[Git][security-tracker-team/security-tracker][master] Add some additional reference for CVE-2022-4856{4,5}
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 54a44ecd by Salvatore Bonaccorso at 2023-08-25T06:23:28+02:00 Add some additional reference for CVE-2022-4856{4,5} - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -338,19 +338,25 @@ CVE-2022-48565 (An XML External Entity (XXE) issue was discovered in Python thro - python3.7 - python2.7 [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) + NOTE: https://bugs.python.org/issue42051 NOTE: https://github.com/python/cpython/issues/86217 NOTE: https://github.com/python/cpython/commit/05ee790f4d1cd8725a90b54268fc1dfe5b4d1fa2 (v3.10.0a2) - NOTE: https://github.com/python/cpython/commit/479553c7c11306a09ce34edb6ef208133b7b95fe (3.9) + NOTE: https://github.com/python/cpython/commit/479553c7c11306a09ce34edb6ef208133b7b95fe (v3.9.1rc1) + NOTE: https://github.com/python/cpython/commit/65894cac0835cb8f469f649e20aa1be8bf89f5ae (v3.8.7rc1) NOTE: https://github.com/python/cpython/commit/e512bc799e3864fe3b1351757261762d63471efc (v3.7.10) + NOTE: https://github.com/python/cpython/commit/a158fb9c5138db94adf24fbc5690467cda811163 (v3.6.13) CVE-2022-48564 (read_ints in plistlib.py in Python through 3.9.1 is vulnerable to a po ...) - python3.9 3.9.1~rc1-1 - python3.7 - python2.7 [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) + NOTE: https://bugs.python.org/issue42103 NOTE: https://github.com/python/cpython/issues/86269 NOTE: https://github.com/python/cpython/commit/34637a0ce21e7261b952fbd9d006474cc29b681f (v3.10.0a2) - NOTE: https://github.com/python/cpython/commit/e277cb76989958fdbc092bf0b2cb55c43e86610a (3.9) + NOTE: https://github.com/python/cpython/commit/e277cb76989958fdbc092bf0b2cb55c43e86610a (v3.9.1rc1) + NOTE: https://github.com/python/cpython/commit/547d2bcc55e348043b2f338027c1acd9549ada76 (v3.8.7rc1) NOTE: https://github.com/python/cpython/commit/225e3659556616ad70186e7efc02baeebfeb5ec4 (v3.7.10) + NOTE: https://github.com/python/cpython/commit/a63234c49b2fbfb6f0aca32525e525ce3d43b2b4 (v3.6.13) CVE-2022-48560 (A use-after-free exists in Python through 3.9 via heappushpop in heapq ...) - python3.9 (Fixed before initial upload to the archive) - python3.7 3.7.7-1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/54a44ecd31913fcc31e3f08969dff1ed89a7b81c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/54a44ecd31913fcc31e3f08969dff1ed89a7b81c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Update information on CVE-2022-48560
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: ed6fce39 by Salvatore Bonaccorso at 2023-08-25T06:18:10+02:00 Update information on CVE-2022-48560 - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -353,12 +353,15 @@ CVE-2022-48564 (read_ints in plistlib.py in Python through 3.9.1 is vulnerable t NOTE: https://github.com/python/cpython/commit/225e3659556616ad70186e7efc02baeebfeb5ec4 (v3.7.10) CVE-2022-48560 (A use-after-free exists in Python through 3.9 via heappushpop in heapq ...) - python3.9 (Fixed before initial upload to the archive) - - python3.7 + - python3.7 3.7.7-1 - python2.7 [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) + NOTE: https://bugs.python.org/issue39421 NOTE: https://github.com/python/cpython/issues/83602 NOTE: https://github.com/python/cpython/commit/79f89e6e5a659846d1068e8b1bd8e491ccdef861 (v3.9.0a3) + NOTE: https://github.com/python/cpython/commit/993811ffe75c2573f97fb3fd1414b34609b8c8db (v3.8.2rc1) NOTE: https://github.com/python/cpython/commit/958064f8d2b84062b0582bbae911df8ccfc11fd6 (v3.7.7rc1) + NOTE: https://github.com/python/cpython/commit/c563f409ea30bcb0623d785428c9257917371b76 (v3.6.11rc1) CVE-2022-48554 (File before 5.43 has an stack-based buffer over-read in file_copystr i ...) - file 1:5.44-1 NOTE: https://bugs.astron.com/view.php?id=310 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed6fce399c8311a5a60b47ac1c2d283f712ad960 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed6fce399c8311a5a60b47ac1c2d283f712ad960 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Update references for CVE-2022-48566
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 4752e740 by Salvatore Bonaccorso at 2023-08-25T06:14:10+02:00 Update references for CVE-2022-48566 - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -323,11 +323,15 @@ CVE-2022-48570 (Crypto++ through 8.4 contains a timing side channel in ECDSA sig NOTE: functionality reasons. TODO: check details on upstream fix (in 8.4?) CVE-2022-48566 (An issue was discovered in compare_digest in Lib/hmac.py in Python thr ...) - - python3.9 3.9.0~b4-1 + - python3.9 3.9.1~rc1-1 - python3.7 - python2.7 [bullseye] - python2.7 (Unsupported in Bullseye, only included to build a few applications) - NOTE: https://github.com/python/cpython/commit/8183e11d87388e4e44e3242c42085b87a878f781 + NOTE: https://bugs.python.org/issue40791 + NOTE: https://github.com/python/cpython/commit/8183e11d87388e4e44e3242c42085b87a878f781 (v3.9.0b2) + NOTE: https://github.com/python/cpython/commit/c1bbca5b004b3f74d240ef8a76ff445cc1a27efb (v3.9.1rc1) + NOTE: https://github.com/python/cpython/commit/db95802bdfac4d13db3e2a391ec7b9e2f8d92dbe (v3.7.10) + NOTE: https://github.com/python/cpython/commit/8bef9ebb1b88cfa4b2a38b93fe4ea22015d8254a (v3.6.13) NOTE: https://github.com/python/cpython/issues/84968 CVE-2022-48565 (An XML External Entity (XXE) issue was discovered in Python through 3. ...) - python3.9 3.9.1~rc1-1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4752e74074721769610f235cc1d637e8856793a4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4752e74074721769610f235cc1d637e8856793a4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2020-21896/mupdf
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 6c08bdcd by Salvatore Bonaccorso at 2023-08-24T23:22:17+02:00 Add CVE-2020-21896/mupdf - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -220135,7 +220135,9 @@ CVE-2020-21898 CVE-2020-21897 RESERVED CVE-2020-21896 (A Use After Free vulnerability in svg_dev_text_span_as_paths_defs func ...) - TODO: check + - mupdf 1.19.0+ds1-1 + NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=701294 + NOTE: https://git.ghostscript.com/?p=mupdf.git;h=8719e07834d6a72b6b4131539e49ed1e8e2ff79e CVE-2020-21895 RESERVED CVE-2020-21894 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6c08bdcd407a7aa80858ee858f3902044bd1aa03 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6c08bdcd407a7aa80858ee858f3902044bd1aa03 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2020-22219/flac
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 4e11d63d by Salvatore Bonaccorso at 2023-08-24T23:21:42+02:00 Add CVE-2020-22219/flac - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -219356,7 +219356,9 @@ CVE-2020-1 CVE-2020-0 RESERVED CVE-2020-22219 (Buffer Overflow vulnerability in function bitwriter_grow_ in flac befo ...) - TODO: check + - flac 1.4.1-1 + NOTE: https://github.com/xiph/flac/issues/215 + NOTE: https://github.com/xiph/flac/pull/419 (1.4.0) CVE-2020-22218 (An issue was discovered in function _libssh2_packet_add in libssh2 1.1 ...) TODO: check CVE-2020-22217 (Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4e11d63d76bfd04d4b5905926e0ad5e3e6c67a30 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4e11d63d76bfd04d4b5905926e0ad5e3e6c67a30 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Process two NFUs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 14245744 by Salvatore Bonaccorso at 2023-08-24T23:21:16+02:00 Process two NFUs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -215334,7 +215334,7 @@ CVE-2020-24115 (In projectworlds Online Book Store 1.0 Use of Hard-coded Credent CVE-2020-24114 RESERVED CVE-2020-24113 (Directory Traversal vulnerability in Contacts File Upload Interface in ...) - TODO: check + NOT-FOR-US: Yealink W60B CVE-2020-24112 RESERVED CVE-2020-24111 @@ -219432,7 +219432,7 @@ CVE-2020-22183 CVE-2020-22182 RESERVED CVE-2020-22181 (A reflected cross site scripting (XSS) vulnerability was discovered on ...) - TODO: check + NOT-FOR-US: Samsung CVE-2020-22180 RESERVED CVE-2020-22179 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1424574447d1389b72d17703e86bb6e1d94f2437 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1424574447d1389b72d17703e86bb6e1d94f2437 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Track some new "old' freeimage CVEs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 69ddffe3 by Salvatore Bonaccorso at 2023-08-24T23:20:39+02:00 Track some new old freeimage CVEs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -214945,13 +214945,17 @@ CVE-2020-24297 (httpd on TP-Link TL-WPA4220 devices (versions 2 through 4) allow CVE-2020-24296 RESERVED CVE-2020-24295 (Buffer Overflow vulnerability in PSDParser.cpp::ReadImageLine() in Fre ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24294 (Buffer Overflow vulnerability in psdParser::UnpackRLE function in PSDP ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24293 (Buffer Overflow vulnerability in psdThumbnail::Read in PSDParser.cpp i ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24292 (Buffer Overflow vulnerability in load function in PluginICO.cpp in Fre ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/ CVE-2020-24291 RESERVED CVE-2020-24290 @@ -218712,7 +218716,8 @@ CVE-2020-22526 CVE-2020-22525 RESERVED CVE-2020-22524 (Buffer Overflow vulnerability in FreeImage_Load function in FreeImage ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/319/ CVE-2020-22523 RESERVED CVE-2020-22522 @@ -221203,11 +221208,14 @@ CVE-2020-21430 CVE-2020-21429 RESERVED CVE-2020-21428 (Buffer Overflow vulnerability in function LoadRGB in PluginDDS.cpp in ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/299/ CVE-2020-21427 (Buffer Overflow vulnerability in function LoadPixelDataRLE8 in PluginB ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/298/ CVE-2020-21426 (Buffer Overflow vulnerability in function C_IStream::read in PluginEXR ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/300/ CVE-2020-21425 RESERVED CVE-2020-21424 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/69ddffe358884f09d5b49abceefb03635ea58fed -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/69ddffe358884f09d5b49abceefb03635ea58fed You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2020-26683/mupdf
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 676ddc20 by Salvatore Bonaccorso at 2023-08-24T23:19:47+02:00 Add CVE-2020-26683/mupdf - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -208968,7 +208968,9 @@ CVE-2020-26685 CVE-2020-26684 RESERVED CVE-2020-26683 (A memory leak issue discovered in /pdf/pdf-font-add.c in Artifex Softw ...) - TODO: check + - mupdf 1.19.0+ds1-1 + NOTE: https://bugs.ghostscript.com/show_bug.cgi?id=702566 + NOTE: https://git.ghostscript.com/?p=mupdf.git;h=05720b4ee3dbae57e65546dc2eecc3021c08eeea (1.18.0-rc1) CVE-2020-26682 (In libass 0.14.0, the `ass_outline_construct`'s call to `outline_strok ...) - libass 1:0.15.0-1 (bug #975108) [buster] - libass (Minor issue) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/676ddc20ecc190ecf33d3bdbe89d8f2365fc4b42 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/676ddc20ecc190ecf33d3bdbe89d8f2365fc4b42 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2021-32292/json-c
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 412798af by Salvatore Bonaccorso at 2023-08-24T22:50:56+02:00 Add CVE-2021-32292/json-c - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -162412,7 +162412,10 @@ CVE-2021-32294 (An issue was discovered in libgig through 20200507. A heap-buffe CVE-2021-32293 RESERVED CVE-2021-32292 (An issue was discovered in json-c through 0.15-20200726. A stack-buffe ...) - TODO: check + - json-c 0.16-1 + NOTE: https://github.com/json-c/json-c/issues/654 + NOTE: https://github.com/json-c/json-c/pull/655 + NOTE: https://github.com/json-c/json-c/commit/4e9e44e5258dee7654f74948b0dd5da39c28beec (json-c-0.16-20220414) CVE-2021-32291 RESERVED CVE-2021-32290 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/412798afc7dce7c6c370a024568d6cb7c8034c78 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/412798afc7dce7c6c370a024568d6cb7c8034c78 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] wireshark fixed in sid
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7810a9ef by Moritz Muehlenhoff at 2023-08-24T22:42:50+02:00 wireshark fixed in sid - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -76,15 +76,15 @@ CVE-2023- [tryton-server lack of record validation] [bullseye] - tryton-server 5.0.33-2+deb11u2 NOTE: https://discuss.tryton.org/t/security-release-for-issue-12428 CVE-2023-4513 (BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to ...) - - wireshark + - wireshark 4.0.8-1 NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19259 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-25.html CVE-2023-4512 (CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of serv ...) - - wireshark + - wireshark 4.0.8-1 NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19144 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-23.html CVE-2023-4511 (BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 t ...) - - wireshark + - wireshark 4.0.8-1 NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19258 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-24.html CVE-2023-4230 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7810a9ef63fd7fa2243cf31ac9814569a5af0c47 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7810a9ef63fd7fa2243cf31ac9814569a5af0c47 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2023-34040/kafka
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 37911160 by Salvatore Bonaccorso at 2023-08-24T22:36:37+02:00 Add CVE-2023-34040/kafka - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -61,7 +61,7 @@ CVE-2023-34972 (A cleartext transmission of sensitive information vulnerability CVE-2023-34971 (An inadequate encryption strength vulnerability has been reported to a ...) NOT-FOR-US: QNAP CVE-2023-34040 (In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and e ...) - TODO: check + - kafka (bug #786460) CVE-2023-32516 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFo ...) NOT-FOR-US: WordPress plugin CVE-2023-32511 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/37911160f44f23952684de850605ad3c1d8321bd -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/37911160f44f23952684de850605ad3c1d8321bd You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 76204cc3 by Salvatore Bonaccorso at 2023-08-24T22:34:47+02:00 Process some NFUs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -31,43 +31,43 @@ CVE-2023-40892 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to cont CVE-2023-40891 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) NOT-FOR-US: Tenda CVE-2023-40877 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...) - TODO: check + NOT-FOR-US: DedeCMS CVE-2023-40876 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...) - TODO: check + NOT-FOR-US: DedeCMS CVE-2023-40875 (DedeCMS up to and including 5.7.110 was discovered to contain multiple ...) - TODO: check + NOT-FOR-US: DedeCMS CVE-2023-40874 (DedeCMS up to and including 5.7.110 was discovered to contain multiple ...) - TODO: check + NOT-FOR-US: DedeCMS CVE-2023-40710 (An adversary could cause a continuous restart loop to the entire devic ...) - TODO: check + NOT-FOR-US: SNAP PAC S1 Firmware CVE-2023-40709 (An adversary could crash the entire device by sending a large quantity ...) - TODO: check + NOT-FOR-US: SNAP PAC S1 Firmware CVE-2023-40708 (The File Transfer Protocol (FTP) port is open by default in the SNAP P ...) - TODO: check + NOT-FOR-US: SNAP PAC S1 Firmware CVE-2023-40707 (There are no requirements for setting a complex password in the built- ...) - TODO: check + NOT-FOR-US: SNAP PAC S1 Firmware CVE-2023-40706 (There is no limit on the number of login attempts in the web server fo ...) - TODO: check + NOT-FOR-US: SNAP PAC S1 Firmware CVE-2023-40371 (IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non- ...) NOT-FOR-US: IBM CVE-2023-39834 (PbootCMS below v3.2.0 was discovered to contain a command injection vu ...) - TODO: check + NOT-FOR-US: PbootCMS CVE-2023-39801 (A lack of exception handling in the Renault Easy Link Multimedia Syste ...) - TODO: check + NOT-FOR-US: Renault Easy Link Multimedia System Software CVE-2023-34973 (An insufficient entropy vulnerability has been reported to affect QNAP ...) - TODO: check + NOT-FOR-US: QNAP CVE-2023-34972 (A cleartext transmission of sensitive information vulnerability has be ...) - TODO: check + NOT-FOR-US: QNAP CVE-2023-34971 (An inadequate encryption strength vulnerability has been reported to a ...) - TODO: check + NOT-FOR-US: QNAP CVE-2023-34040 (In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and e ...) TODO: check CVE-2023-32516 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFo ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32511 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32510 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-31412 (The LMS5xx uses weak hash generation methods, resulting in the creatio ...) TODO: check CVE-2023- [tryton-server lack of record validation] View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76204cc3fed803bc913c34864b00137e318fa81c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/76204cc3fed803bc913c34864b00137e318fa81c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Drop information on CVE-2023-38288 and CVE-2023-38289
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 4fe188bf by Salvatore Bonaccorso at 2023-08-24T22:25:06+02:00 Drop information on CVE-2023-38288 and CVE-2023-38289 RedHat as assigning CNA now rejected both with Rejected Reason: Not a Security Issue. which seems to contradict the discussion around https://bugzilla.redhat.com/show_bug.cgi?id=2224971#c8 . For now follow the CNA decision on the CVE rejection and why so there were not assigned two new CVEs. - - - - - 2 changed files: - data/CVE/list - data/DLA/list Changes: = data/CVE/list = @@ -4058,18 +4058,10 @@ CVE-2023-32232 (An issue was discovered in Vasion PrinterLogic Client for Window NOT-FOR-US: Vasion CVE-2023-32231 (An issue was discovered in Vasion PrinterLogic Client for Windows befo ...) NOT-FOR-US: Vasion -CVE-2023-38289 [libtiff: potential integer overflow in raw2tiff.c] +CVE-2023-38289 REJECTED - {DLA-3513-1} - - tiff 4.5.1+git230720-1 - NOTE: https://gitlab.com/libtiff/libtiff/-/issues/592 - NOTE: https://gitlab.com/libtiff/libtiff/-/commit/6e2dac5f904496d127c92ddc4e56eccfca25c2ee -CVE-2023-38288 [libtiff: integer overflow in tiffcp.c] +CVE-2023-38288 REJECTED - {DLA-3513-1} - - tiff 4.5.1+git230720-1 - NOTE: https://gitlab.com/libtiff/libtiff/-/commit/4fc16f649fa2875d5c388cf2edc295510a247ee5 - NOTE: https://gitlab.com/libtiff/libtiff/-/issues/591 CVE-2023-3870 REJECTED CVE-2023-3863 (A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp ...) = data/DLA/list = @@ -88,7 +88,7 @@ {CVE-2023-33201} [buster] - bouncycastle 1.60-1+deb10u1 [31 Jul 2023] DLA-3513-1 tiff - security update - {CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-25433 CVE-2023-26965 CVE-2023-26966 CVE-2023-38288 CVE-2023-38289} + {CVE-2023-2908 CVE-2023-3316 CVE-2023-3618 CVE-2023-25433 CVE-2023-26965 CVE-2023-26966} [buster] - tiff 4.1.0+git191117-2~deb10u8 [31 Jul 2023] DLA-3512-1 linux-5.10 - security update {CVE-2023-2156 CVE-2023-3390 CVE-2023-3610 CVE-2023-20593 CVE-2023-31248 CVE-2023-35001} View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4fe188bf632e84ccd8fd580b5fc3cba8e4caeeaa -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4fe188bf632e84ccd8fd580b5fc3cba8e4caeeaa You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Process some new NFUs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 6da2598a by Salvatore Bonaccorso at 2023-08-24T22:22:09+02:00 Process some new NFUs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -5,31 +5,31 @@ CVE-2023-4419 (The LMS5xx uses hard-coded credentials, which potentially allow l CVE-2023-4418 (A remote unprivileged attacker can sent multiple packages to the LMS5x ...) TODO: check CVE-2023-40904 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40902 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40901 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40900 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40899 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40898 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40897 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40896 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40895 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40894 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40893 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40892 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40891 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) - TODO: check + NOT-FOR-US: Tenda CVE-2023-40877 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...) TODO: check CVE-2023-40876 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...) @@ -49,7 +49,7 @@ CVE-2023-40707 (There are no requirements for setting a complex password in the CVE-2023-40706 (There is no limit on the number of login attempts in the web server fo ...) TODO: check CVE-2023-40371 (IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non- ...) - TODO: check + NOT-FOR-US: IBM CVE-2023-39834 (PbootCMS below v3.2.0 was discovered to contain a command injection vu ...) TODO: check CVE-2023-39801 (A lack of exception handling in the Renault Easy Link Multimedia Syste ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6da2598ab182683f1b34f6053df121b6ef2c2f68 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6da2598ab182683f1b34f6053df121b6ef2c2f68 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add new "old" set of dpic CVEs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: bdbdd451 by Salvatore Bonaccorso at 2023-08-24T22:17:16+02:00 Add new old set of dpic CVEs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -159521,7 +159521,9 @@ CVE-2021-33390 (dpic 2021.04.10 has a use-after-free in thedeletestringbox() fun CVE-2021-33389 RESERVED CVE-2021-33388 (dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() function in ...) - TODO: check + - dpic 2021.11.01-1 + NOTE: https://gitlab.com/aplevich/dpic/-/issues/8 + NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/32c26bb3996511662029c961f5e83fb696c087d4 CVE-2021-33387 (Cross Site Scripting Vulnerability in MiniCMS v.1.10 allows attacker t ...) NOT-FOR-US: MiniCMS CVE-2021-33386 @@ -162141,11 +162143,17 @@ CVE-2021-32424 (In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session CVE-2021-32423 RESERVED CVE-2021-32422 (dpic 2021.01.01 has a Global buffer overflow in theyylex() function in ...) - TODO: check + - dpic 2021.11.01-1 + NOTE: https://gitlab.com/aplevich/dpic/-/issues/6 + NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf CVE-2021-32421 (dpic 2021.01.01 has a Heap Use-After-Free in thedeletestringbox() func ...) - TODO: check + - dpic 2021.11.01-1 + NOTE: https://gitlab.com/aplevich/dpic/-/issues/7 + NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf CVE-2021-32420 (dpic 2021.01.01 has a Heap-based Buffer Overflow in thestorestring fun ...) - TODO: check + - dpic 2021.11.01-1 + NOTE: https://gitlab.com/aplevich/dpic/-/issues/5 + NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/d317e4066c17f9ceb359b3af13264c32f6fb43cf CVE-2021-32419 (An issue in Schism Tracker v20200412 fixed in v.20200412 allows attack ...) - schism 2:20210525-2 (unimportant) NOTE: https://github.com/schismtracker/schismtracker/issues/249 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bdbdd451fe52140336aec66177a46ac5b3540883 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bdbdd451fe52140336aec66177a46ac5b3540883 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: f512bb00 by security tracker role at 2023-08-24T20:12:07+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,3 +1,75 @@ +CVE-2023-4420 (A remote unprivileged attacker can intercept the communication via e.g ...) + TODO: check +CVE-2023-4419 (The LMS5xx uses hard-coded credentials, which potentially allow low-sk ...) + TODO: check +CVE-2023-4418 (A remote unprivileged attacker can sent multiple packages to the LMS5x ...) + TODO: check +CVE-2023-40904 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain ...) + TODO: check +CVE-2023-40902 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain ...) + TODO: check +CVE-2023-40901 (Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain ...) + TODO: check +CVE-2023-40900 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40899 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40898 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40897 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40896 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40895 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40894 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40893 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40892 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40891 (Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a ...) + TODO: check +CVE-2023-40877 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...) + TODO: check +CVE-2023-40876 (DedeCMS up to and including 5.7.110 was discovered to contain a cross- ...) + TODO: check +CVE-2023-40875 (DedeCMS up to and including 5.7.110 was discovered to contain multiple ...) + TODO: check +CVE-2023-40874 (DedeCMS up to and including 5.7.110 was discovered to contain multiple ...) + TODO: check +CVE-2023-40710 (An adversary could cause a continuous restart loop to the entire devic ...) + TODO: check +CVE-2023-40709 (An adversary could crash the entire device by sending a large quantity ...) + TODO: check +CVE-2023-40708 (The File Transfer Protocol (FTP) port is open by default in the SNAP P ...) + TODO: check +CVE-2023-40707 (There are no requirements for setting a complex password in the built- ...) + TODO: check +CVE-2023-40706 (There is no limit on the number of login attempts in the web server fo ...) + TODO: check +CVE-2023-40371 (IBM AIX 7.2, 7.3, VIOS 3.1's OpenSSH implementation could allow a non- ...) + TODO: check +CVE-2023-39834 (PbootCMS below v3.2.0 was discovered to contain a command injection vu ...) + TODO: check +CVE-2023-39801 (A lack of exception handling in the Renault Easy Link Multimedia Syste ...) + TODO: check +CVE-2023-34973 (An insufficient entropy vulnerability has been reported to affect QNAP ...) + TODO: check +CVE-2023-34972 (A cleartext transmission of sensitive information vulnerability has be ...) + TODO: check +CVE-2023-34971 (An inadequate encryption strength vulnerability has been reported to a ...) + TODO: check +CVE-2023-34040 (In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and e ...) + TODO: check +CVE-2023-32516 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFo ...) + TODO: check +CVE-2023-32511 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking ...) + TODO: check +CVE-2023-32510 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van ...) + TODO: check +CVE-2023-31412 (The LMS5xx uses weak hash generation methods, resulting in the creatio ...) + TODO: check CVE-2023- [tryton-server lack of record validation] - tryton-server 6.0.34-1 [bookworm] - tryton-server 6.0.29-2+deb12u1 @@ -3987,11 +4059,13 @@ CVE-2023-32232 (An issue was discovered in Vasion PrinterLogic Client for Window CVE-2023-32231 (An issue was discovered in Vasion PrinterLogic Client for Windows befo ...) NOT-FOR-US: Vasion CVE-2023-38289 [libtiff: potential integer overflow in raw2tiff.c] + REJECTED {DLA-3513-1} - tiff 4.5.1+git230720-1 NOTE:
[Git][security-tracker-team/security-tracker][master] Add CVE-2021-33390/dpic
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: a6f9c5c8 by Salvatore Bonaccorso at 2023-08-24T22:07:22+02:00 Add CVE-2021-33390/dpic - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -159440,7 +159440,9 @@ CVE-2021-33391 (An issue in HTACG HTML Tidy v5.7.28 allows attacker to execute a NOTE: https://github.com/htacg/tidy-html5/issues/946 NOTE: https://github.com/htacg/tidy-html5/commit/efa61528aa500a1efbd2768121820742d3bb709b CVE-2021-33390 (dpic 2021.04.10 has a use-after-free in thedeletestringbox() function ...) - TODO: check + - dpic 2021.11.01-1 + NOTE: https://gitlab.com/aplevich/dpic/-/issues/10 + NOTE: Fixed by: https://gitlab.com/aplevich/dpic/-/commit/32c26bb3996511662029c961f5e83fb696c087d4 CVE-2021-33389 RESERVED CVE-2021-33388 (dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() function in ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a6f9c5c8f12ef8cf996fbd07f9157ad2cd811e31 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a6f9c5c8f12ef8cf996fbd07f9157ad2cd811e31 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2021-34193/opensc
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 9cff0514 by Salvatore Bonaccorso at 2023-08-24T21:50:46+02:00 Add CVE-2021-34193/opensc - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -157343,7 +157343,32 @@ CVE-2021-34195 CVE-2021-34194 RESERVED CVE-2021-34193 (Stack overflow vulnerability in OpenSC smart card middleware before 0. ...) - TODO: check + - opensc 0.22.0-1 + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185 + NOTE: https://github.com/OpenSC/OpenSC/commit/f015746d22d249642c19674298a18ad824db0ed7 (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843 + NOTE: https://github.com/OpenSC/OpenSC/commit/1db88374bb7706a115d5c3617c6f16115c33bf27 (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383 + NOTE: https://github.com/OpenSC/OpenSC/commit/5df913b7f57ad89b9832555d24c08d23a534311e (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27719 + NOTE: https://github.com/OpenSC/OpenSC/commit/78cdab949f098ad7e593d853229fccf57d749d0c (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28768 + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28855 + NOTE: https://github.com/OpenSC/OpenSC/commit/7114fb71b54ddfe06ce5dfdab013f4c38f129d14 (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29912 + NOTE: https://github.com/OpenSC/OpenSC/commit/1252aca9f10771ef5ba8405e73cf2da50827958f (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30112 + NOTE: https://github.com/OpenSC/OpenSC/commit/17d8980cde7be597afc366b7e311d0d7cadcb1f4 (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30800 + NOTE: https://github.com/OpenSC/OpenSC/commit/ae1cf0be90396fb6c0be95829bf0d3eecbd2fd1c (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31448 + NOTE: https://github.com/OpenSC/OpenSC/commit/40c50a3a4219308aae90f6efd7b10213794a8d86 (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31540 + NOTE: https://github.com/OpenSC/OpenSC/commit/40c50a3a4219308aae90f6efd7b10213794a8d86 (0.22.0-rc1) + NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32149 + NOTE: https://github.com/OpenSC/OpenSC/commit/05648b0604bf3e498e8d42dff3c6e7c56a5bf749 (0.22.0-rc1) + NOTE: https://github.com/OpenSC/OpenSC/commit/715c17c469f6c463dd511a5deb229da4de9ee100 (0.22.0-rc1) + NOTE: https://github.com/OpenSC/OpenSC/issues/2841 CVE-2021-34192 RESERVED CVE-2021-34191 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9cff0514696ddec14762aa9e526a23d2371d4de8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9cff0514696ddec14762aa9e526a23d2371d4de8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2021-40211/imagemagick
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: a2ad0319 by Salvatore Bonaccorso at 2023-08-24T21:37:51+02:00 Add CVE-2021-40211/imagemagick - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -142425,7 +142425,11 @@ CVE-2021-40213 CVE-2021-40212 (An exploitable out-of-bounds write vulnerability in PotPlayer 1.7.2152 ...) NOT-FOR-US: PotPlayer CVE-2021-40211 (An issue was discovered with ImageMagick 7.1.0-4 via Division by zero ...) - TODO: check + - imagemagick 8:6.9.11.60+dfsg-1.5 + NOTE: https://github.com/ImageMagick/ImageMagick/issues/4097 + NOTE: https://github.com/ImageMagick/ImageMagick/commit/0fb77f2a231038efdc38dcceddae6952ebdfb000 (7.1.0-5) + NOTE: https://github.com/ImageMagick/ImageMagick6/commit/450949ed017f009b399c937cf362f0058eacc5fa#diff-9509dd2616f8c0aab419100d616e5e926099cc61bdfde60f2ae408f02f43472a (6.9.12-43) + NOTE: Included in fix for CVE-2022-32545 in 8:6.9.11.60+dfsg-1.5 CVE-2021-40210 RESERVED CVE-2021-40209 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a2ad0319135efeeb6dfc31aeb1ab3e588f70f5ea -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a2ad0319135efeeb6dfc31aeb1ab3e588f70f5ea You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Update information for CVE-2022-41444/cacti
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 159a99a7 by Salvatore Bonaccorso at 2023-08-24T21:26:21+02:00 Update information for CVE-2022-41444/cacti - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -64992,9 +64992,9 @@ CVE-2022-41446 (An access control issue in /Admin/dashboard.php of Record Manage CVE-2022-41445 (A cross-site scripting (XSS) vulnerability in Record Management System ...) NOT-FOR-US: Record Management System CVE-2022-41444 (Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted P ...) - - cacti + - cacti 1.2.22+ds1-1 NOTE: https://gist.github.com/enferas/9079535112e4f4ff2c1d2ce1c099d4c2 - TODO: check, upstream report (according to reporter vulnerability confirmed around 2022-06-18) + NOTE: Fixed by: https://github.com/Cacti/cacti/commit/ccb8b62de0f27f59d5e6073c2ae577a9ca7adaf8 (release/1.2.22) CVE-2022-41443 (phpipam v1.5.0 was discovered to contain a header injection vulnerabil ...) - phpipam (bug #731713) CVE-2022-41442 (PicUploader v2.6.3 was discovered to contain cross-site scripting (XSS ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/159a99a732dc92ef1172f7b243cf67cdc20f6258 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/159a99a732dc92ef1172f7b243cf67cdc20f6258 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2022-41444/cacti
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: e3926036 by Salvatore Bonaccorso at 2023-08-24T21:21:36+02:00 Add CVE-2022-41444/cacti - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -64992,7 +64992,9 @@ CVE-2022-41446 (An access control issue in /Admin/dashboard.php of Record Manage CVE-2022-41445 (A cross-site scripting (XSS) vulnerability in Record Management System ...) NOT-FOR-US: Record Management System CVE-2022-41444 (Cross Site Scripting (XSS) vulnerability in Cacti 1.2.21 via crafted P ...) - TODO: check + - cacti + NOTE: https://gist.github.com/enferas/9079535112e4f4ff2c1d2ce1c099d4c2 + TODO: check, upstream report (according to reporter vulnerability confirmed around 2022-06-18) CVE-2022-41443 (phpipam v1.5.0 was discovered to contain a header injection vulnerabil ...) - phpipam (bug #731713) CVE-2022-41442 (PicUploader v2.6.3 was discovered to contain cross-site scripting (XSS ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e392603624eb9f0aa7594edcbf14d5e45e30be51 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e392603624eb9f0aa7594edcbf14d5e45e30be51 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] track tryton fix in sid
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ae122570 by Moritz Mühlenhoff at 2023-08-24T21:08:11+02:00 track tryton fix in sid - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,3 +1,8 @@ +CVE-2023- [tryton-server lack of record validation] + - tryton-server 6.0.34-1 + [bookworm] - tryton-server 6.0.29-2+deb12u1 + [bullseye] - tryton-server 5.0.33-2+deb11u2 + NOTE: https://discuss.tryton.org/t/security-release-for-issue-12428 CVE-2023-4513 (BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to ...) - wireshark NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19259 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae1225700ef928920a2699e220a6c7fbcddc3617 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae1225700ef928920a2699e220a6c7fbcddc3617 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] tryton-server DSA
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f84c4581 by Moritz Mühlenhoff at 2023-08-24T21:04:04+02:00 tryton-server DSA - - - - - 1 changed file: - data/DSA/list Changes: = data/DSA/list = @@ -1,3 +1,6 @@ +[24 Aug 2023] DSA-5482-1 tryton-server - security update + [bullseye] - tryton-server 5.0.33-2+deb11u2 + [bookworm] - tryton-server 6.0.29-2+deb12u1 [20 Aug 2023] DSA-5481-1 fastdds - security update {CVE-2023-39534 CVE-2023-39945 CVE-2023-39946 CVE-2023-39947 CVE-2023-39948 CVE-2023-39949} [bullseye] - fastdds 2.1.0+ds-9+deb11u1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f84c4581ac0c9ea5ed9d040e0b51a2bf0ef61376 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f84c4581ac0c9ea5ed9d040e0b51a2bf0ef61376 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add new (old) freeimage CVEs (yet with open upstream issue)
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: c95f60d1 by Salvatore Bonaccorso at 2023-08-24T20:29:27+02:00 Add new (old) freeimage CVEs (yet with open upstream issue) Note that the version in the CVE is incorrect, it should be 3.18.0 instead. - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -142299,15 +142299,20 @@ CVE-2021-40268 CVE-2021-40267 RESERVED CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vul ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/334/ CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/337/ CVE-2021-40264 (NULL pointer dereference vulnerability in FreeImage before 1.18.0 via ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/335/ CVE-2021-40263 (A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad funct ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/336/ CVE-2021-40262 (A stack exhaustion issue was discovered in FreeImage before 1.18.0 via ...) - TODO: check + - freeimage + NOTE: https://sourceforge.net/p/freeimage/bugs/338/ CVE-2021-40261 (Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCod ...) NOT-FOR-US: SourceCodester CVE-2021-40260 (Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCod ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c95f60d1cd0f03d7df3f33becab99c3ce31a4da0 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c95f60d1cd0f03d7df3f33becab99c3ce31a4da0 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Adjust notes for two older binutils CVEs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 557873f8 by Salvatore Bonaccorso at 2023-08-24T18:06:15+02:00 Adjust notes for two older binutils CVEs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -195128,11 +195128,12 @@ CVE-2020-35494 (There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who - binutils 2.33.50.20200107-1 (unimportant) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=25319 NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2c5b6e1a1c406cbe06e2d6f77861764ebd01b9ce + NOTE: binutils not covered by security support CVE-2020-35493 (A flaw exists in binutils in bfd/pef.c. An attacker who is able to sub ...) - binutils 2.33.50.20200107-1 (unimportant) NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=25307 NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f2a3559d54602cecfec6d90f792be4a70ad918ab - NOTE: NOTE: binutils not covered by security support + NOTE: binutils not covered by security support CVE-2020-35492 (A flaw was found in cairo's image-compositor.c in all versions prior t ...) {DLA-2518-1} - cairo 1.16.0-5 (bug #978658) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/557873f8515a380c06c9dcf1a8cbdc2268f1fd3f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/557873f8515a380c06c9dcf1a8cbdc2268f1fd3f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2020-35342/binutils
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 713d9663 by Salvatore Bonaccorso at 2023-08-24T18:05:28+02:00 Add CVE-2020-35342/binutils - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -195629,7 +195629,10 @@ CVE-2020-35344 CVE-2020-35343 RESERVED CVE-2020-35342 (GNU Binutils before 2.34 has an uninitialized-heap vulnerability in fu ...) - TODO: check + - binutils 2.33.50.20200107-1 (unimportant) + NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=25319 + NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2c5b6e1a1c406cbe06e2d6f77861764ebd01b9ce + NOTE: binutils not covered by security support CVE-2020-35341 RESERVED CVE-2020-35340 (A local file inclusion vulnerability in ExpertPDF 9.5.0 through 14.1.0 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/713d96631036959959a65f974ba05ace4432d961 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/713d96631036959959a65f974ba05ace4432d961 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2021-46174/binutils
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 578276a2 by Salvatore Bonaccorso at 2023-08-24T17:54:38+02:00 Add CVE-2021-46174/binutils - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -119404,7 +119404,10 @@ CVE-2021-46176 CVE-2021-46175 RESERVED CVE-2021-46174 (Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump ...) - TODO: check + - binutils 2.37.90.20220207-1 (unimportant) + NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=28753 + NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cad4d6b91e97b6962807d33c04ed7e7797788438 (binutils-2_38) + NOTE: binutils not covered by security support CVE-2021-46173 RESERVED CVE-2021-46172 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/578276a22cafa61f1e7ff3d29ebbeb34a2631156 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/578276a22cafa61f1e7ff3d29ebbeb34a2631156 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2021-46179/upx-ucl
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 6aab269f by Salvatore Bonaccorso at 2023-08-24T17:53:13+02:00 Add CVE-2021-46179/upx-ucl - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -119389,7 +119389,12 @@ CVE-2021-46181 CVE-2021-46180 RESERVED CVE-2021-46179 (Reachable Assertion vulnerability in upx before 4.0.0 allows attackers ...) - TODO: check + - upx-ucl + NOTE: https://github.com/upx/upx/issues/545 + NOTE: https://github.com/upx/upx/commit/4a9c46253e308d60b550e9f529e7d37daf978be5 (v3.99) + NOTE: https://github.com/upx/upx/commit/2d6987252ef4cec9b9051e3e161977ab88b67aac (v3.99) + NOTE: https://github.com/upx/upx/commit/fcdf0e92c1a2d89188ec7b50fb9b40ef51362560 (v3.99) + NOTE: https://github.com/upx/upx/commit/be23f93ee6853a688fb9a920c9ee5222aa212303 (v3.99) CVE-2021-46178 RESERVED CVE-2021-46177 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6aab269fddf9150f59c0e66d5bd4d4efaf0858c5 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6aab269fddf9150f59c0e66d5bd4d4efaf0858c5 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add two new CVEs for djvulibre
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 27721ef6 by Salvatore Bonaccorso at 2023-08-24T17:52:36+02:00 Add two new CVEs for djvulibre - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -117602,7 +117602,8 @@ CVE-2021-46313 (The binary MP4Box in GPAC v1.0.1 was discovered to contain a seg NOTE: https://github.com/gpac/gpac/issues/2039 NOTE: https://github.com/gpac/gpac/commit/ee969d3c4c425ecb25999eb68ada616925b58eba (v2.0.0) CVE-2021-46312 (An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in all ...) - TODO: check + - djvulibre + NOTE: https://sourceforge.net/p/djvu/bugs/344/ CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the ...) - gpac 2.0.0+dfsg1-2 [bullseye] - gpac (Minor issue) @@ -117611,7 +117612,8 @@ CVE-2021-46311 (A NULL pointer dereference vulnerability exists in GPAC v1.1.0 v NOTE: https://github.com/gpac/gpac/issues/2038 NOTE: https://github.com/gpac/gpac/commit/ad19e0c4504a89ca273442b1b1483ae7adfb9491 (v2.0.0) CVE-2021-46310 (An issue was discovered IW44Image.cpp in djvulibre 3.5.28 in allows at ...) - TODO: check + - djvulibre + NOTE: https://sourceforge.net/p/djvu/bugs/345/ CVE-2021-46309 (An SQL Injection vulnerability exists in Sourcecodester Employee and V ...) NOT-FOR-US: Sourcecodester CVE-2021-46308 (An SQL Injection vulnerability exists in Sourcecodester Online Railway ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/27721ef6f454a92a9ebcb52f28711dc5239a94b6 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/27721ef6f454a92a9ebcb52f28711dc5239a94b6 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2022-26592/libsass
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 4078d5c7 by Salvatore Bonaccorso at 2023-08-24T17:51:54+02:00 Add CVE-2022-26592/libsass - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -106742,7 +106742,8 @@ CVE-2022-26594 (Multiple cross-site scripting (XSS) vulnerabilities in Liferay P CVE-2022-26593 (Cross-site scripting (XSS) vulnerability in the Asset module's asset c ...) NOT-FOR-US: Liferay CVE-2022-26592 (Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector ...) - TODO: check + - libsass + NOTE: https://github.com/sass/libsass/issues/3174 CVE-2022-26591 (FANTEC GmbH MWiD25-DS Firmware v2.000.030 allows unauthenticated attac ...) NOT-FOR-US: FANTEC GmbH MWiD25-DS Firmware CVE-2022-26590 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4078d5c73e4309ca4f1b28907cdedde288ea8870 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4078d5c73e4309ca4f1b28907cdedde288ea8870 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add new CVEs for radare2
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 33622399 by Salvatore Bonaccorso at 2023-08-24T17:21:53+02:00 Add new CVEs for radare2 - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -102557,17 +102557,23 @@ CVE-2022-28075 CVE-2022-28074 (Halo-1.5.0 was discovered to contain a stored cross-site scripting (XS ...) NOT-FOR-US: Halo CVE-2022-28073 (A use after free in r_reg_set_value function in radare2 5.4.2 and 5.4. ...) - TODO: check + - radare2 5.5.0+dfsg-1 + NOTE: https://github.com/radareorg/radare2/commit/59a9dfb60acf8b5c0312061cffd9693fc9526053 (5.5.0) CVE-2022-28072 (A heap buffer overflow in r_read_le32 function in radare25.4.2 and 5.4 ...) - TODO: check + - radare2 5.5.0+dfsg-1 + NOTE: https://github.com/radareorg/radare2/commit/027cd9b7274988bb1af866539ba6c2fa2ff63e45 (5.5.0) CVE-2022-28071 (A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5 ...) - TODO: check + - radare2 5.5.0+dfsg-1 + NOTE: https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5 (5.5.0) CVE-2022-28070 (A null pointer deference in __core_anal_fcn function in radare2 5.4.2 ...) - TODO: check + - radare2 5.5.0+dfsg-1 + NOTE: https://github.com/radareorg/radare2/commit/4aff1bb00224de4f5bc118f987dfd5d2fe3450d0 (5.5.0) CVE-2022-28069 (A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0.) - TODO: check + - radare2 5.5.0+dfsg-1 + NOTE: https://github.com/radareorg/radare2/commit/49b0cebfdf0db9704e36f8a5533f1df6d3e2ed3a (5.5.0) CVE-2022-28068 (A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4. ...) - TODO: check + - radare2 5.5.0+dfsg-1 + NOTE: https://github.com/radareorg/radare2/commit/637f4bd1af6752e28e0a9998e954e2e9ce6fa992 (5.5.0) CVE-2022-28067 (An incorrect access control issue in Sandboxie Classic v5.55.13 allows ...) NOT-FOR-US: Sandboxie Classic CVE-2022-28066 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/33622399f0968584788129122c2c5d1a9c32cc1c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/33622399f0968584788129122c2c5d1a9c32cc1c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2022-43357/libsass
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: cb8b9d6f by Salvatore Bonaccorso at 2023-08-24T17:21:22+02:00 Add CVE-2022-43357/libsass - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -59591,7 +59591,8 @@ CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function S [bullseye] - libsass (Minor issue) NOTE: https://github.com/sass/libsass/issues/3178 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function Sass::Co ...) - TODO: check + - libsass + NOTE: https://github.com/sass/libsass/issues/3177 CVE-2022-43356 RESERVED CVE-2022-43355 (Sanitization Management System v1.0 was discovered to contain a SQL in ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb8b9d6fdfd7a81750340c304ba9081f94a4f03f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb8b9d6fdfd7a81750340c304ba9081f94a4f03f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 413877b1 by Salvatore Bonaccorso at 2023-08-24T17:20:46+02:00 Process some NFUs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -63,7 +63,7 @@ CVE-2023-3453 (ETIC Telecom RAS versions 4.7.0 and prior the web management port CVE-2023-39583 REJECTED CVE-2023-39441 (Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provide ...) - TODO: check + NOT-FOR-US: Apache Airflow SMTP Provider CVE-2023-38831 (RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code ...) TODO: check CVE-2023-38422 (Walchem Intuition 9 firmware versions prior to v4.21 are missing authe ...) @@ -19868,7 +19868,7 @@ CVE-2023-28996 CVE-2023-28995 (Cross-Site Request Forgery (CSRF) vulnerability in Keith Solomon Confi ...) NOT-FOR-US: WordPress plugin CVE-2023-28994 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in UX-theme ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-28993 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio ...) NOT-FOR-US: WordPress plugin CVE-2023-28992 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Elliot S ...) @@ -55901,15 +55901,15 @@ CVE-2022-3748 (Improper Authorization vulnerability in ForgeRock Inc. Access Man CVE-2022-3747 (The Becustom plugin for WordPress is vulnerable to Cross-Site Request ...) NOT-FOR-US: Becustom plugin for WordPress CVE-2022-3746 (A potential vulnerability was discovered in LCFC BIOS for some Lenovo ...) - TODO: check + NOT-FOR-US: Lenovo CVE-2022-3745 (A potential vulnerability was discovered in LCFC BIOS for some Lenovo ...) - TODO: check + NOT-FOR-US: Lenovo CVE-2022-3744 (A potential vulnerability was discovered in LCFC BIOS for some Lenovo ...) - TODO: check + NOT-FOR-US: Lenovo CVE-2022-3743 (A potential vulnerability was discovered in LCFC BIOS for some Lenovo ...) - TODO: check + NOT-FOR-US: Lenovo CVE-2022-3742 (A potential vulnerability was discovered in LCFC BIOS for some Lenovo ...) - TODO: check + NOT-FOR-US: Lenovo CVE-2022-3741 (Impact varies for each individual vulnerability in the application. Fo ...) NOT-FOR-US: chatwoot CVE-2022-3740 (An issue has been discovered in GitLab CE/EE affecting all versions st ...) @@ -57250,7 +57250,7 @@ CVE-2023-20236 CVE-2023-20235 RESERVED CVE-2023-20234 (A vulnerability in the CLI of Cisco FXOS Software could allow an authe ...) - TODO: check + NOT-FOR-US: Cisco FXOS Software CVE-2023-20233 RESERVED CVE-2023-20232 (A vulnerability in the Tomcat implementation for Cisco Unified Contact ...) @@ -57258,7 +57258,7 @@ CVE-2023-20232 (A vulnerability in the Tomcat implementation for Cisco Unified C CVE-2023-20231 RESERVED CVE-2023-20230 (A vulnerability in the restricted security domain implementation of Ci ...) - TODO: check + NOT-FOR-US: Cisco CVE-2023-20229 (A vulnerability in the CryptoService function of Cisco Duo Device Heal ...) NOT-FOR-US: Cisco CVE-2023-20228 (A vulnerability in the web-based management interface of Cisco Integra ...) @@ -57321,7 +57321,7 @@ CVE-2023-20202 CVE-2023-20201 (Multiple vulnerabilities in the web-based management interface of Cisc ...) NOT-FOR-US: Cisco CVE-2023-20200 (A vulnerability in the Simple Network Management Protocol (SNMP) servi ...) - TODO: check + NOT-FOR-US: Cisco CVE-2023-20199 (A vulnerability in Cisco Duo Two-Factor Authentication for macOS could ...) NOT-FOR-US: Cisco CVE-2023-20198 @@ -57386,9 +57386,9 @@ CVE-2023-20171 (Multiple vulnerabilities in Cisco Identity Services Engine (ISE) CVE-2023-20170 RESERVED CVE-2023-20169 (A vulnerability in the Intermediate System-to-Intermediate System (IS- ...) - TODO: check + NOT-FOR-US: Cisco CVE-2023-20168 (A vulnerability in TACACS+ and RADIUS remote authentication for Cisco ...) - TODO: check + NOT-FOR-US: Cisco CVE-2023-20167 (Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could ...) NOT-FOR-US: Cisco CVE-2023-20166 (Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could ...) @@ -57494,7 +57494,7 @@ CVE-2023-20117 (Multiple vulnerabilities in the web-based management interface o CVE-2023-20116 (A vulnerability in the Administrative XML Web Service (AXL) API of Cis ...) NOT-FOR-US: Cisco CVE-2023-20115 (A vulnerability in the SFTP server implementation for Cisco Nexus 3000 ...) - TODO: check + NOT-FOR-US: Cisco CVE-2023-20114 RESERVED CVE-2023-20113 (A vulnerability in the web-based management interface of Cisco SD-WAN ...) View it on GitLab:
[Git][security-tracker-team/security-tracker][master] Add two new CVEs for airflow, itp'ed
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: ef9f1fa0 by Salvatore Bonaccorso at 2023-08-24T17:19:50+02:00 Add two new CVEs for airflow, itped - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -39,7 +39,7 @@ CVE-2023-40573 (XWiki Platform is a generic wiki platform offering runtime servi CVE-2023-40572 (XWiki Platform is a generic wiki platform offering runtime services fo ...) NOT-FOR-US: XWiki CVE-2023-40273 (The session fixation vulnerability allowed the authenticated user to c ...) - TODO: check + - airflow (bug #819700) CVE-2023-40270 REJECTED CVE-2023-40185 (shescape is simple shell escape library for JavaScript. This may impac ...) @@ -69,7 +69,7 @@ CVE-2023-38831 (RARLabs WinRAR before 6.23 allows attackers to execute arbitrary CVE-2023-38422 (Walchem Intuition 9 firmware versions prior to v4.21 are missing authe ...) NOT-FOR-US: Walchem Intuition 9 firmware CVE-2023-37379 (Apache Airflow, in versions prior to 2.7.0, contains a security vulner ...) - TODO: check + - airflow (bug #819700) CVE-2023-36317 (Cross Site Scripting (XSS) vulnerability in sourcecodester Student Stu ...) NOT-FOR-US: sourcecodester Student Study Center Desk Management System CVE-2023-32509 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef9f1fa0156a83957b9e27dccd0b626ab12f1046 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ef9f1fa0156a83957b9e27dccd0b626ab12f1046 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2023-4042/ghostscript
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: e9ff01bb by Salvatore Bonaccorso at 2023-08-24T17:09:24+02:00 Add CVE-2023-4042/ghostscript - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -19,7 +19,7 @@ CVE-2023-4228 (A vulnerability has been identified in ioLogik 4000 Series (ioLog CVE-2023-4227 (A vulnerability has been identified in the ioLogik 4000 Series (ioLogi ...) NOT-FOR-US: Moxa CVE-2023-4042 (A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostsc ...) - TODO: check + - ghostscript (Red Hat specific packaging issue not including fix for CVE-2020-16305) CVE-2023-41126 REJECTED CVE-2023-41125 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e9ff01bb86faac8c673335c49a0f5f562319aa3f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e9ff01bb86faac8c673335c49a0f5f562319aa3f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Mark CVE-2022-29654/nasm as no-dsa
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: dd6249dc by Salvatore Bonaccorso at 2023-08-24T17:06:48+02:00 Mark CVE-2022-29654/nasm as no-dsa - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -97718,6 +97718,7 @@ CVE-2022-29655 (An arbitrary file upload vulnerability in the Upload Photos modu NOT-FOR-US: Wedding Management System CVE-2022-29654 (Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm ...) - nasm 2.16.01-1 + [bullseye] - nasm (Minor issue) NOTE: https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f CVE-2022-29653 (OFCMS v1.1.4 was discovered to contain a cross-site scripting (XSS) vu ...) NOT-FOR-US: OFCMS View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dd6249dcadbf3f8dc0888413b0bc379f163bb955 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/dd6249dcadbf3f8dc0888413b0bc379f163bb955 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] batik fixed in sid
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e476572e by Moritz Muehlenhoff at 2023-08-24T16:14:08+02:00 batik fixed in sid - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -52924,11 +52924,11 @@ CVE-2022-44748 (A directory traversal vulnerability in the ZIP archive extractio CVE-2022-44731 (A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All ver ...) NOT-FOR-US: Siemens CVE-2022-44730 (Server-Side Request Forgery (SSRF) vulnerability in Apache Software Fo ...) - - batik + - batik 1.17+dfsg-1 NOTE: https://www.openwall.com/lists/oss-security/2023/08/22/3 NOTE: https://issues.apache.org/jira/browse/BATIK-1347 CVE-2022-44729 (Server-Side Request Forgery (SSRF) vulnerability in Apache Software Fo ...) - - batik + - batik 1.17+dfsg-1 NOTE: https://www.openwall.com/lists/oss-security/2023/08/22/2 NOTE: https://issues.apache.org/jira/browse/BATIK-1349 CVE-2022-44728 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e476572edf59ef370a290ca532635cd5a9e963fb -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e476572edf59ef370a290ca532635cd5a9e963fb You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Reserve DLA-3541-1 for w3m
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker Commits: 24816548 by Sylvain Beucler at 2023-08-24T13:42:17+02:00 Reserve DLA-3541-1 for w3m - - - - - 3 changed files: - data/CVE/list - data/DLA/list - data/dla-needed.txt Changes: = data/CVE/list = @@ -73652,7 +73652,6 @@ CVE-2022-38224 CVE-2022-38223 (There is an out-of-bounds write in checkType located in etc.c in w3m 0 ...) - w3m 0.5.3+git20230121-1 (bug #1019599) [bullseye] - w3m 0.5.3+git20210102-6+deb11u1 - [buster] - w3m (Minor issue) NOTE: https://github.com/tats/w3m/issues/242 NOTE: Initial fix: https://github.com/tats/w3m/commit/419ca82d57c72242817b55e2eaa4cdbf6916e7fa NOTE: Follow-up fix: https://github.com/tats/w3m/commit/25fb402cea405b263466c627f32513d186a38ade = data/DLA/list = @@ -1,3 +1,6 @@ +[24 Aug 2023] DLA-3541-1 w3m - security update + {CVE-2022-38223} + [buster] - w3m 0.5.3-37+deb10u1 [23 Aug 2023] DLA-3540-1 mediawiki - security update {CVE-2023-29141} [buster] - mediawiki 1:1.31.16-1+deb10u6 = data/dla-needed.txt = @@ -221,9 +221,3 @@ suricata (Adrian Bunk) NOTE: 20230714: Still reviewing+testing CVEs. (bunk) NOTE: 20230731: Still reviewing+testing CVEs. (bunk) -- -w3m (Sylvain Beucler) - NOTE: 20230812: Added by Front-Desk (Beuc) - NOTE: 20230812: Experimental issue-based workflow: please self-assign and follow https://salsa.debian.org/lts-team/lts-updates-tasks/-/issues/42 - NOTE: 20230812: Follow fixes from bullseye 11.7 (1 CVE) (Beuc/front-desk) - NOTE: 20230819: No ASAN errors with the PoCs, but the backported fixes do bring some (!), more testing needed. (Beuc) --- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24816548dd2b4d229941c70685e219675f1a742c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/24816548dd2b4d229941c70685e219675f1a742c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] rust-rustls-webpki fixed in sid
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ac43f235 by Moritz Muehlenhoff at 2023-08-24T11:37:11+02:00 rust-rustls-webpki fixed in sid - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -306,7 +306,7 @@ CVE-2022-48522 (In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-b NOTE: https://github.com/Perl/perl5/issues/19147 NOTE: Fixed by: https://github.com/Perl/perl5/commit/23cca2d1f4544cb47f1124d98c308ce1f31f09a6 (v5.35.5) CVE-2023- [RUSTSEC-2023-0053: rustls-webpki: CPU denial of service in certificate path building] - - rust-rustls-webpki (bug #1050298) + - rust-rustls-webpki 0.104.4-1 (bug #1050298) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0053.html NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023- [RUSTSEC-2023-0052 webpki: CPU denial of service in certificate path building] View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac43f235f710eef8c3fa002c7e2d863b61a3cd57 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ac43f235f710eef8c3fa002c7e2d863b61a3cd57 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 295a6867 by Moritz Muehlenhoff at 2023-08-24T10:58:32+02:00 bullseye/bookworm triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -113,6 +113,7 @@ CVE-2023-4041 (Buffer Copy without Checking Size of Input ('Classic Buffer Overf CVE-2023-41105 (An issue was discovered in Python 3.11 through 3.11.4. If a path conta ...) - python3.12 - python3.11 + [bookworm] - python3.11 (Minor issue) - python3.10 (Vulnerable code introduced in 3.11.y) - python3.9 (Vulnerable code introduced in 3.11.y) - python3.7 (Vulnerable code introduced in 3.11.y) @@ -238,6 +239,8 @@ CVE-2022-48571 (memcached 1.6.7 allows a Denial of Service via multi-packet uplo NOTE: Fixed by: https://github.com/memcached/memcached/commit/6b319c8c7a29e9c353dec83dc92f01905f6c8966 (1.6.8) CVE-2022-48570 (Crypto++ through 8.4 contains a timing side channel in ECDSA signature ...) - libcrypto++ + [bookworm] - libcrypto++ (Minor issue) + [bullseye] - libcrypto++ (Minor issue) NOTE: https://github.com/weidai11/cryptopp/issues/992 NOTE: This issue exists because the CVE-2019-14318 fix was intentionally removed for NOTE: functionality reasons. @@ -308,6 +311,7 @@ CVE-2023- [RUSTSEC-2023-0053: rustls-webpki: CPU denial of service in certif NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023- [RUSTSEC-2023-0052 webpki: CPU denial of service in certificate path building] - rust-webpki (bug #1050299) + [bookworm] - rust-webpki (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0052.html NOTE: https://github.com/briansmith/webpki/issues/69 CVE-2023-32184 @@ -18260,6 +18264,7 @@ CVE-2023-29453 RESERVED CVE-2023-29452 (Currently, geomap configuration (Administration -> General -> Geograph ...) - zabbix + [bookworm] - zabbix (Minor issue) [bullseye] - zabbix (vulnerable code introduced later) [buster] - zabbix (vulnerable code introduced later) NOTE: https://support.zabbix.com/browse/ZBX-22981 @@ -40763,6 +40768,8 @@ CVE-2022-48175 (Rukovoditel v3.2.1 was discovered to contain a remote code execu NOT-FOR-US: Rukovoditel CVE-2022-48174 (There is a stack overflow vulnerability in ash.c:6030 in busybox befor ...) - busybox + [bookworm] - busybox (Minor issue) + [bullseye] - busybox (Minor issue) NOTE: https://bugs.busybox.net/show_bug.cgi?id=15216 NOTE: https://git.busybox.net/busybox/commit/?id=d417193cf37ca1005830d7e16f5fa7e1d8a44209 CVE-2022-48173 @@ -59580,6 +59587,8 @@ CVE-2022-43359 (Gifdec commit 1dcbae19363597314f6623010cc80abad4e47f7c was disco NOT-FOR-US: Gifdec CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function Sass::C ...) - libsass + [bookworm] - libsass (Minor issue) + [bullseye] - libsass (Minor issue) NOTE: https://github.com/sass/libsass/issues/3178 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function Sass::Co ...) TODO: check @@ -131765,7 +131774,7 @@ CVE-2021-43400 (An issue was discovered in gatt-database.c in BlueZ 5.61. A use- CVE-2021-43399 (The Yubico YubiHSM YubiHSM2 library 2021.08, included in the yubihsm-s ...) NOT-FOR-US: yubihsm-shell CVE-2021-43398 (Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in ...) - - libcrypto++ (unimportant; bug #1000227) + NOTE: Disputed Crypto++ issue, also see #1000227 NOTE: https://github.com/weidai11/cryptopp/issues/1080 NOTE: As per upstream believed to be the expected behaviour: NOTE: https://github.com/weidai11/cryptopp/issues/1080#issuecomment-99649 = data/dsa-needed.txt = @@ -78,6 +78,8 @@ samba/oldstable -- tiff -- +trafficserver +-- wpewebkit/oldstable -- xrdp/oldstable View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/295a6867d32df986c03bec7bc8fd879a51f5e641 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 099b08da by Salvatore Bonaccorso at 2023-08-24T10:40:49+02:00 Process some NFUs - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -11,13 +11,13 @@ CVE-2023-4511 (BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3. NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19258 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-24.html CVE-2023-4230 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) - TODO: check + NOT-FOR-US: Moxa CVE-2023-4229 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) - TODO: check + NOT-FOR-US: Moxa CVE-2023-4228 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) - TODO: check + NOT-FOR-US: Moxa CVE-2023-4227 (A vulnerability has been identified in the ioLogik 4000 Series (ioLogi ...) - TODO: check + NOT-FOR-US: Moxa CVE-2023-4042 (A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostsc ...) TODO: check CVE-2023-41126 @@ -31,13 +31,13 @@ CVE-2023-41123 CVE-2023-41122 REJECTED CVE-2023-41028 (A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi route ...) - TODO: check + NOT-FOR-US: Juplink router CVE-2023-40612 (In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file e ...) - TODO: check + NOT-FOR-US: OpenMNS CVE-2023-40573 (XWiki Platform is a generic wiki platform offering runtime services fo ...) - TODO: check + NOT-FOR-US: XWiki CVE-2023-40572 (XWiki Platform is a generic wiki platform offering runtime services fo ...) - TODO: check + NOT-FOR-US: XWiki CVE-2023-40273 (The session fixation vulnerability allowed the authenticated user to c ...) TODO: check CVE-2023-40270 @@ -47,19 +47,19 @@ CVE-2023-40185 (shescape is simple shell escape library for JavaScript. This may CVE-2023-40178 (Node-SAML is a SAML library not dependent on any frameworks that runs ...) TODO: check CVE-2023-40177 (XWiki Platform is a generic wiki platform offering runtime services fo ...) - TODO: check + NOT-FOR-US: XWiki CVE-2023-40176 (XWiki Platform is a generic wiki platform offering runtime services fo ...) - TODO: check + NOT-FOR-US: XWiki CVE-2023-40035 (Craft is a CMS for creating custom digital experiences on the web and ...) - TODO: check + NOT-FOR-US: Craft CMS CVE-2023-40025 (Argo CD is a declarative, GitOps continuous delivery tool for Kubernet ...) - TODO: check + NOT-FOR-US: Argo CD CVE-2023-3705 (The vulnerability exists in CP-Plus NVR due to an improper input handl ...) - TODO: check + NOT-FOR-US: CP-Plus NVR CVE-2023-3704 (The vulnerability exists in CP-Plus DVR due to an improper input valid ...) - TODO: check + NOT-FOR-US: CP-Plus DVR CVE-2023-3453 (ETIC Telecom RAS versions 4.7.0 and prior the web management portal au ...) - TODO: check + NOT-FOR-US: ETIC Telecom RAS CVE-2023-39583 REJECTED CVE-2023-39441 (Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provide ...) @@ -67,31 +67,31 @@ CVE-2023-39441 (Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP P CVE-2023-38831 (RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code ...) TODO: check CVE-2023-38422 (Walchem Intuition 9 firmware versions prior to v4.21 are missing authe ...) - TODO: check + NOT-FOR-US: Walchem Intuition 9 firmware CVE-2023-37379 (Apache Airflow, in versions prior to 2.7.0, contains a security vulner ...) TODO: check CVE-2023-36317 (Cross Site Scripting (XSS) vulnerability in sourcecodester Student Stu ...) - TODO: check + NOT-FOR-US: sourcecodester Student Study Center Desk Management System CVE-2023-32509 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32505 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Arsh ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32499 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Tony Zeo ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32498 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Easy ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32497 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Supe ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32496 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bill ...) - TODO: check + NOT-FOR-US: WordPress plugin CVE-2023-32300 (Unauth.
[Git][security-tracker-team/security-tracker][master] Add three new wireshark issues: CVE-2023-451{1,2,3}
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: c4cbe174 by Salvatore Bonaccorso at 2023-08-24T10:32:42+02:00 Add three new wireshark issues: CVE-2023-451{1,2,3} - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,9 +1,15 @@ CVE-2023-4513 (BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to ...) - TODO: check + - wireshark + NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19259 + NOTE: https://www.wireshark.org/security/wnpa-sec-2023-25.html CVE-2023-4512 (CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of serv ...) - TODO: check + - wireshark + NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19144 + NOTE: https://www.wireshark.org/security/wnpa-sec-2023-23.html CVE-2023-4511 (BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 t ...) - TODO: check + - wireshark + NOTE: https://gitlab.com/wireshark/wireshark/-/issues/19258 + NOTE: https://www.wireshark.org/security/wnpa-sec-2023-24.html CVE-2023-4230 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) TODO: check CVE-2023-4229 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c4cbe174e1d38ed7315836937a8585010db34e60 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c4cbe174e1d38ed7315836937a8585010db34e60 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Correct version for CVE-2022-29654
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 9ef99005 by Salvatore Bonaccorso at 2023-08-24T10:28:18+02:00 Correct version for CVE-2022-29654 The issue is still present in upstream 2.15.05 contrary to the CVE description but in accordance as well with the report. 2.16.01 OTOH contains the fix. Update the version accordingly. - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -97703,7 +97703,7 @@ CVE-2022-29656 (Wedding Management System v1.0 was discovered to contain a SQL i CVE-2022-29655 (An arbitrary file upload vulnerability in the Upload Photos module of ...) NOT-FOR-US: Wedding Management System CVE-2022-29654 (Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm ...) - - nasm 2.15.05-1 + - nasm 2.16.01-1 NOTE: https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f CVE-2022-29653 (OFCMS v1.1.4 was discovered to contain a cross-site scripting (XSS) vu ...) NOT-FOR-US: OFCMS View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ef9900536c7f58c4b36499d24e760f5283b6ad1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ef9900536c7f58c4b36499d24e760f5283b6ad1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 4f0178dc by security tracker role at 2023-08-24T08:12:20+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,3 +1,91 @@ +CVE-2023-4513 (BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to ...) + TODO: check +CVE-2023-4512 (CBOR dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of serv ...) + TODO: check +CVE-2023-4511 (BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 t ...) + TODO: check +CVE-2023-4230 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) + TODO: check +CVE-2023-4229 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) + TODO: check +CVE-2023-4228 (A vulnerability has been identified in ioLogik 4000 Series (ioLogik E4 ...) + TODO: check +CVE-2023-4227 (A vulnerability has been identified in the ioLogik 4000 Series (ioLogi ...) + TODO: check +CVE-2023-4042 (A flaw was found in ghostscript. The fix for CVE-2020-16305 in ghostsc ...) + TODO: check +CVE-2023-41126 + REJECTED +CVE-2023-41125 + REJECTED +CVE-2023-41124 + REJECTED +CVE-2023-41123 + REJECTED +CVE-2023-41122 + REJECTED +CVE-2023-41028 (A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi route ...) + TODO: check +CVE-2023-40612 (In OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2, the file e ...) + TODO: check +CVE-2023-40573 (XWiki Platform is a generic wiki platform offering runtime services fo ...) + TODO: check +CVE-2023-40572 (XWiki Platform is a generic wiki platform offering runtime services fo ...) + TODO: check +CVE-2023-40273 (The session fixation vulnerability allowed the authenticated user to c ...) + TODO: check +CVE-2023-40270 + REJECTED +CVE-2023-40185 (shescape is simple shell escape library for JavaScript. This may impac ...) + TODO: check +CVE-2023-40178 (Node-SAML is a SAML library not dependent on any frameworks that runs ...) + TODO: check +CVE-2023-40177 (XWiki Platform is a generic wiki platform offering runtime services fo ...) + TODO: check +CVE-2023-40176 (XWiki Platform is a generic wiki platform offering runtime services fo ...) + TODO: check +CVE-2023-40035 (Craft is a CMS for creating custom digital experiences on the web and ...) + TODO: check +CVE-2023-40025 (Argo CD is a declarative, GitOps continuous delivery tool for Kubernet ...) + TODO: check +CVE-2023-3705 (The vulnerability exists in CP-Plus NVR due to an improper input handl ...) + TODO: check +CVE-2023-3704 (The vulnerability exists in CP-Plus DVR due to an improper input valid ...) + TODO: check +CVE-2023-3453 (ETIC Telecom RAS versions 4.7.0 and prior the web management portal au ...) + TODO: check +CVE-2023-39583 + REJECTED +CVE-2023-39441 (Apache Airflow SMTP Provider before 1.3.0, Apache Airflow IMAP Provide ...) + TODO: check +CVE-2023-38831 (RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code ...) + TODO: check +CVE-2023-38422 (Walchem Intuition 9 firmware versions prior to v4.21 are missing authe ...) + TODO: check +CVE-2023-37379 (Apache Airflow, in versions prior to 2.7.0, contains a security vulner ...) + TODO: check +CVE-2023-36317 (Cross Site Scripting (XSS) vulnerability in sourcecodester Student Stu ...) + TODO: check +CVE-2023-32509 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van ...) + TODO: check +CVE-2023-32505 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Arsh ...) + TODO: check +CVE-2023-32499 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Tony Zeo ...) + TODO: check +CVE-2023-32498 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Easy ...) + TODO: check +CVE-2023-32497 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Supe ...) + TODO: check +CVE-2023-32496 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bill ...) + TODO: check +CVE-2023-32300 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Yoast Yo ...) + TODO: check +CVE-2023-32236 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking ...) + TODO: check +CVE-2023-32202 (Walchem Intuition 9 firmware versions prior to v4.21 are vulnerable to ...) + TODO: check +CVE-2023-32119 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPO365 | ...) + TODO: check CVE-2023-3893 - kubernetes 1.20.5+really1.20.2-1 NOTE: Server components no longer built since 1.20.5+really1.20.2-1, marking that as fixed version @@ -10,7 +98,7 @@ CVE-2023-3676 -
[Git][security-tracker-team/security-tracker][master] new k8s issues
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5795fc5b by Moritz Muehlenhoff at 2023-08-24T10:06:22+02:00 new k8s issues - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1,3 +1,15 @@ +CVE-2023-3893 + - kubernetes 1.20.5+really1.20.2-1 + NOTE: Server components no longer built since 1.20.5+really1.20.2-1, marking that as fixed version + NOTE: The source package itself it still vulnerable, but custom rebuilds are not really a usecase here +CVE-2023-3955 + - kubernetes 1.20.5+really1.20.2-1 + NOTE: Server components no longer built since 1.20.5+really1.20.2-1, marking that as fixed version + NOTE: The source package itself it still vulnerable, but custom rebuilds are not really a usecase here +CVE-2023-3676 + - kubernetes 1.20.5+really1.20.2-1 + NOTE: Server components no longer built since 1.20.5+really1.20.2-1, marking that as fixed version + NOTE: The source package itself it still vulnerable, but custom rebuilds are not really a usecase here CVE-2023-3899 NOT-FOR-US: Red Hat Licence Manager CVE-2023-4404 (The Donation Forms by Charitable plugin for WordPress is vulnerable to ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5795fc5b8222818b8a7df291f78ba59f76e99280 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5795fc5b8222818b8a7df291f78ba59f76e99280 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Correct severity of CVE-2022-29654
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 9302704e by Salvatore Bonaccorso at 2023-08-24T09:41:02+02:00 Correct severity of CVE-2022-29654 As it is an memory write, this can lead potentially lead to more as only a crash. Revert the status of unimportant and reference the report from the resarcher. Thanks: Moritz Muehlenhoff - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -97603,8 +97603,8 @@ CVE-2022-29656 (Wedding Management System v1.0 was discovered to contain a SQL i CVE-2022-29655 (An arbitrary file upload vulnerability in the Upload Photos module of ...) NOT-FOR-US: Wedding Management System CVE-2022-29654 (Buffer overflow vulnerability in quote_for_pmake in asm/nasm.c in nasm ...) - - nasm 2.15.05-1 (unimportant) - NOTE: Crash in CLI tool, no security impact + - nasm 2.15.05-1 + NOTE: https://gist.github.com/naihsin/b96e2c5c2c81621b46557fd7aacd165f CVE-2022-29653 (OFCMS v1.1.4 was discovered to contain a cross-site scripting (XSS) vu ...) NOT-FOR-US: OFCMS CVE-2022-29652 (Online Sports Complex Booking System 1.0 is vulnerable to SQL Injectio ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9302704ea59fe085a32c274af6986bdbe3a4a55c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9302704ea59fe085a32c274af6986bdbe3a4a55c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] Add CVE-2022-43358/libasass
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker Commits: 4e616d65 by Salvatore Bonaccorso at 2023-08-24T09:28:39+02:00 Add CVE-2022-43358/libasass - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -59473,7 +59473,8 @@ CVE-2022-43360 CVE-2022-43359 (Gifdec commit 1dcbae19363597314f6623010cc80abad4e47f7c was discovered ...) NOT-FOR-US: Gifdec CVE-2022-43358 (Stack overflow vulnerability in ast_selectors.cpp: in function Sass::C ...) - TODO: check + - libsass + NOTE: https://github.com/sass/libsass/issues/3178 CVE-2022-43357 (Stack overflow vulnerability in ast_selectors.cpp in function Sass::Co ...) TODO: check CVE-2022-43356 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4e616d65d23bd4f2df5d391fb1f3eb981d41967e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4e616d65d23bd4f2df5d391fb1f3eb981d41967e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits