Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits: 295a6867 by Moritz Muehlenhoff at 2023-08-24T10:58:32+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: ===================================== data/CVE/list ===================================== @@ -113,6 +113,7 @@ CVE-2023-4041 (Buffer Copy without Checking Size of Input ('Classic Buffer Overf CVE-2023-41105 (An issue was discovered in Python 3.11 through 3.11.4. If a path conta ...) - python3.12 <unfixed> - python3.11 <unfixed> + [bookworm] - python3.11 <no-dsa> (Minor issue) - python3.10 <not-affected> (Vulnerable code introduced in 3.11.y) - python3.9 <not-affected> (Vulnerable code introduced in 3.11.y) - python3.7 <not-affected> (Vulnerable code introduced in 3.11.y) @@ -238,6 +239,8 @@ CVE-2022-48571 (memcached 1.6.7 allows a Denial of Service via multi-packet uplo NOTE: Fixed by: https://github.com/memcached/memcached/commit/6b319c8c7a29e9c353dec83dc92f01905f6c8966 (1.6.8) CVE-2022-48570 (Crypto++ through 8.4 contains a timing side channel in ECDSA signature ...) - libcrypto++ <unfixed> + [bookworm] - libcrypto++ <no-dsa> (Minor issue) + [bullseye] - libcrypto++ <no-dsa> (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/992 NOTE: This issue exists because the CVE-2019-14318 fix was intentionally removed for NOTE: functionality reasons. @@ -308,6 +311,7 @@ CVE-2023-XXXX [RUSTSEC-2023-0053: rustls-webpki: CPU denial of service in certif NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023-XXXX [RUSTSEC-2023-0052 webpki: CPU denial of service in certificate path building] - rust-webpki <unfixed> (bug #1050299) + [bookworm] - rust-webpki <no-dsa> (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0052.html NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023-32184 @@ -18260,6 +18264,7 @@ CVE-2023-29453 RESERVED CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> Geograph ...) - zabbix <unfixed> + [bookworm] - zabbix <no-dsa> (Minor issue) [bullseye] - zabbix <not-affected> (vulnerable code introduced later) [buster] - zabbix <not-affected> (vulnerable code introduced later) NOTE: https://support.zabbix.com/browse/ZBX-22981 @@ -40763,6 +40768,8 @@ CVE-2022-48175 (Rukovoditel v3.2.1 was discovered to contain a remote code execu NOT-FOR-US: Rukovoditel CVE-2022-48174 (There is a stack overflow vulnerability in ash.c:6030 in busybox befor ...) - busybox <unfixed> + [bookworm] - busybox <no-dsa> (Minor issue) + [bullseye] - busybox <no-dsa> (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15216 NOTE: https://git.busybox.net/busybox/commit/?id=d417193cf37ca1005830d7e16f5fa7e1d8a44209 CVE-2022-48173 @@ -59580,6 +59587,8 @@ CVE-2022-43359 (Gifdec commit 1dcbae19363597314f6623010cc80abad4e47f7c was disco NOT-FOR-US: Gifdec CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function Sass::C ...) - libsass <unfixed> + [bookworm] - libsass <no-dsa> (Minor issue) + [bullseye] - libsass <no-dsa> (Minor issue) NOTE: https://github.com/sass/libsass/issues/3178 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function Sass::Co ...) TODO: check @@ -131765,7 +131774,7 @@ CVE-2021-43400 (An issue was discovered in gatt-database.c in BlueZ 5.61. A use- CVE-2021-43399 (The Yubico YubiHSM YubiHSM2 library 2021.08, included in the yubihsm-s ...) NOT-FOR-US: yubihsm-shell CVE-2021-43398 (Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in ...) - - libcrypto++ <unfixed> (unimportant; bug #1000227) + NOTE: Disputed Crypto++ issue, also see #1000227 NOTE: https://github.com/weidai11/cryptopp/issues/1080 NOTE: As per upstream believed to be the expected behaviour: NOTE: https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222 ===================================== data/dsa-needed.txt ===================================== @@ -78,6 +78,8 @@ samba/oldstable -- tiff -- +trafficserver +-- wpewebkit/oldstable -- xrdp/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits