization of Input During Web Page Generation ('Cro NOT-FOR-US: PlatPlay DSr CVE-2023-38199 (coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does n ...) - modsecurity-crs (bug #1041109) + [bookworm] - modsecurity-crs (Minor issue) + [bullseye] - modsecurity-crs (Minor issue) NOTE: https://github.com/coreruleset/coreruleset/issues/3191 NOTE: https://github.com/coreruleset/coreruleset/pull/3237 CVE-2023-38198 (acme.sh before 3.0.6 runs arbitrary commands from a remote server via ...) @@ -3840,13 +3842,15 @@ CVE-2023-34867 (Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an As CVE-2023-34865 (Directory traversal vulnerability in ujcms 6.0.2 allows attackers to m ...) NOT-FOR-US: ujcms CVE-2023-34824 (fdkaac before 1.0.5 was discovered to contain a heap buffer overflow i ...) - - fdkaac (bug #1038951) + - fdkaac (unimportant; bug #1038951) NOTE: https://github.com/nu774/fdkaac/issues/55 NOTE: https://github.com/nu774/fdkaac/commit/22dbf72491541aa854835fdf2a9a0d92532728d8 (v1.0.5) + NOTE: Crash in CLI tool, no security impact CVE-2023-34823 (fdkaac before 1.0.5 was discovered to contain a stack overflow in read ...) - - fdkaac (bug #1038951) + - fdkaac (unimportant; bug #1038951) NOTE: https://github.com/nu774/fdkaac/issues/55 NOTE: https://github.com/nu774/fdkaac/commit/22dbf72491541aa854835fdf2a9a0d92532728d8 (v1.0.5) + NOTE: Crash in CLI tool, no security impact CVE-2023-34756 (bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerabili ...) NOT-FOR-US: bloofox CVE-2023-34755 (bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerabili ...) @@ -4916,8 +4920,11 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse NOTE: Introduced with: https://github.com/lloyd/yajl/commit/cfa9f8fcb12d80dd5ebf94f5e6a607aab4d225fb (2.0.0) NOTE: The original fix uploaded as 2.1.0-3.1 was incomplete. - burp + [bookworm] - burp (Minor issue) + [bullseye] - burp (Minor issue) [buster] - burp (Minor issue; fix only after newer releases got a fix) - epics-base + [bookworm] - epics-base (Minor issue) [buster] - epics-base (Minor issue; fix only after newer releases got a fix) - r-cran-jsonlite [bookworm] - r-cran-jsonlite (Minor issue) @@ -6628,6 +6635,8 @@ CVE-2023-33203 (The Linux kernel before 6.2.9 has a race condition and resultant NOTE: https://git.kernel.org/linus/6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 (6.3-rc4) CVE-2023-33201 (Bouncy Castle For Java before 1.74 is affected by an LDAP injection vu ...) - bouncycastle (bug #1040050) + [bookworm] - bouncycastle (Minor issue) + [bullseye] - bouncycastle (Minor issue) NOTE: https://github.com/bcgit/bc-java/wiki/CVE-2023-33201 CVE-2023-31729 (TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection.) NOT-FOR-US: TOTOLINK @@ -13339,6 +13348,7 @@ CVE-2023-29407 CVE-2023-29406 (The HTTP/1 client does not fully validate the contents of the Host hea ...) - golang-1.20 1.20.6-1 - golang-1.19 1.19.11-1 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 - golang-1.11 NOTE: https://groups.google.com/g/golang-announce/c/2q13H6LEEx0 @@ -106475,7 +106485,10 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation [bookworm] - yajl (Minor issue) [bullseye] - yajl (Minor issue) - burp (bug #1040146) + [bookworm] - burp (Minor issue) + [bullseye] - burp (Minor issue) - epics-base (bug #1040159) + [bookworm] - epics-base (Minor issue) - r-cran-jsonlite (bug #1040161) [bookworm] - r-cran-jsonlite (Minor issue) [bullseye] - r-cran-jsonlite (Minor issue) @@ -152746,6 +152759,7 @@ CVE-2021-33797 (Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to NOTE: https://github.com/ccxvii/mujs/commit/833b6f1672b4f2991a63c4d05318f0b84ef4d550 (1.1.2) CVE-2021-33796 (In MuJS before version 1.1.2, a use-after-free flaw in the regexp sour ...) - mujs 1.1.3-2 + [bullseye] - mujs (Minor issue) NOTE: https://github.com/ccxvii/mujs/commit/7ef066a3bb95bf83e7c5be50d859e62e58fe8515 (1.1.2) CVE-2021-3573 (A use-after-free in function hci_sock_bound_ioctl() of the Linux kerne ...) {DLA-2690-1 DLA-2689-1} @@
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7dace96e by Moritz Muehlenhoff at 2023-07-16T19:59:28+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -657,6 +657,7 @@ CVE-2023-37196 (A CWE-89: Improper Neutralization of Special Elements vulnerabil NOT-FOR-US: Schneider Electric CVE-2023-37174 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2505 NOTE: https://github.com/gpac/gpac/commit/549ff4484246f2bc4d5fec6760332b43774db483 @@ -1546,6 +1547,7 @@ CVE-2023-3528 (A vulnerability was found in ThinuTech ThinuCMS 1.5. It has been NOT-FOR-US: ThinuTech ThinuCMS CVE-2023-3523 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac/ NOTE: https://github.com/gpac/gpac/commit/64201a26476c12a7dbd7ffb5757743af6954db96 @@ -4368,9 +4370,13 @@ CVE-2023-33557 (Fuel CMS v1.5.2 was discovered to contain a SQL injection vulner NOT-FOR-US: Fuel CMS CVE-2023-32732 (gRPC contains a vulnerability whereby a client can cause a termination ...) - grpc + [bookworm] - grpc (Minor issue) + [bullseye] - grpc (Minor issue) NOTE: https://github.com/grpc/grpc/pull/32309 CVE-2023-32731 (When gRPC HTTP2 stack raised a header size exceeded error, it skipped ...) - grpc + [bookworm] - grpc (Minor issue) + [bullseye] - grpc (Minor issue) NOTE: https://github.com/grpc/grpc/pull/32309 NOTE: https://github.com/grpc/grpc/pull/33005 CVE-2023-32312 (UmbracoIdentityExtensions is an Umbraco add-on package that enables ea ...) @@ -1,6 +16672,8 @@ CVE-2023-1429 (Cross-site Scripting (XSS) - Reflected in GitHub repository pimco NOT-FOR-US: pimcore CVE-2023-1428 (There exists an vulnerability causing an abort() to be called in gRPC. ...) - grpc + [bookworm] - grpc (Minor issue) + [bullseye] - grpc (Minor issue) NOTE: https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8 (v1.54.0-pre1) CVE-2023-1427 (- The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not en ...) NOT-FOR-US: WordPress plugin View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7dace96e208c4985be19716090774d0fc4b1a434 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7dace96e208c4985be19716090774d0fc4b1a434 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cb137028 by Moritz Muehlenhoff at 2023-07-16T15:15:09+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -96,11 +96,13 @@ CVE-2023-38325 (The cryptography package before 41.0.2 for Python mishandles SSH NOTE: Fixed by: https://github.com/pyca/cryptography/commit/1ca7adc97b76a9dfbd3d850628b613eb93b78fc3 (main) NOTE: Fixed by: https://github.com/pyca/cryptography/commit/e190ef190525999d1f599cf8c3aef5cb7f3a8bc4 (41.0.2) CVE-2023-38253 (An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str fun ...) - - w3m + - w3m (unimportant) NOTE: https://github.com/tats/w3m/issues/271 + NOTE: Crash in CLI tool, no security impact CVE-2023-38252 (An out-of-bounds read flaw was found in w3m, in the Strnew_size functi ...) - - w3m + - w3m (unimportant) NOTE: https://github.com/tats/w3m/issues/270 + NOTE: Crash in CLI tool, no security impact CVE-2023-37474 (Copyparty is a portable file server. Versions prior to 1.8.2 are subje ...) NOT-FOR-US: copyparty CVE-2023-37473 (zenstruck/collections is a set of helpers for iterating/paginating/fil ...) @@ -619,22 +621,27 @@ CVE-2023-3023 (The WP EasyCart plugin for WordPress is vulnerable to time-based NOT-FOR-US: WP EasyCart plugin for WordPress CVE-2023-3019 [e1000e: heap use-after-free in e1000e_write_packet_to_guest()] - qemu (bug #1041102) + [bookworm] - qemu (Minor issue) + [bullseye] - qemu (Minor issue) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59243 NOTE: Proposed upstream patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg08310.html CVE-2023-3011 (The ARMember plugin for WordPress is vulnerable to Cross-Site Request ...) NOT-FOR-US: ARMember plugin for WordPress CVE-2023-37767 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2514 NOTE: https://github.com/gpac/gpac/commit/d414df635c773b21bbb3a9fbf17b101b1e8ea345 CVE-2023-37766 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2516 NOTE: https://github.com/gpac/gpac/commit/a64c60ef0983be6db8ab1e4a663e0ce83ff7bf2c CVE-2023-37765 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2515 NOTE: https://github.com/gpac/gpac/commit/36e1b9900ff638576cb88636bbbe2116ed06dfdc @@ -789,6 +796,7 @@ CVE-2023-36825 (Decidim is a participatory democracy framework, written in Ruby NOT-FOR-US: Decidim CVE-2023-36824 (Redis is an in-memory database that persists on disk. In Redit 7.0 pri ...) - redis 5:7.0.12-1 (bug #1040879) + [bookworm] - redis (Minor issue) [bullseye] - redis (Vulnerable code introduced later) [buster] - redis (Vulnerable code introduced later) NOTE: https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3 = data/dsa-needed.txt = @@ -18,8 +18,13 @@ cjose -- cinder/oldstable -- +frr + maintainer proposed to update to 8.4.4 for bookworm-stable, which might be a good idea +-- iperf3 (aron) -- +kanboard (jmm) +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y and 6.1.y versions @@ -71,6 +76,10 @@ salt/oldstable -- samba/oldstable -- +sox + all issues unfixed upstream + for CVE-2023-34432, rest can be ignored +-- wpewebkit -- xrdp/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb13702815ca326ed196f2d6df6a2e05d6539618 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb13702815ca326ed196f2d6df6a2e05d6539618 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 10e64aab by Moritz Muehlenhoff at 2023-07-10T17:25:16+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -382,6 +382,8 @@ CVE-2023-35939 (GLPI is a free asset and IT management software package. Startin NOTE: Only supported behind an authenticated HTTP zone CVE-2023-35936 (Pandoc is a Haskell library for converting from one markup format to a ...) - pandoc + [bookworm] - pandoc (Minor issue) + [bullseye] - pandoc (Minor issue) NOTE: https://github.com/jgm/pandoc/security/advisories/GHSA-xj5q-fv23-575g NOTE: https://github.com/jgm/pandoc/commit/5e381e3878b5da87ee7542f7e51c3c1a7fd84b89 (3.1.4) CVE-2023-3515 (Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4.) @@ -487,6 +489,8 @@ CVE-2023-34150 (** UNSUPPORTED WHEN ASSIGNED **Use of TikaEncodingDetector in Ap NOT-FOR-US: Apache Any23 CVE-2023-3255 [VNC: infinite loop in inflate_buffer() leads to denial of service] - qemu + [bookworm] - qemu (Minor issue) + [bullseye] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2218486 NOTE: Proposed patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg00596.html CVE-2023-37212 (Memory safety bugs present in Firefox 114. Some of these bugs showed e ...) @@ -786,9 +790,13 @@ CVE-2023-3478 (A vulnerability classified as critical was found in IBOS OA 4.5.5 NOT-FOR-US: IBOS OA CVE-2023-37365 (Hnswlib 0.7.0 has a double free in init_index when the M argument is a ...) - hnswlib + [bookworm] - hnswlib (Minor issue) + [bullseye] - hnswlib (Minor issue) NOTE: https://github.com/nmslib/hnswlib/issues/467 CVE-2023-37360 (pacparser_find_proxy in Pacparser before 1.4.2 allows JavaScript injec ...) - pacparser + [bookworm] - pacparser (Minor issue) + [bullseye] - pacparser (Minor issue) NOTE: https://github.com/manugarg/pacparser/security/advisories/GHSA-62q6-v997-f7v9 NOTE: https://github.com/manugarg/pacparser/commit/0bf0636de624996fe202b51eec8a58abd774269e (v1.4.2) CVE-2023-37307 (In MISP before 2.4.172, title_for_layout is not properly sanitized in ...) @@ -24654,6 +24662,7 @@ CVE-2023-25400 RESERVED CVE-2023-25399 (A refcounting issue which leads to potential memory leak was discovere ...) - scipy 1.10.0-2 + [bullseye] - scipy (Minor issue) NOTE: https://github.com/scipy/scipy/issues/16235 NOTE: https://github.com/scipy/scipy/pull/16397 NOTE: Fixed by: https://github.com/scipy/scipy/commit/9b6521198c4f31d3f9cb525e581bea8e3e77f0a2 (v1.10.0rc1) @@ -105049,10 +105058,14 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation [buster] - ruby-yajl (Minor issue) [stretch] - ruby-yajl (Minor issue) - yajl 2.1.0-4 (bug #1040036) + [bookworm] - yajl (Minor issue) + [bullseye] - yajl (Minor issue) - burp (bug #1040146) - crun (bug #1040147) - epics-base (bug #1040159) - r-cran-jsonlite (bug #1040161) + [bookworm] - r-cran-jsonlite (Minor issue) + [bullseye] - r-cran-jsonlite (Minor issue) - xqilla (bug #1040164) [bullseye] - xqilla (Minor issue) NOTE: https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm @@ -382798,10 +382811,14 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is [stretch] - ruby-yajl (Minor issue) [jessie] - ruby-yajl (Minor issue) - yajl 2.1.0-4 (bug #1040036) + [bookworm] - yajl (Minor issue) + [bullseye] - yajl (Minor issue) - burp (bug #1040146) - crun (bug #1040147) - epics-base (bug #1040159) - r-cran-jsonlite (bug #1040161) + [bookworm] - r-cran-jsonlite (Minor issue) + [bullseye] - r-cran-jsonlite (Minor issue) - xqilla (bug #1040164) [bullseye] - xqilla (Minor issue) NOTE: https://github.com/brianmario/yajl-ruby/issues/176 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10e64aabadd2744bb59ee1f8be5f869c5c5022d8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10e64aabadd2744bb59ee1f8be5f869c5c5022d8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ef1aa0ff by Moritz Muehlenhoff at 2023-07-03T17:30:39+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1330,6 +1330,8 @@ CVE-2023-31410 (A remote unprivileged attacker can intercept the communication v NOT-FOR-US: SICK CVE-2023-2908 (A null pointer dereference issue was discovered in Libtiff's tif_dir.c ...) - tiff 4.5.1~rc3-1 + [bookworm] - tiff (Minor issue) + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/479 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f (v4.5.1rc1) CVE-2023-2907 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) @@ -19228,10 +19230,11 @@ CVE-2023-26967 RESERVED CVE-2023-26966 (libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when lib ...) - tiff 4.5.1~rc3-1 + [bookworm] - tiff (Minor issue) + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/530 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/473 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/b0e1c25dd1d065200c8d8f59ad0afe014861a1b9 (v4.5.1rc1) - TODO: check CVE-2023-26965 (loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-ba ...) - tiff 4.5.1~rc3-1 [bookworm] - tiff (Minor issue) @@ -104277,6 +104280,7 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation - epics-base (bug #1040159) - r-cran-jsonlite (bug #1040161) - xqilla (bug #1040164) + [bullseye] - xqilla (Minor issue) NOTE: https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm NOTE: https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6 NOTE: https://github.com/brianmario/yajl-ruby/commit/e8de283a6d64f0902740fd09e858fc3d7d803161 @@ -382008,6 +382012,7 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is - epics-base (bug #1040159) - r-cran-jsonlite (bug #1040161) - xqilla (bug #1040164) + [bullseye] - xqilla (Minor issue) NOTE: https://github.com/brianmario/yajl-ruby/issues/176 NOTE: https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce NOTE: yail: https://github.com/lloyd/yajl/issues/248 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef1aa0ff91ef2e78571718f393da36113ea369d4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef1aa0ff91ef2e78571718f393da36113ea369d4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5936ceab by Moritz Muehlenhoff at 2023-06-29T16:04:51+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -65052,6 +65052,7 @@ CVE-2021-46834 (A permission bypass vulnerability in Huawei cross device task ma CVE-2020-36599 (lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before ...) [experimental] - ruby-omniauth 2.0.4-1~exp1 - ruby-omniauth 2.0.4-2 + [bullseye] - ruby-omniauth (Minor issue) [buster] - ruby-omniauth (Minor issue) NOTE: https://github.com/omniauth/omniauth/commit/43a396f181ef7d0ed2ec8291c939c95e3ed3ff00 (v2.0.0-rc1) CVE-2020-36598 @@ -72262,6 +72263,7 @@ CVE-2022-2401 (Unrestricted information disclosure of all users in Mattermost ve - mattermost-server (bug #823556) CVE-2022-2400 (External Control of File Name or Path in GitHub repository dompdf/domp ...) - php-dompdf 2.0.2+dfsg-1 (bug #1015874) + [bullseye] - php-dompdf (Minor issue) NOTE: https://huntr.dev/bounties/a6da5e5e-86be-499a-a3c3-2950f749202a NOTE: https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a CVE-2022-2399 (Use after free in WebGPU in Google Chrome prior to 100.0.4896.88 allow ...) @@ -82198,6 +82200,7 @@ CVE-2022-1962 (Uncontrolled recursion in the Parse functions in go/parser before - golang-1.18 1.18.4-1 - golang-1.17 1.17.13-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://go.dev/issue/53616 @@ -86689,6 +86692,7 @@ CVE-2022-1705 (Acceptance of some invalid Transfer-Encoding headers in the HTTP/ - golang-1.18 1.18.4-1 - golang-1.17 1.17.13-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 (Introduced in 1.15) NOTE: https://go.dev/issue/53188 NOTE: https://github.com/golang/go/commit/e5017a93fcde94f09836200bca55324af037ee5f (go1.19rc1) @@ -92740,7 +92744,7 @@ CVE-2022-1227 (A privilege escalation flaw was found in Podman. This flaw allows - libpod 3.4.7+ds1-1 [bullseye] - libpod 3.0.1+dfsg1-3+deb11u2 - golang-github-containers-psgo 1.7.1+ds1-1 (bug #1020907) - [bullseye] - golang-github-containers-psgo 1.5.2-2~deb11u1 + [bullseye] - golang-github-containers-psgo 1.5.2-1+deb11u1 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2070368 NOTE: https://github.com/containers/psgo/pull/92 NOTE: https://github.com/containers/psgo/commit/d9467da9f563a9de1ece79dcae86b37b1db75443 (v1.7.2) @@ -126108,6 +126112,7 @@ CVE-2021-42853 (It was discovered that the SteelCentral AppInternals Dynamic Sam CVE-2021-3902 RESERVED - php-dompdf 2.0.2+dfsg-1 + [bullseye] - php-dompdf (Minor issue) NOTE: https://github.com/dompdf/dompdf/issues/2564 NOTE: https://huntr.dev/bounties/a6071c07-806f-429a-8656-a4742e4191b1 CVE-2021-3901 (firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)) @@ -130261,6 +130266,7 @@ CVE-2021-41770 (Ping Identity PingFederate before 10.3.1 mishandles pre-parsing CVE-2021-3838 RESERVED - php-dompdf 2.0.2+dfsg-1 + [bullseye] - php-dompdf (Minor issue) NOTE: https://github.com/dompdf/dompdf/issues/2564 NOTE: https://huntr.dev/bounties/0bdddc12-ff67-4815-ab9f-6011a974f48e CVE-2021-41769 (A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU v ...) @@ -160782,6 +160788,7 @@ CVE-2021-29924 CVE-2021-29923 (Go before 1.17 does not properly consider extraneous zero characters a ...) - golang-1.16 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, minor issue, follow bullseye DSAs/point-releases) - golang-1.8 = data/dsa-needed.txt = @@ -22,6 +22,12 @@ ghostscript (carnil) -- gpac/oldstable (jmm) -- +gst-plugins-base1.0 (jmm) +-- +gst-plugins-bad1.0 (jmm) +-- +gst-plugins-bad1.0 (jmm) +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5936ceabfeaa1226e6dc1e82e854a848f2260327 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5936ceabfeaa1226e6dc1e82e854a848f2260327 You're receiving this email because of your account on salsa.debian.org. ___
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8ab4d6fb by Moritz Muehlenhoff at 2023-06-28T12:26:48+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -241,6 +241,8 @@ CVE-2023-2992 (An unauthenticated denial of service vulnerability exists in the NOT-FOR-US: Lenovo CVE-2023-36675 (An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1. ...) - mediawiki + [bookworm] - mediawiki (Fix in next security release) + [bullseye] - mediawiki (Fix in next security release) NOTE: https://gerrit.wikimedia.org/r/c/mediawiki/core/+/921452 NOTE: https://phabricator.wikimedia.org/T332889 CVE-2023-3 (INEX IXP-Manager before 6.3.1 allows XSS. list-preamble.foil.php, page ...) @@ -1356,6 +1358,8 @@ CVE-2023-31671 (PrestaShop postfinance <= 17.1.13 is vulnerable to SQL Injection NOT-FOR-US: PrestaShop postfinance CVE-2023-2976 (Use of Java's default temporary directory for file creation in `FileBa ...) - guava-libraries 32.0.1-1 (bug #1038979) + [bookworm] - guava-libraries (Minor issue) + [bullseye] - guava-libraries (Minor issue) NOTE: https://github.com/google/guava/releases/tag/v32.0.0 NOTE: https://github.com/google/guava/issues/2575 CVE-2023-35149 (A missing permission check in Jenkins Digital.ai App Management Publis ...) @@ -2343,6 +2347,8 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse [bookworm] - r-cran-jsonlite (Minor issue) [bullseye] - r-cran-jsonlite (Minor issue) - ruby-yajl + [bookworm] - ruby-yajl (Minor issue) + [bullseye] - ruby-yajl (Minor issue) CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , ...) NOT-FOR-US: Sogou Workflow CVE-2023-33381 (A command injection vulnerability was found in the ping functionality ...) @@ -2552,6 +2558,8 @@ CVE-2023-34410 (An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, - qt6-base 6.4.2+dfsg-11 (bug #1037209) [bookworm] - qt6-base (Minor issue) - qtbase-opensource-src 5.15.8+dfsg-12 (bug #1037210) + [bookworm] - qtbase-opensource-src (Minor issue) + [bullseye] - qtbase-opensource-src (Minor issue) [buster] - qtbase-opensource-src (Minor issue) - qtbase-opensource-src-gles [bookworm] - qtbase-opensource-src-gles (Minor issue) @@ -3879,6 +3887,7 @@ CVE-2023-33285 (An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2 - qt6-base 6.4.2+dfsg-10 (bug #1036848) [bookworm] - qt6-base (Minor issue) - qtbase-opensource-src 5.15.8+dfsg-11 + [bullseye] - qtbase-opensource-src (Minor issue) [buster] - qtbase-opensource-src (Minor issue) - qtbase-opensource-src-gles [bookworm] - qtbase-opensource-src-gles (Minor issue) @@ -4042,6 +4051,7 @@ CVE-2019-25137 (Umbraco CMS 4.11.8 through 7.15.10, and 7.12.4, allows Remote Co CVE-2023-32763 (An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6. ...) - qt6-base 6.4.2+dfsg-8 - qtbase-opensource-src 5.15.8+dfsg-10 + [bullseye] - qtbase-opensource-src (Minor issue) [buster] - qtbase-opensource-src (Minor issue) - qtbase-opensource-src-gles 5.15.8+dfsg-3 (bug #1036702) [bullseye] - qtbase-opensource-src-gles (Minor issue) @@ -4054,6 +4064,7 @@ CVE-2023-32763 (An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, CVE-2023-32762 (An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6. ...) - qt6-base 6.4.2+dfsg-9 - qtbase-opensource-src 5.15.8+dfsg-10 + [bullseye] - qtbase-opensource-src (Minor issue) [buster] - qtbase-opensource-src (Can wait for next upload) - qtbase-opensource-src-gles (Not built in GLES variant) NOTE: https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305 @@ -24400,6 +24411,7 @@ CVE-2023-24999 (HashiCorp Vault and Vault Enterprise\u2019s approle auth method CVE-2023-24998 (Apache Commons FileUpload before 1.5 does not limit the number of requ ...) - tomcat10 10.1.5-1 - tomcat9 9.0.70-2 + [bullseye] - tomcat9 (Minor issue, fix along with future update) [buster] - tomcat9 (Minor issue) - libcommons-fileupload-java 1.4-2 (bug #1031733) [bullseye] - libcommons-fileupload-java (Minor issue) @@ -58600,6 +58612,7 @@ CVE-2022-40717 (This vulnerability allows network-adjacent attackers to execute NOT-FOR-US: D-Link CVE-2022-40716 (HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13. ...) - consul (bug #1027161) + [bullseye] - consul (Minor issue) [buster] - consul (Vulnerable Code not
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 826bb966 by Moritz Muehlenhoff at 2023-06-26T18:43:04+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1021,9 +1021,9 @@ CVE-2023-3040 (A debug function in the lua-resty-json package, up to commit id 3 CVE-2023-3036 (An unchecked read in NTP server in github.com/cloudflare/cfnts prior t ...) NOT-FOR-US: cfnts CVE-2023-35116 (An issue was discovered jackson-databind thru 2.15.2 allows attackers ...) - - jackson-databind - [buster] - jackson-databind (Minor issue) + NOTE: Disputed jackson-databind issue NOTE: https://github.com/FasterXML/jackson-databind/issues/3972 + NOTE: https://github.com/FasterXML/jackson-databind/issues/3972#issuecomment-1597218091 CVE-2023-35110 (An issue was discovered jjson thru 0.1.7 allows attackers to cause a d ...) NOT-FOR-US: jjson CVE-2023-34878 (An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensi ...) @@ -2094,6 +2094,8 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse - crun - epic-base - r-cran-jsonlite + [bookworm] - r-cran-jsonlite (Minor issue) + [bullseye] - r-cran-jsonlite (Minor issue) - ruby-yajl CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , ...) NOT-FOR-US: Sogou Workflow @@ -20633,6 +20635,7 @@ CVE-2023-26131 (All versions of the package github.com/xyproto/algernon/engine; NOT-FOR-US: github.com/xyproto/algernon/engine CVE-2023-26130 (Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerab ...) - cpp-httplib (bug #1037100) + [bookworm] - cpp-httplib (Minor issue) NOTE: https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194 NOTE: https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280 NOTE: https://github.com/yhirose/cpp-httplib/commit/5b397d455d25a391ba346863830c1949627b4d08 (v0.12.4) @@ -81671,6 +81674,7 @@ CVE-2022-32150 RESERVED CVE-2022-32149 (An attacker may cause a denial of service by crafting an Accept-Langua ...) - golang-golang-x-text 0.3.8-1 (bug #1021785) + [bullseye] - golang-golang-x-text (Minor issue) - golang-x-text [buster] - golang-x-text (Limited support, minor issue, follow bullseye DSAs/point-releases (renamed package)) NOTE: https://groups.google.com/g/golang-dev/c/qfPIly0X7aU @@ -137849,6 +137853,7 @@ CVE-2021-38562 (Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 befor NOTE: https://github.com/bestpractical/rt/commit/d16f8cf13c2af517ee55a85e7b91a0267477189f (rt-4.2.17) CVE-2021-38561 (golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic ...) - golang-golang-x-text 0.3.7-1 + [bullseye] - golang-golang-x-text (Minor issue) - golang-x-text [buster] - golang-x-text (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2100495 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/826bb96661a31e35b0686f5d23f6c83e61e97185 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/826bb96661a31e35b0686f5d23f6c83e61e97185 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d76a24f2 by Moritz Muehlenhoff at 2023-06-21T13:16:07+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -66,6 +66,8 @@ CVE-2023-3317 [wifi: mt76: mt7921: Fix use-after-free in fw features query] NOTE: https://git.kernel.org/linus/2ceb76f734e37833824b7fab6af17c999eb48d2b (6.3-rc6) CVE-2023-3316 (A NULL pointer dereference in TIFFClose() is caused by a failure to op ...) - tiff 4.5.1~rc3-1 + [bookworm] - tiff (Minor issue) + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/515 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/468 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/d63de61b1ec3385f6383ef9a1f453e4b8b11d536 (v4.5.1rc1) @@ -9951,6 +9953,7 @@ CVE-2023-29403 (On Unix platforms, the Go runtime does not behave differently wh - golang-1.20 1.20.5-1 [experimental] - golang-1.19 1.19.10-1 - golang-1.19 1.19.10-2 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 [bullseye] - golang-1.15 (Minor issue) - golang-1.11 @@ -9963,6 +9966,7 @@ CVE-2023-29402 (The go command may generate unexpected code at build time when u - golang-1.20 1.20.5-1 [experimental] - golang-1.19 1.19.10-1 - golang-1.19 1.19.10-2 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 [bullseye] - golang-1.15 (Minor issue) - golang-1.11 @@ -17767,6 +17771,7 @@ CVE-2023-27043 (The email module of Python through 3.11.3 incorrectly parses e-m [bookworm] - python3.11 (Minor issue) - python3.10 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 - python2.7 [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) @@ -89067,6 +89072,7 @@ CVE-2022-29526 (Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privile - golang-1.18 1.18.2-1 - golang-1.17 1.17.10-1 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 (Vulnerable code introduced later) - golang-1.8 (Vulnerable code introduced later) - golang-1.7 (Vulnerable code introduced later) @@ -94572,6 +94578,7 @@ CVE-2022-27664 (In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attack - golang-1.18 1.18.6-1 - golang-1.17 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, minor issue, follow bullseye DSAs/point-releases) - golang-golang-x-net 1:0.0+git20221012.0b7e1fb+dfsg-1 @@ -103197,6 +103204,7 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended version of the C reference implem [bullseye] - ghostwriter (Vulnerable code not present) [buster] - ghostwriter (Vulnerable code not present) - python-cmarkgfm 0.7.0-1 (bug #1006758) + [bullseye] - python-cmarkgfm (Minor issue) [buster] - python-cmarkgfm (Minor issue) - ruby-commonmarker 0.23.4-1 (bug #1006759) [bullseye] - ruby-commonmarker (Minor issue) = data/dsa-needed.txt = @@ -78,6 +78,8 @@ salt/oldstable -- samba/oldstable -- +trafficserver (jmm) +-- wpewebkit -- xrdp/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d76a24f2a838b7314f74de9d1baaff1c10be7d49 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d76a24f2a838b7314f74de9d1baaff1c10be7d49 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 05fb674b by Moritz Muehlenhoff at 2023-06-20T14:59:40+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3184,6 +3184,7 @@ CVE-2023-2481 (Compiler removal of buffer clearing in sli_se_opaque_import_k CVE-2023-33204 (sysstat through 12.7.2 allows a multiplication integer overflow in che ...) {DLA-3434-1} - sysstat (bug #1036294) + [bookworm] - sysstat (Minor issue) [bullseye] - sysstat (Incomplete fix for CVE-2022-39377 not applied) NOTE: https://github.com/sysstat/sysstat/pull/360 NOTE: https://github.com/sysstat/sysstat/commit/6f8dc568e6ab072bb8205b732f04e685bf9237c0 @@ -9848,6 +9849,7 @@ CVE-2023-29405 (The go command may execute arbitrary code at build time when usi - golang-1.19 1.19.10-2 [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support) NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924 @@ -9862,6 +9864,7 @@ CVE-2023-29404 (The go command may execute arbitrary code at build time when usi - golang-1.19 1.19.10-2 [bookworm] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support) NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924 @@ -9873,6 +9876,7 @@ CVE-2023-29403 (On Unix platforms, the Go runtime does not behave differently wh [experimental] - golang-1.19 1.19.10-1 - golang-1.19 1.19.10-2 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support) NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924 @@ -9884,6 +9888,7 @@ CVE-2023-29402 (The go command may generate unexpected code at build time when u [experimental] - golang-1.19 1.19.10-1 - golang-1.19 1.19.10-2 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support) NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924 @@ -9892,6 +9897,8 @@ CVE-2023-29402 (The go command may generate unexpected code at build time when u NOTE: https://github.com/golang/go/commit/c160b49b6d328c86bd76ca2fff9009a71347333f (go.1.19.10) CVE-2023-29401 (The filename parameter of the Context.FileAttachment function is not p ...) - golang-github-gin-gonic-gin (bug #1037530) + [bookworm] - golang-github-gin-gonic-gin (Minor issue) + [bullseye] - golang-github-gin-gonic-gin (Minor issue) [buster] - golang-github-gin-gonic-gin (Minor issue) NOTE: https://github.com/gin-gonic/gin/issues/3555 NOTE: https://github.com/gin-gonic/gin/commit/2d4bbec941551479b1fdf1e54ece03e6e82a7e72 (v1.9.1) @@ -9902,6 +9909,7 @@ CVE-2023-29400 (Templates containing actions in unquoted HTML attributes (e.g. " [bookworm] - golang-1.19 (Minor issue) [bullseye] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Minor issue) NOTE: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU @@ -24843,6 +24851,7 @@ CVE-2023-24540 (Not all valid JavaScript whitespace characters are considered to [bookworm] - golang-1.19 (Minor issue) [bullseye] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Minor issue) NOTE: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU @@ -24856,6 +24865,7 @@ CVE-2023-24539 (Angle brackets (<>) are not considered dangerous characters when [bookworm] - golang-1.19 (Minor issue) [bullseye] - golang-1.19 (Minor issue) - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Minor issue) NOTE: https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU @@ -24867,6 +24877,7 @@ CVE-2023-24538 (Templates do not properly consider backticks (`) as Javascript s [experimental] - golang-1.19 1.19.8-1 - golang-1.19 1.19.8-2 - golang-1.15 + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) NOTE: https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8 @@ -24878,6 +24889,7 @@ CVE-2023-24537 (Calling any of the Parse functions on Go source code which conta
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b3ab1ada by Moritz Muehlenhoff at 2023-06-19T23:00:08+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -395,6 +395,8 @@ CVE-2023-2683 (A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 NOT-FOR-US: silabs Bluetooth SDK CVE-2023- [RUSTSEC-2023-0038: Out-of-bounds array access leads to panic] - rust-sequoia-openpgp 1.16.0-1 + [bookworm] - rust-sequoia-openpgp (Minor issue) + [bullseye] - rust-sequoia-openpgp (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0038.html CVE-2023-3193 (Cross-site scripting (XSS) vulnerability in the Layout module's SEO co ...) NOT-FOR-US: Liferay @@ -55063,6 +55065,7 @@ CVE-2022-41723 (A maliciously crafted HTTP/2 stream could cause excessive CPU co - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) - golang-golang-x-net 1:0.7.0+dfsg-1 + [bullseye] - golang-golang-x-net (Minor issue) NOTE: https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E NOTE: https://go.dev/issue/57855 CVE-2022-41722 (A path traversal vulnerability exists in filepath.Clean on Windows. On ...) @@ -55101,6 +55104,7 @@ CVE-2022-41717 (An attacker can cause excessive memory growth in a Go server acc - golang-1.11 [buster] - golang-1.11 (Limited support, follow bullseye DSAs/point-releases) - golang-golang-x-net 1:0.4.0+dfsg-1 + [bullseye] - golang-golang-x-net (Minor issue) - golang-golang-x-net-dev [buster] - golang-golang-x-net-dev (Limited support, follow bullseye DSAs/point-releases) NOTE: https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU @@ -94408,6 +94412,7 @@ CVE-2022-27664 (In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attack - golang-1.11 [buster] - golang-1.11 (Limited support, minor issue, follow bullseye DSAs/point-releases) - golang-golang-x-net 1:0.0+git20221012.0b7e1fb+dfsg-1 + [bullseye] - golang-golang-x-net (Minor issue) - golang-golang-x-net-dev [buster] - golang-golang-x-net-dev (Limited support, follow bullseye DSAs/point-releases) NOTE: https://groups.google.com/g/golang-announce/c/x49AQzIVX-s @@ -151504,6 +151509,7 @@ CVE-2021-32838 (Flask-RESTX (pypi package flask-restx) is a community driven for NOT-FOR-US: Flask restx CVE-2021-32837 (mechanize, a library for automatically interacting with HTTP web serve ...) - python-mechanize 1:0.4.7-1 + [bullseye] - python-mechanize (Minor issue) NOTE: https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/ NOTE: https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6 (v0.4.6) CVE-2021-32836 (ZStack is open source IaaS(infrastructure as a service) software. In Z ...) @@ -190305,6 +190311,7 @@ CVE-2020-35914 (An issue was discovered in the lock_api crate before 0.4.2 for R [bullseye] - rust-lock-api (Minor issue) [buster] - rust-lock-api (Minor issue) - rust-lock-api-0.1 (bug #1032854) + [bullseye] - rust-lock-api-0.1 (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0070.html NOTE: https://github.com/Amanieu/parking_lot/pull/262 CVE-2020-35913 (An issue was discovered in the lock_api crate before 0.4.2 for Rust. A ...) @@ -190312,6 +190319,7 @@ CVE-2020-35913 (An issue was discovered in the lock_api crate before 0.4.2 for R [bullseye] - rust-lock-api (Minor issue) [buster] - rust-lock-api (Minor issue) - rust-lock-api-0.1 (bug #1032854) + [bullseye] - rust-lock-api-0.1 (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0070.html NOTE: https://github.com/Amanieu/parking_lot/pull/262 CVE-2020-35912 (An issue was discovered in the lock_api crate before 0.4.2 for Rust. A ...) @@ -190319,6 +190327,7 @@ CVE-2020-35912 (An issue was discovered in the lock_api crate before 0.4.2 for R [bullseye] - rust-lock-api (Minor issue) [buster] - rust-lock-api (Minor issue) - rust-lock-api-0.1 (bug #1032854) + [bullseye] - rust-lock-api-0.1 (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0070.html NOTE: https://github.com/Amanieu/parking_lot/pull/262 CVE-2020-35911 (An issue was discovered in the lock_api crate before 0.4.2 for Rust. A ...) @@ -190326,6 +190335,7 @@ CVE-2020-35911 (An issue was discovered in the lock_api crate before 0.4.2 for R [bullseye] - rust-lock-api (Minor issue) [buster] - rust-lock-api (Minor issue) - rust-lock-api-0.1 (bug #1032854) + [bullseye] -
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 89ead2a8 by Moritz Muehlenhoff at 2023-06-19T17:40:13+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -809,6 +809,8 @@ CVE-2015-10118 (A vulnerability classified as problematic was found in cchetanon NOT-FOR-US: WordPress plugin CVE-2023-3195 (A stack-based buffer overflow issue was found in ImageMagick's coders/ ...) - imagemagick + [bookworm] - imagemagick (Minor issue) + [bullseye] - imagemagick (Minor issue) [buster] - imagemagick (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/05/29/1 NOTE: ImageMagick6: https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023 (6.9.12-26) @@ -1363,6 +1365,8 @@ CVE-2023-33477 (In Harmonic NSG 9000-6G devices, an authenticated remote user ca NOT-FOR-US: Harmonic NSG 9000-6G devices CVE-2023-33460 (There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse functi ...) - yajl + [bookworm] - yajl (Minor issue) + [bullseye] - yajl (Minor issue) [buster] - yajl (Minor issue) NOTE: https://github.com/lloyd/yajl/issues/250 CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in URIParser::parse , ...) @@ -2563,6 +2567,8 @@ CVE-2023-27529 (Wacom Tablet Driver installer prior to 6.4.2-1 (for macOS) conta NOT-FOR-US: Wacom Tablet Driver installer CVE-2023- [Block themes parsing shortcodes in user-generated data] - wordpress 6.2.2+dfsg1-1 (bug #1036689) + [bookworm] - wordpress (Minor issue, fix along in future update) + [bullseye] - wordpress (Minor issue, fix along in future update) NOTE: https://wordpress.org/news/2023/05/wordpress-6-2-2-security-release/ CVE-2023-33983 (The Introduction Client in Briar through 1.5.3 does not implement out- ...) - briar (bug #1019932) @@ -3135,6 +3141,8 @@ CVE-2023-2756 (SQL Injection in GitHub repository pimcore/customer-data-framewor NOT-FOR-US: pimcore CVE-2023-2745 (WordPress Core is vulnerable to Directory Traversal in versions up to, ...) - wordpress 6.2.1+dfsg1-1 (bug #1036296) + [bookworm] - wordpress (Minor issue, fix along in future update) + [bullseye] - wordpress (Minor issue, fix along in future update) NOTE: https://core.trac.wordpress.org/changeset?old=55765=55765 NOTE: https://wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/ CVE-2023-2679 (Data leakage in Adobe connector in Snow Software SPE 9.27.0 on Windows ...) @@ -9342,6 +9350,7 @@ CVE-2012-10010 (A vulnerability was found in BestWebSoft Contact Form 3.21. It h NOT-FOR-US: WordPress plugin CVE-2023-32665 [GVariant deserialisation does not match spec for non-normal data] - glib2.0 2.74.4-1 + [bullseye] - glib2.0 (Minor issue) NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2121 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126 @@ -9351,6 +9360,7 @@ CVE-2023-32665 [GVariant deserialisation does not match spec for non-normal data NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2841 CVE-2023-32611 [g_variant_byteswap() can take a long time with some non-normal inputs] - glib2.0 2.74.4-1 + [bullseye] - glib2.0 (Minor issue) NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2797 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126 @@ -9360,6 +9370,7 @@ CVE-2023-32611 [g_variant_byteswap() can take a long time with some non-normal i NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2841 CVE-2023-29499 [GVariant offset table entry size is not checked in is_normal()] - glib2.0 2.74.4-1 + [bullseye] - glib2.0 (Minor issue) NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/2794 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126 @@ -11895,6 +11906,7 @@ CVE-2023-28766 (A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) CVE-2023-25180 RESERVED - glib2.0 2.74.4-1 + [bullseye] - glib2.0 (Minor issue) NOTE: https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3125 NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/3126 @@ -11906,6 +11918,7 @@ CVE-2023-25180 CVE-2023-24593 RESERVED - glib2.0 2.74.4-1 + [bullseye] - glib2.0 (Minor issue)
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 76306029 by Moritz Muehlenhoff at 2023-06-18T21:22:39+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -21,6 +21,7 @@ CVE-2023-3295 (The Unlimited Elements For Elementor (Free Widgets, Addons, Templ NOT-FOR-US: WordPress plugin CVE-2023-35790 (An issue was discovered in dec_patch_dictionary.cc in libjxl before 0. ...) - jpeg-xl + [bookworm] - jpeg-xl (Minor issue) NOTE: https://github.com/libjxl/libjxl/pull/2551 NOTE: https://github.com/libjxl/libjxl/commit/d4e67a644d8babe7cb68de122d8b5ccb2ad8f226 CVE-2023-35789 (An issue was discovered in the C AMQP client library (aka rabbitmq-c) ...) @@ -3746,6 +3747,7 @@ CVE-2023- [several critical memory corruption vulnerabilities] CVE-2023-32573 (In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x thro ...) - qt6-svg 6.4.2-2 - qtsvg-opensource-src 5.15.8-3 + [bullseye] - qtsvg-opensource-src (Minor issue) [buster] - qtsvg-opensource-src (Minor issue) - qt4-x11 NOTE: https://codereview.qt-project.org/c/qt/qtsvg/+/474093 @@ -9593,6 +9595,7 @@ CVE-2023-29405 (The go command may execute arbitrary code at build time when usi - golang-1.20 1.20.5-1 [experimental] - golang-1.19 1.19.10-1 - golang-1.19 1.19.10-2 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 - golang-1.11 NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924 @@ -9605,6 +9608,7 @@ CVE-2023-29404 (The go command may execute arbitrary code at build time when usi - golang-1.20 1.20.5-1 [experimental] - golang-1.19 1.19.10-1 - golang-1.19 1.19.10-2 + [bookworm] - golang-1.19 (Minor issue) - golang-1.15 - golang-1.11 NOTE: https://groups.google.com/g/golang-announce/c/q5135a9d924 @@ -49927,6 +49931,7 @@ CVE-2022-3617 RESERVED CVE-2022-3616 (Attackers can create long chains of CAs that would lead to OctoRPKI ex ...) - cfrpki 1.4.4-1 + [bullseye] - cfrpki (Minor issue) NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc CVE-2022-3615 RESERVED @@ -102778,6 +102783,7 @@ CVE-2022-24724 (cmark-gfm is GitHub's extended version of the C reference implem - python-cmarkgfm 0.7.0-1 (bug #1006758) [buster] - python-cmarkgfm (Minor issue) - ruby-commonmarker 0.23.4-1 (bug #1006759) + [bullseye] - ruby-commonmarker (Minor issue) [buster] - ruby-commonmarker (Minor issue) - r-cran-commonmark 1.8.0-1 (bug #1006760) [bullseye] - r-cran-commonmark (Minor issue) = data/dsa-needed.txt = @@ -25,6 +25,8 @@ linux (carnil) nbconvert/oldstable Guilhem Moulin proposed an update ready for review -- +maradns/oldstable +-- netatalk/oldstable open regression with MacOS, tentative patch not yet merged upstream See discussion on team mailing list. @@ -55,7 +57,7 @@ ruby2.7/oldstable -- ruby3.1/stable -- -ruby-nokogiri/oldstble +ruby-nokogiri/oldstable -- ruby-rack/oldstable (carnil) Utkarsh Gupta available for preparing updates, debdiff ready for review View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76306029fa98d8a35037fd5816c2465eacaa3997 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76306029fa98d8a35037fd5816c2465eacaa3997 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6f4d703c by Moritz Muehlenhoff at 2023-06-17T20:48:41+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1989,6 +1989,7 @@ CVE-2023-2978 (A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has b NOT-FOR-US: Abstrium Pydio Cells CVE-2023-2977 (A vulnerbility was found in OpenSC. This security flaw cause a buffer ...) - opensc 0.23.0-0.3 (bug #1037021) + [bullseye] - opensc (Minor issue) NOTE: https://github.com/OpenSC/OpenSC/issues/2785 NOTE: https://github.com/OpenSC/OpenSC/pull/2787 NOTE: Fixed by: https://github.com/OpenSC/OpenSC/commit/81944d1529202bd28359bede57c0a15deb65ba8a @@ -2928,6 +2929,7 @@ CVE-2023-32763 (An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, - qt6-base 6.4.2+dfsg-8 - qtbase-opensource-src 5.15.8+dfsg-10 - qtbase-opensource-src-gles 5.15.8+dfsg-3 (bug #1036702) + [bullseye] - qtbase-opensource-src-gles (Minor issue) - qt4-x11 NOTE: https://lists.qt-project.org/pipermail/announce/2023-May/000413.html NOTE: https://download.qt.io/official_releases/qt/5.15/CVE-2023-32763-qtbase-5.15.diff @@ -20714,6 +20716,7 @@ CVE-2023-0842 (xml2js version 0.4.23 allows an external attacker to edit or add NOTE: https://github.com/Leonidas-from-XIV/node-xml2js/commit/581b19a62d88f8a3c068b5a45f4542c2d6a495a5 CVE-2023-0841 (A vulnerability, which was classified as critical, has been found in G ...) - gpac (bug #1034890) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) CVE-2023-0840 (A vulnerability classified as problematic was found in PHPCrazy 1.1.1. ...) NOT-FOR-US: PHPCrazy @@ -21268,6 +21271,7 @@ CVE-2023-0779 (At the most basic level, an invalid pointer can be input that cra NOT-FOR-US: Zephyr CVE-2023-0778 (A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This is ...) - libpod 4.3.1+ds1-7 (bug #1032099) + [bullseye] - libpod (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2168256 NOTE: https://github.com/containers/podman/commit/6ca857feb07a5fdc96fd947afef03916291673d8 CVE-2023-25678 @@ -26833,6 +26837,7 @@ CVE-2023-0359 RESERVED CVE-2023-0358 (Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.) - gpac (bug #1033116) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 NOTE: https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b @@ -129558,6 +129563,7 @@ CVE-2021-41459 (There is a stack buffer overflow in MP4Box v1.0.1 at src/filters NOTE: Fixed by: https://github.com/gpac/gpac/commit/7d4538e104f2b3ff6a65a41394795654e6972339 (v2.0.0) CVE-2021-41458 (In GPAC MP4Box v1.1.0, there is a stack buffer overflow at src/utils/e ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1910 @@ -130870,6 +130876,7 @@ CVE-2021-40943 (In Bento4 1.6.0-638, there is a null pointer reference in the fu NOT-FOR-US: Bento4 CVE-2021-40942 (In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the function ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/1908 NOTE: https://github.com/gpac/gpac/commit/da37ec8582266983d0ec4b7550ec907401ec441e (v2.0.0) @@ -131703,6 +131710,7 @@ CVE-2021-40608 (The gf_hinter_track_finalize function in GPAC 1.0.1 allows attac NOTE: https://github.com/gpac/gpac/commit/b09c75dc2d4bf68ac447daa71e72365aa30231a9 (v2.0.0) CVE-2021-40607 (The schm_box_size function in GPAC 1.0.1 allows attackers to cause a d ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/1879 NOTE: https://github.com/gpac/gpac/commit/f19668964bf422cf5a63e4dbe1d3c6c75edadcbb (v2.0.0) @@ -131800,6 +131808,7 @@ CVE-2021-40574 (The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability NOTE: https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb (v2.0.0) CVE-2021-40573 (The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5113f761 by Moritz Muehlenhoff at 2023-06-16T17:11:32+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -772,6 +772,7 @@ CVE-2023-34096 (Thruk is a multibackend monitoring webinterface which currently NOT-FOR-US: Thruk CVE-2023-34095 (cpdb-libs provides frontend and backend libraries for the Common Print ...) - cpdb-libs + [bookworm] - cpdb-libs (Minor issue) NOTE: https://github.com/OpenPrinting/cpdb-libs/security/advisories/GHSA-25j7-9gfc-f46x NOTE: Fixed by: https://github.com/OpenPrinting/cpdb-libs/commit/f181bd1f14757c2ae0f17cc76dc20421a40f30b7 NOTE: 1.2.x version predate the upstream commit 3f66d47252d5 ("print_frontend: Use @@ -818,8 +819,8 @@ CVE-2023-2866 (If an attacker can trick an authenticated user into loading a mal NOT-FOR-US: Advantech CVE-2023-3153 [service monitor MAC flow is not rate limited] - ovn + [bookworm] - ovn (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2213279 - TODO: check details CVE-2023-3152 (A vulnerability classified as critical has been found in SourceCodeste ...) NOT-FOR-US: SourceCodester Online Discussion Forum Site CVE-2023-3151 (A vulnerability was found in SourceCodester Online Discussion Forum Si ...) @@ -1247,6 +1248,7 @@ CVE-2023-34414 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-21/#CVE-2023-34414 CVE-2023- [RUSTSEC-2023-0041] - rust-trust-dns-server + [bookworm] - rust-trust-dns-server (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0041.html NOTE: https://github.com/bluejekyll/trust-dns/pull/1952 NOTE: https://github.com/bluejekyll/trust-dns/commit/217974c0544483efe0c648befabb25bf88242716 @@ -1378,6 +1380,7 @@ CVE-2023-34411 (The xml-rs crate before 0.8.14 for Rust and Crab allows a denial NOTE: Fixed by: https://github.com/netvl/xml-rs/commit/c09549a187e62d39d40467f129e64abf32efc35c (0.8.14) CVE-2023-34410 (An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6. ...) - qt6-base 6.4.2+dfsg-11 (bug #1037209) + [bookworm] - qt6-base (Minor issue) - qtbase-opensource-src 5.15.8+dfsg-12 (bug #1037210) - qtbase-opensource-src-gles [bookworm] - qtbase-opensource-src-gles (Minor issue) @@ -11252,6 +11255,7 @@ CVE-2023-1656 (Cleartext Transmission of Sensitive Information vulnerability in NOT-FOR-US: ForgeRock CVE-2023-1655 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4 ...) - gpac (bug #1034187) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9 NOTE: https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4 @@ -17292,6 +17296,7 @@ CVE-2023-27044 RESERVED CVE-2023-27043 (The email module of Python through 3.11.3 incorrectly parses e-mail ad ...) - python3.11 + [bookworm] - python3.11 (Minor issue) - python3.10 - python3.9 - python3.7 @@ -25205,6 +25210,7 @@ CVE-2023-24330 RESERVED CVE-2023-24329 (An issue in the urllib.parse component of Python before 3.11.4 allows ...) - python3.11 3.11.4-1 + [bookworm] - python3.11 (Minor issue) - python3.9 [bullseye] - python3.9 (Minor issue) - python3.7 @@ -36703,6 +36709,7 @@ CVE-2022-46946 (Helmet Store Showroom Site v1.0 was discovered to contain a SQL NOT-FOR-US: Helmet Store Showroom Site CVE-2022-46945 (Nagvis before 1.9.34 was discovered to contain an arbitrary file read ...) - nagvis 1:1.9.34-1 + [bullseye] - nagvis (Minor issue) NOTE: https://github.com/NagVis/nagvis/commit/71aba7f46f79d846e1df037f165d206a2cd1d22a (nagvis-1.9.34) CVE-2022-46944 RESERVED = data/dsa-needed.txt = @@ -53,6 +53,8 @@ ring ruby2.7/oldstable Utkarsh Gupta offered help in preparing updates -- +ruby3.1/stable +-- ruby-nokogiri/oldstble -- ruby-rack/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5113f761d99bed0d46673be23cd7055d5e790e60 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5113f761d99bed0d46673be23cd7055d5e790e60 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 4a6be8e4 by Moritz Muehlenhoff at 2023-06-16T10:57:12+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1372,6 +1372,8 @@ CVE-2023-34410 (An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, - qt6-base 6.4.2+dfsg-11 (bug #1037209) - qtbase-opensource-src 5.15.8+dfsg-12 (bug #1037210) - qtbase-opensource-src-gles + [bookworm] - qtbase-opensource-src-gles (Minor issue) + [bullseye] - qtbase-opensource-src-gles (Minor issue) - qt4-x11 NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/477560 NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/480002 @@ -2485,6 +2487,8 @@ CVE-2023-32685 (Kanboard is project management software that focuses on the Kanb NOTE: https://github.com/kanboard/kanboard/security/advisories/GHSA-hjmw-gm82-r4gv CVE-2023-32681 (Requests is a HTTP library. Since Requests 2.3.0, Requests has been le ...) - requests (bug #1036693) + [bookworm] - requests (Minor issue) + [bullseye] - requests (Minor issue) NOTE: https://github.com/psf/requests/security/advisories/GHSA-j8r2-6x86-q33q NOTE: Fixed by: https://github.com/psf/requests/commit/74ea7cf7a6a27a4eeb2ae24e162bcc942a6706d5 (v2.31.0) CVE-2023-31763 (Weak security in the transmitter of AGShome Smart Alarm v1.0 allows at ...) @@ -2685,6 +2689,8 @@ CVE-2023-33285 (An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2 [bookworm] - qt6-base (Minor issue) - qtbase-opensource-src 5.15.8+dfsg-11 - qtbase-opensource-src-gles + [bookworm] - qtbase-opensource-src-gles (Minor issue) + [bullseye] - qtbase-opensource-src-gles (Minor issue) NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/477644 CVE-2023-33281 (The remote keyfob system on Nissan Sylphy Classic 2021 sends the same ...) NOT-FOR-US: Nissan Sylphy Classic 2021 @@ -3639,6 +3645,8 @@ CVE-2023-32573 (In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3. CVE-2023-32570 (VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that ca ...) [experimental] - dav1d 1.2.0-1 - dav1d 1.2.1-2 (bug #1035950) + [bookworm] - dav1d (Minor issue) + [bullseye] - dav1d (Minor issue) NOTE: https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa (1.2.0) CVE-2023-32569 (An issue was discovered in Veritas InfoScale Operations Manager (VIOM) ...) NOT-FOR-US: Veritas InfoScale Operations Manager @@ -11396,18 +11404,18 @@ CVE-2023-1637 (A flaw that boot CPU could be vulnerable for the speculative exec NOTE: https://git.kernel.org/linus/e2a1256b17b16f9b9adf1b6fea56819e7b68e463 (5.18-rc2) CVE-2023-1636 [incomplete container isolation] RESERVED - - barbican + - barbican NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2181765 - TODO: check, possibly RedHat downstream RHOSP specific, RedHat clarifying with reporter + NOTE: possibly RedHat downstream RHOSP specific, RedHat clarifying with reporter CVE-2023-1635 (A vulnerability was found in OTCMS 6.72. It has been declared as probl ...) NOT-FOR-US: OTCMS CVE-2023-1634 (A vulnerability was found in OTCMS 6.72. It has been classified as cri ...) NOT-FOR-US: OTCMS CVE-2023-1633 [Insecure Barbican configuration file leaking credential] RESERVED - - barbican + - barbican NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2181761 - TODO: check, possibly RedHat downstream RHOSP specific, RedHat clarifying with reporter + NOTE: possibly RedHat downstream RHOSP specific, RedHat clarifying with reporter CVE-2023-1632 (** DISPUTED ** A vulnerability has been found in Ellucian Banner Web T ...) NOT-FOR-US: Ellucian Banner Web Tailor CVE-2023-1631 (A vulnerability, which was classified as problematic, was found in Jia ...) @@ -24530,6 +24538,7 @@ CVE-2023-24531 CVE-2023-24473 (An information disclosure vulnerability exists in the TGAInput::read_t ...) [experimental] - openimageio 2.4.9.0+dfsg-1 - openimageio (bug #1034150) + [bookworm] - openimageio (Minor issue) [bullseye] - openimageio (Minor issue) NOTE: https://github.com/OpenImageIO/oiio/pull/3768 NOTE: https://github.com/OpenImageIO/oiio/commit/759fcd392d130c12ae476857e1ed2a91bcf2686b (master) @@ -24538,6 +24547,7 @@ CVE-2023-24473 (An information disclosure vulnerability exists in the TGAInput:: CVE-2023-24472 (A denial of service vulnerability exists in the FitsOutput::close() fu ...) [experimental] - openimageio 2.4.9.0+dfsg-1 - openimageio (bug #1034151) + [bookworm] -
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b5a0150f by Moritz Muehlenhoff at 2023-06-15T16:17:42+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -183,6 +183,8 @@ CVE-2023-34944 (An arbitrary file upload vulnerability in the /fileUpload.lib.ph NOT-FOR-US: Chamilo LMS CVE-2023-34537 (A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacke ...) - hoteldruid + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) [buster] - hoteldruid (Minor issue) NOTE: https://github.com/leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5 CVE-2023-34396 (Allocation of Resources Without Limits or Throttling vulnerability in ...) @@ -201,6 +203,8 @@ CVE-2023-33933 (Exposure of Sensitive Information to an Unauthorized Actor vulne NOTE: https://github.com/apache/trafficserver/commit/496fa2c4cbdf2b3d6c61760a3fb6675b74b549f0 (8.1.x) CVE-2023-33817 (hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerabil ...) - hoteldruid + [bookworm] - hoteldruid (Minor issue) + [bullseye] - hoteldruid (Minor issue) [buster] - hoteldruid (Minor issue) NOTE: https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5 CVE-2023-33146 (Microsoft Office Remote Code Execution Vulnerability) @@ -1749,7 +1753,6 @@ CVE-2023-2952 (XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 {DLA-3443-1} [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-20.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19100 @@ -2149,7 +2152,6 @@ CVE-2023-2817 (A post-authentication stored cross-site scripting vulnerability e CVE-2023-2854 (BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 ...) [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (vulnerable code introduced later) [buster] - wireshark (vulnerable code introduced in 4.0) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-17.html @@ -2159,7 +2161,6 @@ CVE-2023-2856 (VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and {DLA-3443-1} [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-16.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19083 @@ -2167,7 +2168,6 @@ CVE-2023-2858 (NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 {DLA-3443-1} [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-15.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19081 @@ -2175,7 +2175,6 @@ CVE-2023-2879 (GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6. {DLA-3443-1} [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-14.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19068 @@ -2190,7 +2189,6 @@ CVE-2023-2857 (BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3. CVE-2023-2855 (Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6. ...) [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (Minor issue) [buster] - wireshark (Candump support added in 3.2) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-12.html @@ -22494,7 +22492,6 @@ CVE-2023-0669 (Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre- CVE-2023-0668 (Due to failure in validating the length provided by an attacker-crafte ...) [experimental] - wireshark 4.0.6-1~exp1 - wireshark 4.0.6-1 - [bookworm] - wireshark (Minor issue) [bullseye] - wireshark (Minor issue) [buster] - wireshark (vulnerable code introduced in 3.2) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-19.html @@ -22505,7 +22502,6 @@ CVE-2023-0667 (Due to failure in validating the length provided by an attacker-c CVE-2023-0666 (Due to failure in validating the length provided by an
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 95679643 by Moritz Muehlenhoff at 2023-06-15T09:33:47+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -25654,13 +25654,13 @@ CVE-2022-48280 CVE-2023-0412 (TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 a ...) {DLA-3313-1} - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-07.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18770 CVE-2023-0411 (Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and ...) {DLA-3313-1} - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-06.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18711 NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18720 @@ -25668,12 +25668,12 @@ CVE-2023-0411 (Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0. CVE-2023-0415 (iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 ...) {DLA-3313-1} - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-05.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18796 CVE-2023-0416 (GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 an ...) - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) [buster] - wireshark (Vulnerable code introduced later) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-04.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18779 @@ -25682,18 +25682,18 @@ CVE-2023-0416 (GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6. CVE-2023-0413 (Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 ...) {DLA-3313-1} - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-03.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18766 CVE-2023-0417 (Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 ...) {DLA-3313-1} - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-02.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18628 CVE-2023-0414 (Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial o ...) - wireshark 4.0.3-1 - [bullseye] - wireshark (Minor issue, fix along in future update) + [bullseye] - wireshark (Minor issue) [buster] - wireshark (Vulnerable code introduced later) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-01.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18622 = data/dsa-needed.txt = @@ -14,7 +14,7 @@ If needed, specify the release by adding a slash after the name of the source pa -- asterisk/oldstable -- -chromium +chromium (jmm) -- cinder/oldstable -- @@ -75,10 +75,10 @@ webkit2gtk -- wpewebkit -- -wireshark - bookworm to 4.0.6, bullseye isolated cherrypick +wireshark/stable (jmm) + bookworm to 4.0.6, bullseye only harmless issues and no DSA -- -xmltooling +xmltooling (jmm) Maintainer preparing updates -- xrdp/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/956796437979d389da90370d80e2a83236b022c6 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/956796437979d389da90370d80e2a83236b022c6 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 11d8335a by Moritz Muehlenhoff at 2023-06-05T21:14:39+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -183,6 +183,8 @@ CVE-2023-33551 (Heap Buffer Overflow in the erofsfsck_dirent_iter function in fs NOTE: Proposed fix: https://git.kernel.org/pub/scm/linux/kernel/git/xiang/erofs-utils.git/commit/?h=experimental=27aeef179bf17d5f1d98f827e93d24839a6d4176 CVE-2023-33546 (janino 3.1.9 and earlier are subject to denial of service (DOS) attack ...) - janino + [bookworm] - janino (Minor issue) + [bullseye] - janino (Minor issue) NOTE: https://github.com/janino-compiler/janino/issues/201 CVE-2023-33544 (hawtio 2.17.2 is vulnerable to Path Traversal. it is possible to input ...) TODO: check @@ -8059,6 +8061,7 @@ CVE-2023-29400 (Templates containing actions in unquoted HTML attributes (e.g. " - golang-1.20 1.20.4-1 [experimental] - golang-1.19 1.19.9-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) [bullseye] - golang-1.19 (Minor issue) - golang-1.15 - golang-1.11 @@ -22949,6 +22952,7 @@ CVE-2023-24540 (Not all valid JavaScript whitespace characters are considered to - golang-1.20 1.20.4-1 [experimental] - golang-1.19 1.19.9-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) [bullseye] - golang-1.19 (Minor issue) - golang-1.15 - golang-1.11 @@ -22960,6 +22964,7 @@ CVE-2023-24539 (Angle brackets (<>) are not considered dangerous characters when - golang-1.20 1.20.4-1 [experimental] - golang-1.19 1.19.9-1 - golang-1.19 + [bookworm] - golang-1.19 (Minor issue) [bullseye] - golang-1.19 (Minor issue) - golang-1.15 - golang-1.11 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d8335a7c7d8acf3dbc315078eebc0d4857da22 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d8335a7c7d8acf3dbc315078eebc0d4857da22 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1493cc75 by Moritz Muehlenhoff at 2023-06-02T20:53:53+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -179,10 +179,12 @@ CVE-2023-3014 (A vulnerability, which was classified as problematic, was found i NOT-FOR-US: BeipyVideoResolution CVE-2023-3013 (Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073 NOTE: https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594 CVE-2023-3012 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2 ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 NOTE: https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7 CVE-2023-3009 (Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassn ...) @@ -77639,6 +77641,8 @@ CVE-2022-32547 (In ImageMagick, there is load of misaligned address for type 'do NOTE: https://github.com/ImageMagick/ImageMagick6/commit/dc070da861a015d3c97488fdcca6063b44d47a7b (6.9.12-45) CVE-2023-34151 (A vulnerability was found in ImageMagick. This security flaw ouccers a ...) - imagemagick (bug #1036999) + [bookworm] - imagemagick (Minor issue) + [bullseye] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/issues/6341 NOTE: ImageMagick: https://github.com/ImageMagick/ImageMagick/commit/3d6d98d8a2be30d74172ab43b5b8e874d2deb158 (7.1.1-10) NOTE: ImageMagick6: https://github.com/ImageMagick/ImageMagick6/commit/133089f716f23ce0b80d89ccc1fd680960235512 (6.9.12-88) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1493cc75b54619481cb3683d027b32dd4c8f60bf -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1493cc75b54619481cb3683d027b32dd4c8f60bf You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e41ae35a by Moritz Mühlenhoff at 2023-05-28T22:46:28+02:00 bullseye/bookworm triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -569,6 +569,7 @@ CVE-2023-33288 (An issue was discovered in the Linux kernel before 6.2.9. A use- NOTE: https://git.kernel.org/linus/47c29d69212911f50bdcdd0564b5999a559010d4 (6.3-rc4) CVE-2023-33285 (An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, an ...) - qt6-base 6.4.2+dfsg-10 (bug #1036848) + [bookworm] - qt6-base (Minor issue) - qtbase-opensource-src 5.15.8+dfsg-11 - qtbase-opensource-src-gles NOTE: https://codereview.qt-project.org/c/qt/qtbase/+/477644 @@ -1406,6 +1407,7 @@ CVE-2023-2454 [CREATE SCHEMA ... schema_element defeats protective search_path c NOTE: https://www.postgresql.org/about/news/postgresql-153-148-1311-1215-and-1120-released-2637/ CVE-2023-32668 (LuaTeX before 1.17.0 allows a document (compiled with the default sett ...) - texlive-bin (bug #1036470) + [bookworm] - texlive-bin (Minor issue) [bullseye] - texlive-bin (Minor issue) [buster] - texlive-bin (Minor issue) NOTE: https://tug.org/pipermail/tex-live/2023-May/049188.html @@ -10692,7 +10694,10 @@ CVE-2023-28448 (Versionize is a framework for version tolerant serializion/deser NOT-FOR-US: Versionize (firecracker-microvm / framework for version tolerant serializion/deserialization of Rust data structures) CVE-2023-28447 (Smarty is a template engine for PHP. In affected versions smarty did n ...) - smarty3 (bug #1033964) + [bookworm] - smarty3 (Minor issue) + [bullseye] - smarty3 (Minor issue) - smarty4 (bug #1033965) + [bookworm] - smarty4 (Minor issue) NOTE: https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj NOTE: https://github.com/smarty-php/smarty/commit/e75165565e9e5956a73365c24d650ba40570ae72 (v4.3.1) NOTE: https://github.com/smarty-php/smarty/commit/7677db7bc9a1dcfcad1435fc9d3bac3f295ca3ad (v3.1.48) @@ -12290,6 +12295,7 @@ CVE-2023-1290 (A vulnerability, which was classified as critical, has been found NOT-FOR-US: SourceCodester Sales Tracker Management System CVE-2023-1289 (A vulnerability was discovered in ImageMagick where a specially create ...) - imagemagick (bug #1033254) + [bookworm] - imagemagick (Minor issue) [bullseye] - imagemagick (Minor issue) [buster] - imagemagick (Should be fixed together with some other CVEs) NOTE: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr @@ -14566,6 +14572,8 @@ CVE-2023-1056 (A vulnerability was found in SourceCodester Doctors Appointment S NOT-FOR-US: SourceCodester Doctors Appointment System CVE-2023-1055 (A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP t ...) - 389-ds-base (bug #1034891) + [bookworm] - 389-ds-base (Minor issue) + [bullseye] - 389-ds-base (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2173517 CVE-2023-1054 (A vulnerability was found in SourceCodester Music Gallery Site 1.0. It ...) NOT-FOR-US: SourceCodester Music Gallery Site @@ -147394,6 +147402,7 @@ CVE-2021-33392 RESERVED CVE-2021-33391 (An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute arbitra ...) - tidy-html5 (bug #1032665) + [bookworm] - tidy-html5 (Minor issue) [bullseye] - tidy-html5 (Minor issue) [buster] - tidy-html5 (Minor issue) NOTE: https://github.com/htacg/tidy-html5/issues/946 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e41ae35aeddf8f8462802238f1a5833e4767375f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e41ae35aeddf8f8462802238f1a5833e4767375f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits