Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6730b8cc by Moritz Muehlenhoff at 2025-04-20T20:54:33+02:00
CVE-2024-57520 resolved and harmless

- - - - -
31a052fc by Moritz Muehlenhoff at 2025-04-20T21:07:46+02:00
trixie triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2778,11 +2778,13 @@ CVE-2025-3550 (A vulnerability has been found in wowjoy 
\u6d59\u6c5f\u6e56\u5dde
        NOT-FOR-US: wowjoy Internet Doctor Workstation System
 CVE-2025-3549 (A vulnerability, which was classified as critical, was found in 
Open A ...)
        - assimp <unfixed> (bug #1103444)
+       [trixie] - assimp <no-dsa> (Minor issue)
        [bookworm] - assimp <no-dsa> (Minor issue)
        [bullseye] - assimp <postponed> (Minor issue)
        NOTE: https://github.com/assimp/assimp/issues/6070
 CVE-2025-3548 (A vulnerability, which was classified as critical, has been 
found in O ...)
        - assimp <unfixed> (bug #1103443)
+       [trixie] - assimp <no-dsa> (Minor issue)
        [bookworm] - assimp <no-dsa> (Minor issue)
        [bullseye] - assimp <postponed> (Minor issue)
        NOTE: https://github.com/assimp/assimp/issues/6068
@@ -5503,6 +5505,7 @@ CVE-2025-3197 (Versions of the package expand-object from 
0.0.0 are vulnerable t
        NOT-FOR-US: expand-object Nodejs module
 CVE-2025-3196 (A vulnerability, which was classified as critical, was found in 
Open A ...)
        - assimp <unfixed> (bug #1102207)
+       [trixie] - assimp <no-dsa> (Minor issue)
        [bookworm] - assimp <no-dsa> (Minor issue)
        [bullseye] - assimp <postponed> (Minor issue, no upstream patch)
        NOTE: https://github.com/assimp/assimp/issues/6069
@@ -5651,6 +5654,7 @@ CVE-2025-3160 (A vulnerability has been found in Open 
Asset Import Library Assim
        NOTE: Fixed by: 
https://github.com/assimp/assimp/commit/4b8f55cc0008af43a8a50b91f0134e2f4e80142e
 CVE-2025-3159 (A vulnerability, which was classified as critical, was found in 
Open A ...)
        - assimp <unfixed> (bug #1102205)
+       [trixie] - assimp <no-dsa> (Minor issue)
        [bookworm] - assimp <no-dsa> (Minor issue)
        [bullseye] - assimp <postponed> (Minor issue, OOB read)
        NOTE: https://github.com/assimp/assimp/issues/6024
@@ -25297,10 +25301,9 @@ CVE-2025-24892 (OpenProject is open-source, web-based 
project management softwar
 CVE-2025-24200 (An authorization issue was addressed with improved state 
management. T ...)
        NOT-FOR-US: Apple
 CVE-2025-24031 (PAM-PKCS#11 is a Linux-PAM login module that allows a X.509 
certificat ...)
-       - pam-pkcs11 <unfixed>
-       [bookworm] - pam-pkcs11 <postponed> (Reevaluate once issue fixed 
upstream)
-       [bullseye] - pam-pkcs11 <postponed> (Reevaluate once issue fixed 
upstream)
+       - pam-pkcs11 <unfixed> (unimportant)
        NOTE: 
https://github.com/OpenSC/pam_pkcs11/security/advisories/GHSA-wvr3-c9x3-9mff
+       NOTE: Negligible security impact
 CVE-2025-24016 (Wazuh is a free and open source platform used for threat 
prevention, d ...)
        NOT-FOR-US: Wazuh
 CVE-2025-1193 (Improper host validation in the certificate validation 
component in De ...)
@@ -25958,9 +25961,11 @@ CVE-2024-57699 (A security issue was found in Netplex 
Json-smart 2.5.0 through 2
 CVE-2024-57598 (A floating point exception (divide-by-zero) vulnerability was 
discover ...)
        NOT-FOR-US: Bento4
 CVE-2024-57520 (Insecure Permissions vulnerability in asterisk v22 allows a 
remote att ...)
-       - asterisk <undetermined>
+       - asterisk 1:22.3.0~dfsg+~cs6.15.60671435-1 (unimportant)
        NOTE: https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621
-       TODO: check upstream awareness and position
+       NOTE: https://github.com/asterisk/asterisk/issues/1122
+       NOTE: 
https://github.com/asterisk/asterisk/commit/d184ae428df0740da02bf7ba7d9e7a7fcb7502fd
 (22.3.0-rc1)
+       NOTE: Negligible security impact
 CVE-2024-57086 (A prototype pollution in the function fieldsToJson of 
node-opcua-alarm ...)
        NOT-FOR-US: Node node-opcua-alarm-condition
 CVE-2024-57085 (A prototype pollution in the function deepMerge of 
@stryker-mutator/ut ...)
@@ -52750,6 +52755,7 @@ CVE-2024-10964 (A vulnerability classified as critical 
has been found in emqx ne
        NOT-FOR-US: emqx neuron
 CVE-2024-10963 (A flaw was found in pam_access, where certain rules in its 
configurati ...)
        - pam <unfixed> (bug #1087019)
+       [trixie] - pam <postponed> (Minor issue, revisit when fixed upstream)
        [bookworm] - pam <not-affected> (The vulnerable code was introduced in 
1.5.3)
        [bullseye] - pam <not-affected> (The vulnerable code was introduced in 
1.5.3)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2324291
@@ -141636,14 +141642,16 @@ CVE-2023-50782 (A flaw was found in the 
python-cryptography package. This issue
        NOTE: The fix relies on OpenSSL 3.2, marking the first 42.x upload to 
unstable as fixed,
        NOTE: openssl 3.2 was uploaded to unstable shortly after
 CVE-2023-50781 (A flaw was found in m2crypto. This issue may allow a remote 
attacker t ...)
-       - m2crypto <unfixed> (bug #1059292)
-       [bookworm] - m2crypto <postponed> (Minor issue, revisit when fixed 
upstream)
+       - m2crypto 0.40.1-3 (bug #1059292)
+       [bookworm] - m2crypto <postponed> (Minor issue, requires OpenSSL 3.2 
which isn't in Bookworm)
        [bullseye] - m2crypto <no-dsa> (Minor issue)
        [buster] - m2crypto <no-dsa> (Minor issue; it's an incomplete fix of 
CVE-2020-25657)
        NOTE: https://todo.sr.ht/~mcepl/m2crypto/342
        NOTE: https://people.redhat.com/~hkario/marvin/
        NOTE: https://github.com/openssl/openssl/pull/13817
        NOTE: CVE is for incomplete fix of CVE-2020-25657
+       NOTE: openssl 3.2 landed in Debian unstable at 04 Apr 2024, marking the 
first upload
+       NOTE: of m2crypto following it as the fixed version (0.40.1-3)
 CVE-2023-49934 (An issue was discovered in SchedMD Slurm 23.11.x. There is SQL 
Injecti ...)
        - slurm-wlm <not-affected> (Vulnerable code introduced in 23.11 series)
        - slurm-llnl <not-affected> (Vulnerable code introduced in 23.11 series)
@@ -209128,6 +209136,7 @@ CVE-2022-46304 (ChangingTec ServiSign component has 
insufficient filtering for s
        NOT-FOR-US: ChangingTec ServiSign
 CVE-2022-46295 (Multiple out-of-bounds write vulnerabilities exist in the 
translationV ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209135,6 +209144,7 @@ CVE-2022-46295 (Multiple out-of-bounds write 
vulnerabilities exist in the transl
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46294 (Multiple out-of-bounds write vulnerabilities exist in the 
translationV ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209142,6 +209152,7 @@ CVE-2022-46294 (Multiple out-of-bounds write 
vulnerabilities exist in the transl
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46293 (Multiple out-of-bounds write vulnerabilities exist in the 
translationV ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209149,6 +209160,7 @@ CVE-2022-46293 (Multiple out-of-bounds write 
vulnerabilities exist in the transl
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46292 (Multiple out-of-bounds write vulnerabilities exist in the 
translationV ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209156,6 +209168,7 @@ CVE-2022-46292 (Multiple out-of-bounds write 
vulnerabilities exist in the transl
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46291 (Multiple out-of-bounds write vulnerabilities exist in the 
translationV ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209163,6 +209176,7 @@ CVE-2022-46291 (Multiple out-of-bounds write 
vulnerabilities exist in the transl
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46290 (Multiple out-of-bounds write vulnerabilities exist in the ORCA 
format  ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209170,6 +209184,7 @@ CVE-2022-46290 (Multiple out-of-bounds write 
vulnerabilities exist in the ORCA f
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46289 (Multiple out-of-bounds write vulnerabilities exist in the ORCA 
format  ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209177,6 +209192,7 @@ CVE-2022-46289 (Multiple out-of-bounds write 
vulnerabilities exist in the ORCA f
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-46280 (A use of uninitialized pointer vulnerability exists in the PQS 
format  ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209220,6 +209236,7 @@ CVE-2022-44453
        RESERVED
 CVE-2022-44451 (A use of uninitialized pointer vulnerability exists in the MSI 
format  ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209233,6 +209250,7 @@ CVE-2022-43503
        REJECTED
 CVE-2022-43467 (An out-of-bounds write vulnerability exists in the PQS format 
coord_fi ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209240,6 +209258,7 @@ CVE-2022-43467 (An out-of-bounds write vulnerability 
exists in the PQS format co
        NOTE: https://github.com/openbabel/openbabel/issues/2650
 CVE-2022-42885 (A use of uninitialized pointer vulnerability exists in the GRO 
format  ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209327,6 +209346,7 @@ CVE-2022-41795
        RESERVED
 CVE-2022-41793 (An out-of-bounds write vulnerability exists in the CSR format 
title fu ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -209371,6 +209391,7 @@ CVE-2022-40973
        RESERVED
 CVE-2022-37331 (An out-of-bounds write vulnerability exists in the Gaussian 
format ori ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)
@@ -219628,6 +219649,7 @@ CVE-2022-3649 (A vulnerability was found in Linux 
Kernel. It has been classified
        NOTE: 
https://git.kernel.org/linus/d325dc6eb763c10f591c239550b8c7e5466a5d09
 CVE-2022-43607 (An out-of-bounds write vulnerability exists in the MOL2 format 
attribu ...)
        - openbabel <unfixed> (bug #1059277)
+       [trixie] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - openbabel <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - openbabel <no-dsa> (Minor issue)
        [buster] - openbabel <postponed> (Minor issue, no upstream patch yet)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b6aeea5c179f936b5b0d2442456710c89aa1b1c8...31a052fcff959d7bbe192fb98de3407329fba0f1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b6aeea5c179f936b5b0d2442456710c89aa1b1c8...31a052fcff959d7bbe192fb98de3407329fba0f1
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to