Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker
Commits: 1151e0e3 by Emilio Pozuelo Monfort at 2023-11-10T13:29:37+01:00 Mark CVE-2023-43642/snappy-java as no-dsa on buster - - - - - 29e67e5e by Emilio Pozuelo Monfort at 2023-11-10T13:30:32+01:00 Mark two golang-1.11 issues as no-dsa on buster - - - - - d993030b by Emilio Pozuelo Monfort at 2023-11-10T13:35:36+01:00 Mark CVE-2023-26141/ruby-sidekiq as no-dsa on buster - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -475,6 +475,7 @@ CVE-2023-45284 (On Windows, The IsLocal function does not correctly detect reser - golang-1.15 <removed> [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> + [buster] - golang-1.11 <no-dsa> (Minor issue) NOTE: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY NOTE: https://github.com/golang/go/issues/63713 NOTE: https://github.com/golang/go/commit/9e933c189ca3a84f12995b3c799364a06abc4376 (go1.21.4) @@ -488,6 +489,7 @@ CVE-2023-45283 (The filepath package does not recognize paths with a \??\ prefix - golang-1.15 <removed> [bullseye] - golang-1.15 <no-dsa> (Minor issue) - golang-1.11 <removed> + [buster] - golang-1.11 <no-dsa> (Minor issue) NOTE: https://groups.google.com/g/golang-announce/c/4tU8LZfBFkY NOTE: https://github.com/golang/go/issues/63713 NOTE: https://github.com/golang/go/commit/9e933c189ca3a84f12995b3c799364a06abc4376 (go1.21.4) @@ -8173,6 +8175,7 @@ CVE-2023-43642 (snappy-java is a Java port of the snappy, a fast C++ compresser/ - snappy-java 1.1.10.5-1 (bug #1053474) [bookworm] - snappy-java <no-dsa> (Minor issue) [bullseye] - snappy-java <no-dsa> (Minor issue) + [buster] - snappy-java <no-dsa> (Minor issue) NOTE: https://github.com/xerial/snappy-java/commit/9f8c3cf74223ed0a8a834134be9c917b9f10ceb5 (v1.1.10.4) NOTE: https://github.com/xerial/snappy-java/security/advisories/GHSA-55g7-9cwv-5qfv CVE-2023-43458 (Cross Site Scripting (XSS) vulnerability in Resort Reservation System ...) @@ -41407,6 +41410,7 @@ CVE-2023-26142 (All versions of the package crow are vulnerable to HTTP Response NOT-FOR-US: Crow CVE-2023-26141 (Versions of the package sidekiq before 7.1.3 are vulnerable to Denial ...) - ruby-sidekiq <unfixed> + [buster] - ruby-sidekiq <no-dsa> (Minor issue, DoS still possible) NOTE: https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-5885107 NOTE: https://github.com/sidekiq/sidekiq/commit/62c90d7c5a7d8a378d79909859d87c2e0702bf89 (v7.1.3) CVE-2023-26140 (Versions of the package @excalidraw/excalidraw from 0.0.0 are vulnerab ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/3e1fe0e440a80dbcacc87dfad89b5b4dcb7971f1...d993030b744100af82567168e18fe795962291b0 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/3e1fe0e440a80dbcacc87dfad89b5b4dcb7971f1...d993030b744100af82567168e18fe795962291b0 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits