[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: eab15f76 by Moritz Muehlenhoff at 2024-05-01T13:42:52+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -22378,7 +22378,7 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4 [bullseye] - knot-resolver (Too intrusive to backport, if DNSSEC is used Bookworm can be used) [buster] - knot-resolver (Too intrusive to backport) - pdns-recursor 4.9.3-1 (bug #1063852) - [bullseye] - pdns-recursor (Too intrusive to backport, if DNSSEC is used Bookworm can be used) + [bullseye] - pdns-recursor (No longer supported with security updates in Bullseye) - unbound 1.19.1-1 (bug #1063845) - systemd 255.4-1 [bookworm] - systemd (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release) @@ -22420,7 +22420,7 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC 51 [bullseye] - knot-resolver (Too intrusive to backport, if DNSSEC is used Bookworm can be used) [buster] - knot-resolver (Too intrusive to backport, if DNSSEC is used Bookworm can be used) - pdns-recursor 4.9.3-1 (bug #1063852) - [bullseye] - pdns-recursor (Too intrusive to backport, if DNSSEC is used Bookworm can be used) + [bullseye] - pdns-recursor (No longer supported with security updates in Bullseye) - unbound 1.19.1-1 (bug #1063845) - systemd 255.4-1 [bookworm] - systemd (DNSSEC is disabled by default in systemd-resolved; can be fixed via point release) @@ -41844,6 +41844,7 @@ CVE-2015-20110 (JHipster generator-jhipster before 2.23.0 allows a timing attack NOT-FOR-US: JHipster generator-jhipster CVE-2023-34049 [allows an attacker to force Salt-SSH to run their script] - salt (bug #1055179) + [bullseye] - salt (Scheduled for removal) [buster] - salt (EOL in buster LTS) NOTE: https://saltproject.io/security-announcements/2023-10-27-advisory/index.html CVE-2023-5844 (Unverified Password Change in GitHub repository pimcore/admin-ui-class ...) @@ -64221,6 +64222,7 @@ CVE-2023-28370 (Open redirect vulnerability in Tornado versions 6.3.1 and earlie [bullseye] - python-tornado (Minor issue) [buster] - python-tornado (Minor issue) - salt (bug #1059297) + [bullseye] - salt (Scheduled for removal) [buster] - salt (EOL in buster LTS) NOTE: https://github.com/tornadoweb/tornado/commit/32ad07c54e607839273b4e1819c347f5c8976b2f (v6.3.2) CVE-2023-27529 (Wacom Tablet Driver installer prior to 6.4.2-1 (for macOS) contains an ...) @@ -81150,7 +81152,7 @@ CVE-2023-26438 (External service lookups for a number of protocols were vulnerab NOT-FOR-US: OX App Suite CVE-2023-26437 (Denial of service vulnerability in PowerDNS Recursor allows authoritat ...) - pdns-recursor 4.8.4-1 (bug #1033941) - [bullseye] - pdns-recursor (Minor issue) + [bullseye] - pdns-recursor (No longer supported with security updates in Bullseye) [buster] - pdns-recursor (Minor issue) NOTE: https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html NOTE: https://github.com/PowerDNS/pdns/commit/94fccab63457f8327add3a8e1e2b7876234e4989 (rec-4.6.6) @@ -107817,10 +107819,12 @@ CVE-2023-20899 (VMware SD-WAN (Edge) contains a bypass authentication vulnerabil NOT-FOR-US: VMware CVE-2023-20898 (Git Providers can read from the wrong environment because they get the ...) - salt (bug #1051504) + [bullseye] - salt (Scheduled for removal) [buster] - salt (EOL in buster LTS) NOTE: https://saltproject.io/security-announcements/2023-08-10-advisory/ CVE-2023-20897 (Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. ...) - salt (bug #1051504) + [bullseye] - salt (Scheduled for removal) [buster] - salt (EOL in buster LTS) NOTE: https://saltproject.io/security-announcements/2023-08-10-advisory/ NOTE: https://github.com/saltstack/salt/issues/64061 @@ -129284,7 +129288,7 @@ CVE-2022-37429 (Silverstripe silverstripe/framework through 4.11 allows XSS (iss NOT-FOR-US: SilverStripe CMS CVE-2022-37428 (PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when pro ...) - pdns-recursor 4.7.2-1 - [bullseye] - pdns-recursor (Minor issue) + [bullseye] - pdns-recursor (No longer supported with security updates in Bullseye) [buster] - pdns-recursor (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/08/23/1 NOTE: https://downloads.powerdns.com/patches/2022-02/ @@ -158499,7 +158503,7 @@ CVE-2022-27228 (In the
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0ba18c60 by Moritz Mühlenhoff at 2023-05-24T18:17:19+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -52131,6 +52131,7 @@ CVE-2022-41608 (Cross-Site Request Forgery (CSRF) vulnerability in Thomas Belser NOT-FOR-US: WordPress plugin CVE-2022-41606 (HashiCorp Nomad and Nomad Enterprise 1.0.2 up to 1.2.12, and 1.3.5 job ...) - nomad (bug #1021670) + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-22-nomad-panics-on-job-submission-with-bad-artifact-stanza-source-url/45420 CVE-2022-41605 RESERVED @@ -100015,18 +100016,22 @@ CVE-2022-24687 (HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.1 NOTE: https://github.com/hashicorp/consul/commit/d35c6a97cbdff252f5238d6b52f49786f896566a (v1.9.15) CVE-2022-24686 (HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and ...) - nomad (bug #1021273) + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-condition/35559 CVE-2022-24685 (HashiCorp Nomad and Nomad Enterprise 1.0.17, 1.1.11, and 1.2.5 allow i ...) - nomad (bug #1021273) + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-03-nomad-malformed-job-parsing-results-in-excessive-cpu-usage/35561 NOTE: https://github.com/hashicorp/nomad/issues/12038 CVE-2022-24684 (HashiCorp Nomad and Nomad Enterprise 0.9.0 through 1.0.16, 1.1.11, and ...) - nomad (bug #1021273) + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/35562 NOTE: https://github.com/hashicorp/nomad/issues/12039 NOTE: https://github.com/hashicorp/nomad/commit/c49359ad58f0af18a5697a0b7b9b6cca9656d267 (v1.2.6) CVE-2022-24683 (HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and ...) - nomad (bug #1021273) + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-02-nomad-alloc-filesystem-and-container-escape/35560 CVE-2022-24682 (An issue was discovered in the Calendar feature in Zimbra Collaboratio ...) NOT-FOR-US: Zimbra @@ -119241,6 +119246,7 @@ CVE-2021-43416 RESERVED CVE-2021-43415 (HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, w ...) - nomad (bug #1021273) + [bullseye] - nomad (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288 NOTE: https://github.com/hashicorp/nomad/issues/11542 NOTE: https://github.com/hashicorp/nomad/pull/11554 = data/dsa-needed.txt = @@ -18,6 +18,8 @@ c-ares -- cinder -- +docker-registry (jmm) +-- gpac (aron) -- jupyter-core View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ba18c601e344b81267580d8ba8d25c51345e74b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ba18c601e344b81267580d8ba8d25c51345e74b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 19efa95a by Moritz Muehlenhoff at 2023-05-19T17:40:51+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -82,8 +82,9 @@ CVE-2023-31903 (GuppY CMS 6.00.10 is vulnerable to Unrestricted File Upload whic CVE-2023-31902 (RPA Technology Mobile Mouse 3.6.0.4 is vulnerable to Remote Code Execu ...) NOT-FOR-US: RPA Technology Mobile Mouse CVE-2023-31725 (yasm 1.3.0.55.g101bc was discovered to contain a heap-use-after-free v ...) - - yasm + - yasm (unimportant) NOTE: https://github.com/yasm/yasm/issues/221 + NOTE: Crash in CLI tool, no security impact CVE-2023-31724 (yasm 1.3.0.55.g101bc was discovered to contain a segmentation violatio ...) - yasm (unimportant) NOTE: https://github.com/yasm/yasm/issues/222 @@ -446,6 +447,7 @@ CVE-2023-31408 (Cleartext Storage of Sensitive Information in SICK FTMg AIR FLOW NOT-FOR-US: SICK CVE-2023-32784 (In KeePass 2.x before 2.54, it is possible to recover the cleartext ma ...) - keepass2 + [bullseye] - keepass2 (Minor issue) NOTE: https://github.com/vdohney/keepass-password-dumper NOTE: https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/ CVE-2023-32758 (giturlparse (aka git-url-parse) through 1.2.2, as used in Semgrep thro ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/19efa95abc996d1ec55635099eaa51129cbdd7b8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/19efa95abc996d1ec55635099eaa51129cbdd7b8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 234c492e by Moritz Muehlenhoff at 2023-05-19T16:32:05+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -5734,6 +5734,7 @@ CVE-2023-29660 RESERVED CVE-2023-29659 (A Segmentation fault caused by a floating point exception exists in li ...) - libheif (bug #1035607) + [bullseye] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/issues/794 NOTE: https://github.com/strukturag/libheif/commit/e05e15b57a38ec411cb9acb38512a1c36ff62991 (v1.15.2) CVE-2023-29658 @@ -8535,6 +8536,7 @@ CVE-2023-1625 [information leak in API] RESERVED [experimental] - heat 1:20.0.0~rc1-1 - heat 1:19.0.0-2 (bug #1034186) + [bullseye] - heat (Minor issue) [buster] - heat (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2181621 NOTE: https://review.opendev.org/c/openstack/heat/+/868166 @@ -21424,6 +21426,7 @@ CVE-2023-24531 CVE-2023-24473 (An information disclosure vulnerability exists in the TGAInput::read_t ...) [experimental] - openimageio 2.4.9.0+dfsg-1 - openimageio (bug #1034150) + [bullseye] - openimageio (Minor issue) NOTE: https://github.com/OpenImageIO/oiio/pull/3768 NOTE: https://github.com/OpenImageIO/oiio/commit/759fcd392d130c12ae476857e1ed2a91bcf2686b (master) NOTE: https://github.com/OpenImageIO/oiio/commit/209bb4c327b2a8be08f41c1a213dfe9001f0b5d0 (v2.4.8.1) @@ -21431,12 +21434,14 @@ CVE-2023-24473 (An information disclosure vulnerability exists in the TGAInput:: CVE-2023-24472 (A denial of service vulnerability exists in the FitsOutput::close() fu ...) [experimental] - openimageio 2.4.9.0+dfsg-1 - openimageio (bug #1034151) + [bullseye] - openimageio (Minor issue) NOTE: https://github.com/OpenImageIO/oiio/commit/f8db9f38d18a66889f444031051e0f0acaa611b6 (master) NOTE: https://github.com/OpenImageIO/oiio/commit/a39692256b060b543f53646c6a807c81b79c5750 (v2.4.8.1) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709 CVE-2023-22845 (An out-of-bounds read vulnerability exists in the TGAInput::decode_pix ...) [experimental] - openimageio 2.4.9.0+dfsg-1 - openimageio (bug #1034150) + [bullseye] - openimageio (Minor issue) NOTE: https://github.com/OpenImageIO/oiio/pull/3768 NOTE: https://github.com/OpenImageIO/oiio/commit/759fcd392d130c12ae476857e1ed2a91bcf2686b (master) NOTE: https://github.com/OpenImageIO/oiio/commit/209bb4c327b2a8be08f41c1a213dfe9001f0b5d0 (v2.4.8.1) @@ -67724,6 +67729,7 @@ CVE-2022-31471 (untangle is a python library to convert XML data to python objec NOTE: https://github.com/stchris/untangle/pull/94 CVE-2022-2393 (A flaw was found in pki-core, which could allow a user to get a certif ...) - dogtag-pki (bug #1034802) + [bullseye] - dogtag-pki (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2101046 CVE-2022-2392 (The Lana Downloads Manager WordPress plugin before 1.8.0 is affected b ...) NOT-FOR-US: WordPress plugin @@ -193942,9 +193948,10 @@ CVE-2020-27509 (Persistent XSS in Galaxkey Secure Mail Client in Galaxkey up to CVE-2020-27508 (In two-factor authentication, the system also sending 2fa secret key i ...) NOT-FOR-US: Frappe Framework CVE-2020-27507 (The Kamailio SIP before 5.5.0 server mishandles INVITE requests with d ...) - - kamailio 5.5.3-1 - NOTE: https://github.com/kamailio/kamailio/commit/ada3701d22b1fd579f06b4f54fa695fa988e685f (5.5.0) + - kamailio 5.4.2-1 NOTE: https://github.com/kamailio/kamailio/issues/2503 + NOTE: https://github.com/kamailio/kamailio/commit/f57c900b438f3233fa1e9a9d3ca8cd383a30baa6 (5.4.2) (5.4 branch) + NOTE: https://github.com/kamailio/kamailio/commit/ada3701d22b1fd579f06b4f54fa695fa988e685f (5.5.0) (master branch) CVE-2020-27506 RESERVED CVE-2020-27505 = data/dsa-needed.txt = @@ -14,6 +14,8 @@ If needed, specify the release by adding a slash after the name of the source pa -- asterisk -- +cinder +-- cups-filters -- gpac (aron) @@ -37,6 +39,8 @@ netatalk open regression with MacOS, tentative patch not yet merged upstream See discussion on team mailing list. -- +nova +-- openjdk-11 (jmm) -- openjdk-17 (jmm) @@ -51,6 +55,10 @@ php-horde-turba -- py7zr -- +python-glance-store +-- +python-os-brick +-- python-werkzeug -- ring View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/234c492e44d69ad58d708c5a6f68a18c28eb3dab -- View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b8c47a99 by Moritz Muehlenhoff at 2023-05-19T13:36:01+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -691,6 +691,7 @@ CVE-2023-2641 (A vulnerability was found in SourceCodester Online Internship Man NOT-FOR-US: SourceCodester Online Internship Management System CVE-2023-32076 (in-toto is a framework to protect supply chain integrity. The in-toto ...) - in-toto (bug #1035934) + [bullseye] - in-toto (Minor issue) NOTE: https://github.com/in-toto/in-toto/security/advisories/GHSA-wc64-c5rv-32pf NOTE: https://github.com/in-toto/in-toto/commit/f88138c90861953c77a1384ea2fcc58126e6fe59 (v2.0.0) NOTE: https://github.com/in-toto/in-toto/commit/9835aae17bc60b600713962b2bb66e6b7abe9325 (v2.0.0) @@ -8397,6 +8398,7 @@ CVE-2023-28859 (redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection NOTE: https://github.com/redis/redis-py/pull/2641 CVE-2023-28858 (redis-py before 4.5.3 leaves a connection open after canceling an asyn ...) - python-redis (bug #1033754) + [bullseye] - python-redis (Vulnerable code not present) [buster] - python-redis (Vulnerable code introduced later) NOTE: https://github.com/redis/redis-py/issues/2624 NOTE: https://github.com/redis/redis-py/pull/2641 @@ -11067,6 +11069,7 @@ CVE-2023-28116 (Contiki-NG is an open-source, cross-platform operating system fo NOT-FOR-US: Contiki-NG CVE-2023-28115 (Snappy is a PHP library allowing thumbnail, snapshot or PDF generation ...) - civicrm (bug #1036284) + [bullseye] - civicrm (Minor issue) NOTE: https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc NOTE: https://github.com/KnpLabs/snappy/pull/469 NOTE: https://github.com/KnpLabs/snappy/commit/1ee6360cbdbea5d09705909a150df7963a88efd6 (v1.4.2) = data/dsa-needed.txt = @@ -14,6 +14,8 @@ If needed, specify the release by adding a slash after the name of the source pa -- asterisk -- +cups-filters +-- gpac (aron) -- jupyter-core View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b8c47a9986b10c61e647714f34ee02c1f869f5dd -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b8c47a9986b10c61e647714f34ee02c1f869f5dd You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f474a2a5 by Moritz Muehlenhoff at 2023-05-19T12:25:53+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -453,6 +453,7 @@ CVE-2023-32758 (giturlparse (aka git-url-parse) through 1.2.2, as used in Semgre CVE-2023-2700 (A vulnerability was found in libvirt. This security flaw ouccers due t ...) [experimental] - libvirt 9.3.0-1 - libvirt (bug #1036297) + [bullseye] - libvirt (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2203653 NOTE: Fixed by: https://gitlab.com/libvirt/libvirt/-/commit/6425a311b8ad19d6f9c0b315bf1d722551ea3585 (v9.3.0) CVE-2023-2699 (A vulnerability, which was classified as critical, has been found in S ...) @@ -8463,16 +8464,19 @@ CVE-2023-28843 (PrestaShop/paypal is an open source module for the PrestaShop we NOT-FOR-US: PrestaShop CVE-2023-28842 (Moby) is an open source container framework developed by Docker Inc. t ...) - docker.io 20.10.24+dfsg1-1 + [bullseye] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p NOTE: https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333 CVE-2023-28841 (Moby is an open source container framework developed by Docker Inc. th ...) - docker.io 20.10.24+dfsg1-1 + [bullseye] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237 NOTE: https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333 NOTE: https://github.com/moby/moby/issues/43382 NOTE: https://github.com/moby/moby/pull/45118 CVE-2023-28840 (Moby is an open source container framework developed by Docker Inc. th ...) - docker.io 20.10.24+dfsg1-1 + [bullseye] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp NOTE: https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333 NOTE: https://github.com/moby/moby/issues/43382 = data/dsa-needed.txt = @@ -23,6 +23,12 @@ linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions -- +libraw +-- +libssh +-- +libwebp (jmm) +-- nbconvert -- netatalk View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f474a2a5c477a7e077c8c23a40e1dafec15699d6 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f474a2a5c477a7e077c8c23a40e1dafec15699d6 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: dc5f382e by Moritz Muehlenhoff at 2023-05-18T17:51:15+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -337,43 +337,67 @@ CVE-2023-31620 (An issue in the dv_compare component of openlink virtuoso-openso NOTE: https://github.com/openlink/virtuoso-opensource/commit/a4997ed2499c4de8c95e2de9e2a07b60384fbbec CVE-2023-31619 (An issue in the sch_name_to_object component of openlink virtuoso-open ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1133 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2ed10333e6e973c2b3e1e60ba854ef0dd12afe07 CVE-2023-31618 (An issue in the sqlc_union_dt_wrap component of openlink virtuoso-open ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1136 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/030e47a29976709a50603e3f34e82278e5f462df CVE-2023-31617 (An issue in the dk_set_delete component of openlink virtuoso-opensourc ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1127 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2b64ad928ef5f75fc93091677a78abfbd17ea07f CVE-2023-31616 (An issue in the bif_mod component of openlink virtuoso-opensource v7.2 ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1122 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/25fff0eaa85898004bb14909e9f29d16b2918792 CVE-2023-31615 (An issue in the chash_array component of openlink virtuoso-opensource ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1124 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/d02925b18e3ad0244ae7c52acf92bfa686738eb2 CVE-2023-31614 (An issue in the mp_box_deserialize_string function in openlink virtuos ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1117 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/7c488ae70803b208a94bf12fee792195caddbf7d CVE-2023-31613 (An issue in the __nss_database_lookup component of openlink virtuoso-o ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1121 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/171718c844530864cb375213c8b9cbc8ba079efc CVE-2023-31612 (An issue in the dfe_qexp_list component of openlink virtuoso-opensourc ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1125 CVE-2023-31611 (An issue in the __libc_longjmp component of openlink virtuoso-opensour ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1119 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/db0b768dfbb66e306504d0f7951c4ae4932edd74 CVE-2023-31610 (An issue in the _IO_default_xsputn component of openlink virtuoso-open ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1118 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2ed10333e6e973c2b3e1e60ba854ef0dd12afe07 CVE-2023-31609 (An issue in the dfe_unit_col_loci component of openlink virtuoso-opens ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1126 CVE-2023-31608 (An issue in the artm_div_int component of openlink virtuoso-opensource ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1123 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/9c5bdeb73b00b5ae88db0be036d429d779126094 CVE-2023-31607 (An issue in the __libc_malloc component of openlink virtuoso-opensourc ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1120 + NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ae967725 by Moritz Muehlenhoff at 2023-05-17T16:26:56+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -173,40 +173,64 @@ CVE-2023-31842 (Sourcecodester Faculty Evaluation System v1.0 is vulnerable to S NOT-FOR-US: Sourcecodester Faculty Evaluation System CVE-2023-31631 (An issue in the sqlo_preds_contradiction component of openlink virtuos ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1137 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/c77cd981a82a7f6385b174eb818057b2f19d8c09 CVE-2023-31630 (An issue in the sqlo_query_spec component of openlink virtuoso-opensou ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1138 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/f9244141ce68dc4a3314fd4a0cd5bb3bdd6ab830 CVE-2023-31629 (An issue in the sqlo_union_scope component of openlink virtuoso-openso ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1139 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/9553f94992f0a33f7eb7e87e74f0f78998ba5bec CVE-2023-31628 (An issue in the stricmp component of openlink virtuoso-opensource v7.2 ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1141 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2ed10333e6e973c2b3e1e60ba854ef0dd12afe07 CVE-2023-31627 (An issue in the strhash component of openlink virtuoso-opensource v7.2 ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1140 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/ce61d6f568568b771d7e857408e3246d31135494 CVE-2023-31626 (An issue in the gpf_notice component of openlink virtuoso-opensource v ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1129 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2ed10333e6e973c2b3e1e60ba854ef0dd12afe07 CVE-2023-31625 (An issue in the psiginfo component of openlink virtuoso-opensource v7. ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1132 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2ed10333e6e973c2b3e1e60ba854ef0dd12afe07 CVE-2023-31624 (An issue in the sinv_check_exp component of openlink virtuoso-opensour ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1134 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/311097fb1f23d0a1dd7dcdd2afecf6fe14665526 CVE-2023-31623 (An issue in the mp_box_copy component of openlink virtuoso-opensource ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1131 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/2ed10333e6e973c2b3e1e60ba854ef0dd12afe07 CVE-2023-31622 (An issue in the sqlc_make_policy_trig component of openlink virtuoso-o ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1135 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/db91dc5602a8cfde2e4e1d00387d5ba4b77389dc CVE-2023-31621 (An issue in the kc_var_col component of openlink virtuoso-opensource v ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1130 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/ec54f1c7b50df944ae4a8d3e29cd7eaf1cc97b21 CVE-2023-31620 (An issue in the dv_compare component of openlink virtuoso-opensource v ...) - virtuoso-opensource + [bullseye] - virtuoso-opensource (Minor issue) NOTE: https://github.com/openlink/virtuoso-opensource/issues/1128 + NOTE: https://github.com/openlink/virtuoso-opensource/commit/a4997ed2499c4de8c95e2de9e2a07b60384fbbec CVE-2023-31619 (An issue in the sch_name_to_object component of openlink virtuoso-open
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 0fe51f8c by Moritz Muehlenhoff at 2023-05-17T15:33:43+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -46,6 +46,7 @@ CVE-2023-2738 (A vulnerability classified as critical has been found in Tongda O TODO: check CVE-2023-2731 [null pointer deference in LZWDecode() in libtiff/tif_lzw.c] - tiff + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/548 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/9be22b639ea69e102d3847dca4c53ef025e9527b CVE-2023-2730 (Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimco ...) @@ -581,6 +582,7 @@ CVE-2023-2614 (Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pim NOT-FOR-US: pimcore CVE-2023-2610 (Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9 ...) - vim (bug #1035955) + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d NOTE: https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a (v9.0.1532) CVE-2023-32216 @@ -3776,6 +3778,7 @@ CVE-2023-1981 [avahi-daemon can be crashed via DBus] RESERVED {DLA-3414-1} - avahi 0.8-10 (bug #1034594) + [bullseye] - avahi (Minor issue) NOTE: https://github.com/lathiat/avahi/issues/375 NOTE: https://github.com/lathiat/avahi/pull/407 NOTE: https://github.com/lathiat/avahi/commit/a2696da2f2c50ac43b6c4903f72290d5c3fa9f6f = data/dsa-needed.txt = @@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +asterisk -- chromium -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0fe51f8cfdbd10a7fe4092deaeec7741280c5494 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0fe51f8cfdbd10a7fe4092deaeec7741280c5494 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 47fd1137 by Moritz Muehlenhoff at 2023-05-08T17:27:21+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2334,6 +2334,7 @@ CVE-2023-30609 (matrix-react-sdk is a react-based SDK for inserting a Matrix cha NOTE: https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-xv83-x443-7rmw CVE-2023-30608 (sqlparse is a non-validating SQL parser module for Python. In affected ...) - sqlparse (bug #1034615) + [bullseye] - sqlparse (Minor issue) NOTE: https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2 NOTE: Introduced by: https://github.com/andialbrecht/sqlparse/commit/e75e35869473832a1eb67772b1adfee2db11b85a (0.1.15) NOTE: Fixed by: https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb (0.4.4) @@ -2753,6 +2754,7 @@ CVE-2023-2005 RESERVED CVE-2023-2004 (An integer overflow vulnerability was discovered in Freetype in tt_hva ...) - freetype 2.12.1+dfsg-5 (bug #1034612) + [bullseye] - freetype (Minor issue) [buster] - freetype (Minor issue) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50462 NOTE: https://github.com/freetype/freetype/commit/e6fda039ad638866b7a6a5d046f03278ba1b7611 (VER-2-13-0) @@ -2860,18 +2862,21 @@ CVE-2023-1994 (GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3. {DLA-3402-1} [experimental] - wireshark 4.0.5-1~exp1 - wireshark (bug #1034721) + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18947 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-11.html CVE-2023-1993 (LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6 ...) {DLA-3402-1} [experimental] - wireshark 4.0.5-1~exp1 - wireshark (bug #1034721) + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18900 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-10.html CVE-2023-1992 (RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6. ...) {DLA-3402-1} [experimental] - wireshark 4.0.5-1~exp1 - wireshark (bug #1034721) + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18852 NOTE: https://www.wireshark.org/security/wnpa-sec-2023-09.html CVE-2023-1991 @@ -4873,6 +4878,7 @@ CVE-2023-29580 (yasm 1.3.0.55.g101bc was discovered to contain a segmentation vi NOTE: Crash in CLI tool, no security impact CVE-2023-29579 (yasm 1.3.0.55.g101bc was discovered to contain a stack overflow via th ...) - yasm + [bullseye] - yasm (Minor issue) NOTE: https://github.com/yasm/yasm/issues/214 CVE-2023-29578 (mp4v2 v2.0.0 was discovered to contain a heap buffer overflow via the ...) NOT-FOR-US: MP4v2 @@ -5195,6 +5201,7 @@ CVE-2023-29492 (Novi Survey before 8.9.43676 allows remote attackers to execute NOT-FOR-US: Novi Survey CVE-2023-29491 (ncurses before 6.4 20230408, when used by a setuid application, allows ...) - ncurses (bug #1034372) + [bullseye] - ncurses (Minor issue) NOTE: https://invisible-island.net/ncurses/NEWS.html#index-t20230408 NOTE: http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commitdiff;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56 NOTE: https://github.com/ThomasDickey/ncurses-snapshots/commit/a6d3f92bb5bba1a71c7c3df39497abbe5fe999ff @@ -5439,6 +5446,7 @@ CVE-2023-1907 RESERVED CVE-2023-1906 (A heap-based buffer overflow issue was discovered in ImageMagick's Imp ...) - imagemagick (bug #1034373) + [bullseye] - imagemagick (Minor issue) [buster] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-35q2-86c7-9247 NOTE: https://github.com/ImageMagick/ImageMagick6/commit/e30c693b37c3b41723f1469d1226a2c814ca443d (ImageMagick 6.9.12-84) @@ -9061,6 +9069,7 @@ CVE-2023-28372 RESERVED CVE-2023-28371 (In Stellarium through 1.2, attackers can write to files that are typic ...) - stellarium (bug #1034183) + [bullseye] - stellarium (Minor issue) NOTE: https://github.com/Stellarium/stellarium/commit/1261f74dc4aa6bbd01ab514343424097f8cf46b7 NOTE: https://github.com/Stellarium/stellarium/commit/787a894897b7872ae96e6f5804a182210edd5c78 NOTE: https://github.com/Stellarium/stellarium/commit/eba61df3b38605befcb43687a4c0a159dbc0c5cb @@ -17588,18 +17597,23 @@ CVE-2023-25515 RESERVED CVE-2023-25514 (NVIDIA CUDA toolkit for Linux and Windows contains
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8c06fed2 by Moritz Muehlenhoff at 2023-05-02T15:08:27+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -24,6 +24,7 @@ CVE-2023-2428 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten NOT-FOR-US: phpmyfaq CVE-2023-2426 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior ...) - vim (bug #1035323) + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425 NOTE: https://github.com/vim/vim/commit/caf642c25de526229264cab9425e7c9979f3509b (v9.0.1499) CVE-2023-31485 (GitLab::API::v4 through 0.26 does not verify TLS certificates when con ...) @@ -17161,6 +17162,7 @@ CVE-2023-25568 RESERVED CVE-2023-25567 (GSS-NTLMSSP, a mechglue plugin for the GSSAPI library that implements ...) - gss-ntlmssp 1.2.0-1 (bug #1031369) + [bullseye] - gss-ntlmssp (Minor issue) NOTE: https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-24pf-6prf-24ch NOTE: https://github.com/gssapi/gss-ntlmssp/commit/025fbb756d44ffee8f847db4222ed6aa4bd1fbe4 (v1.2.0) CVE-2023-25566 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) @@ -17171,6 +17173,7 @@ CVE-2023-25566 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that imp NOTE: https://github.com/gssapi/gss-ntlmssp/commit/8660fb16474054e692a596e9c79670cd4d3954f4 (v1.2.0) CVE-2023-25565 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) - gss-ntlmssp 1.2.0-1 (bug #1031369) + [bullseye] - gss-ntlmssp (Minor issue) NOTE: https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-7q7f-wqcg-mvfg NOTE: https://github.com/gssapi/gss-ntlmssp/commit/c16100f60907a2de92bcb676f303b81facee0f64 (v1.2.0) CVE-2023-25564 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) @@ -17181,6 +17184,7 @@ CVE-2023-25564 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that imp NOTE: https://github.com/gssapi/gss-ntlmssp/commit/c753000eb31835c0664e528fbc99378ae0cbe950 (v1.2.0) CVE-2023-25563 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) - gss-ntlmssp 1.2.0-1 (bug #1031369) + [bullseye] - gss-ntlmssp (Minor issue) NOTE: https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-jjjx-5qf7-9mgf NOTE: https://github.com/gssapi/gss-ntlmssp/commit/97c62c6167299028d80765080e74d91dfc99efbd (v1.2.0) CVE-2023-25562 (DataHub is an open-source metadata platform. In versions of DataHub pr ...) @@ -109485,6 +109489,7 @@ CVE-2021-45424 RESERVED CVE-2021-45423 (A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports f ...) - pev 0.81-9 (bug #1034725) + [bullseye] - pev (Minor issue, will be fixed in next point release) NOTE: https://github.com/merces/libpe/issues/35 NOTE: https://github.com/merces/libpe/commit/9b5fedc37ccbcd23695a0e97c0fe46c999e26100 NOTE: https://github.com/merces/libpe/commit/8960f7d710c4d1a43badd2bbf273721248b864f8 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c06fed2b2418e78d802836a1be87d85438b0b61 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8c06fed2b2418e78d802836a1be87d85438b0b61 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a131af39 by Moritz Muehlenhoff at 2023-04-19T09:08:52+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -304,12 +304,14 @@ CVE-2023-2110 RESERVED CVE-2023-30775 RESERVED - - tiff 4.5.0-2 + - tiff 4.5.0-2 (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/464 NOTE: https://gitlab.com/libtiff/libtiff/-/afd7086090dafd3949afd172822cbcec4ed17d56 (v4.5.0rc1) + NOTE: Crash in CLI tool, no security impact CVE-2023-30774 RESERVED - tiff 4.5.0-2 + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/463 NOTE: https://gitlab.com/libtiff/libtiff/-/f00484b9519df933723deb38fff943dc291a793d (v4.5.0rc1) CVE-2023-2109 (Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoo ...) @@ -48382,6 +48384,7 @@ CVE-2022-41728 RESERVED CVE-2022-41727 (An attacker can craft a malformed TIFF image which will consume a sign ...) - golang-golang-x-image 0.5.0-1 + [bullseye] - golang-golang-x-image (Minor issue) [buster] - golang-golang-x-image (Limited support, minor issue, DoS) CVE-2022-41726 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a131af3944b34f0918abf86cfe6e9bdfdf62cabc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a131af3944b34f0918abf86cfe6e9bdfdf62cabc You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ae04ed3a by Moritz Muehlenhoff at 2023-04-13T21:00:53+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -13503,6 +13503,7 @@ CVE-2023-0843 RESERVED CVE-2023-0842 (xml2js version 0.4.23 allows an external attacker to edit or add new p ...) - node-xml2js (bug #1034148) + [bullseye] - node-xml2js (Minor issue) NOTE: https://fluidattacks.com/advisories/myers/ NOTE: https://github.com/Leonidas-from-XIV/node-xml2js/issues/663 NOTE: https://github.com/Leonidas-from-XIV/node-xml2js/pull/603 @@ -114742,33 +114743,40 @@ CVE-2021-43319 (Zoho ManageEngine Network Configuration Manager before 125488 is CVE-2021-43318 RESERVED CVE-2021-43317 (A heap-based buffer overflows was discovered in upx, during the generi ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/380 NOTE: https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338 + NOTE: Crash in CLI tool, no security impact CVE-2021-43316 (A heap-based buffer overflow was discovered in upx, during the generic ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/381 NOTE: https://github.com/upx/upx/commit/962c35aa08ef3dcee13d3f7ef6e2d845da912f25 + NOTE: Crash in CLI tool, no security impact CVE-2021-43315 (A heap-based buffer overflows was discovered in upx, during the generi ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/380 NOTE: https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338 + NOTE: Crash in CLI tool, no security impact CVE-2021-43314 (A heap-based buffer overflows was discovered in upx, during the generi ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/380 NOTE: https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338 + NOTE: Crash in CLI tool, no security impact CVE-2021-43313 (A heap-based buffer overflow was discovered in upx, during the variabl ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/378 NOTE: https://github.com/upx/upx/commit/828a6cf07b69bc7314e888d7b76f0eafe125a3f6 + NOTE: Crash in CLI tool, no security impact CVE-2021-43312 (A heap-based buffer overflow was discovered in upx, during the variabl ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/379 NOTE: https://github.com/upx/upx/commit/828a6cf07b69bc7314e888d7b76f0eafe125a3f6 + NOTE: Crash in CLI tool, no security impact CVE-2021-43311 (A heap-based buffer overflow was discovered in upx, during the generic ...) - - upx-ucl + - upx-ucl (unimportant) NOTE: https://github.com/upx/upx/issues/380 NOTE: https://github.com/upx/upx/commit/b327645e648d46c8730be80730a171cf74cfe338 + NOTE: Crash in CLI tool, no security impact CVE-2021-43310 (A vulnerability in Keylime before 6.3.0 allows an attacker to craft a ...) NOT-FOR-US: Keylime CVE-2021-43309 (An exponential ReDoS (Regular Expression Denial of Service) can be tri ...) @@ -248734,6 +248742,7 @@ CVE-2019-19922 (kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.c CVE-2023-27561 (runc through 1.1.4 has Incorrect Access Control leading to Escalation ...) {DLA-3369-1} - runc 1.1.5+ds1-1 (bug #1033520) + [bullseye] - runc (Minor issue) NOTE: https://github.com/opencontainers/runc/issues/3751 NOTE: https://github.com/opencontainers/runc/issues/2197#issuecomment-1437617334 NOTE: https://gist.github.com/LiveOverflow/c937820b688922eb127fb760ce06dab9 = data/dsa-needed.txt = @@ -36,6 +36,8 @@ php-horde-turba -- py7zr -- +python-werkzeug +-- ring might make sense to rebase to current version -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae04ed3abf8cee70d58176f91eff1b15dc35589c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ae04ed3abf8cee70d58176f91eff1b15dc35589c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 765695dc by Moritz Muehlenhoff at 2023-04-13T16:09:55+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2098,11 +2098,13 @@ CVE-2023-29583 CVE-2023-29582 RESERVED CVE-2023-29581 (yasm 1.3.0.55.g101bc was discovered to contain a segmentation violatio ...) - - yasm + - yasm (unimportant) NOTE: https://github.com/yasm/yasm/issues/216 + NOTE: Crash in CLI tool, no security impact CVE-2023-29580 (yasm 1.3.0.55.g101bc was discovered to contain a segmentation violatio ...) - - yasm + - yasm (unimportant) NOTE: https://github.com/yasm/yasm/issues/215 + NOTE: Crash in CLI tool, no security impact CVE-2023-29579 RESERVED CVE-2023-29578 @@ -4143,6 +4145,7 @@ CVE-2023-1691 RESERVED CVE-2022-48434 (libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and ...) - ffmpeg 7:5.1.2-1 + [bullseye] - ffmpeg (Wait until it lands in 4.3.x) NOTE: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/cc867f2c09d2b69cee8a0eccd62aff002cbbfe11 (n6.1-dev) NOTE: https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/35aa7e70e7ec350319e7634a30d8d8aa1e6ecdda (n5.1.2) CVE-2022-48433 (In JetBrains IntelliJ IDEA before 2023.1 the NTLM hash could leak thro ...) @@ -5125,6 +5128,7 @@ CVE-2023-1545 (SQL Injection in GitHub repository nilsteampassnet/teampass prior - teampass (bug #730180) CVE-2023-1544 (A flaw was found in the QEMU implementation of VMWare's paravirtual RD ...) - qemu (bug #1034179) + [bullseye] - qemu (Minor issue) NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html CVE-2023-28686 (Dino before 0.2.3, 0.3.x before 0.3.2, and 0.4.x before 0.4.2 allows a ...) {DSA-5379-1} @@ -10488,10 +10492,12 @@ CVE-2023-26918 RESERVED CVE-2023-26917 (libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL poin ...) - libyang2 + [bullseye] - libyang2 (Minor issue) NOTE: https://github.com/CESNET/libyang/issues/1987 NOTE: https://github.com/CESNET/libyang/commit/cfa1a965a429e4bfc5ae1539a8e87a9cf71c3090 (v2.1.55) CVE-2023-26916 (libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL poin ...) - libyang2 (bug #1034154) + [bullseye] - libyang2 (Minor issue) NOTE: https://github.com/CESNET/libyang/issues/1979 NOTE: https://github.com/CESNET/libyang/commit/dc668d296f9f05aeab6315d44cff3208641e3096 (v2.1.55) CVE-2023-26915 @@ -49422,6 +49428,7 @@ CVE-2022-40900 RESERVED CVE-2022-40899 (An issue discovered in Python Charmers Future 0.18.2 and earlier allow ...) - python-future (bug #1031699) + [bullseye] - python-future (Minor issue) NOTE: https://github.com/PythonCharmers/python-future/pull/610 NOTE: https://github.com/PythonCharmers/python-future/commit/c91d70b34ef0402aef3e9d04364ba98509dca76f (v0.18.3) CVE-2022-40898 (An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 ...) @@ -53557,11 +53564,14 @@ CVE-2022-39210 (Nextcloud android is the official Android client for the Nextclo NOT-FOR-US: Nextcloud android CVE-2022-39209 (cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and renderin ...) - cmark-gfm 0.29.0.gfm.6-2 (bug #1020588) + [bullseye] - cmark-gfm (Minor issue) [buster] - cmark-gfm (Minor issue) - python-cmarkgfm + [bullseye] - python-cmarkgfm (Minor issue) [buster] - python-cmarkgfm (Minor issue) - ghostwriter 2.1.6+ds-1 (unimportant) - ruby-commonmarker + [bullseye] - ruby-commonmarker (Minor issue) [buster] - ruby-commonmarker (Minor issue) - r-cran-commonmark 1.8.1-1 [bullseye] - r-cran-commonmark (Minor issue) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/765695dc67dfa6bcc2ffadf1fd19d21e973280c7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/765695dc67dfa6bcc2ffadf1fd19d21e973280c7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 36906343 by Moritz Muehlenhoff at 2023-03-21T16:51:11+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1147,6 +1147,7 @@ CVE-2023-28340 RESERVED CVE-2023-28339 (OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege es ...) - doas + [bullseye] - doas (Minor issue) - opendoas NOTE: https://github.com/Duncaen/OpenDoas/issues/106 NOTE: https://www.openwall.com/lists/oss-security/2023/03/14/4 @@ -1717,6 +1718,7 @@ CVE-2023-1371 RESERVED CVE-2023-1370 ([Json-smart](https://netplex.github.io/json-smart/) is a performance f ...) - json-smart + [bullseye] - json-smart (Minor issue) NOTE: https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/ NOTE: https://github.com/netplex/json-smart-v2/commit/5b3205d051952d3100aa0db1535f6ba6226bd87a (2.4.9) CVE-2023-1369 (A vulnerability was found in TG Soft Vir.IT eXplorer 9.4.86.0. It has ...) @@ -1829,6 +1831,7 @@ CVE-2023-28145 RESERVED CVE-2023-28144 (KDAB Hotspot 1.3.x and 1.4.x through 1.4.1, in a non-default configura ...) - hotspot + [bullseye] - hotspot (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/03/14/8 NOTE: Introduced by: https://github.com/KDAB/hotspot/commit/3b4682565f0e53f903f3ad0f3f2c0f236d382efb (v1.3.0) NOTE: Opt-In to allow privilege escalation (and disable by default): @@ -4894,10 +4897,12 @@ CVE-2023-27104 RESERVED CVE-2023-27103 (Libde265 v1.0.11 was discovered to contain a heap buffer overflow via ...) - libde265 (bug #1033257) + [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/394 NOTE: https://github.com/strukturag/libde265/commit/d6bf73e765b7a23627bfd7a8645c143fd9097995 CVE-2023-27102 (Libde265 v1.0.11 was discovered to contain a segmentation violation vi ...) - libde265 (bug #1033257) + [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/393 NOTE: https://github.com/strukturag/libde265/commit/0b1752abff97cb542941d317a0d18aa50cb199b1 CVE-2023-27101 @@ -6384,7 +6389,7 @@ CVE-2022-48345 (sanitize-url (aka @braintree/sanitize-url) before 6.0.2 allows X [bullseye] - node-mermaid (Minor issue) NOTE: https://github.com/braintree/sanitize-url/commit/d4bdc89f1743fe3cdb7c3f24b06e4c875f349b0c CVE-2023-26464 (** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppen ...) - - apache-log4j1.2 + - apache-log4j1.2 (Only affects legacy Java releases which Debian hasn't shipped since 2015) NOTE: https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t CVE-2023-0991 RESERVED @@ -6963,6 +6968,7 @@ CVE-2023-26250 RESERVED CVE-2023-26249 (Knot Resolver before 5.6.0 enables attackers to consume its resources, ...) - knot-resolver 5.6.0-1 + [bullseye] - knot-resolver (Minor issue) NOTE: https://www.knot-resolver.cz/2023-01-26-knot-resolver-5.6.0.html CVE-2023-26248 RESERVED @@ -83113,12 +83119,15 @@ CVE-2022-26891 (Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerabi NOT-FOR-US: Microsoft CVE-2022-26061 (A heap-based buffer overflow vulnerability exists in the gif2h5 functi ...) - hdf5 (bug #1031726) + [bullseye] - hdf5 (Minor issue, revisit when fixed upstream) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2022-1487 CVE-2022-25972 (An out-of-bounds write vulnerability exists in the gif2h5 functionalit ...) - hdf5 (bug #1031726) + [bullseye] - hdf5 (Minor issue, revisit when fixed upstream) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2022-1485 CVE-2022-25942 (An out-of-bounds read vulnerability exists in the gif2h5 functionality ...) - hdf5 (bug #1031726) + [bullseye] - hdf5 (Minor issue, revisit when fixed upstream) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2022-1486 CVE-2022-0935 (Host Header injection in password Reset in GitHub repository livehelpe ...) NOT-FOR-US: livehelperchat = data/dsa-needed.txt = @@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +cairosvg -- gpac (aron) -- @@ -56,6 +58,8 @@ samba sofia-sip Maintainer proposed debdiff for review with additional question and sent a followup -- +xen +-- xrdp needs
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 2fd6cae3 by Moritz Muehlenhoff at 2023-03-20T21:22:05+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2904,29 +2904,36 @@ CVE-2023-27791 CVE-2023-27790 RESERVED CVE-2023-27789 (An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/784 NOTE: https://github.com/appneta/tcpreplay/pull/783 + NOTE: Crash in CLI tool, no security impact CVE-2023-27788 (An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/786 + NOTE: Crash in CLI tool, no security impact CVE-2023-27787 (An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/788 + NOTE: Crash in CLI tool, no security impact CVE-2023-27786 (An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/782 NOTE: https://github.com/appneta/tcpreplay/pull/783 + NOTE: Crash in CLI tool, no security impact CVE-2023-27785 (An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker t ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/785 + NOTE: Crash in CLI tool, no security impact CVE-2023-27784 (An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/787 + NOTE: Crash in CLI tool, no security impact CVE-2023-27783 (An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacke ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/780 NOTE: https://github.com/appneta/tcpreplay/pull/781 + NOTE: Crash in CLI tool, no security impact CVE-2023-27782 RESERVED CVE-2023-27781 (jpegoptim v1.5.2 was discovered to contain a heap overflow in the opti ...) @@ -94538,6 +94545,7 @@ CVE-2021-46323 (Espruino 2v11.251 was discovered to contain a SEGV vulnerability NOT-FOR-US: Espruino CVE-2021-46322 (Duktape v2.99.99 was discovered to contain a SEGV vulnerability via th ...) - duktape 2.7.0-1 + [bullseye] - duktape (Minor issue) NOTE: https://github.com/svaarala/duktape/issues/2448 NOTE: https://github.com/svaarala/duktape/pull/2451 NOTE: https://github.com/svaarala/duktape/commit/fc75060165a011ff5ec43bfebea0c37a3d1baca1 @@ -128591,6 +128599,7 @@ CVE-2021-36490 RESERVED CVE-2021-36489 (Buffer Overflow vulnerability in Allegro through 5.2.6 allows attacker ...) - allegro4.4 (bug #1032670) + [bullseye] - allegro4.4 (Minor issue) [buster] - allegro4.4 (Minor issue) - allegro5 2:5.2.8.0-1 [bullseye] - allegro5 (Minor issue) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2fd6cae3b697677a6b1a3f4006a465037a8c261b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2fd6cae3b697677a6b1a3f4006a465037a8c261b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f6c41193 by Moritz Muehlenhoff at 2023-03-16T14:17:47+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2,9 +2,11 @@ CVE-2023-28488 RESERVED CVE-2023-28487 (Sudo before 1.9.13 does not escape control characters in sudoreplay ou ...) - sudo 1.9.13p1-1 + [bullseye] - sudo (Minor issue) NOTE: https://github.com/sudo-project/sudo/commit/334daf92b31b79ce68ed75e2ee14fca265f029ca CVE-2023-28486 (Sudo before 1.9.13 does not escape control characters in log messages. ...) - sudo 1.9.13p1-1 + [bullseye] - sudo (Minor issue) NOTE: https://github.com/sudo-project/sudo/commit/334daf92b31b79ce68ed75e2ee14fca265f029ca CVE-2023-28485 RESERVED @@ -2933,6 +2935,7 @@ CVE-2023-1162 (A vulnerability, which was classified as critical, was found in D NOT-FOR-US: DrayTek Vigor 2960 CVE-2023-1161 (ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 an ...) - wireshark + [bullseye] - wireshark (Minor issue) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-08.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18839 CVE-2023-1160 (Use of Platform-Dependent Third Party Components in GitHub repository ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f6c41193d4b7bda16ec132f26a43e82407c068cc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f6c41193d4b7bda16ec132f26a43e82407c068cc You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a1b5eb28 by Moritz Muehlenhoff at 2023-03-14T16:29:52+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -557,6 +557,7 @@ CVE-2023-1351 (A vulnerability classified as critical has been found in SourceCo NOT-FOR-US: SourceCodester Computer Parts Sales and Inventory System CVE-2023-1350 (A vulnerability was found in liferea. It has been rated as critical. A ...) - liferea 1.14.1-1 (bug #1032822) + [bullseye] - liferea (Minor issue) NOTE: Introduced by: https://github.com/lwindolf/liferea/commit/b8288389820a3f510ef4b21684b22439c41d95a5 (v1.12.0) NOTE: introduced by: https://github.com/lwindolf/liferea/commit/b67dbba73443ab7b36fcd3c78aa803e974c0f23e (v1.12.0) NOTE: Fixed by: https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59 (v1.14.1) @@ -1003,6 +1004,7 @@ CVE-2023-1290 (A vulnerability, which was classified as critical, has been found CVE-2023-1289 RESERVED - imagemagick + [bullseye] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-j96m-mjp6-99xr NOTE: https://github.com/ImageMagick/ImageMagick/commit/c5b23cbf2119540725e6dc81f4deb25798ead6a4 CVE-2023-1288 (An XML External Entity injection (XXE) vulnerability in ENOVIA Live Co ...) @@ -2112,6 +2114,7 @@ CVE-2023-1176 RESERVED CVE-2023-1175 (Incorrect Calculation of Buffer Size in GitHub repository vim/vim prio ...) - vim 2:9.0.1378-1 + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e NOTE: https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba (v9.0.1378) CVE-2022-4930 (A vulnerability classified as problematic was found in nuxsmin sysPass ...) @@ -2245,9 +2248,10 @@ CVE-2023-1172 CVE-2023-1171 RESERVED CVE-2023-1170 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - - vim 2:9.0.1378-1 + - vim 2:9.0.1378-1 (unimportant) NOTE: https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4 NOTE: https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c (v9.0.1376) + NOTE: Crash in CLI tool, no security impact CVE-2023-1169 RESERVED CVE-2015-10089 (A vulnerability classified as problematic has been found in flame.js. ...) @@ -7762,6 +7766,7 @@ CVE-2023-25567 (GSS-NTLMSSP, a mechglue plugin for the GSSAPI library that imple NOTE: https://github.com/gssapi/gss-ntlmssp/commit/025fbb756d44ffee8f847db4222ed6aa4bd1fbe4 (v1.2.0) CVE-2023-25566 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) - gss-ntlmssp 1.2.0-1 (bug #1031369) + [bullseye] - gss-ntlmssp (Vulnerable code not present) NOTE: https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-mfm4-6g58-jw74 NOTE: https://github.com/gssapi/gss-ntlmssp/commit/8660fb16474054e692a596e9c79670cd4d3954f4 (v1.2.0) CVE-2023-25565 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) @@ -7770,6 +7775,7 @@ CVE-2023-25565 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that imp NOTE: https://github.com/gssapi/gss-ntlmssp/commit/c16100f60907a2de92bcb676f303b81facee0f64 (v1.2.0) CVE-2023-25564 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) - gss-ntlmssp 1.2.0-1 (bug #1031369) + [bullseye] - gss-ntlmssp (Vulnerable code not present) NOTE: https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-r85x-q5px-9xfq NOTE: https://github.com/gssapi/gss-ntlmssp/commit/c753000eb31835c0664e528fbc99378ae0cbe950 (v1.2.0) CVE-2023-25563 (GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implement ...) @@ -48847,6 +48853,7 @@ CVE-2022-38102 RESERVED CVE-2022-38090 (Improper isolation of shared resources in some Intel(R) Processors whe ...) - intel-microcode (bug #1031334) + [bullseye] - intel-microcode (Minor issue) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00767.html NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20230214 CVE-2022-38084 @@ -54402,6 +54409,7 @@ CVE-2022-34657 RESERVED CVE-2022-33196 (Incorrect default permissions in some memory controller configurations ...) - intel-microcode (bug #1031334) + [bullseye] - intel-microcode (Minor issue) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00738.html NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5990d70b by Moritz Muehlenhoff at 2023-03-08T20:02:07+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1608,6 +1608,7 @@ CVE-2023-1099 (A vulnerability was found in SourceCodester Online Student Manage NOT-FOR-US: SourceCodester Online Student Management System CVE-2023-27371 (GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) ...) - libmicrohttpd 0.9.75-6 + [bullseye] - libmicrohttpd (Minor issue) NOTE: https://git.gnunet.org/libmicrohttpd.git/commit/?id=e0754d1638c602382384f1eface30854b1defeec (v0.9.76) NOTE: https://lists.gnu.org/archive/html/libmicrohttpd/2023-02/msg0.html CVE-2023-27370 @@ -3732,6 +3733,7 @@ CVE-2023-22293 RESERVED CVE-2023-0996 (There is a vulnerability in the strided image data parsing code in the ...) - libheif 1.15.1-1 (bug #1032101) + [bullseye] - libheif (Minor issue) NOTE: https://github.com/strukturag/libheif/pull/759 NOTE: https://govtech-csg.github.io/security-advisories/2023/02/24/CVE-2023-0996.html CVE-2023-0995 (Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bum ...) = data/dsa-needed.txt = @@ -12,7 +12,9 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. -- -chromium +apache2 (jmm) +-- +chromium (jmm) -- jupyter-core Maintainer asked for availability to prepare updates View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5990d70b760077ef4d7a7c7bb7441663576bb741 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5990d70b760077ef4d7a7c7bb7441663576bb741 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9501e698 by Moritz Muehlenhoff at 2023-03-03T19:43:39+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2651,6 +2651,7 @@ CVE-2023-0992 RESERVED CVE-2022-48345 (sanitize-url (aka @braintree/sanitize-url) before 6.0.2 allows XSS via ...) - node-mermaid (bug #1032313) + [bullseye] - node-mermaid (Minor issue) NOTE: https://github.com/braintree/sanitize-url/commit/d4bdc89f1743fe3cdb7c3f24b06e4c875f349b0c CVE-2023-26464 RESERVED @@ -2687,6 +2688,7 @@ CVE-2022-48342 (In JetBrains TeamCity before 2022.10.2 jVMTI was enabled by defa CVE-2023-26463 RESERVED - strongswan 5.9.8-4 + [bullseye] - strongswan (Vulnerable code not present) NOTE: https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-(cve-2023-26463).html CVE-2023-26462 (ThingsBoard 3.4.1 could allow a remote attacker to gain elevated privi ...) NOT-FOR-US: ThingsBoard @@ -45603,8 +45605,9 @@ CVE-2022-2962 (A DMA reentrancy issue was found in the Tulip device emulation in NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1171 NOTE: https://gitlab.com/qemu-project/qemu/-/commit/36a894aeb64a2e02871016da1c37d4a4ca109182 CVE-2022-2961 (A use-after-free flaw was found in the Linux kernels PLP Rose f ...) - - linux + - linux (unimportant) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2120595 + NOTE: Mitigated by hamradio-disable-auto-loading-as-mitigation-against-local-exploits.patch CVE-2022-2960 RESERVED CVE-2022-2959 (A race condition was found in the Linux kernel's watch queue due to a ...) @@ -73897,8 +73900,9 @@ CVE-2022-1250 (The LifterLMS PayPal WordPress plugin before 1.4.0 does not sanit CVE-2022-1248 (A vulnerability was found in SAP Information System 1.0 which has been ...) NOT-FOR-US: SAP CVE-2022-1247 (An issue found in linux-kernel that leads to a race condition in rose_ ...) - - linux + - linux (unimportant) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2066799 + NOTE: Mitigated by hamradio-disable-auto-loading-as-mitigation-against-local-exploits.patch CVE-2022-1246 REJECTED CVE-2022-1245 (A privilege escalation flaw was found in the token exchange feature of ...) @@ -81746,6 +81750,7 @@ CVE-2022-25928 RESERVED CVE-2022-25927 (Versions of the package ua-parser-js from 0.7.30 and before 0.7.33, fr ...) - node-ua-parser-js + [bullseye] - node-ua-parser-js (Minor issue) NOTE: https://github.com/faisalman/ua-parser-js/commit/a6140a17dd0300a35cfc9cff999545f267889411 NOTE: https://security.snyk.io/vuln/SNYK-JS-UAPARSERJS-3244450 NOTE: https://github.com/faisalman/ua-parser-js/security/advisories/GHSA-fhg7-m89q-25r3 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9501e698ef0205aff58f2d2f92aabaa73856ca72 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9501e698ef0205aff58f2d2f92aabaa73856ca72 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7fdc140f by Moritz Muehlenhoff at 2023-03-03T11:24:22+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6466,6 +6466,7 @@ CVE-2023-25156 (Kiwi TCMS, an open source test management system, does not impos NOT-FOR-US: Kiwi TCMS CVE-2023-25155 (Redis is an in-memory database that persists on disk. Authenticated us ...) - redis (bug #1032279) + [bullseye] - redis (Minor issue) NOTE: https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83 NOTE: https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619 (7.0.9) CVE-2023-25154 (Misskey is an open source, decentralized social media platform. In ver ...) @@ -37296,8 +37297,8 @@ CVE-2022-41860 (In freeradius, when an EAP-SIM supplicant sends an unknown SIM o CVE-2022-41859 (In freeradius, the EAP-PWD function compute_password_element() leaks i ...) {DLA-3342-1} - freeradius 3.2.0+dfsg-1 + [bullseye] - freeradius (Minor issue) NOTE: https://github.com/FreeRADIUS/freeradius-server/commit/9e5e8f2f912ad2da8ac6e176ac3a606333469937 (release_3_0_26) - TODO: check details on fix CVE-2022-41858 (A flaw was found in the Linux kernel. A NULL pointer dereference may o ...) - linux 5.17.6-1 [bullseye] - linux 5.10.113-1 @@ -37310,10 +37311,10 @@ CVE-2022-41856 CVE-2022-41855 REJECTED CVE-2022-41854 (Those using Snakeyaml to parse untrusted YAML files may be vulnerable ...) - - snakeyaml 1.33-1 + - snakeyaml 1.33-1 (unimportant) [buster] - snakeyaml 1.23-1+deb10u1 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355 - TODO: check details + NOTE: No suitable for parsing untrusted YAML, see README.Debian.security CVE-2022-41853 (Those using java.sql.Statement or java.sql.PreparedStatement in hsqldb ...) {DSA-5313-1 DLA-3234-1} - hsqldb 2.7.1-1 (bug #1023573) = data/dsa-needed.txt = @@ -38,6 +38,8 @@ php-horde-mime-viewer -- php-horde-turba -- +py7zr +-- rails (aron) -- ring View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7fdc140f1370c83b3d3418e2815f1c65aff48fe1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7fdc140f1370c83b3d3418e2815f1c65aff48fe1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e6c2bacf by Moritz Muehlenhoff at 2023-03-01T12:25:54+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3276,6 +3276,7 @@ CVE-2023-0912 (A vulnerability classified as critical has been found in SourceCo NOT-FOR-US: SourceCodester Auto Dealer Management System CVE-2019-25104 (A vulnerability has been found in rtcwcoop 1.0.2 and classified as pro ...) - iortcw (bug #1031732) + [bullseye] - iortcw (Minor issue) NOTE: https://github.com/rtcwcoop/rtcwcoop/pull/45 NOTE: Reported against a version based on iortcw, but seems missing in iortcw CVE-2016-15026 (A vulnerability was found in 3breadt dd-plist 1.17 and classified as p ...) @@ -6903,6 +6904,7 @@ CVE-2023-24810 (Misskey is an open source, decentralized social media platform. NOT-FOR-US: Misskey CVE-2023-24809 (NetHack is a single player dungeon exploration game. Starting with ver ...) - nethack (bug #1031869) + [bullseye] - nethack (Minor issue) [buster] - nethack (Minor issue) NOTE: https://github.com/NetHack/NetHack/security/advisories/GHSA-2cqv-5w4v-mgch NOTE: https://nethack.org/security/CVE-2023-24809.html @@ -8318,6 +8320,7 @@ CVE-2023-24330 CVE-2023-24329 (An issue in the urllib.parse component of Python before v3.11 allows a ...) - python3.11 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 NOTE: https://pointernull.com/security/python-url-parse-problem.html NOTE: https://github.com/python/cpython/pull/99421 @@ -11655,11 +11658,13 @@ CVE-2023-23111 CVE-2023-23110 (An exploitable firmware modification vulnerability was discovered in c ...) NOT-FOR-US: Netgear CVE-2023-23109 (In crasm 1.8-3, invalid input validation, specific files passed to the ...) - - crasm + - crasm (unimportant) NOTE: https://github.com/colinbourassa/crasm/pull/7 + NOTE: Crash in CLI tool, no security impact CVE-2023-23108 (In crasm 1.8-3, invalid input validation, specific files passed to the ...) - - crasm + - crasm (unimportant) NOTE: https://github.com/colinbourassa/crasm/pull/7 + NOTE: Crash in CLI tool, no security impact CVE-2023-23107 RESERVED CVE-2023-23106 @@ -81586,6 +81591,7 @@ CVE-2022-21223 (The package cocoapods-downloader before 1.6.2 are vulnerable to NOT-FOR-US: cocoapods-downloader CVE-2022-21222 (The package css-what before 2.1.3 are vulnerable to Regular Expression ...) - node-css-what 5.0.1 + [bullseye] - node-css-what (Minor issue) NOTE: https://security.snyk.io/vuln/SNYK-JS-CSSWHAT-3035488 NOTE: ReDoS issue fixed with rewrite of module to TypeScript NOTE: Not fixed in 4.0.0 see https://sources.debian.org/src/node-css-what/4.0.0-3/src/parse.ts/#L84 = data/dsa-needed.txt = @@ -17,6 +17,8 @@ apr (carnil) jupyter-core Maintainer asked for availability to prepare updates -- +libreswan +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions @@ -26,6 +28,9 @@ netatalk -- nodejs (aron) -- +openimageio + some issues allow for RCE, the other ones can also be ignored for stable +-- php-cas -- php-horde-mime-viewer @@ -34,6 +39,9 @@ php-horde-turba -- rails (aron) -- +ring + might make sense to rebase to current version +-- ruby-nokogiri -- ruby-rack @@ -50,6 +58,8 @@ sofia-sip spip (seb) Maintainer prepared updates -- +syslog-ng +-- xrdp needs some additional clarification, tentatively DSA worthy maybe upgrade to 0.9.21 within bullseye? View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6c2bacfee370b446f649ac41ff3482b0c5f72d5 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6c2bacfee370b446f649ac41ff3482b0c5f72d5 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5de29380 by Moritz Muehlenhoff at 2023-02-23T12:26:31+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -521,6 +521,7 @@ CVE-2023-26254 RESERVED CVE-2023-26253 (In Gluster GlusterFS 11.0, there is an xlators/mount/fuse/src/fuse-bri ...) - glusterfs (bug #1031731) + [bullseye] - glusterfs (Minor issue) NOTE: https://github.com/gluster/glusterfs/issues/3954 CVE-2023-26252 RESERVED @@ -628,6 +629,7 @@ CVE-2023-0927 (Use after free in Web Payments API in Google Chrome on Android pr [buster] - chromium (see DSA 5046) CVE-2022-48340 (In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-com ...) - glusterfs (bug #1031796) + [bullseye] - glusterfs (Minor issue) NOTE: https://github.com/gluster/glusterfs/issues/3732 CVE-2022-48336 RESERVED @@ -15629,6 +15631,7 @@ CVE-2022-4511 (A vulnerability has been found in RainyGao DocSys and classified NOT-FOR-US: RainyGao DocSys CVE-2022-4510 (A path traversal vulnerability was identified in ReFirm Labs binwalk f ...) - binwalk 2.3.4+dfsg1-1 + [bullseye] - binwalk (Minor issue) NOTE: https://github.com/ReFirmLabs/binwalk/pull/617 NOTE: https://github.com/ReFirmLabs/binwalk/commit/696fe34ed680ffd951bfeca737feb4a0b98dde5c (v2.3.4) CVE-2022-4509 (The Content Control WordPress plugin before 1.1.10 does not validate a ...) @@ -91768,6 +91771,7 @@ CVE-2021-46024 (Projectworlds online-shopping-webvsite-in-php 1.0 suffers from a NOT-FOR-US: Projectworlds online-shopping-webvsite-in-php CVE-2021-46023 (An Untrusted Pointer Dereference was discovered in function mrb_vm_exe ...) - mruby 3.1.0-1 + [bullseye] - mruby (Minor issue) NOTE: https://github.com/mruby/mruby/issues/5613 CVE-2021-46022 (An Use-After-Free vulnerability in rec_mset_elem_destroy() at rec-mset ...) - recutils (unimportant) @@ -130834,6 +130838,7 @@ CVE-2021-32851 (Mind-elixir is a free, open source mind map core. Prior to versi TODO: check CVE-2021-32850 (jQuery MiniColors is a color picker built on jQuery. Prior to version ...) - jquery-minicolors (bug #1031791) + [bullseye] - jquery-minicolors (Minor issue) NOTE: https://securitylab.github.com/advisories/GHSL-2021-1045_jQuery_MiniColors_Plugin/ NOTE: https://github.com/claviska/jquery-minicolors/commit/ef134824a7f4110ada53ea6c173111a4fa2f48f3 (2.3.6) CVE-2021-32849 (Gerapy is a distributed crawler management framework. Prior to version ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5de29380efc69f27b721942c55c1e2ba8aef0ba8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5de29380efc69f27b721942c55c1e2ba8aef0ba8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a7c31718 by Moritz Muehlenhoff at 2023-02-15T17:48:34+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -235,6 +235,7 @@ CVE-2023-0806 RESERVED CVE-2023-25727 (In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated use ...) - phpmyadmin 4:5.2.1+dfsg-1 + [bullseye] - phpmyadmin (Minor issue) NOTE: https://www.phpmyadmin.net/security/PMASA-2023-1/ CVE-2023-25726 RESERVED @@ -10635,6 +10636,7 @@ CVE-2023-22333 (Cross-site scripting vulnerability in EasyMail 2.00.130 and earl NOT-FOR-US: EasyMail CVE-2023-22332 (Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4. ...) - pgpool2 (bug #1030048) + [bullseye] - pgpool2 (Minor issue) NOTE: https://www.pgpool.net/mediawiki/index.php/Main_Page#News CVE-2023-22324 (SQL injection vulnerability in the CONPROSYS HMI System (CHS) Ver.3.5. ...) NOT-FOR-US: CONPROSYS @@ -72086,6 +72088,7 @@ CVE-2022-27673 (Insufficient access controls in the AMD Link Android app may pot CVE-2022-27672 (When SMT is enabled, certain AMD processors may speculatively execute ...) - linux 6.1.12-1 - xen + [bullseye] - xen (Vulnerable code not present) NOTE: https://www.openwall.com/lists/oss-security/2023/02/14/4 NOTE: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1045 NOTE: https://xenbits.xen.org/xsa/advisory-426.html = data/dsa-needed.txt = @@ -16,6 +16,8 @@ apr-util (carnil) -- apr (carnil) -- +curl +-- firefox-esr (jmm) -- frr @@ -30,6 +32,8 @@ linux (carnil) netatalk open regression with MacOS, tentative patch not yet merged upstream -- +nss +-- multipath-tools Tobias Frost proposed a potential update to be reviewed, maintainer asked to review changes -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a7c31718befd1381e7360aee9f0689aee6957cdb -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a7c31718befd1381e7360aee9f0689aee6957cdb You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 930574e9 by Moritz Muehlenhoff at 2023-02-10T08:59:38+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -5363,6 +5363,7 @@ CVE-2023-23628 (Metabase is an open source data analytics platform. Affected ver NOT-FOR-US: Metabase CVE-2023-23627 (Sanitize is an allowlist-based HTML and CSS sanitizer. Versions 5.0.0 ...) - ruby-sanitize (bug #1030047) + [bullseye] - ruby-sanitize (Minor issue) NOTE: https://github.com/rgrove/sanitize/security/advisories/GHSA-fw3g-2h3j-qmm7 NOTE: https://github.com/rgrove/sanitize/commit/ec14265e530dc3fe31ce2ef773594d3a97778d22 (v6.0.1) CVE-2023-23626 @@ -10350,6 +10351,7 @@ CVE-2020-36628 (A vulnerability classified as critical has been found in Calsign NOT-FOR-US: Calsign APDE CVE-2020-36627 (A vulnerability was found in Macaron i18n. It has been declared as pro ...) - golang-github-go-macaron-i18n + [bullseye] - golang-github-go-macaron-i18n (Minor issue) [buster] - golang-github-go-macaron-i18n (Limited support, minor issue, follow bullseye DSAs/point-releases) NOTE: https://github.com/go-macaron/i18n/commit/329b0c4844cc16a5a253c011b55180598e707735 (v0.5.0) CVE-2020-36626 (A vulnerability classified as critical has been found in Modern Tribe ...) @@ -30290,9 +30292,10 @@ CVE-2022-3425 (The Analyticator WordPress plugin before 6.5.6 unserializes user NOT-FOR-US: WordPress plugin CVE-2022-3424 [misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os] RESERVED - - linux 6.1.4-1 + - linux 6.1.4-1 (unimportant) NOTE: https://lore.kernel.org/all/20221006152643.1694235-1-zyytlz...@163.com/ NOTE: https://git.kernel.org/linus/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc + NOTE: SGI_GRU not enabled in any Debian kernel CVE-2022-3423 (Denial of Service in GitHub repository nocodb/nocodb prior to 0.92.0. ...) NOT-FOR-US: nocodb CVE-2022-3422 (Account Takeover :: when see the info i can see the hash pass i can cr ...) @@ -34889,6 +34892,7 @@ CVE-2022-3217 (When logging in to a VBASE runtime project via Web-Remote, the pr CVE-2018-25047 (In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.ma ...) {DLA-3262-1} - smarty3 3.1.47-1 (bug #1019897) + [bullseye] - smarty3 (Minor issue) - smarty4 4.2.1-1 (bug #1019896) NOTE: https://github.com/smarty-php/smarty/issues/454 NOTE: https://github.com/smarty-php/smarty/commit/f1f7ee6e34c14a8a9dfa5c6ef894d39277a93938 (v3.1.47) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/930574e97e267371947b4c9b04c882b39470f0ad -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/930574e97e267371947b4c9b04c882b39470f0ad You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5790e7d1 by Moritz Muehlenhoff at 2023-02-07T13:54:27+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -7620,6 +7620,7 @@ CVE-2023-22800 CVE-2023-22799 RESERVED - ruby-globalid (bug #1029851) + [bullseye] - ruby-globalid (Minor issue) NOTE: https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127 NOTE: https://github.com/rails/globalid/commit/3bc4349422e60f2235876a59dd415e98b072eb2b (v1.1.0) CVE-2023-22798 @@ -15551,11 +15552,13 @@ CVE-2022-46491 (A Cross-Site Request Forgery (CSRF) vulnerability in the Add Adm NOT-FOR-US: nbnbk CVE-2022-46490 (GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contai ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2327 NOTE: https://github.com/gpac/gpac/commit/8968a510250e8c70a611221d63fe0a45b7d3a551 (v2.2.0) CVE-2022-46489 (GPAC version 2.1-DEV-rev505-gb9577e6ad-master was discovered to contai ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2328 NOTE: https://github.com/gpac/gpac/commit/44e8616ec6d0c37498cdacb81375b09249fa9daa (v2.2.0) = data/dsa-needed.txt = @@ -20,6 +20,8 @@ frr -- haproxy (carnil) -- +imagemagick (jmm) +-- jupyter-core Maintainer asked for availability to prepare updates -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5790e7d1be5c9ef84935d7ef5bb8e86633caa37b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5790e7d1be5c9ef84935d7ef5bb8e86633caa37b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 891d9dab by Moritz Muehlenhoff at 2023-02-06T16:53:15+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -526,10 +526,11 @@ CVE-2023-25002 CVE-2023-25001 RESERVED CVE-2023-0634 (An uncontrolled process operation was found in the newgrp command prov ...) - - shadow + - shadow (unimportant) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2166544 NOTE: https://github.com/shadow-maint/shadow/pull/642 NOTE: https://github.com/shadow-maint/shadow/commit/62172f6fb51519a8cf56e35e4ce2b76cc301a7fc + NOTE: Crash in CLI tool, no security impact CVE-2023-0633 RESERVED CVE-2023-0632 @@ -27436,6 +27437,7 @@ CVE-2022-3561 (Cross-site Scripting (XSS) - Generic in GitHub repository librenm NOT-FOR-US: LibreNMS CVE-2022-3560 (A flaw was found in pesign. The pesign package provides a systemd serv ...) - pesign (bug #1030168) + [bullseye] - pesign (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/01/31/6 NOTE: https://www.openwall.com/lists/oss-security/2023/02/01/2 NOTE: https://github.com/rhboot/pesign/commit/d8a8c259994d0278c59b30b41758a8dd0abff998 (116) @@ -78149,10 +78151,12 @@ CVE-2022-24896 (Tuleap is a Free Open Source Suite to manage software deve NOT-FOR-US: Tuleap CVE-2022-24895 (Symfony is a PHP framework for web and console applications and a set ...) - symfony 5.4.20+dfsg-1 + [bullseye] - symfony (Minor issue) NOTE: https://github.com/symfony/symfony/security/advisories/GHSA-3gv2-29qc-v67m NOTE: https://github.com/symfony/symfony/commit/5909d74ecee359ea4982fcf4331aaf2e489a1fd4 CVE-2022-24894 (Symfony is a PHP framework for web and console applications and a set ...) - symfony 5.4.20+dfsg-1 + [bullseye] - symfony (Minor issue) NOTE: https://github.com/symfony/symfony/security/advisories/GHSA-h7vf-5wrv-9fhv NOTE: https://github.com/symfony/symfony/commit/d2f6322af9444ac5cd1ef3ac6f280dbef7f9d1fb CVE-2022-24893 (ESP-IDF is the official development framework for Espressif SoCs. In E ...) = data/dsa-needed.txt = @@ -11,9 +11,15 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +apr-util +-- +apr -- frr -- +haproxy +-- jupyter-core Maintainer asked for availability to prepare updates -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/891d9dab823803c5fa72786a7d4f30558b57b1de -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/891d9dab823803c5fa72786a7d4f30558b57b1de You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9e5dd925 by Moritz Muehlenhoff at 2023-01-30T13:14:37+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2935,6 +2935,7 @@ CVE-2023- [RUSTSEC-2023-0002] NOTE: https://github.com/rust-lang/git2-rs/pull/909 CVE-2023- [RUSTSEC-2022-0078] - rust-bumpalo + [bullseye] - rust-bumpalo (Minor issue) NOTE: https://rustsec.org/advisories/RUSTSEC-2022-0078.html NOTE: https://github.com/fitzgen/bumpalo/blob/main/CHANGELOG.md#3111 CVE-2023-23698 @@ -12387,6 +12388,7 @@ CVE-2022-4397 (A vulnerability was found in morontt zend-blog-number-2. It has b NOT-FOR-US: morontt zend-blog-number-2 CVE-2022-4396 (** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in RDFlib py ...) - python-pyrdfa 3.5.2+20220329~ds-1 (bug #1026051) + [bullseye] - python-pyrdfa (Minor issue) NOTE: https://github.com/RDFLib/pyrdfa3/commit/ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e NOTE: https://github.com/RDFLib/pyrdfa3/pull/40 CVE-2022-46906 (Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allo ...) @@ -31025,6 +31027,7 @@ CVE-2020-36604 (hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisonin NOTE: Fixed by: https://github.com/hapijs/hoek/commit/948baf98634a5c206875b67d11368f133034fa90 (v9.0.3) CVE-2022-3276 (Command injection is possible in the puppetlabs-mysql module prior to ...) - puppet-module-puppetlabs-mysql (bug #1027154) + [bullseye] - puppet-module-puppetlabs-mysql (Minor issue) NOTE: https://puppet.com/security/cve/CVE-2022-3276 NOTE: https://github.com/puppetlabs/puppetlabs-mysql/commit/f83792b256fa6acc1b1375b3bfed257629a5c02d (v13.0.0) NOTE: https://github.com/puppetlabs/puppetlabs-mysql/commit/18813a151f150a374a52141db520ed2a8d38b071 (v13.0.0) @@ -45186,6 +45189,7 @@ CVE-2022-35978 (Minetest is a free open-source voxel game engine with easy moddi NOTE: https://github.com/minetest/minetest/commit/da71e86633d0b27cd02d7aac9fdac625d141ca13 (5.6.0) CVE-2022-35977 (Redis is an in-memory database that persists on disk. Authenticated us ...) - redis 5:7.0.8-1 + [bullseye] - redis (Minor issue) NOTE: https://github.com/redis/redis/commit/6c25c6b7da116e110e89a5db45eeae743879e7ea (7.0.8) CVE-2022-35976 (The GitOps Tools Extension for VSCode relies on kubeconfigs in order t ...) NOT-FOR-US: GitOps Tools Extension for VSCode @@ -81059,6 +81063,7 @@ CVE-2022-23838 CVE-2022-23837 (In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the ...) {DLA-2943-1} - ruby-sidekiq (bug #1004193) + [bullseye] - ruby-sidekiq (Minor issue) NOTE: https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956 (v6.4.0) CVE-2022-23836 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9e5dd925f26f10f7189f3c8f80d0546f2470ac47 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9e5dd925f26f10f7189f3c8f80d0546f2470ac47 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 11ade977 by Moritz Mühlenhoff at 2023-01-30T11:55:30+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -16622,6 +16622,7 @@ CVE-2022-4056 RESERVED CVE-2022-4055 (When xdg-mail is configured to use thunderbird for mailto URLs, improp ...) - xdg-utils (bug #1027160) + [bullseye] - xdg-utils (Minor issue) NOTE: https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267 NOTE: https://gitlab.freedesktop.org/xdg/xdg-utils/-/merge_requests/58 CVE-2022-4054 (An issue has been discovered in GitLab affecting all versions starting ...) @@ -40567,6 +40568,7 @@ CVE-2022-37706 (enlightenment_sys in Enlightenment before 0.25.4 allows local us CVE-2022-37705 RESERVED - amanda (bug #1029829) + [bullseye] - amanda (Minor issue) NOTE: https://github.com/MaherAzzouzi/CVE-2022-37705 NOTE: https://github.com/zmanda/amanda/issues/192 NOTE: https://marc.info/?l=amanda-hackers=167437716918603=2 = data/dsa-needed.txt = @@ -11,9 +11,13 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +cinder (jmm) -- frr -- +glance (jmm) +-- jupyter-core Maintainer asked for availability to prepare updates -- @@ -28,6 +32,8 @@ linux (carnil) netatalk open regression with MacOS, tentative patch not yet merged upstream -- +nova (jmm) +-- multipath-tools Tobias Frost proposed a potential update to be reviewed, maintainer asked to review changes -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11ade977b14218f0b01408703bf04687a6c1a640 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11ade977b14218f0b01408703bf04687a6c1a640 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: ada99554 by Moritz Muehlenhoff at 2023-01-28T13:15:35+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2399,7 +2399,9 @@ CVE-2023-0342 CVE-2023-0341 [potential buffer overflow in ec_glob] RESERVED - editorconfig-core 0.12.6-0.1 - TODO: check details + [bullseye] - editorconfig-core (Minor issue) + NOTE: https://github.com/editorconfig/editorconfig-core-c/pull/87 + NOTE: https://github.com/editorconfig/editorconfig-core-c/commit/41281ea82fbf24b060a9f69b9c5369350fb0529e CVE-2023-0340 RESERVED CVE-2023-0339 @@ -11540,8 +11542,9 @@ CVE-2022-47026 CVE-2022-47025 RESERVED CVE-2022-47024 (A null pointer dereference issue was discovered in function gui_x11_cr ...) - - vim 2:9.0.0626-1 + - vim 2:9.0.0626-1 (unimportant) NOTE: https://github.com/vim/vim/commit/a63ad78ed31e36dbdf3a9cd28071dcdbefce7d19 (v9.0.0339) + NOTE: Crash in CLI tool, no security impact CVE-2022-47023 RESERVED CVE-2022-47022 @@ -13699,12 +13702,14 @@ CVE-2022-4257 (A vulnerability was found in C-DATA Web Management System. It has CVE-2022-4256 (The All-in-One Addons for Elementor WordPress plugin before 2.4.4 does ...) NOT-FOR-US: WordPress plugin CVE-2022-4255 (An info leak issue was identified in all versions of GitLab EE from 13 ...) - TODO: check + - gitlab (Specific to EE) CVE-2022-4254 [libsss_certmap fails to sanitise certificate data used in LDAP filters] RESERVED - sssd 2.3.1-1 + [bullseye] - sssd (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2149894 - TODO: check upstream references (missing), and fixing commit + NOTE: https://github.com/SSSD/sssd/issues/5135 + NOTE: https://github.com/SSSD/sssd/commit/a2b9a84460429181f2a4fa7e2bb5ab49fd561274 CVE-2022-4253 (A vulnerability was found in SourceCodester Canteen Management System. ...) NOT-FOR-US: SourceCodester Canteen Management System CVE-2022-4252 (A vulnerability was found in SourceCodester Canteen Management System. ...) @@ -15420,6 +15425,7 @@ CVE-2022-45749 RESERVED CVE-2022-45748 (An issue was discovered with assimp 5.1.4, a use after free occurred i ...) - assimp + [bullseye] - assimp (Minor issue) NOTE: https://github.com/assimp/assimp/issues/4286 CVE-2022-45747 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ada99554bb1804d57a86712e01498675d04c7b53 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ada99554bb1804d57a86712e01498675d04c7b53 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: c8516a5c by Moritz Muehlenhoff at 2023-01-26T13:05:59+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -11301,6 +11301,7 @@ CVE-2022-47017 RESERVED CVE-2022-47016 (A null pointer dereference issue was discovered in function window_pan ...) - tmux + [bullseye] - tmux (Minor issue) NOTE: https://github.com/tmux/tmux/issues/3312 NOTE: https://github.com/tmux/tmux/issues/3447 NOTE: https://github.com/tmux/tmux/commit/e86752820993a00e3d28350cbe46878ba95d9012 @@ -23899,10 +23900,14 @@ CVE-2022-43592 (An information disclosure vulnerability exists in the DPXOutput: - openimageio (bug #1027143) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2022-1651 CVE-2022-43591 (A buffer overflow vulnerability exists in the QML QtScript Reflect API ...) - - qt6-declarative - - qtdeclarative-opensource-src - - qtdeclarative-opensource-src-gles + - qt6-declarative 6.4.2+dfsg~rc1-2 (unimportant) + - qtdeclarative-opensource-src (unimportant) + - qtdeclarative-opensource-src-gles (unimportant) + NOTE: Not considered a security issue, QML only supported from a trusted source NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1650 + NOTE: https://www.qt.io/blog/regarding-recent-reported-security-vulnerabilities-from-cisco-talos + NOTE: https://bugreports.qt.io/browse/QTBUG-107619 + NOTE: https://codereview.qt-project.org/c/qt/qtdeclarative/+/437789 CVE-2022-43590 (A null pointer dereference vulnerability exists in the handle_ioctl_0x ...) NOT-FOR-US: Callback technologies CBFS Filter CVE-2022-43589 (A null pointer dereference vulnerability exists in the handle_ioctl_83 ...) @@ -30667,10 +30672,14 @@ CVE-2022-41141 CVE-2022-41140 RESERVED CVE-2022-40983 (An integer overflow vulnerability exists in the QML QtScript Reflect A ...) - - qt6-declarative - - qtdeclarative-opensource-src - - qtdeclarative-opensource-src-gles - NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1617 + - qt6-declarative 6.4.2+dfsg~rc1-2 (unimportant) + - qtdeclarative-opensource-src (unimportant) + - qtdeclarative-opensource-src-gles (unimportant) + NOTE: Not considered a security issue, QML only supported from a trusted source + NOTE: https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1650 + NOTE: https://www.qt.io/blog/regarding-recent-reported-security-vulnerabilities-from-cisco-talos + NOTE: https://bugreports.qt.io/browse/QTBUG-107619 + NOTE: https://codereview.qt-project.org/c/qt/qtdeclarative/+/437921 CVE-2022-40693 RESERVED CVE-2022-41222 (mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via ...) @@ -33045,6 +33054,7 @@ CVE-2022-40153 REJECTED CVE-2022-40152 (Those using Woodstox to parse XML data may be vulnerable to Denial of ...) - libwoodstox-java + [bullseye] - libwoodstox-java (Minor issue) NOTE: https://github.com/x-stream/xstream/issues/304 NOTE: https://github.com/advisories/GHSA-3f7h-mf4q-vrm4 CVE-2022-40151 (Those using Xstream to seralize XML data may be vulnerable to Denial o ...) = data/dsa-needed.txt = @@ -12,10 +12,10 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. -- -bind9 +bind9 (jmm) Maintainer uploaded bullseye-security update -- -chromium +chromium (jmm) -- curl (jmm) Team asked maintainer to prepare updates @@ -27,6 +27,8 @@ git (aron) jupyter-core Maintainer asked for availability to prepare updates -- +libde265 +-- libhtml-stripscripts-perl (carnil) -- linux (carnil) @@ -43,7 +45,7 @@ openjdk-11 (jmm) -- openjdk-17 (jmm) -- -php-cas (jmm) +php-cas -- php-horde-mime-viewer -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8516a5c66faf2d9238e807e4879c611e8462fdb -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c8516a5c66faf2d9238e807e4879c611e8462fdb You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: aac46c0f by Moritz Muehlenhoff at 2023-01-24T14:52:24+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -927,6 +927,7 @@ CVE-2023-24057 RESERVED CVE-2023-24056 (In pkgconf through 1.9.3, variable duplication can cause unbounded str ...) - pkgconf 1.8.1-1 + [bullseye] - pkgconf (Minor issue) NOTE: https://gitea.treehouse.systems/ariadne/pkgconf/commit/81cc9b3e6dafcdd02579bcccec6ac47d91e5d023 (pkgconf-1.9.4, pkgconf-1.8.1) NOTE: https://nullprogram.com/blog/2023/01/18/ CVE-2023-24055 (** DISPUTED ** KeePass through 2.53 (in a default installation) allows ...) @@ -4865,6 +4866,7 @@ CVE-2023-22743 RESERVED CVE-2023-22742 (libgit2 is a cross-platform, linkable library implementation of Git. W ...) - libgit2 1.5.1+ds-1 (bug #1029368) + [bullseye] - libgit2 (Minor issue) NOTE: https://github.com/libgit2/libgit2/commit/cd6f679af401eda1f172402006ef8265f8bd58ea (v1.4.5) NOTE: https://github.com/libgit2/libgit2/commit/42e5db98b963ae503229c63e44e06e439df50e56 (v1.5.1) NOTE: https://github.com/libgit2/libgit2/security/advisories/GHSA-8643-3wh5-rmjq = data/dsa-needed.txt = @@ -22,6 +22,8 @@ git (aron) jupyter-core Maintainer asked for availability to prepare updates -- +libhtml-stripscripts-perl +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aac46c0f00aa64ff20550209ed3caafa28517b98 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aac46c0f00aa64ff20550209ed3caafa28517b98 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 4c023ff2 by Moritz Muehlenhoff at 2023-01-23T11:18:33+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -632,32 +632,39 @@ CVE-2022-48280 RESERVED CVE-2023- [wnpa-sec-2023-07: TIPC dissector crash] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-07.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18770 CVE-2023- [wnpa-sec-2023-06: Multiple dissector excessive loops] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-06.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18711 NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18720 NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18737 CVE-2023- [wnpa-sec-2023-05: iSCSI dissector crash] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-05.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18796 CVE-2023- [wnpa-sec-2023-04: GNW dissector crash] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-04.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18779 CVE-2023- [wnpa-sec-2023-03: Dissection engine crash] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-03.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18766 CVE-2023- [wnpa-sec-2023-02: NFS dissector memory leak] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-02.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18628 CVE-2023- [wnpa-sec-2023-01: EAP dissector crash] - wireshark 4.0.3-1 + [bullseye] - wireshark (Minor issue, fix along in future update) NOTE: https://www.wireshark.org/security/wnpa-sec-2023-01.html NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18622 CVE-2023-24059 (Grand Theft Auto V for PC allows attackers to achieve partial remote c ...) @@ -677,9 +684,10 @@ CVE-2023-0434 (Improper Input Validation in GitHub repository pyload/pyload prio CVE-2023-24054 RESERVED CVE-2023-0433 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e/ NOTE: https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b (v9.0.1225) + NOTE: Crash in CLI tool, no security impact CVE-2023-24053 RESERVED CVE-2023-24052 @@ -4591,6 +4599,7 @@ CVE-2023-22746 RESERVED CVE-2023-22745 (tpm2-tss is an open source software implementation of the Trusted Comp ...) - tpm2-tss (bug #1029369) + [bullseye] - tpm2-tss (Minor issue) NOTE: Fixed by: https://github.com/tpm2-software/tpm2-tss/commit/306490c8d848c367faa2d9df81f5e69dab46ffb5 NOTE: https://github.com/tpm2-software/tpm2-tss/security/advisories/GHSA-4j3v-fh23-vx67 CVE-2023-22744 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4c023ff2561f93e8ebcc48651fcda6fa15803434 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4c023ff2561f93e8ebcc48651fcda6fa15803434 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e9a278be by Moritz Muehlenhoff at 2023-01-18T15:37:34+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -712,10 +712,10 @@ CVE-2023-0290 CVE-2023-0289 (Cross-site Scripting (XSS) - Stored in GitHub repository craigk5n/webc ...) NOT-FOR-US: craigk5n/webcalendar CVE-2023-0288 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - - vim - [buster] - vim (Minor issue) + - vim (unimportant) NOTE: https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3 NOTE: https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a (v9.0.1189) + NOTE: Crash in CLI tool, no security impact CVE-2023-0287 (A vulnerability was found in ityouknow favorites-web. It has been rate ...) NOT-FOR-US: ityouknow favorites-web CVE-2023-0286 @@ -2487,6 +2487,7 @@ CVE-2023-22900 RESERVED CVE-2023-22899 (Zip4j through 2.11.2, as used in Threema and other products, does not ...) - zip4j 2.11.2-3 (bug #1029038) + [bullseye] - zip4j (Minor issue) NOTE: https://github.com/srikanth-lingala/zip4j/issues/485 NOTE: https://github.com/srikanth-lingala/zip4j/commit/597b31afb473a40e8252de5b5def1876bab198d3 CVE-2023-22898 (workers/extractor.py in Pandora (aka pandora-analysis/pandora) 1.3.0 a ...) @@ -2678,6 +2679,7 @@ CVE-2022-4884 (Path-Traversal in MKP storing in Tribe29 Checkmk =2.0.0p32 an CVE-2022-4883 RESERVED - libxpm 1:3.5.12-1.1 + [bullseye] - libxpm (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/01/17/2 NOTE: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/515294bb8023a45ff916696d0a14308ff4f3a376 (libXpm-3.5.15) NOTE: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/8178eb0834d82242e1edbc7d4fb0d1b397569c68 (libXpm-3.5.15) @@ -2728,11 +2730,13 @@ CVE-2022-48230 CVE-2022-46285 RESERVED - libxpm 1:3.5.12-1.1 + [bullseye] - libxpm (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/01/17/2 NOTE: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/a3a7c6dcc3b629d765014816c566c63165c63ca8 (libXpm-3.5.15) CVE-2022-44617 RESERVED - libxpm 1:3.5.12-1.1 + [bullseye] - libxpm (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/01/17/2 NOTE: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/f80fa6ae47ad4a5beacb287c0030c9913b046643 (libXpm-3.5.15) NOTE: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/c5ab17bcc34914c0b0707d2135dbebe9a367c5f0 (libXpm-3.5.15) @@ -2810,6 +2814,7 @@ CVE-2021-4307 (A vulnerability was found in Yomguithereal Baobab up to 2.6.0. It NOT-FOR-US: Yomguithereal Baobab CVE-2020-36646 (A vulnerability classified as problematic has been found in MediaArea ...) - libzen 0.4.39-1 + [bullseye] - libzen (Minor issue) NOTE: https://github.com/MediaArea/ZenLib/pull/119 NOTE: https://github.com/MediaArea/ZenLib/commit/6475fcccd37c9cf17e0cfe263b5fe0e2e47a8408 (v0.4.39) CVE-2017-20164 (A vulnerability was found in Symbiote Seed up to 6.0.2. It has been cl ...) = data/dsa-needed.txt = @@ -67,6 +67,8 @@ sofia-sip sox patch needed for CVE-2021-40426, check with upstream -- +swift +-- tiff (aron) -- varnish (carnil) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e9a278be78d80b41807a9bca05c586c0681c9ea1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e9a278be78d80b41807a9bca05c586c0681c9ea1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9d5282a2 by Moritz Muehlenhoff at 2023-01-18T14:07:25+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -375,6 +375,7 @@ CVE-2023-0331 CVE-2023-0330 RESERVED - qemu + [bullseye] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2160151 NOTE: Proposed patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-01/msg03411.html CVE-2023-0329 @@ -12013,7 +12014,9 @@ CVE-2022-46177 (Discourse is an option source discussion platform. Prior to vers NOT-FOR-US: Discourse CVE-2022-46176 (Cargo is a Rust package manager. The Rust Security Response WG was not ...) - cargo 0.66.0+ds1-1 + [bullseye] - cargo (Minor issue) - rust-cargo 0.66.0-1 + [bullseye] - rust-cargo (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2023/01/10/3 NOTE: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176 CVE-2022-46175 (JSON5 is an extension to the popular JSON file format that aims to be ...) = data/dsa-needed.txt = @@ -11,6 +11,9 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +apache2 + Update to 2.4.55 should settle in unstable for a week, before considering an update -- curl (jmm) Team asked maintainer to prepare updates View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9d5282a23d7ffa8ee597ee185ac6cf25c8be8c3e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9d5282a23d7ffa8ee597ee185ac6cf25c8be8c3e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7ee10f8b by Moritz Muehlenhoff at 2023-01-16T13:09:50+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -22,6 +22,7 @@ CVE-2023-0306 (Cross-site Scripting (XSS) - Stored in GitHub repository thorsten NOT-FOR-US: phpmyfaq CVE-2023- [Multiple integer overflow and buffer overflow issues in game loading] - sgt-puzzles (bug #1028986) + [bullseye] - sgt-puzzles (Minor issue) CVE-2023-0305 (A vulnerability classified as critical was found in SourceCodester Onl ...) NOT-FOR-US: SourceCodester Online Food Ordering System CVE-2023-0304 (A vulnerability classified as critical has been found in SourceCodeste ...) @@ -4529,6 +4530,7 @@ CVE-2022-4744 RESERVED CVE-2022-4743 (A potential memory leak issue was discovered in SDL2 in GLES_CreateTex ...) - libsdl2 2.26.0+dfsg-1 + [bullseye] - libsdl2 (Minor issue) [buster] - libsdl2 (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2156290 NOTE: https://github.com/libsdl-org/SDL/pull/6269 @@ -123343,6 +123345,7 @@ CVE-2021-32440 (The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers NOTE: https://github.com/gpac/gpac/issues/1772 CVE-2021-32439 (Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0. ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (Vulnerable code introduced later, in version 0.8.0) [stretch] - gpac (Vulnerable code introduced later, in version 0.8.0) NOTE: https://github.com/gpac/gpac/commit/77ed81c069e10b3861d88f72e1c6be1277ee7eae (v2.0.0) @@ -190862,6 +190865,7 @@ CVE-2020-17355 (Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before CVE-2020-17354 RESERVED - lilypond 2.22.1-1 + [bullseye] - lilypond (Unfixable, marked as insecure in later uploads) NOTE: https://phabricator.wikimedia.org/T259210 NOTE: https://phabricator.wikimedia.org/T257062 NOTE: https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory = data/dsa-needed.txt = @@ -17,6 +17,8 @@ curl (jmm) -- frr -- +jupyter-core +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7ee10f8b298a0e33139452eb1b3eefec0aba4197 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 24493847 by Moritz Muehlenhoff at 2023-01-09T16:59:33+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3368,34 +3368,42 @@ CVE-2022-47664 RESERVED CVE-2022-47663 (GPAC MP4box 2.1-DEV-rev649-ga8f438d20 is vulnerable to buffer overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2360 NOTE: https://github.com/gpac/gpac/commit/e7e8745f677010a5cb3366d5cbf39df7cffaaa2d (v2.2.0) CVE-2022-47662 (GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack over ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2359 NOTE: https://github.com/gpac/gpac/commit/080a62728ccd251a7f20eaac3fda21b0716e3c9b (v2.2.0) CVE-2022-47661 (GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2358 NOTE: https://github.com/gpac/gpac/commit/aa8fbec874b5e040854e5309aa445c234618 (v2.2.0) CVE-2022-47660 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is has an integer overflow in is ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2357 NOTE: https://github.com/gpac/gpac/commit/a8f438d201fb165961ba1d5d3b80daa3637735f4 (v2.2.0) CVE-2022-47659 (GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2354 NOTE: https://github.com/gpac/gpac/commit/348d7722c1e90c7811b43b0eed5c2aca2cb8a717 (v2.2.0) CVE-2022-47658 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2356 NOTE: https://github.com/gpac/gpac/commit/55c8b3af6f5ef9e51edb41172062ca9b5db4026b (v2.2.0) CVE-2022-47657 (GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2355 NOTE: https://github.com/gpac/gpac/commit/9f1e633184904fffc315bd35ebce76b4b42f9097 (v2.2.0) CVE-2022-47656 (GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2353 NOTE: https://github.com/gpac/gpac/commit/c9a8118965b53d29837b1b82b6a58543efb23baf (v2.2.0) CVE-2022-47655 (Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_q ...) @@ -5168,6 +5176,7 @@ CVE-2022-4516 CVE-2022-4515 (A flaw was found in Exuberant Ctags in the way it handles the "-o" opt ...) {DLA-3254-1} - exuberant-ctags 1:5.9~svn20110310-18 (bug #1026995) + [bullseye] - exuberant-ctags (Minor issue) - universal-ctags (Fixed before initial upload to Debian) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2153519 NOTE: Fixed by: https://github.com/universal-ctags/ctags/commit/e00c55d7a0204dc1d0ae316141323959e1e16162 @@ -5681,6 +5690,7 @@ CVE-2022-4442 RESERVED CVE-2019-25078 (A vulnerability classified as problematic was found in pacparser up to ...) - pacparser (bug #1026106) + [bullseye] - pacparser (Minor issue) [buster] - pacparser (Minor issue) NOTE: https://github.com/manugarg/pacparser/issues/99 NOTE: https://github.com/manugarg/pacparser/commit/853e8f45607cb07b877ffd270c63dbcdd5201ad9 (v1.4.0) = data/dsa-needed.txt = @@ -66,3 +66,8 @@ sox -- tiff (aron) -- +varnish +-- +xrdp + needs some additional clarification, tentatively DSA worthy + maybe upgrade to 0.9.21 within bullseye? View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/244938475e37774c5c75690533d9804cd49f61de -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/244938475e37774c5c75690533d9804cd49f61de You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3ad52e3d by Moritz Muehlenhoff at 2023-01-09T10:28:37+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3400,13 +3400,16 @@ CVE-2022-47656 (GPAC MP4box 2.1-DEV-rev617-g85ce76efd is vulnerable to Buffer Ov NOTE: https://github.com/gpac/gpac/commit/c9a8118965b53d29837b1b82b6a58543efb23baf (v2.2.0) CVE-2022-47655 (Libde265 1.0.9 is vulnerable to Buffer Overflow in function void put_q ...) - libde265 + [bullseye] - libde265 (Minor issue) NOTE: https://github.com/strukturag/libde265/issues/367 CVE-2022-47654 (GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2350 NOTE: https://github.com/gpac/gpac/commit/88e7b873da5d3e85d31b601c1560d2e24a1d7b25 (v2.2.0) CVE-2022-47653 (GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2349 NOTE: https://github.com/gpac/gpac/commit/a1e197581437cf0a104a9b6543cb4547cfdfc03f (v2.2.0) CVE-2022-47652 @@ -6271,40 +6274,49 @@ CVE-2022-47096 RESERVED CVE-2022-47095 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2346 NOTE: https://github.com/gpac/gpac/commit/1918a58bd0c9789844cf6a377293161506ee312c (v2.2.0) CVE-2022-47094 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Null pointer de ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2345 NOTE: https://github.com/gpac/gpac/commit/6ddedfb85e617f5e935cb490d5b51f141e13a937 (v2.2.0) CVE-2022-47093 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to heap use-after- ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2344 NOTE: https://github.com/gpac/gpac/commit/706111f4d8babf0cda9fac5f3ca4e89983274d6e (v2.2.0) CVE-2022-47092 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is contains an Integer overflow ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2347 NOTE: https://github.com/gpac/gpac/commit/6bb3e4e288f02c9c595e63230979cd5443a1cb7a (v2.2.0) CVE-2022-47091 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2343 NOTE: https://github.com/gpac/gpac/commit/65d089bcb5dad6fda668ee61e38a8394ed8bdf1f (v2.2.0) CVE-2022-47090 RESERVED CVE-2022-47089 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2338 NOTE: https://github.com/gpac/gpac/commit/73a8c425adaad7526de81586fcb053acde807757 (v2.2.0) CVE-2022-47088 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b is vulnerable to Buffer Overflow ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2340 NOTE: https://github.com/gpac/gpac/commit/48760768611f6766bf9e7378bb7cc66cebd6e49d (v2.2.0) CVE-2022-47087 (GPAC MP4box 2.1-DEV-rev574-g9d5bb184b has a Buffer overflow in gf_vvc_ ...) - gpac + [bullseye] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2339 NOTE: https://github.com/gpac/gpac/commit/48760768611f6766bf9e7378bb7cc66cebd6e49d (v2.2.0) CVE-2022-47086 (GPAC MP4Box v2.1-DEV-rev574-g9d5bb184b contains a segmentation violati ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2337 NOTE: https://github.com/gpac/gpac/commit/15e3aece44f24a1c4e8cc0622c59008b1b9ab683 (v2.2.0) CVE-2022-47085 @@ -8070,11 +8082,11 @@ CVE-2022-46458 CVE-2022-46457 (NASM v2.16 was discovered to contain a segmentation violation in the c ...) - nasm (unimportant) NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392809 - NOTE: Negligible security impact + NOTE: Crash in CLI tool, no security impact CVE-2022-46456 (NASM v2.16 was discovered to contain a global buffer overflow in the c ...) - nasm (unimportant) NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392814 - NOTE: Negligible security impact + NOTE: Crash in CLI tool, no security impact CVE-2022-46455 RESERVED CVE-2022-46454 @@
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 6117b5b6 by Moritz Muehlenhoff at 2023-01-05T12:19:30+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -114,6 +114,7 @@ CVE-2023-22603 RESERVED CVE-2023-0054 (Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145. ...) - vim + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d NOTE: https://github.com/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731 (v9.0.1145) CVE-2023-0053 @@ -121,15 +122,17 @@ CVE-2023-0053 CVE-2023-0052 RESERVED CVE-2023-0051 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9 NOTE: https://github.com/vim/vim/commit/c32949b0779106ed5710ae3bffc5053e49083ab4 (v9.0.1144) + NOTE: Crash in CLI tool, no security impact CVE-2023-0050 RESERVED CVE-2023-0049 (Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9 NOTE: https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c (v9.0.1143) + NOTE: Crash in CLI tool, no security impact CVE-2023-0048 (Code Injection in GitHub repository lirantal/daloradius prior to maste ...) TODO: check CVE-2023-0047 @@ -50510,6 +50513,7 @@ CVE-2022-31631 RESERVED - php8.1 - php7.4 + [bullseye] - php7.4 (Minor issue, fix along in next update) - php7.3 NOTE: Fixed in 8.1.14 NOTE: PHP Bug: https://bugs.php.net/bug.php?id=81740 = data/dsa-needed.txt = @@ -61,6 +61,5 @@ sox -- tiff -- -trafficserver - Maintainer asked for an update +trafficserver (jmm) -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6117b5b68cdcd692a13e4504487cadb48d2b8fb1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6117b5b68cdcd692a13e4504487cadb48d2b8fb1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 98fdc069 by Moritz Muehlenhoff at 2023-01-03T16:30:37+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -306,6 +306,7 @@ CVE-2020-36637 (** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in Chr NOT-FOR-US: Chris92de AdminServ CVE-2018-25060 (A vulnerability was found in Macaron csrf and classified as problemati ...) - golang-github-go-macaron-csrf + [bullseye] - golang-github-go-macaron-csrf (Minor issue) [buster] - golang-github-go-macaron-csrf (Minor issue) NOTE: https://github.com/go-macaron/csrf/commit/dadd1711a617000b70e5e408a76531b73187031c NOTE: https://github.com/go-macaron/csrf/pull/7 @@ -1391,6 +1392,7 @@ CVE-2019-25084 (A vulnerability, which was classified as problematic, has been f TODO: check CVE-2022-47952 (lxc-user-nic in lxc through 5.0.1 is installed setuid root, and may al ...) - lxc + [bullseye] - lxc (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2157281 NOTE: https://github.com/MaherAzzouzi/CVE-2022-47952 NOTE: https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591/comments/45 @@ -75182,6 +75184,7 @@ CVE-2022-23468 (xrdp is an open source project which provides a graphical login NOTE: https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8c2f-mw8m-qpx6 CVE-2022-23467 (OpenRazer is an open source driver and user-space daemon to control Ra ...) - openrazer 3.5.1+dfsg-1 + [bullseye] - openrazer (Minor issue) [buster] - openrazer (Minor issue) NOTE: https://github.com/openrazer/openrazer/security/advisories/GHSA-39hg-jvc9-fg7h NOTE: https://github.com/openrazer/openrazer/commit/33aa7f07d54ae066f201c6d298cb4a2181cb90e6 (v3.5.1) = data/dsa-needed.txt = @@ -21,6 +21,8 @@ hsqldb (apo) -- lava -- +libxstream-java +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/98fdc069b5b3818f3d1320fab5c3f8f6fd038cd4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/98fdc069b5b3818f3d1320fab5c3f8f6fd038cd4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: c0205320 by Moritz Mühlenhoff at 2022-12-28T00:09:34+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -115,9 +115,10 @@ CVE-2021-4289 (A vulnerability classified as problematic was found in OpenMRS op CVE-2021-4288 (A vulnerability was found in OpenMRS openmrs-module-referenceapplicati ...) NOT-FOR-US: OpenMRS CVE-2021-4287 (A vulnerability, which was classified as problematic, was found in ReF ...) - - binwalk 2.3.3+dfsg1-1 + - binwalk 2.3.3+dfsg1-1 (unimportant) NOTE: https://github.com/ReFirmLabs/binwalk/commit/fa0c0bd59b8588814756942fe4cb5452e76c1dcd (v2.3.3) NOTE: https://github.com/ReFirmLabs/binwalk/pull/556 + NOTE: This is not a security vulnerability, but only adds a security-related feature CVE-2021-4286 (A vulnerability, which was classified as problematic, has been found i ...) NOT-FOR-US: cocagne pysrp CVE-2021-4285 (A vulnerability classified as problematic was found in Nagios NCPA. Th ...) @@ -2691,10 +2692,12 @@ CVE-2022-4559 (A vulnerability was found in INEX IPX-Manager up to 6.2.0. It has NOT-FOR-US: INEX IPX-Manager CVE-2022-4558 (A vulnerability was found in Alinto SOGo up to 5.7.1. It has been clas ...) - sogo 5.8.0-1 + [bullseye] - sogo (Minor issue) NOTE: https://github.com/Alinto/sogo/commit/1e0f5f00890f751e84d67be4f139dd7f00faa5f3 (SOGo-5.8.0) CVE-2022-4557 RESERVED CVE-2022-4556 (A vulnerability was found in Alinto SOGo up to 5.7.1 and classified as ...) + [bullseye] - CVE-2022-4556 (Minor issue) - sogo 5.8.0-1 NOTE: https://github.com/Alinto/sogo/commit/efac49ae91a4a325df9931e78e543f707a0f8e5e (SOGo-5.8.0) CVE-2022-4555 (The WP Shamsi plugin for WordPress is vulnerable to authorization bypa ...) @@ -6910,6 +6913,7 @@ CVE-2022-46176 RESERVED CVE-2022-46175 (JSON5 is an extension to the popular JSON file format that aims to be ...) - node-json5 + [bullseye] - node-json5 (Minor issue) NOTE: https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h NOTE: https://github.com/json5/json5/issues/199 NOTE: https://github.com/json5/json5/issues/295 @@ -7679,9 +7683,7 @@ CVE-2022-4134 NOTE: https://bugs.launchpad.net/ossn/+bug/1990157 CVE-2022-4133 [reflected XSS] RESERVED - - horizon - NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2147389 - NOTE: check, unclear if specific to Red Hat OpenStack Platform dashboard + NOT-FOR-US: Red Hat OpenStack Platform dashboard CVE-2022-4132 RESERVED CVE-2021-46855 @@ -25384,6 +25386,7 @@ CVE-2022-3172 CVE-2022-3171 (A parsing issue with binary data in protobuf-java core and lite versio ...) [experimental] - protobuf 3.21.7-1 - protobuf 3.21.9-3 + [bullseye] - protobuf (Minor issue) NOTE: https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2 CVE-2022-3170 (An out-of-bounds access issue was found in the Linux kernel sound subs ...) - linux (Vulnerable code not present) @@ -112100,6 +112103,7 @@ CVE-2021-35066 (An XXE vulnerability exists in ConnectWise Automate before 2021. NOT-FOR-US: ConnectWise Automate CVE-2021-35065 (The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular ...) - node-glob-parent 6.0.2+~5.1.1-1 + [bullseye] - node-glob-parent (Minor issue) NOTE: https://github.com/gulpjs/glob-parent/commit/3e9f04a3b4349db7e1962d87c9a7398cda51f339 (v6.0.1) NOTE: https://github.com/gulpjs/glob-parent/pull/49 CVE-2021-35064 (KramerAV VIAWare, all tested versions, allow privilege escalation thro ...) = data/dsa-needed.txt = @@ -17,6 +17,8 @@ curl -- frr -- +hsqldb +-- lava -- linux (carnil) @@ -59,3 +61,5 @@ sox -- tiff -- +trafficserver +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c02053201d55bb287d69686ddff7fa56596f37b2 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c02053201d55bb287d69686ddff7fa56596f37b2 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 03378f2f by Moritz Muehlenhoff at 2022-12-12T18:56:26+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3113,7 +3113,7 @@ CVE-2022-4135 (Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304. [buster] - chromium (see DSA 5046) CVE-2022-4134 RESERVED - - glance + NOTE: There's no code fix, just an update on best practices NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2147462 NOTE: https://wiki.openstack.org/wiki/OSSN/OSSN-0090 NOTE: https://bugs.launchpad.net/ossn/+bug/1990157 @@ -4929,6 +4929,7 @@ CVE-2022-45284 RESERVED CVE-2022-45283 (GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the s ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2295 NOTE: https://github.com/gpac/gpac/commit/0fc714872ba4536a1190f93aa278b6e08f8c60df @@ -13877,6 +13878,7 @@ CVE-2022-42962 RESERVED CVE-2022-42961 (An issue was discovered in wolfSSL before 5.5.0. A fault injection att ...) - wolfssl 5.5.3-1 (bug #1023574) + [bullseye] - wolfssl (Minor issue) NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.0-stable CVE-2022-42960 (EqualWeb Accessibility Widget 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.1 ...) NOT-FOR-US: EqualWeb Accessibility Widget @@ -14028,10 +14030,12 @@ CVE-2022-3511 (The Awesome Support WordPress plugin before 6.1.2 does not ensure NOT-FOR-US: WordPress plugin CVE-2022-3510 (A parsing issue similar to CVE-2022-3171, but with Message-Type Extens ...) - protobuf + [bullseye] - protobuf (Minor issue) NOTE: https://github.com/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48 CVE-2022-3509 (A parsing issue similar to CVE-2022-3171, but with textformat in proto ...) [experimental] - protobuf 3.21.7-1 - protobuf 3.21.9-3 + [bullseye] - protobuf (Minor issue) NOTE: https://github.com/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9 (v21.7, v3.21.7) CVE-2022-3508 RESERVED @@ -14152,6 +14156,7 @@ CVE-2022-42907 RESERVED CVE-2022-42905 (In wolfSSL before 5.5.2, if callback functions are enabled (via the WO ...) - wolfssl 5.5.3-1 + [bullseye] - wolfssl (Minor issue) NOTE: Fixed in 5.5.2 (https://www.wolfssl.com/docs/security-vulnerabilities/) CVE-2022-42904 (Zoho ManageEngine ADManager Plus through 7151 allows authenticated adm ...) NOT-FOR-US: Zoho ManageEngine @@ -23489,6 +23494,7 @@ CVE-2022-39174 RESERVED CVE-2022-39173 (In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow ...) - wolfssl 5.5.3-1 (bug #1021021) + [bullseye] - wolfssl (Minor issue) CVE-2022-39172 RESERVED CVE-2022-39171 @@ -33855,6 +33861,7 @@ CVE-2022-35410 (mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows . NOTE: https://dustri.org/b/mat2-0130.html CVE-2022-35409 (An issue was discovered in Mbed TLS before 2.28.1 and 3.x before 3.2.0 ...) - mbedtls 2.28.1-1 + [bullseye] - mbedtls (Minor issue) NOTE: https://github.com/Mbed-TLS/mbedtls-docs/blob/5e9790353d2d9e41e85262eebe52fd90bb49f1e0/security-advisories/advisories/mbedtls-security-advisory-2022-07.md NOTE: https://github.com/Mbed-TLS/mbedtls/commit/f333dfab4a6c2d8a604a61558a8f783145161de4 (v2.28.1) NOTE: https://github.com/Mbed-TLS/mbedtls/commit/e5af9fabf7d68e3807b6ea78792794b8352dbba2 (v2.28.1) @@ -43639,6 +43646,7 @@ CVE-2022-1942 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to CVE-2022-1941 (A parsing vulnerability for the MessageSet type in the ProtocolBuffers ...) [experimental] - protobuf 3.20.2-1 - protobuf 3.21.9-3 + [bullseye] - protobuf (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/09/27/1 NOTE: https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf NOTE: https://github.com/protocolbuffers/protobuf/commit/806d7e4ce6f1fd0545cae226b94cb0249ea495c7 (v3.20.2) @@ -61286,6 +61294,7 @@ CVE-2022-24440 (The package cocoapods-downloader before 1.6.0, from 1.6.2 and be NOT-FOR-US: cocoapods-downloader CVE-2022-24439 (All versions of package gitpython are vulnerable to Remote Code Execut ...) - python-git + [bullseye] - python-git (Minor issue) NOTE: https://security.snyk.io/vuln/SNYK-PYTHON-GITPYTHON-3113858 NOTE: https://github.com/gitpython-developers/GitPython/issues/1515 CVE-2022-24438 @@ -78784,6 +78793,7 @@ CVE-2021-44733 (A use-after-free exists in
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b4f7be00 by Moritz Muehlenhoff at 2022-12-08T10:41:00+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -951,13 +951,15 @@ CVE-2022-43443 CVE-2022-4294 RESERVED CVE-2022-4293 (Floating Point Comparison with Incorrect Operator in GitHub repository ...) - - vim 2:9.0.0813-1 + - vim 2:9.0.0813-1 (unimportant) NOTE: https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143 NOTE: https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b (v9.0.0804) + NOTE: Crash in CLI tool, no security impact CVE-2022-4292 (Use After Free in GitHub repository vim/vim prior to 9.0.0882. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b NOTE: https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 (v9.0.0882) + NOTE: Crash in CLI tool, no security impact CVE-2022-4291 (The aswjsflt.dll library from Avast Antivirus windows contained a pote ...) TODO: check CVE-2022-4290 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b4f7be00b524b027e50f66f5035b4d243762cada -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b4f7be00b524b027e50f66f5035b4d243762cada You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7273a8db by Moritz Muehlenhoff at 2022-12-07T20:11:47+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1892,6 +1892,7 @@ CVE-2022-46150 (Discourse is an open-source discussion platform. Prior to versio CVE-2022-46149 (Cap'n Proto is a data interchange format and remote procedure call (RP ...) [experimental] - capnproto 0.9.2-1 - capnproto + [bullseye] - capnproto (Breaks API and requires rebuilds, possibly via point release) - rust-capnp NOTE: https://github.com/capnproto/capnproto/security/advisories/GHSA-qqff-4vw4-f6hx NOTE: https://github.com/capnproto/capnproto/commit/25d34c67863fd960af34fc4f82a7ca3362ee74b9 @@ -11084,6 +11085,7 @@ CVE-2022-3698 RESERVED CVE-2022-3697 (A flaw was found in Ansible in the amazon.aws collection when using th ...) - ansible 7.0.0+dfsg-1 + [bullseye] - ansible (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2137664 NOTE: https://github.com/ansible-collections/amazon.aws/pull/1199 CVE-2022-3696 (A post-auth code injection vulnerability allows admins to execute code ...) @@ -11545,6 +11547,7 @@ CVE-2022-3651 CVE-2022-3650 [ceph-crash.service allows local ceph user to root exploit] RESERVED - ceph 16.2.10+ds-4 (bug #1024932) + [bullseye] - ceph (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/1 NOTE: https://tracker.ceph.com/issues/57967 NOTE: https://github.com/ceph/ceph/pull/48713 @@ -14171,10 +14174,12 @@ CVE-2022-42707 (In Mahara 21.04 before 21.04.7, 21.10 before 21.10.5, 22.04 befo - mahara CVE-2022-42706 (An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 t ...) - asterisk + [bullseye] - asterisk (Minor issue) NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-30176 NOTE: https://downloads.asterisk.org/pub/security/AST-2022-009.html CVE-2022-42705 (A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.1 ...) - asterisk + [bullseye] - asterisk (Minor issue) NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-30244 NOTE: https://downloads.asterisk.org/pub/security/AST-2022-008.html CVE-2022-42704 @@ -22630,6 +22635,7 @@ CVE-2022-39270 (DiscoTOC is a Discourse theme component that generates a table o NOT-FOR-US: DiscoTOC Discourse theme CVE-2022-39269 (PJSIP is a free and open source multimedia communication library writt ...) - asterisk + [bullseye] - asterisk (Vulnerable code not present) - pjproject - ring NOTE: https://github.com/pjsip/pjproject/security/advisories/GHSA-wx5m-cj97-4wwg @@ -22726,6 +22732,7 @@ CVE-2022-39245 (Mist is the command-line interface for the makedeb Package Repos NOT-FOR-US: Makedeb Mist CVE-2022-39244 (PJSIP is a free and open source multimedia communication library writt ...) - asterisk + [bullseye] - asterisk (Vulnerable code not present) - pjproject - ring NOTE: https://github.com/pjsip/pjproject/security/advisories/GHSA-fq45-m3f7-3mhj @@ -28243,6 +28250,7 @@ CVE-2022-37326 RESERVED CVE-2022-37325 (In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, an ...) - asterisk + [bullseye] - asterisk (Minor issue) NOTE: https://issues.asterisk.org/jira/browse/ASTERISK-30103 NOTE: https://downloads.asterisk.org/pub/security/AST-2022-007.html CVE-2022-37324 = data/dsa-needed.txt = @@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it. If needed, specify the release by adding a slash after the name of the source package. +-- +cacti -- frr -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7273a8dbf6549ed1189d224452d086414a70109b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7273a8dbf6549ed1189d224452d086414a70109b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1e706af0 by Moritz Muehlenhoff at 2022-12-05T13:18:41+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -11308,9 +11308,10 @@ CVE-2022-43397 (A vulnerability has been identified in Parasolid V34.0 (All vers CVE-2022-43396 RESERVED CVE-2022-3591 (Use After Free in GitHub repository vim/vim prior to 9.0.0789. ...) - - vim 2:9.0.0813-1 + - vim 2:9.0.0813-1 (unimportant) NOTE: https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921 NOTE: https://github.com/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad (v9.0.0789) + NOTE: Crash in CLI tool, no security impact CVE-2022-3590 RESERVED CVE-2022-3589 (An API Endpoint used by Miele's "AppWash" MobileApp in all versions wa ...) @@ -12451,9 +12452,10 @@ CVE-2022-42964 (An exponential ReDoS (Regular Expression Denial of Service) can NOTE: https://research.jfrog.com/vulnerabilities/pymatgen-redos-xray-257184/ NOTE: Doesn't seem to be reported upstream so far CVE-2022-3520 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - - vim 2:9.0.0813-1 + - vim 2:9.0.0813-1 (unimportant) NOTE: https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246 NOTE: https://github.com/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b (v9.0.0765) + NOTE: Crash in CLI tool, no security impact CVE-2022-3519 (A vulnerability classified as problematic was found in SourceCodester ...) NOT-FOR-US: SourceCodester Sanitization Management System CVE-2022-3518 (A vulnerability classified as problematic has been found in SourceCode ...) @@ -12703,9 +12705,10 @@ CVE-2022-3493 (A vulnerability, which was classified as problematic, has been fo CVE-2022-3492 (A vulnerability classified as critical was found in SourceCodester Hum ...) NOT-FOR-US: SourceCodester Human Resource Management System CVE-2022-3491 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - - vim 2:9.0.0813-1 + - vim 2:9.0.0813-1 (unimportant) NOTE: https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb NOTE: https://github.com/vim/vim/commit/3558afe9e9e904cabb8475392d859f2d2fc21041 (v9.0.0742) + NOTE: Crash in CLI tool, no security impact CVE-2022-3490 (The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress ...) NOT-FOR-US: WordPress plugin CVE-2022-3489 (The WP Hide WordPress plugin through 0.0.2 does not have authorisation ...) = data/dsa-needed.txt = @@ -61,7 +61,7 @@ sox -- tiff -- -vlc +vlc (jmm) Maintainer proposed update for review, to be acked for upload -- xfce4-settings (corsac) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e706af008a48a951e49c5a8c4eaa2349df052a9 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e706af008a48a951e49c5a8c4eaa2349df052a9 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: bc795767 by Moritz Muehlenhoff at 2022-12-02T15:14:36+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3505,16 +3505,15 @@ CVE-2022-45206 (Jeecg-boot v3.4.3 was discovered to contain a SQL injection vuln CVE-2022-45205 (Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerabil ...) NOT-FOR-US: Jeecg-boot CVE-2022-45204 (GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a mem ...) - - gpac - [buster] - gpac (EOL in buster LTS) + - gpac (Vulnerable code not present in any version in the archive) NOTE: https://github.com/gpac/gpac/issues/2307 NOTE: Introduced by: https://github.com/gpac/gpac/commit/74e53280dad7b29f85386c6a1286fb92643465da NOTE: Fixed by: https://github.com/gpac/gpac/commit/f045be5809808d64ebf8ce5ab628fa55786bea4f - TODO: double check, but introducing commit is the fix for CVE-2022-45202 CVE-2022-45203 RESERVED CVE-2022-45202 (GPAC v2.1-DEV-rev428-gcb8ae46c8-master was discovered to contain a sta ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2296 NOTE: https://github.com/gpac/gpac/issues/2296#issuecomment-1303112783 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc7957675e39777a56317d5322e533584051dcf5 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bc7957675e39777a56317d5322e533584051dcf5 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 46508902 by Moritz Muehlenhoff at 2022-12-02T11:41:02+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -19266,6 +19266,7 @@ CVE-2022-3168 [experimental] - android-platform-tools 33.0.3-1~exp1 - android-platform-tools - android-platform-system-core + [bullseye] - android-platform-system-core (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/5 CVE-2019-25076 (The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.1 ...) - openvswitch (bug #1021740) @@ -23110,6 +23111,7 @@ CVE-2022-2991 (A heap-based buffer overflow was found in the Linux kernel's Ligh NOTE: CONFIG_NVM not enabled in Debian CVE-2022-2990 (An incorrect handling of the supplementary groups in the Buildah conta ...) - golang-github-containers-buildah 1.28.0+ds1-2 + [bullseye] - golang-github-containers-buildah (Minor issue) NOTE: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ NOTE: https://github.com/containers/buildah/pull/4200 NOTE: https://github.com/containers/buildah/commit/9934b17365083ce966b44c5ce3c7e052f516e255 (v1.28.0) @@ -54601,6 +54603,7 @@ CVE-2022-27652 (A flaw was found in cri-o, where containers were incorrectly sta CVE-2022-27651 (A flaw was found in buildah where containers were incorrectly started ...) [experimental] - golang-github-containers-buildah 1.27.0+ds1-2 - golang-github-containers-buildah 1.28.0+ds1-2 (bug #1009882) + [bullseye] - golang-github-containers-buildah (Minor issue) NOTE: https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b (v1.25.1) NOTE: https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h CVE-2022-27650 (A flaw was found in crun where containers were incorrectly started wit ...) @@ -86744,6 +86747,7 @@ CVE-2022-20128 [experimental] - android-platform-tools 33.0.3-1~exp1 - android-platform-tools - android-platform-system-core + [bullseye] - android-platform-system-core (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/5 CVE-2022-20127 (In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds w ...) NOT-FOR-US: Android View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4650890261b3ab4aebfd56d3ad49b2d564ec226c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4650890261b3ab4aebfd56d3ad49b2d564ec226c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 88861372 by Moritz Muehlenhoff at 2022-11-30T23:15:49+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -46299,6 +46299,7 @@ CVE-2022-30257 (An issue was discovered in Technitium DNS Server through 8.0.2 t NOT-FOR-US: Technitium DNS Server CVE-2022-30256 (An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allo ...) - maradns + [bullseye] - maradns (Minor issue) NOTE: https://maradns.samiam.org/security.html#CVE-2022-30256 CVE-2022-30255 RESERVED @@ -50203,6 +50204,7 @@ CVE-2022-28949 RESERVED CVE-2022-28948 (An issue in the Unmarshal function in Go-Yaml v3 causes the program to ...) - golang-gopkg-yaml.v3 3.0.1-1 (bug #1011338) + [bullseye] - golang-gopkg-yaml.v3 (Minor issue) NOTE: https://github.com/go-yaml/yaml/issues/666 NOTE: https://github.com/go-yaml/yaml/commit/8f96da9f5d5eff988554c1aae1784627c4bf6754 (v3.0.0) CVE-2022-28947 @@ -66056,6 +66058,7 @@ CVE-2022-23825 (Aliases in the branch predictor may cause some AMD processors to NOTE: https://www.amd.com/system/files/documents/technical-guidance-for-mitigating-branch-type-confusion.pdf CVE-2022-23824 (IBPB may not prevent return branch predictions from being specified by ...) - xen 4.16.2+90-g0d39a6d1ae-1 + [bullseye] - xen (Fix along in next DSA) [buster] - xen (DSA 4677-1) NOTE: https://xenbits.xen.org/xsa/advisory-422.html NOTE: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8886137260d1520fb34f3ceec72d354a4bf14aae -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8886137260d1520fb34f3ceec72d354a4bf14aae You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d6f78138 by Moritz Muehlenhoff at 2022-11-30T22:46:30+01:00 bullseye triage mplayer spu - - - - - 2 changed files: - data/CVE/list - data/next-point-update.txt Changes: = data/CVE/list = @@ -1486,6 +1486,7 @@ CVE-2022-45786 CVE-2022-4121 [Null pointer dereference in mailimap_mailbox_data_status_free in low-level/imap/mailimap_types.c] RESERVED - libetpan (bug #1025120) + [bullseye] - libetpan (Minor issue) NOTE: https://github.com/dinhvh/libetpan/issues/420 CVE-2022-4120 RESERVED @@ -2959,6 +2960,7 @@ CVE-2022-45344 RESERVED CVE-2022-45343 (GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a hea ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2315 NOTE: https://github.com/gpac/gpac/commit/1016912db5408b6f38e8eb715279493ae380d1c4 @@ -3341,6 +3343,7 @@ CVE-2022-3964 (A vulnerability classified as problematic has been found in ffmpe CVE-2022-45197 [missing certificate hostname validation] RESERVED - slixmpp 1.8.3-1 + [bullseye] - slixmpp (Minor issue) NOTE: https://lab.louiz.org/poezio/slixmpp/-/commit/b60b1b985db928532f97c4f61d6fbc801f0aa7fa (slix-1.8.3) CVE-2022-45196 (Hyperledger Fabric 2.3 allows attackers to cause a denial of service ( ...) NOT-FOR-US: Hyperledger Fabric @@ -1,6 +4,7 @@ CVE-2022-38865 (Certain The MPlayer Project products are vulnerable to Divide By NOTE: Crash in CLI tool, no security impact CVE-2022-38864 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - mplayer (bug #1021013) + [bullseye] - mplayer (Minor issue, will be fixed via spu) NOTE: https://trac.mplayerhq.hu/ticket/2406 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/36546389ef9fb6b0e0540c5c3f212534c34b0e94 (r38391) CVE-2022-38863 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) @@ -22234,6 +22238,7 @@ CVE-2022-38862 (Certain The MPlayer Project products are vulnerable to Buffer Ov NOTE: https://trac.mplayerhq.hu/ticket/2404 CVE-2022-38861 (The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory ...) - mplayer (bug #1021013) + [bullseye] - mplayer (Minor issue, will be fixed via spu) NOTE: https://trac.mplayerhq.hu/ticket/2407 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/2622e7fbe3605a2f3b4f74900197fefeedc0d2e1 (r38402) CVE-2022-38860 (Certain The MPlayer Project products are vulnerable to Divide By Zero ...) @@ -29726,9 +29731,11 @@ CVE-2022-36181 RESERVED CVE-2022-36180 (Fusiondirectory 1.3 is vulnerable to Cross Site Scripting (XSS) via /f ...) - fusiondirectory + [bullseye] - fusiondirectory (Minor issue) NOTE: https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ CVE-2022-36179 (Fusiondirectory 1.3 suffers from Improper Session Handling. ...) - fusiondirectory + [bullseye] - fusiondirectory (Minor issue) NOTE: https://yoroi.company/research/cve-advisory-full-disclosure-multiple-vulnerabilities/ CVE-2022-36178 RESERVED = data/next-point-update.txt = @@ -68,3 +68,23 @@ CVE-2020-29260 [bullseye] - libvncserver 0.9.13+dfsg-2+deb11u1 CVE-2022-39353 [bullseye] - node-xmldom 0.5.0-1+deb11u2 +CVE-2022-38866 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38865 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38864 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38863 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38861 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38860 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38858 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38855 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38851 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 +CVE-2022-38850 + [bullseye] - mplayer 2:1.4+ds1-1+deb11u1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6f78138c9925551da9bf1698da03dbd1876e772 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d6f78138c9925551da9bf1698da03dbd1876e772 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f8915d75 by Moritz Muehlenhoff at 2022-11-29T09:24:46+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -950,10 +950,10 @@ CVE-2022-45898 CVE-2022-4144 [QXL: qxl_phys2virt unsafe address translation can lead to out-of-bounds read] RESERVED - qemu + [bullseye] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2148506 NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1336 - TODO: check details CVE-2022-4143 RESERVED CVE-2022-4142 @@ -4157,10 +4157,12 @@ CVE-2022-44794 (An issue was discovered in Object First 1.0.7.712. Management pr NOT-FOR-US: Object First CVE-2022-44793 (handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-S ...) - net-snmp (bug #1024020) + [bullseye] - net-snmp (Minor issue) NOTE: https://github.com/net-snmp/net-snmp/issues/475 NOTE: https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f CVE-2022-44792 (handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP ...) - net-snmp (bug #1024020) + [bullseye] - net-snmp (Minor issue) NOTE: https://github.com/net-snmp/net-snmp/issues/474 NOTE: https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 CVE-2022-44791 @@ -15353,6 +15355,7 @@ CVE-2022-3325 (Improper access control in the GitLab CE/EE API affecting all ver CVE-2022-3324 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. ...) {DLA-3182-1} - vim 2:9.0.0626-1 + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/e414e55b-f332-491f-863b-c18dca97403c/ NOTE: https://github.com/vim/vim/commit/8279af514ca7e5fd3c31cf13b0864163d1a0bfeb (v9.0.0598) CVE-2022-3323 (An SQL injection vulnerability in Advantech iView 5.7.04.6469. The spe ...) @@ -21993,8 +21996,7 @@ CVE-2022-38863 (Certain The MPlayer Project products are vulnerable to Buffer Ov NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/b5e745b4bfab2835103a060094fae3c6cc1ba17d (r38393) NOTE: Crash in CLI tool, no security impact CVE-2022-38862 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer (bug #1021013) - [bullseye] - mplayer (Minor issue) + NOTE: Unreproducible issue, probably a bug in the reporter's ASAN setup NOTE: https://trac.mplayerhq.hu/ticket/2400 NOTE: https://trac.mplayerhq.hu/ticket/2404 CVE-2022-38861 (The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory ...) @@ -35599,6 +35601,7 @@ CVE-2022-33980 (Apache Commons Configuration performs variable interpolation, al CVE-2022-2129 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...) {DLA-3204-1} - vim 2:9.0.0135-1 (bug #1015984) + [bullseye] - vim (Minor issue) [stretch] - vim (Minor issue) NOTE: https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352 NOTE: https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d (v8.2.5126) @@ -43635,6 +43638,7 @@ CVE-2022-31009 (wire-ios is an iOS client for the Wire secure messaging applicat NOT-FOR-US: wire-ios CVE-2022-31008 (RabbitMQ is a multi-protocol messaging and streaming broker. In affect ...) - rabbitmq-server 3.10.8-1 + [bullseye] - rabbitmq-server (Minor issue) [buster] - rabbitmq-server (Vulnerable code introduced later) NOTE: https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-v9gv-xp36-jgj8 NOTE: https://github.com/rabbitmq/rabbitmq-server/pull/4841 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f8915d750e02b409853c4b5680a4968c8b996dd6 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f8915d750e02b409853c4b5680a4968c8b996dd6 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1af13e33 by Moritz Muehlenhoff at 2022-11-27T22:45:21+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -94,6 +94,7 @@ CVE-2022-4142 RESERVED CVE-2022-4141 (The target's backtrace indicates that libc has detected a heap error o ...) - vim + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f NOTE: https://github.com/vim/vim/commit/cc762a48d42b579fb7bdec2c614636b830342dd5 (v9.0.0947) CVE-2022-4140 @@ -9596,6 +9597,7 @@ CVE-2022-3607 (Failure to Sanitize Special Elements into a Different Plane (Spec - octoprint (bug #718591) CVE-2022-3606 (A vulnerability was found in Linux Kernel. It has been classified as p ...) - libbpf (bug #1023717) + [bullseye] - libbpf (Minor issue) NOTE: Introduced by: https://github.com/libbpf/libbpf/commit/a3abae5122f30b83baebd4e4dd8ba4578a87cd4b (v0.2) NOTE: Fixed by: https://github.com/libbpf/libbpf/commit/3a3ef0c1d09e1894740db71cdcb7be0bfd713671 CVE-2022-3605 @@ -10803,6 +10805,7 @@ CVE-2022-3535 (A vulnerability classified as problematic was found in Linux Kern NOTE: https://git.kernel.org/linus/0152dfee235e87660f52a117fc9f70dc55956bb4 (6.1-rc1) CVE-2022-3534 (A vulnerability classified as critical has been found in Linux Kernel. ...) - libbpf (bug #1023717) + [bullseye] - libbpf (Minor issue) NOTE: Introduced by: https://github.com/libbpf/libbpf/commit/7ac1547f32f060d84b06c74edbb2c6896cc07949 (v0.2) NOTE: Fixed by: https://github.com/libbpf/libbpf/commit/54caf920db0e489de90f341e2a51ddbcd084 CVE-2022-3533 (A vulnerability was found in Linux Kernel. It has been rated as proble ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1af13e3376f0932c4781fd9a7241373b91e149e8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1af13e3376f0932c4781fd9a7241373b91e149e8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 344ee89a by Moritz Muehlenhoff at 2022-11-25T19:57:06+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -8,6 +8,7 @@ CVE-2021-43173 (In NLnet Labs Routinator prior to 0.10.2, a validation run can b - cfrpki 1.4.0-1 - fort-validator 1.5.3-1 - rpki-client 7.5-1 + [bullseye] - rpki-client (Fixed versions need more recent libretls) NOTE: https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt NOTE: https://github.com/NLnetLabs/routinator/pull/666 NOTE: https://github.com/NLnetLabs/routinator/pull/612 @@ -82232,6 +82233,7 @@ CVE-2021-43172 (NLnet Labs Routinator prior to 0.10.2 happily processes a chain - cfrpki [bullseye] - cfrpki (Minor issue, revisit when fixed upstream) - rpki-client 7.5-1 + [bullseye] - rpki-client (Fixed versions need more recent libretls) NOTE: https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt NOTE: https://github.com/NLnetLabs/routinator/pull/665 CVE-2021-3917 (A flaw was found in the coreos-installer, where it writes the Ignition ...) @@ -82588,6 +82590,7 @@ CVE-2021-3909 (OctoRPKI does not limit the length of a connection, allowing for - cfrpki 1.4.0-1 - fort-validator 1.5.3-1 - rpki-client 7.5-1 + [bullseye] - rpki-client (Fixed versions need more recent libretls) NOTE: https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244 CVE-2021-3908 (OctoRPKI does not limit the depth of a certificate chain, allowing for ...) {DSA-5041-1} = data/dsa-needed.txt = @@ -33,6 +33,8 @@ netatalk -- nodejs -- +mujs (jmm) +-- multipath-tools -- openexr @@ -47,9 +49,6 @@ pngcheck (jmm) -- rails -- -rpki-client - new 7.6 release required libretls, which isn't in Bullseye --- ruby-image-processing -- ruby-nokogiri View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/344ee89ac27454282223c7163eeaf21496bf9dab -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/344ee89ac27454282223c7163eeaf21496bf9dab You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a9246dbc by Moritz Muehlenhoff at 2022-11-24T16:21:02+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -8456,8 +8456,9 @@ CVE-2022-43761 RESERVED CVE-2022-3705 (A vulnerability was found in vim and classified as problematic. Affect ...) {DLA-3182-1} - - vim 2:9.0.0813-1 + - vim 2:9.0.0813-1 (unimportant) NOTE: https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731 (v9.0.0805) + NOTE: Crash in CLI tool, no security impact CVE-2022-3704 (A vulnerability classified as problematic has been found in Ruby on Ra ...) - rails (bug #1024274) NOTE: https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4 @@ -13413,6 +13414,7 @@ CVE-2022-41883 (TensorFlow is an open source platform for machine learning. When - tensorflow (bug #804612) CVE-2022-41882 (The Nextcloud Desktop Client is a tool to synchronize files from Nextc ...) - nextcloud-desktop 3.6.1-1 + [bullseye] - nextcloud-desktop (Minor issue) NOTE: https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3w86-rm38-8w63 NOTE: https://github.com/nextcloud/desktop/pull/5039 NOTE: https://github.com/nextcloud/server/pull/34559 @@ -13969,9 +13971,10 @@ CVE-2022-3354 (A vulnerability has been found in Open5GS up to 2.4.10 and classi CVE-2022-3353 RESERVED CVE-2022-3352 (Use After Free in GitHub repository vim/vim prior to 9.0.0614. ...) - - vim 2:9.0.0626-1 + - vim 2:9.0.0626-1 (unimportant) NOTE: https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60 NOTE: https://github.com/vim/vim/commit/ef976323e770315b5fca544efb6b2faa25674d15 (v9.0.0614) + NOTE: Crash in CLI tool, no security impact CVE-2022-3351 (An issue has been discovered in GitLab EE affecting all versions start ...) - gitlab (Only affects Gitlab EE) CVE-2022-3350 (The Contact Bank WordPress plugin through 3.0.30 does not sanitise and ...) @@ -15153,9 +15156,10 @@ CVE-2022-3258 (Incorrect Permission Assignment for Critical Resource vulnerabili CVE-2022-3257 (Mattermost version 7.1.x and earlier fails to sufficiently process a s ...) - mattermost-server (bug #823556) CVE-2022-3256 (Use After Free in GitHub repository vim/vim prior to 9.0.0530. ...) - - vim 2:9.0.0626-1 + - vim 2:9.0.0626-1 (unimportant) NOTE: https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3 NOTE: https://github.com/vim/vim/commit/8ecfa2c56b4992c7f067b92488aa9acea5a454ad (v9.0.0530) + NOTE: Crash in CLI tool, no security impact CVE-2022-3255 (If an attacker can control a script that is executed in the victim's b ...) NOT-FOR-US: pimcore CVE-2022-3254 (The WordPress Classifieds Plugin WordPress plugin before 4.3 does not ...) @@ -16229,9 +16233,10 @@ CVE-2022-3236 (A code injection vulnerability in the User Portal and Webadmin al CVE-2022-40763 RESERVED CVE-2022-3235 (Use After Free in GitHub repository vim/vim prior to 9.0.0490. ...) - - vim 2:9.0.0626-1 + - vim 2:9.0.0626-1 (unimportant) NOTE: https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af NOTE: https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0 (v9.0.0490) + NOTE: Crash in CLI tool, no security impact CVE-2022-40762 (A Memory Allocation with Excessive Size Value vulnerablity in the TEE_ ...) NOT-FOR-US: Samsung mTower CVE-2022-40761 (The function tee_obj_free in Samsung mTower through 0.3.0 allows a tru ...) = data/dsa-needed.txt = @@ -20,6 +20,8 @@ gerbv -- graphicsmagick (jmm) -- +jhead +-- lava -- linux (carnil) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a9246dbc6b2dc798cd3b97d28d06959f7c693711 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a9246dbc6b2dc798cd3b97d28d06959f7c693711 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 778bff91 by Moritz Muehlenhoff at 2022-11-24T10:51:59+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -16240,9 +16240,10 @@ CVE-2022-40755 (JasPer 3.0.6 allows denial of service via a reachable assertion NOTE: https://github.com/jasper-software/jasper/issues/338 CVE-2022-3234 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) {DLA-3182-1} - - vim 2:9.0.0626-1 + - vim 2:9.0.0626-1 (unimportant) NOTE: https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da/ NOTE: https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d (v9.0.0483) + NOTE: Crash in CLI tool, no security impact CVE-2022-40754 (In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in t ...) - airflow (bug #819700) CVE-2022-40753 (IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scr ...) @@ -20604,11 +20605,11 @@ CVE-2022-3038 (Use after free in Network Service in Google Chrome prior to 105.0 - chromium 105.0.5195.52-1 [buster] - chromium (see DSA 5046) CVE-2022-3037 (Use After Free in GitHub repository vim/vim prior to 9.0.0322. ...) - - vim 2:9.0.0626-1 (bug #1019590) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0626-1 (bug #1019590; unimportant) [buster] - vim (quickfixtextfunc added in 8.2.0869) NOTE: https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5 NOTE: https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb (v9.0.0322) + NOTE: Crash in CLI tool, no security impact CVE-2022-3036 (The Gettext override translations WordPress plugin before 2.0.0 does n ...) NOT-FOR-US: WordPress plugin CVE-2022-3035 (Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-i ...) @@ -21416,11 +21417,11 @@ CVE-2022-2984 (In jpg driver, there is a possible out of bounds write due to a m CVE-2022-2983 RESERVED CVE-2022-2982 (Use After Free in GitHub repository vim/vim prior to 9.0.0260. ...) - - vim 2:9.0.0626-1 (bug #1019590) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0626-1 (bug #1019590; unimportant) [buster] - vim (quickfixtextfunc added in 8.2.0869) NOTE: https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be NOTE: https://github.com/vim/vim/commit/d6c67629ed05aae436164eec474832daf8ba7420 (v9.0.0260) + NOTE: Crash in CLI tool, no security impact CVE-2022-2981 (The Download Monitor WordPress plugin before 4.5.98 does not ensure th ...) NOT-FOR-US: WordPress plugin CVE-2022-2980 (NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.025 ...) @@ -21696,10 +21697,10 @@ CVE-2022-38648 (Server-Side Request Forgery (SSRF) vulnerability in Batik of Apa NOTE: http://svn.apache.org/viewvc?view=revision=1903625 CVE-2022-2946 (Use After Free in GitHub repository vim/vim prior to 9.0.0246. ...) {DLA-3182-1} - - vim 2:9.0.0626-1 (bug #1019590) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0626-1 (bug #1019590; unimportant) NOTE: https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5 NOTE: https://github.com/vim/vim/commit/adce965162dd89bf29ee0e5baf53652e7515762c (v9.0.0246) + NOTE: Crash in CLI tool, no security impact CVE-2022-2945 (The WordPress Infinite Scroll Ajax Load More plugin for WordPr ...) NOT-FOR-US: WordPress plugin CVE-2022-2944 @@ -31930,10 +31931,10 @@ CVE-2022-34894 (In JetBrains Hub before 2022.2.14799, insufficient access contro NOT-FOR-US: JetBrains Hub CVE-2022-2285 (Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9 ...) {DLA-3182-1} - - vim 2:9.0.0135-1 (bug #1015984) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0135-1 (bug #1015984; unimportant) NOTE: https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736/ NOTE: https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe (v9.0.0018) + NOTE: Crash in CLI tool, no security impact CVE-2022-2284 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. ...) - vim 2:9.0.0135-1 (unimportant) NOTE: https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874/ = data/dsa-needed.txt = @@ -68,3 +68,5 @@ sox -- tiff -- +xfce4-settings (Corsac) +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/778bff91172866ad880639e69977d7e1f83944f0 -- View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 55038710 by Moritz Muehlenhoff at 2022-11-23T21:06:46+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -7864,6 +7864,7 @@ CVE-2022-3716 (A vulnerability classified as problematic was found in SourceCode CVE-2022-3715 [a heap-buffer-overflow in valid_parameter_transform] RESERVED - bash + [bullseye] - bash (Minor issue) [buster] - bash (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2126720 NOTE: https://lists.gnu.org/archive/html/bug-bash/2022-08/msg00147.html @@ -8590,6 +8591,7 @@ CVE-2021-46850 (myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel NOT-FOR-US: myVesta Control Panel CVE-2021-46849 (pikepdf before 2.10.0 allows an XXE attack against PDF XMP metadata pa ...) - pikepdf 3.2.0+dfsg-1 + [bullseye] - pikepdf (Minor issue) [buster] - pikepdf (Minor issue) NOTE: https://github.com/pikepdf/pikepdf/blob/v2.10.0/docs/release_notes.rst#v2100 CVE-2021-46848 (GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check ...) @@ -19642,6 +19644,7 @@ CVE-2022-39261 (Twig is a template language for PHP. Versions 1.x prior to 1.44. NOTE: https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b (v1.44.7, v2.15.3, v3.4.3) CVE-2022-39260 (Git is an open source, scalable, distributed revision control system. ...) - git 1:2.38.1-1 (bug #1022046) + [bullseye] - git (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/10/18/5 NOTE: https://lore.kernel.org/git/xmqq4jw1uku5.fsf@gitster.g/T/#u NOTE: https://github.com/git/git/commit/32696a4cbe90929ae79ea442f5102c513ce3dfaa (v2.30.6) @@ -19664,6 +19667,7 @@ CVE-2022-39254 (matrix-nio is a Python Matrix client library, designed according NOTE: https://github.com/poljar/matrix-nio/commit/b1cbf234a831daa160673defd596e6450e9c29f0 (0.20.0) CVE-2022-39253 (Git is an open source, scalable, distributed revision control system. ...) - git 1:2.38.1-1 (bug #1022046) + [bullseye] - git (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/10/18/5 NOTE: https://lore.kernel.org/git/xmqq4jw1uku5.fsf@gitster.g/T/#u NOTE: https://github.com/git/git/commit/6f054f9fb3a501c35b55c65e547a244f14c38d56 (v2.30.6) @@ -19723,6 +19727,7 @@ CVE-2022-39238 (Arvados is an open source platform for managing and analyzing bi NOT-FOR-US: Arvados CVE-2022-39237 (syslabs/sif is the Singularity Image Format (SIF) reference implementa ...) - golang-github-sylabs-sif (bug #1023570) + [bullseye] - golang-github-sylabs-sif (Minor issue) - singularity-container 3.10.3+ds1-1 NOTE: https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8 NOTE: https://github.com/sylabs/sif/commit/21972852d8783bc93fbf080190de8e1978f1c254 (v2.8.1) @@ -38927,10 +38932,10 @@ CVE-2022-1969 (The Mobile browser color select plugin for WordPress is vulnerabl NOT-FOR-US: Mobile browser color select plugin for WordPress CVE-2022-1968 (Use After Free in GitHub repository vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-3053-1} - - vim 2:9.0.0135-1 (bug #1015984) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0135-1 (bug #1015984; unimportant) NOTE: https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b NOTE: https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895 (v8.2.5050) + NOTE: Crash in CLI tool, no security impact CVE-2022-1967 (The WP Championship WordPress plugin before 9.3 is lacking CSRF checks ...) NOT-FOR-US: WordPress plugin CVE-2022-1966 @@ -40316,10 +40321,10 @@ CVE-2022-1899 (Out-of-bounds Read in GitHub repository radareorg/radare2 prior t NOTE: https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d CVE-2022-1898 (Use After Free in GitHub repository vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-3053-1} - - vim 2:9.0.0135-1 (bug #1015984) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0135-1 (bug #1015984; unimportant) NOTE: https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea NOTE: https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a (v8.2.5024) + NOTE: Crash in CLI tool, no security impact CVE-2022-1897 (Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. ...) - vim 2:9.0.0135-1 (bug #1015984) [bullseye] - vim (Minor issue) @@ -40922,10 +40927,10 @@ CVE-2022-1852 (A NULL pointer dereference flaw was found in the Linux kernel NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 70450616 by Moritz Muehlenhoff at 2022-11-23T12:29:05+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -10,6 +10,7 @@ CVE-2022-4122 RESERVED CVE-2021-46854 (mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS ...) - proftpd-dfsg 1.3.7c+dfsg-1 + [bullseye] - proftpd-dfsg (Minor issue) NOTE: https://github.com/proftpd/proftpd/issues/1284 NOTE: https://github.com/proftpd/proftpd/pull/1285 NOTE: Fixed by: https://github.com/proftpd/proftpd/commit/10a227b4d50e0a2cd2faf87926f58d865da44e43 (v1.3.8rc2) @@ -42870,10 +42871,10 @@ CVE-2022-1721 (Path Traversal in WellKnownServlet in GitHub repository jgraph/dr NOT-FOR-US: jgraph/drawio CVE-2022-1720 (Buffer Over-read in function grab_file_name in GitHub repository vim/v ...) {DLA-3182-1 DLA-3053-1} - - vim 2:9.0.0135-1 (bug #1015984) - [bullseye] - vim (Minor issue) + - vim 2:9.0.0135-1 (bug #1015984; unimportant) NOTE: https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8 NOTE: https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c (v8.2.4956) + NOTE: Crash in CLI tool, no security impact CVE-2022-1719 (Reflected XSS on ticket filter function in GitHub repository polonel/t ...) NOT-FOR-US: Trudesk CVE-2022-1718 (The trudesk application allows large characters to insert in the input ...) @@ -44485,11 +44486,10 @@ CVE-2022-1622 (LibTIFF master branch has an out-of-bounds read in LZWDecode in l NOTE: https://gitlab.com/libtiff/libtiff/-/issues/410 CVE-2022-1621 (Heap buffer overflow in vim_strncpy find_word in GitHub repository vim ...) {DLA-3011-1} - - vim 2:9.0.0135-1 (bug #1015984) - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim 2:9.0.0135-1 (bug #1015984; unimportant) NOTE: https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb NOTE: https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919) + NOTE: Crash in CLI tool, no security impact CVE-2018-25033 (ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_ ...) {DLA-3019-1} - admesh 0.98.4-2 (bug #1010770) @@ -44504,11 +44504,10 @@ CVE-2022-1620 (NULL Pointer Dereference in function vim_regexec_string at regexp NOTE: Crash in CLI tool, no security impact CVE-2022-1619 (Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub r ...) {DLA-3011-1} - - vim 2:9.0.0135-1 (bug #1015984) - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim 2:9.0.0135-1 (bug #1015984; unimportant) NOTE: https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 NOTE: https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe (v8.2.4899) + NOTE: Crash in CLI tool, no security impact CVE-2022-1618 RESERVED CVE-2022-1617 @@ -46905,11 +46904,11 @@ CVE-2022-1422 (The Discy WordPress theme before 5.2 does not check for CSRF toke CVE-2022-1421 (The Discy WordPress theme before 5.2 lacks CSRF checks in some AJAX ac ...) NOT-FOR-US: WordPress theme CVE-2022-1420 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior ...) - - vim 2:8.2.4793-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4793-1 (unimportant) [buster] - vim (method call operator -> introduced in 8.1.1803) NOTE: https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326 NOTE: https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774) + NOTE: Crash in CLI tool, no security impact CVE-2021-46784 (In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due ...) {DSA-5171-1} - squid 5.6-1 @@ -51061,10 +51060,10 @@ CVE-2022-1155 (Old sessions are not blocked by the login enable function. in Git - snipe-it (bug #1005172) CVE-2022-1154 (Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8 ...) {DLA-3182-1 DLA-3011-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 NOTE: https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 (v8.2.4646) + NOTE: Crash in CLI tool, no security impact CVE-2022-1153 (The LayerSlider WordPress plugin before 7.1.2 does not sanitise and es ...) NOT-FOR-US: WordPress plugin CVE-2022-1152 (The Menubar WordPress plugin before 5.8 does not sanitise and escape t ...) View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a2d84d6d by Moritz Muehlenhoff at 2022-11-21T11:57:04+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -12536,6 +12536,7 @@ CVE-2022-41878 (Parse Server is an open source backend that can be deployed to a NOT-FOR-US: Node parse-server CVE-2022-41877 (FreeRDP is a free remote desktop protocol library and clients. Affecte ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pmv3-wpw4-pw5h NOTE: https://github.com/FreeRDP/FreeRDP/commit/6655841cf2a00b764f855040aecb8803cfc5eaba @@ -18704,6 +18705,7 @@ CVE-2022-39348 (Twisted is an event-based framework for internet applications. S NOTE: Fixed by: https://github.com/twisted/twisted/commit/f2f5e81c03f14e253e85fe457e646130780db40b (twisted-22.10.0rc1) CVE-2022-39347 (FreeRDP is a free remote desktop protocol library and clients. Affecte ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c5xq-8v35-pffg NOTE: https://github.com/FreeRDP/FreeRDP/commit/027424c2c6c0991cb9c22f9511478229c9b17e5d @@ -18766,24 +18768,29 @@ CVE-2022-39321 (GitHub Actions Runner is the application that runs a job from a NOT-FOR-US: GitHub Actions Runner CVE-2022-39320 (FreeRDP is a free remote desktop protocol library and clients. Affecte ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qfq2-82qr-7f4j CVE-2022-39319 (FreeRDP is a free remote desktop protocol library and clients. Affecte ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mvxm-wfj2-5fvh NOTE: https://github.com/FreeRDP/FreeRDP/commit/11555828d2cf289b350baba5ad1f462f10b80b76 CVE-2022-39318 (FreeRDP is a free remote desktop protocol library and clients. Affecte ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-387j-8j96-7q35 NOTE: https://github.com/FreeRDP/FreeRDP/commit/80adde17ddc4b596ed1dae0922a0c54ab3d4b8ea CVE-2022-39317 (FreeRDP is a free remote desktop protocol library and clients. Affecte ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-99cm-4gw7-c8jh CVE-2022-39316 (FreeRDP is a free remote desktop protocol library and clients. In affe ...) - freerdp2 (bug #1024511) + [bullseye] - freerdp2 (Minor issue) [buster] - freerdp2 (Minor issue) NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5w4j-mrrh-jjrm NOTE: https://github.com/FreeRDP/FreeRDP/commit/e865c24efc40ebc52e75979c94cdd4ee2c1495b0 @@ -53747,10 +53754,10 @@ CVE-2022-0944 (Template injection in connection test endpoint leads to RCE in Gi NOT-FOR-US: sqlpad CVE-2022-0943 (Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim ...) {DLA-3182-1 DLA-3053-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1 NOTE: https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3 (v8.2.4563) + NOTE: Crash in CLI tool, no security impact CVE-2022-26981 (Liblouis through 3.21.0 has a buffer overflow in compilePassOpcode in ...) - liblouis 3.22.0-1 (bug #1008009) [bullseye] - liblouis (Minor issue) @@ -57409,10 +57416,10 @@ CVE-2022-0730 (Under certain ldap conditions, Cacti authentication can be bypass NOTE: https://github.com/Cacti/cacti/commit/0bb77ee9b4d1c7a99e0140b88789e050e523e628 (1.2.x) CVE-2022-0729 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea NOTE: https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30 (v8.2.4440) + NOTE: Crash in CLI tool, no security impact CVE-2022-0728 (The Easy Smooth Scroll
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7cc7c9f5 by Moritz Muehlenhoff at 2022-11-18T13:08:06+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -7611,6 +7611,7 @@ CVE-2022-43706 CVE-2022-43705 [malicious OCSP responder could forge OCSP responses] RESERVED - botan 2.19.3+dfsg-1 + [bullseye] - botan (Minor issue) NOTE: https://github.com/randombit/botan/security/advisories/GHSA-4v9w-qvcq-6q7w NOTE: https://github.com/randombit/botan/commit/fd83d9e262f63fb673e4c13ca37e5b768e41e812 (2.19.3) NOTE: https://github.com/randombit/botan/commit/4e35073ff356e37c3adcf1ff3522e9d0d48c765f (2.19.3) @@ -61584,10 +61585,10 @@ CVE-2022-0444 (The Backup, Restore and Migrate WordPress Sites With the XCloner NOT-FOR-US: WordPress plugin CVE-2022-0443 (Use After Free in GitHub repository vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-3011-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51 NOTE: https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461 (v8.2.4281) + NOTE: Crash in CLI tool, no security issue CVE-2022-0442 (The UsersWP WordPress plugin before 1.2.3.1 is missing access controls ...) NOT-FOR-US: WordPress plugin CVE-2022-0441 (The MasterStudy LMS WordPress plugin before 2.7.6 does to validate som ...) @@ -62126,10 +62127,10 @@ CVE-2022-0414 (Business Logic Errors in Packagist dolibarr/dolibarr prior to 16. - dolibarr CVE-2022-0413 (Use After Free in GitHub repository vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-3011-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38 NOTE: https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a (v8.2.4253) + NOTE: Crash in CLI tool, no security issue CVE-2022-0412 (The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooComm ...) NOT-FOR-US: WordPress plugin CVE-2022-0411 (The Asgaros Forum WordPress plugin before 2.0.0 does not sanitise and ...) @@ -62163,17 +62164,17 @@ CVE-2022-0409 (Unrestricted Upload of File with Dangerous Type in Packagist show NOT-FOR-US: ShowDoc CVE-2022-0408 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d NOTE: https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 (v8.2.4247) + NOTE: Crash in CLI tool, no security issue CVE-2022-0407 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. ...) - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) [buster] - vim (The vulnerable code is not present) [stretch] - vim (The vulnerable code is not present) NOTE: https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c NOTE: https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e (v8.2.4219) + NOTE: Crash in CLI tool, no security issue CVE-2022-24112 (An attacker can abuse the batch-requests plugin to send requests to by ...) NOT-FOR-US: Apache APISIX CVE-2022-0406 (Improper Authorization in GitHub repository janeczku/calibre-web prior ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7cc7c9f5537e1adfe0f913407ad2a39bc41b82bb -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7cc7c9f5537e1adfe0f913407ad2a39bc41b82bb You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: d82dbd02 by Moritz Muehlenhoff at 2022-11-16T11:04:49+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -9888,6 +9888,7 @@ CVE-2022-3462 (The Highlight Focus WordPress plugin through 1.1 does not sanitis NOT-FOR-US: WordPress plugin CVE-2022-42889 (Apache Commons Text performs variable interpolation, allowing properti ...) - commons-text 1.10.0-1 (bug #1021787) + [bullseye] - commons-text (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/10/13/4 NOTE: https://securitylab.github.com/advisories/GHSL-2022-018_Apache_Commons_Text/ NOTE: https://blogs.apache.org/security/entry/cve-2022-42889 @@ -62120,12 +62121,12 @@ CVE-2022-0395 (Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelpe CVE-2022-0394 (Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat ...) NOT-FOR-US: livehelperchat CVE-2022-0393 (Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. ...) - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) [buster] - vim (The vulnerable code is not present) [stretch] - vim (The vulnerable code is not present) NOTE: https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba NOTE: https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323 (v8.2.4233) + NOTE: Crash in CLI tool, no security impact CVE-2022-24069 (An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel ...) NOT-FOR-US: Insyde CVE-2022-24064 (This vulnerability allows remote attackers to execute arbitrary code o ...) @@ -62728,10 +62729,10 @@ CVE-2022-21184 (An information disclosure vulnerability exists in the License re NOT-FOR-US: Bachmann Visutec GmbH Atvise CVE-2022-0368 (Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9/ NOTE: https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) + NOTE: Crash in CLI tool, no security impact CVE-2022-0367 (A heap-based buffer overflow flaw was found in libmodbus in function m ...) {DLA-3098-1} - libmodbus 3.1.6-2.1 (bug #1021270) @@ -63650,17 +63651,16 @@ CVE-2022-0320 (The Essential Addons for Elementor WordPress plugin before 5.0.5 NOT-FOR-US: WordPress plugin CVE-2022-0319 (Out-of-bounds Read in vim/vim prior to 8.2. ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/ba622fd2-e6ef-4ad9-95b4-17f87b68755b NOTE: https://github.com/vim/vim/commit/05b27615481e72e3b338bb12990fb3e0c2ecc2a9 (v8.2.4154) + NOTE: Crash in CLI tool, no security impact CVE-2022-0318 (Heap-based Buffer Overflow in vim/vim prior to 8.2. ...) - - vim 2:8.2.4659-1 (bug #1004859) - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim 2:8.2.4659-1 (bug #1004859; unimportant) [stretch] - vim (Fix introduces a test regression) NOTE: https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08 NOTE: https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc (v8.2.4151) + NOTE: Crash in CLI tool, no security impact CVE-2022-0317 (An improper input validation vulnerability in go-attestation before 0. ...) NOT-FOR-US: go-attestation CVE-2022-0316 @@ -67546,9 +67546,10 @@ CVE-2022-0139 (Use After Free in GitHub repository radareorg/radare2 prior to 5. CVE-2022-0138 (MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior ...) NOT-FOR-US: Airspan Networks CVE-2022-0137 (A heap buffer overflow in image_set_mask function of HTMLDOC before 1. ...) - - htmldoc 1.9.15-1 + - htmldoc 1.9.15-1 (unimportant) NOTE: https://github.com/michaelrsweet/htmldoc/issues/461 NOTE: Fixed by: https://github.com/michaelrsweet/htmldoc/commit/71fe87878c9cbc3db429f5e5c70f28e4b3d96e3b (v1.9.15) + NOTE: Crash in CLI tool, no security impact CVE-2022-0136 (A vulnerability was discovered in GitLab versions 10.5 to 14.5.4, 14.6 ...) - gitlab CVE-2022-0135 (An out-of-bounds write issue was found in the VirGL virtual OpenGL ren ...) = data/dsa-needed.txt = @@ -26,6 +26,8 @@ heimdal (carnil) -- jackson-databind (apo) -- +krb5 +-- linux (carnil) Wait
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f5311755 by Moritz Muehlenhoff at 2022-11-14T10:35:38+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -6,10 +6,12 @@ CVE-2022-45199 (Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL NOTE: https://github.com/python-pillow/Pillow/pull/6700 CVE-2022-45198 (Pillow before 9.2.0 performs Improper Handling of Highly Compressed GI ...) - pillow 9.2.0-1 + [bullseye] - pillow (Minor issue) NOTE: https://github.com/python-pillow/Pillow/commit/11918eac0628ec8ac0812670d9838361ead2d6a4 (9.2.0) NOTE: https://github.com/python-pillow/Pillow/pull/6402 CVE-2022-3979 (A vulnerability was found in NagVis up to 1.9.33 and classified as pro ...) - nagvis 1:1.9.34-1 + [bullseye] - nagvis (Minor issue) NOTE: https://github.com/NagVis/nagvis/commit/7574fd8a2903282c2e0d1feef5c4876763db21d5 (nagvis-1.9.34) CVE-2022-3978 (A vulnerability, which was classified as problematic, was found in Nod ...) TODO: check @@ -64660,10 +64662,10 @@ CVE-2022-0214 (The Popup | Custom Popup Builder WordPress plugin before 1.3.1 au NOT-FOR-US: WordPress plugin CVE-2022-0213 (vim is vulnerable to Heap-based Buffer Overflow ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed NOTE: Fixed by: https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26 (v8.2.4074) + NOTE: Crash in CLI tool, no security impact CVE-2022-0212 (The SpiderCalendar WordPress plugin through 1.5.65 does not sanitise a ...) NOT-FOR-US: WordPress plugin CVE-2022-0211 (The Shield Security WordPress plugin before 13.0.6 does not sanitise a ...) @@ -66031,12 +66033,12 @@ CVE-2021-23154 (In Lens prior to 5.3.4, custom helm chart configuration creates CVE-2022-0159 (orchardcore is vulnerable to Improper Neutralization of Input During W ...) NOT-FOR-US: orchardcore CVE-2022-0158 (vim is vulnerable to Heap-based Buffer Overflow ...) - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) [buster] - vim (The vulnerable code was introduced later) [stretch] - vim (The vulnerable code was introduced later) NOTE: https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b/ NOTE: https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 (v8.2.4049) + NOTE: Crash in CLI tool, no security impact CVE-2022-0157 (phoronix-test-suite is vulnerable to Improper Neutralization of Input ...) - phoronix-test-suite CVE-2022-22848 @@ -66098,12 +66100,10 @@ CVE-2021-46164 (Zoho ManageEngine Desktop Central before 10.0.662 allows remote CVE-2021-46163 (Kentico Xperience 13.0.44 allows XSS via an XML document to the Media ...) NOT-FOR-US: Kentico Xperience CMS CVE-2022-0156 (vim is vulnerable to Use After Free ...) - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) - [stretch] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36 NOTE: https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f (v8.2.4040) + NOTE: Crash in CLI tool, no security impact CVE-2022-22827 (storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an in ...) {DSA-5073-1 DLA-2904-1} - expat 2.4.3-1 (bug #1003474) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f5311755dd15aa1f9b32c7030fb46b1931cd5dbf -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f5311755dd15aa1f9b32c7030fb46b1931cd5dbf You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7e7e3697 by Moritz Muehlenhoff at 2022-11-13T19:19:20+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -114,9 +114,9 @@ CVE-2022-3959 (A vulnerability, which was classified as problematic, has been fo CVE-2022-3958 RESERVED CVE-2022-3957 (A vulnerability classified as problematic was found in GPAC. Affected ...) - - gpac - [buster] - gpac (EOL in buster LTS) + - gpac (unimportant) NOTE: https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb + NOTE: Negligible security impact CVE-2022-3956 (A vulnerability classified as critical has been found in tsruban HHIMS ...) NOT-FOR-US: tsruban HHIMS CVE-2022-3955 (A vulnerability was found in tholum crm42. It has been rated as critic ...) @@ -56788,12 +56788,10 @@ CVE-2022-0698 CVE-2022-0697 (Open Redirect in GitHub repository archivy/archivy prior to 1.7.0. ...) NOT-FOR-US: Archivy CVE-2022-0696 (NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.442 ...) - - vim 2:8.2.4659-1 - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) - [stretch] - vim (Minor issue) + - vim 2:8.2.4659-1 (unimportant) NOTE: https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f/ NOTE: https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1 (v8.2.4428) + NOTE: Crash in CLI tool, no security impact CVE-2022-0695 (Denial of Service in GitHub repository radareorg/radare2 prior to 5.6. ...) - radare2 (bug #1014478) NOTE: https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e7e3697de7a93032b4ce640aef6497234433375 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7e7e3697de7a93032b4ce640aef6497234433375 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a89b938c by Moritz Muehlenhoff at 2022-11-11T16:05:36+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -367,6 +367,7 @@ CVE-2022-3873 (Cross-site Scripting (XSS) - DOM in GitHub repository jgraph/draw NOT-FOR-US: jgraph/drawio CVE-2022-3872 (An off-by-one read/write issue was found in the SDHCI device of QEMU. ...) - qemu + [bullseye] - qemu (Minor issue) [buster] - qemu (Minor issue, DoS, waiting for sanctioned patch) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2140567 NOTE: patch proposal 1: https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg01068.html @@ -8623,6 +8624,7 @@ CVE-2022-42919 (Python 3.9.x and 3.10.x through 3.10.8 on Linux allows local pri - python3.11 3.11.0-2 - python3.10 3.10.8-2 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 [buster] - python3.7 (Vulnerable functionality backported later in 3.7.8) NOTE: https://github.com/python/cpython/issues/97514 @@ -17202,6 +17204,7 @@ CVE-2022-39378 (Discourse is a platform for community discussion. Under certain NOT-FOR-US: Discourse CVE-2022-39377 (sysstat is a set of system performance tools for the Linux operating s ...) - sysstat (bug #1023832) + [bullseye] - sysstat (Minor issue) NOTE: https://github.com/sysstat/sysstat/security/advisories/GHSA-q8r6-g56f-9w7x NOTE: https://github.com/sysstat/sysstat/commit/9c4eaf150662ad40607923389d4519bc83b93540 (v12.7.1) CVE-2022-39376 (GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Fre ...) @@ -68232,16 +68235,16 @@ CVE-2021-4194 (bookstack is vulnerable to Improper Access Control ...) NOT-FOR-US: bookstack CVE-2021-4193 (vim is vulnerable to Out-of-bounds Read ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.3995-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.3995-1 (unimportant) NOTE: https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0 NOTE: Fixed by: https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b (v8.2.3950) + NOTE: Crash in CLI tool, no security impact CVE-2021-4192 (vim is vulnerable to Use After Free ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.3995-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.3995-1 (unimportant) NOTE: https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22 NOTE: Fixed by: https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952 (v8.2.3949) + NOTE: Crash in CLI tool, no security impact CVE-2021-4191 (An issue has been discovered in GitLab CE/EE affecting versions 13.0 t ...) [experimental] - gitlab 14.6.5+ds1 - gitlab @@ -69568,12 +69571,10 @@ CVE-2021-45476 (Yordam Library Information Document Automation product before ve CVE-2021-45475 (Yordam Library Information Document Automation product before version ...) NOT-FOR-US: Yordam Library Information Document Automation CVE-2021-4166 (vim is vulnerable to Out-of-bounds Read ...) - - vim 2:8.2.3995-1 - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) - [stretch] - vim (Minor issue) + - vim 2:8.2.3995-1 (unimportant) NOTE: https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 NOTE: https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) + NOTE: Crash in CLI tool, no security impact CVE-2021-4165 RESERVED CVE-2021-4164 (calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) ...) @@ -71185,13 +71186,13 @@ CVE-2021-44462 (This vulnerability can be exploited by parsing maliciously craft CVE-2021-4137 RESERVED CVE-2021-4136 (vim is vulnerable to Heap-based Buffer Overflow ...) - - vim 2:8.2.3995-1 (bug #1002534) - [bullseye] - vim (Minor issue) + - vim 2:8.2.3995-1 (bug #1002534; unimportant) [buster] - vim (Vulnerable code introduced later) [stretch] - vim (Vulnerable code introduced later) NOTE: https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938 NOTE: Introduced by: https://github.com/vim/vim/commit/2949cfdbe4335b9abcfeda1be4dfc52090ee1df6 (v8.2.2257) NOTE: Fixed by: https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264 (v8.2.3847) + NOTE: Crash in CLI tool, no security impact CVE-2021-4135 (A memory leak vulnerability was found in the Linux kernel's eBPF for t ...) {DSA-5096-1 DLA-2941-1} - linux 5.15.15-1 (unimportant) @@ -73239,10 +73240,10 @@ CVE-2021-44549 (Apache Sling Commons Messaging Mail provides a simple
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 237bccab by Moritz Muehlenhoff at 2022-11-09T14:13:56+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -9,6 +9,7 @@ CVE-2022-45061 (An issue was discovered in Python before 3.11.1. An unnecessary - python3.11 - python3.10 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 NOTE: https://github.com/python/cpython/issues/98433 NOTE: https://github.com/python/cpython/pull/99092 @@ -70366,6 +70367,7 @@ CVE-2021-45267 (An invalid memory address dereference vulnerability exists in gp NOTE: https://github.com/gpac/gpac/commit/29f31f431b18278b94c659452562e8a027436487 (v2.0.0) CVE-2021-45266 (A null pointer dereference vulnerability exists in gpac 1.1.0 via the ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1985 @@ -70376,12 +70378,14 @@ CVE-2021-45264 RESERVED CVE-2021-45263 (An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_dele ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1975 NOTE: https://github.com/gpac/gpac/commit/b232648da3b111a0efe500501ee8ca8f32b616e9 (v2.0.0) CVE-2021-45262 (An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_comma ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1980 @@ -75022,12 +75026,12 @@ CVE-2021-3970 (A potential vulnerability in LenovoVariable SMI Handler due to in CVE-2021-3969 (A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMC ...) NOT-FOR-US: Lenovo CVE-2021-3968 (vim is vulnerable to Heap-based Buffer Overflow ...) - - vim 2:8.2.3995-1 (bug #1001900) - [bullseye] - vim (Minor issue) + - vim 2:8.2.3995-1 (unimportant; bug #1001900) [buster] - vim (The vulnerable code is not present) [stretch] - vim (The vulnerable code is not present) NOTE: https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528/ NOTE: https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 (v8.2.3610) + NOTE: Crash in CLI tool, no security impact CVE-2022-21741 (Tensorflow is an Open Source Machine Learning Framework. ### Impact An ...) - tensorflow (bug #804612) CVE-2022-21740 (Tensorflow is an Open Source Machine Learning Framework. The implement ...) @@ -77963,16 +77967,16 @@ CVE-2021-43358 (Sunnet eHRD has inadequate filtering for special characters in U NOT-FOR-US: Sunnet eHRD CVE-2021-3928 (vim is vulnerable to Use of Uninitialized Variable ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.3995-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.3995-1 (unimportant) NOTE: https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd NOTE: Fixed by: https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732 (v8.2.3582) + NOTE: Crash in CLI tool, no security impact CVE-2021-3927 (vim is vulnerable to Heap-based Buffer Overflow ...) {DLA-3182-1 DLA-2947-1} - - vim 2:8.2.3995-1 - [bullseye] - vim (Minor issue) + - vim 2:8.2.3995-1 (unimportant) NOTE: https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 NOTE: Fixed by: https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e (v8.2.3581) + NOTE: Crash in CLI tool, no security impact CVE-2021-43357 RESERVED CVE-2021-43350 (An unauthenticated Apache Traffic Control Traffic Ops user can send a ...) @@ -79915,12 +79919,11 @@ CVE-2021-3904 (grav is vulnerable to Improper Neutralization of Input During Web NOT-FOR-US: Grav CMS CVE-2021-3903 (vim is vulnerable to Heap-based Buffer Overflow ...) {DLA-3053-1} - - vim 2:8.2.3565-1 - [bullseye] - vim (Minor issue) - [buster] - vim (Minor issue) + - vim 2:8.2.3565-1 (unimportant) NOTE: https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 NOTE: https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 NOTE: PoC crashes starting with https://github.com/vim/vim/commit/8a7d6542b33e5d2b352262305c3bfdb2d14e1cf8 (v8.2.0149) + NOTE: Crash in CLI tool, no security impact CVE-2020-36503 (The Connections Business Directory WordPress plugin before 9.7 does
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1e1b50cb by Moritz Muehlenhoff at 2022-11-09T11:54:20+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -2177,6 +2177,7 @@ CVE-2022-3822 RESERVED CVE-2022-3821 (An off-by-one Error issue was discovered in Systemd in format_timespan ...) - systemd 251.3-1 + [bullseye] - systemd (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2139327 NOTE: https://github.com/systemd/systemd/issues/23928 NOTE: https://github.com/systemd/systemd/pull/23933 @@ -19868,9 +19869,10 @@ CVE-2022-2891 (The WP 2FA WordPress plugin before 2.3.0 uses comparison operator CVE-2022-2890 (Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecomp ...) NOT-FOR-US: yetiforcecrm CVE-2022-2889 (Use After Free in GitHub repository vim/vim prior to 9.0.0225. ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) NOTE: https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa NOTE: https://github.com/vim/vim/commit/91c7cbfe31bbef57d5fcf7d76989fc159f73ef15 (v9.0.0225) + NOTE: Crash in CLI tool, no security impact CVE-2022-2888 (If an attacker comes into the possession of a victim's OctoPrint sessi ...) - octoprint (bug #718591) CVE-2022-2887 (The WP Server Health Stats WordPress plugin before 1.7.0 does not esca ...) @@ -20003,10 +20005,11 @@ CVE-2022-2864 (The demon image annotation plugin for WordPress is vulnerable to CVE-2022-2863 (The Migration, Backup, Staging WordPress plugin before 0.9.76 does not ...) NOT-FOR-US: WordPress plugin CVE-2022-2862 (Use After Free in GitHub repository vim/vim prior to 9.0.0221. ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) [buster] - vim (The vulnerable code was introduced later) NOTE: https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765 NOTE: https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494 (v9.0.0221) + NOTE: Crash in CLI tool, no security impact CVE-2022-2861 (Inappropriate implementation in Extensions API in Google Chrome prior ...) {DSA-5212-1} - chromium 104.0.5112.101-1 @@ -20290,10 +20293,11 @@ CVE-2022-2821 (Missing Critical Step in Authentication in GitHub repository name CVE-2022-2820 (Improper Access Control in GitHub repository namelessmc/nameless prior ...) NOT-FOR-US: NamelessMC/Nameless CVE-2022-2819 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) [buster] - vim (The vulnerable code was introduced later) NOTE: https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59 NOTE: https://github.com/vim/vim/commit/d1d8f6bacb489036d0fd479c9dd3c0102c99 (v9.0.0211) + NOTE: Crash in CLI tool, no security impact CVE-2022-2818 (Authentication Bypass by Primary Weakness in GitHub repository cockpit ...) NOT-FOR-US: Cockpit-HQ/Cockpit CVE-2022-38305 (AeroCMS v0.0.1 was discovered to contain an arbitrary file upload vuln ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e1b50cbbbf564362adeec21bc0cdf185cbcef3e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1e1b50cbbbf564362adeec21bc0cdf185cbcef3e You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 72eca0ba by Moritz Muehlenhoff at 2022-11-07T17:40:29+01:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -7908,6 +7908,7 @@ CVE-2022-3552 (Unrestricted Upload of File with Dangerous Type in GitHub reposit NOT-FOR-US: boxbilling CVE-2022-3551 (A vulnerability, which was classified as problematic, has been found i ...) - xorg-server + [bullseye] - xorg-server (Minor issue) - xwayland NOTE: https://gitlab.freedesktop.org/xorg/xserver/commit/18f91b950e22c2a342a4fbc55e9ddf7534a707d2 CVE-2022-3550 (A vulnerability classified as critical was found in X.org Server. Affe ...) @@ -12258,7 +12259,9 @@ CVE-2022-3276 (Command injection is possible in the puppetlabs-mysql module prio NOTE: https://github.com/puppetlabs/puppetlabs-mysql/commit/e70e7fd130aaa2fe1cefe4ccb628b304ad3c180a (v13.0.0) CVE-2022-3275 (Command injection is possible in the puppetlabs-apt module prior to ve ...) - puppet-module-puppetlabs-apt + [bullseye] - puppet-module-puppetlabs-apt (Minor issue) NOTE: https://puppet.com/security/cve/CVE-2022-3275 + NOTE: https://github.com/puppetlabs/puppetlabs-apt/commit/c26ad2a54f318b4d6fbe55f837b00cd6afd9f1eb CVE-2022-3274 (Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffwe ...) - rdiffweb (bug #969974) CVE-2022-3273 (Allocation of Resources Without Limits or Throttling in GitHub reposit ...) @@ -20310,9 +20313,10 @@ CVE-2022-38219 CVE-2022-38218 RESERVED CVE-2022-2817 (Use After Free in GitHub repository vim/vim prior to 9.0.0213. ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) NOTE: https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f NOTE: https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20 (v9.0.0213) + NOTE: Crash in CLI tool, no security impact CVE-2022-2816 (Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212. ...) - vim 2:9.0.0229-1 (unimportant) NOTE: https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58 @@ -22822,9 +22826,10 @@ CVE-2022-2600 (The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not s CVE-2022-2599 (The Anti-Malware Security and Brute-Force Firewall WordPress plugin be ...) NOT-FOR-US: WordPress plugin CVE-2022-2598 (Undefined Behavior for Input to API in GitHub repository vim/vim prior ...) - - vim 2:9.0.0135-1 + - vim 2:9.0.0135-1 (unimportant) NOTE: https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e/ NOTE: https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d (v9.0.0101) + NOTE: Crash in CLI tool, no security impact CVE-2022-2597 (The Visual Portfolio, Photo Gallery Post Grid WordPress plugin b ...) NOT-FOR-US: WordPress plugin CVE-2022-2596 (Denial of Service in GitHub repository node-fetch/node-fetch prior to ...) @@ -23554,9 +23559,10 @@ CVE-2022-37014 CVE-2022-2572 (In affected versions of Octopus Server where access is managed by an e ...) NOT-FOR-US: Octopus Server CVE-2022-2571 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - - vim 2:9.0.0135-1 + - vim 2:9.0.0135-1 (unimportant) NOTE: https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571/ NOTE: https://github.com/vim/vim/commit/a6f9e300161f4cb54713da22f65b261595e8e614 (v9.0.0102) + NOTE: Crash in CLI tool, no security impact CVE-2022-2570 RESERVED CVE-2022-37013 @@ -24941,9 +24947,10 @@ CVE-2022-34147 CVE-2022-31137 (Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Kee ...) NOT-FOR-US: Roxy-WI CVE-2022-2522 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - - vim 2:9.0.0135-1 (bug #1016068) + - vim 2:9.0.0135-1 (unimportant; bug #1016068) NOTE: https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 NOTE: https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089 (v9.0.0061) + NOTE: Crash in CLI tool, no security impact CVE-2022-2521 (It was found in libtiff 4.4.0rc1 that there is an invalid pointer free ...) - tiff (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/422 @@ -88172,8 +88179,9 @@ CVE-2021-40243 CVE-2021-40242 RESERVED CVE-2021-40241 (xfig 3.2.7 is vulnerable to Buffer Overflow. ...) - - xfig 1:3.2.8a-1 (bug #992395) + - xfig 1:3.2.8a-1 (unimportant; bug #992395) NOTE: https://sourceforge.net/p/mcj/tickets/136/ + NOTE: No security impact CVE-2021-40240 RESERVED CVE-2021-40239 (A Buffer Overflow vulnerability exists in the latest version of
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5ab6f8f3 by Moritz Muehlenhoff at 2022-11-02T10:04:12+01:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6239,6 +6239,7 @@ CVE-2022-3480 RESERVED CVE-2022-3479 (A vulnerability found in nss. By this security vulnerability, nss clie ...) - nss (bug #1021786) + [bullseye] - nss (Minor issue) [buster] - nss (The vulnerable code was introduced later) NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1774654 CVE-2022-42907 @@ -6268,6 +6269,7 @@ CVE-2022-3478 RESERVED CVE-2022-42906 (powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbi ...) - powerline-gitstatus 1.3.2-1 + [bullseye] - powerline-gitstatus (Minor issue) NOTE: https://github.com/jaspernbrouwer/powerline-gitstatus/issues/45 NOTE: https://github.com/jaspernbrouwer/powerline-gitstatus/pull/46 CVE-2022-42896 @@ -16052,9 +16054,9 @@ CVE-2022-38858 (Certain The MPlayer Project products are vulnerable to Buffer Ov CVE-2022-38857 RESERVED CVE-2022-38856 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer (bug #1021013) + - mplayer (unimportant; bug #1021013) NOTE: https://trac.mplayerhq.hu/ticket/2395 - TODO: Fixed by other fixes, but not pin pointed upstream, try to isolate revision to fix issue + NOTE: Crash in CLI tool, no security impact CVE-2022-38855 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2392 @@ -16947,10 +16949,11 @@ CVE-2022-38602 CVE-2022-38601 RESERVED CVE-2022-38600 (Mplayer SVN-r38374-13.0.1 is vulnerable to Memory Leak via vf.c and vf ...) - - mplayer (bug #1021013) + - mplayer (unimportant; bug #1021013) NOTE: https://trac.mplayerhq.hu/ticket/2390#comment:2 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/59792bad144c11b21b27171a93a36e3fbd21eb5e (r38380) NOTE: Followup: https://git.ffmpeg.org/gitweb/mplayer.git/commit/48ca1226397974bb2bc53de878411f88a80fe1f8 (r38392) + NOTE: Memory leak in CLI tool, no security impact CVE-2022-38599 RESERVED CVE-2022-38598 @@ -27639,6 +27642,7 @@ CVE-2022-34668 (NVFLARE, versions prior to 2.1.4, contains a vulnerability that CVE-2022-34667 RESERVED - nvidia-cuda-toolkit (bug #1021625) + [bullseye] - nvidia-cuda-toolkit (Non-free not supported) [buster] - nvidia-cuda-toolkit (Minor issue) NOTE: https://nvidia.custhelp.com/app/answers/detail/a_id/5373 CVE-2022-34666 @@ -69432,36 +69436,42 @@ CVE-2021-44928 RESERVED CVE-2021-44927 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1960 NOTE: https://github.com/gpac/gpac/commit/eaea647cc7dec7b452c17e72f4ce46be35348c92 (v2.0.0) CVE-2021-44926 (A null pointer dereference vulnerability exists in gpac 1.1.0-DEV in t ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1961 NOTE: https://github.com/gpac/gpac/commit/f73da86bf32992f62b9ff2b9c9e853e3c97edf8e (v2.0.0) CVE-2021-44925 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1967 NOTE: https://github.com/gpac/gpac/commit/a5a8dbcdd95666f763fe59ab65154ae9271a18f2 (v2.0.0) CVE-2021-44924 (An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log func ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1959 NOTE: https://github.com/gpac/gpac/commit/e2acb1511d1e69115141ea3080afd1cce6a15497 (v2.0.0) CVE-2021-44923 (A null pointer dereference vulnerability exists in gpac 1.1.0 in the g ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1962 NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9ce5b6e9 by Moritz Muehlenhoff at 2022-10-25T12:33:08+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -5988,9 +5988,10 @@ CVE-2022-3297 (Use After Free in GitHub repository vim/vim prior to 9.0.0579. .. NOTE: https://github.com/vim/vim/commit/0ff01835a40f549c5c4a550502f62a2ac9ac447c (v9.0.0579) NOTE: Crash in CLI tool, no security impact CVE-2022-3296 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. ...) - - vim 2:9.0.0626-1 + - vim 2:9.0.0626-1 (unimportant) NOTE: https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077 NOTE: https://github.com/vim/vim/commit/96b9bf8f74af8abf1e30054f996708db7dc285be (v9.0.0577) + NOTE: Crash in CLI tool, no security impact CVE-2022-3295 (Allocation of Resources Without Limits or Throttling in GitHub reposit ...) - rdiffweb (bug #969974) CVE-2022-3294 @@ -49437,6 +49438,7 @@ CVE-2022-0700 (The Simple Tracking WordPress plugin before 1.7 does not sanitise NOT-FOR-US: WordPress plugin CVE-2022-0699 (A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 ...) - shapelib 1.5.0-3 (bug #1022557) + [bullseye] - shapelib (Minor issue) NOTE: https://github.com/OSGeo/shapelib/commit/c75b9281a5b9452d92e1682bdfe6019a13ed819f NOTE: https://github.com/OSGeo/shapelib/issues/39 CVE-2022-25597 (ASUS RT-AC86Us LPD service has insufficient filtering for speci ...) = data/dsa-needed.txt = @@ -56,9 +56,13 @@ ruby-tzinfo -- salt -- +samba +-- sofia-sip Maintainer proposed debdiff, though as rebuild of the testing version -- sox patch needed for CVE-2021-40426, check with upstream -- +thunderbird (jmm) +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ce5b6e9ab5505b40b5cc89387e82e44cd9f6e5a -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9ce5b6e9ab5505b40b5cc89387e82e44cd9f6e5a You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f75a9f52 by Moritz Muehlenhoff at 2022-10-25T09:00:30+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -903,8 +903,9 @@ CVE-2022-3594 (A vulnerability was found in Linux Kernel. It has been declared a - linux 6.0.3-1 NOTE: https://git.kernel.org/linus/93e2be344a7db169b7119de21ac1bf253b8c6907 (6.1-rc1) CVE-2022-3593 (A vulnerability was found in Linux Kernel. It has been classified as p ...) - - iproute2 5.19.0-1 + - iproute2 5.19.0-1 (unimportant) NOTE: https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=2cb76253ed852559a4f2b315f5e23457a15d71e5 + NOTE: Memory leak in CLI tool, no security impact CVE-2022-3592 RESERVED CVE-2022-43399 @@ -1968,17 +1969,21 @@ CVE-2022-3531 (A vulnerability was found in Linux Kernel. It has been classified NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=6d2e21dc4db3933db65293552ecc1ede26febeca NOTE: Issue only in selftest/bpf. CVE-2022-3530 (A vulnerability was found in Linux Kernel and classified as problemati ...) - - iproute2 5.19.0-1 + - iproute2 5.19.0-1 (unimportant) NOTE: https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=1d540336b026ed5bfe10eefac383db7f434d842f + NOTE: Memory leak in CLI tool, no security impact CVE-2022-3529 (A vulnerability has been found in Linux Kernel and classified as probl ...) - - iproute2 5.19.0-1 + - iproute2 5.19.0-1 (unimportant) NOTE: https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=6db01afd60748afbba114be2773be338c5be28ff + NOTE: Memory leak in CLI tool, no security impact CVE-2022-3528 (A vulnerability, which was classified as problematic, was found in Lin ...) - - iproute2 5.19.0-1 + - iproute2 5.19.0-1 (unimportant) NOTE: https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=afdbb0204a5872f1f76058a0db5a529b1f0c8de7 + NOTE: Memory leak in CLI tool, no security impact CVE-2022-3527 (A vulnerability, which was classified as problematic, has been found i ...) - - iproute2 5.19.0-1 + - iproute2 5.19.0-1 (unimportant) NOTE: https://git.kernel.org/pub/scm/network/iproute2/iproute2-next.git/commit/?id=c5433c4b7a57d380f4cb351316f5ba5ebae9538e + NOTE: Memory leak in CLI tool, no security impact CVE-2022-3526 (A vulnerability classified as problematic was found in Linux Kernel. T ...) - linux 5.17.6-1 [bullseye] - linux (Vulnerable code not present) @@ -68709,10 +68714,11 @@ CVE-2022-21695 (OnionShare is an open source tool that lets you securely and ano [buster] - onionshare (Vulnerable code not present) NOTE: https://github.com/onionshare/onionshare/security/advisories/GHSA-99p8-9p2c-49j4 CVE-2022-21694 (OnionShare is an open source tool that lets you securely and anonymous ...) - - onionshare 2.5-1 (bug #1014966) + - onionshare 2.5-1 (unimportant; bug #1014966) [buster] - onionshare (Vulnerable code not present) NOTE: https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h NOTE: https://github.com/onionshare/onionshare/issues/1389 + NOTE: This isn't a security vulnerability by itself CVE-2022-21693 (OnionShare is an open source tool that lets you securely and anonymous ...) - onionshare 2.5-1 (bug #1014966) [bullseye] - onionshare (Vulnerable code not present) @@ -68738,7 +68744,7 @@ CVE-2022-21689 (OnionShare is an open source tool that lets you securely and ano NOTE: https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc NOTE: https://github.com/onionshare/onionshare/commit/096178a9e6133fd6ca9d95a00a67bba75ccab377 (v2.5) CVE-2022-21688 (OnionShare is an open source tool that lets you securely and anonymous ...) - - onionshare 2.5-1 (bug #1014966) + NOTE: The report against OnionShare is just a stop gap, this needs to be tracked down/fixed in Qt NOTE: https://github.com/onionshare/onionshare/security/advisories/GHSA-x7wr-283h-5h2v CVE-2022-21687 (gh-ost is a triggerless online schema migration solution for MySQL. Ve ...) NOT-FOR-US: GitHub Online Schema @@ -77583,6 +77589,7 @@ CVE-2021-41869 (SuiteCRM 7.10.x before 7.10.33 and 7.11.x before 7.11.22 is vuln CVE-2021-41868 (OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to u ...) - onionshare 2.5-1 (bug #1014966) [buster] - onionshare (Vulnerable code not present) + NOTE: https://github.com/onionshare/onionshare/issues/1396 CVE-2021-41867 (An information disclosure vulnerability
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 8db5037c by Moritz Muehlenhoff at 2022-10-23T23:24:55+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1649,6 +1649,7 @@ CVE-2022-3560 RESERVED CVE-2022-3559 (A vulnerability was found in Exim and classified as problematic. This ...) - exim4 4.96-4 + [bullseye] - exim4 (Minor issue) NOTE: https://git.exim.org/exim.git/commit/4e9ed49f8f12eb331b29bd5b6dc3693c520fddc2 CVE-2022-3558 RESERVED = data/dsa-needed.txt = @@ -22,6 +22,8 @@ frr -- gerbv -- +libxml2 +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8db5037cc8de95b1bbb41341b236d5847e6ebda8 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8db5037cc8de95b1bbb41341b236d5847e6ebda8 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3c660b8a by Moritz Muehlenhoff at 2022-10-23T21:00:42+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1487,28 +1487,36 @@ CVE-2022-43046 RESERVED CVE-2022-43045 (GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segm ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2277 NOTE: https://github.com/gpac/gpac/commit/c5249ee4b62dfc604fecb4dce2fc480b3e388bbb CVE-2022-43044 (GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segm ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2282 NOTE: https://github.com/gpac/gpac/commit/8a0e8e4ab13348cb1ab8e93b950a03d93f158a35 CVE-2022-43043 (GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segm ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2276 NOTE: https://github.com/gpac/gpac/commit/6bff06cdb8e9b4e8ed2e789ee9340877759536fd CVE-2022-43042 (GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2278 NOTE: https://github.com/gpac/gpac/commit/3661da280b3eba75490e75ff20ad440c66e24de9 CVE-2022-43041 RESERVED CVE-2022-43040 (GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a heap ...) - gpac + [bullseye] - gpac (Vulnerable code not present) + [buster] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2280 NOTE: https://github.com/gpac/gpac/commit/f17dae31ebf6ea7af8c512165d9b954c2a6ea46e CVE-2022-43039 (GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segm ...) - gpac + [bullseye] - gpac (Vulnerable code not present) + [buster] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2281 NOTE: https://github.com/gpac/gpac/commit/62dbd5caad6b89b33535dfa19ef65419f0378303 CVE-2022-43038 (Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP ...) @@ -1650,9 +1658,11 @@ CVE-2022-3556 RESERVED CVE-2022-3555 (A vulnerability was found in X.org libX11 and classified as problemati ...) - libx11 2:1.7.4-1 + [bullseye] - libx11 (Minor issue) NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/8a368d808fec166b5fb3dfe6312aab22c7ee20af (libX11-1.7.4) CVE-2022-3554 (A vulnerability has been found in X.org libX11 and classified as probl ...) - libx11 + [bullseye] - libx11 (Minor issue) NOTE: https://gitlab.freedesktop.org/xorg/lib/libx11/commit/1d11822601fd24a396b354fa616b04ed3df8b4ef CVE-2022-3553 (A vulnerability, which was classified as problematic, was found in X.o ...) - xorg-server 2:21.1.4-1 (unimportant) @@ -69162,6 +69172,7 @@ CVE-2022-21619 (Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise E - openjdk-11 11.0.17+8-1 [bullseye] - openjdk-11 (Minor issue, fix along with next CPU) - openjdk-17 + [bullseye] - openjdk-17 (Minor issue, fix along with next CPU) CVE-2022-21618 (Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition ...) - openjdk-17 17.0.5+8-1 [bullseye] - openjdk-17 (Minor issue, fix along with next CPU) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3c660b8add95c68dfc060298c966ae4b674524b4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3c660b8add95c68dfc060298c966ae4b674524b4 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e3d9e484 by Moritz Muehlenhoff at 2022-10-12T14:07:11+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -5376,9 +5376,9 @@ CVE-2022-40627 RESERVED CVE-2022-40626 (An unauthenticated user can create a link with reflected Javascript co ...) - zabbix 1:6.0.7+dfsg-2 + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-21350 NOTE: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/55eb14d0a394b362d5df00ed9e06a3918472deec (6.0.7rc1) - TODO: check, verify it really did not affect versions before 6.0.0 CVE-2022-40625 RESERVED CVE-2022-40624 @@ -10656,7 +10656,7 @@ CVE-2022-2925 (Cross-site Scripting (XSS) - Stored in GitHub repository appwrite CVE-2022-2924 (Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecomp ...) NOT-FOR-US: yetiforcecrm CVE-2022-2923 (NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.024 ...) - - vim 2:9.0.0242-1 + - vim 2:9.0.0242-1 (unimportant) NOTE: https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2 NOTE: https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e (v9.0.0240) NOTE: Crash in CLI tool, no security impact @@ -11632,9 +11632,10 @@ CVE-2022-2817 (Use After Free in GitHub repository vim/vim prior to 9.0.0213. .. NOTE: https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f NOTE: https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20 (v9.0.0213) CVE-2022-2816 (Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212. ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) NOTE: https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58 NOTE: https://github.com/vim/vim/commit/dbdd16b62560413abcc3c8e893cc3010ccf31666 (v9.0.0212) + NOTE: Crash in CLI tool, no security impact CVE-2022-38217 RESERVED CVE-2022-2815 @@ -13130,6 +13131,7 @@ CVE-2022-37617 (Prototype pollution vulnerability in function resolveShims in re NOT-FOR-US: Node browserify-shim CVE-2022-37616 (A prototype pollution vulnerability exists in the function copy in dom ...) - node-xmldom (bug #1021618) + [bullseye] - node-xmldom (Minor issue) NOTE: https://github.com/xmldom/xmldom/issues/436 NOTE: https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj NOTE: Fixed by: https://github.com/xmldom/xmldom/commit/6956ec406fd4658dfb028a327c7a39238b24c3cd (0.9.0-beta.2) @@ -77752,6 +77754,7 @@ CVE-2021-3783 (yourls is vulnerable to Improper Neutralization of Input During W NOT-FOR-US: yourls CVE-2021-3782 (An internal reference count is held on the buffer pool, incremented ev ...) - wayland 1.21.0-1 + [bullseye] - wayland (Minor issue) NOTE: https://gitlab.freedesktop.org/wayland/wayland/-/issues/224 NOTE: https://gitlab.freedesktop.org/wayland/wayland/-/commit/b19488c7154b902354cb26a27f11415d7799b0b2 (1.20.91) CVE-2021-3781 (A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3d9e4849fe58b368f33fed7567106c64665ae16 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3d9e4849fe58b368f33fed7567106c64665ae16 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: f2089065 by Moritz Muehlenhoff at 2022-10-05T17:02:42+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -7460,11 +7460,13 @@ CVE-2022-39210 (Nextcloud android is the official Android client for the Nextclo CVE-2022-39209 (cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and renderin ...) - cmark-gfm (bug #1020588) - python-cmarkgfm - - ghostwriter + - ghostwriter (unimportant) - ruby-commonmarker - r-cran-commonmark + [bullseye] - r-cran-commonmark (Minor issue) NOTE: https://github.com/github/cmark-gfm/security/advisories/GHSA-cgh3-p57x-9q7q NOTE: https://github.com/github/cmark-gfm/commit/cfcaa0068bf319974fdec283416fcee5035c2d70 (0.29.0.gfm.6) + NOTE: For ghostwriter just a hang/crash in GUI tool, no security impact CVE-2022-39208 (Onedev is an open source, self-hosted Git Server with CI/CD and Kanban ...) NOT-FOR-US: Onedev CVE-2022-39207 (Onedev is an open source, self-hosted Git Server with CI/CD and Kanban ...) @@ -7824,6 +7826,7 @@ CVE-2006-20001 RESERVED CVE-2022- [wordpress 6.0.2] - wordpress 6.0.2+dfsg1-1 (bug #1018863) + [bullseye] - wordpress (Minor issue) NOTE: https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/ CVE-2022-39079 RESERVED @@ -18258,11 +18261,13 @@ CVE-2022-2321 (Improper Restriction of Excessive Authentication Attempts in GitH CVE-2022-35230 (An authenticated user can create a link with reflected Javascript code ...) [experimental] - zabbix 1:6.0.6+dfsg-1 - zabbix 1:6.0.7+dfsg-2 (bug #1014994) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-21305 NOTE: Fixed in: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/3b47a97676ee9ca4e16566f1931c456459108eae (5.0.25rc1) CVE-2022-35229 (An authenticated user can create a link with reflected Javascript code ...) [experimental] - zabbix 1:6.0.6+dfsg-1 - zabbix 1:6.0.7+dfsg-2 (bug #1014992) + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-21306 NOTE: Fixed in: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/b546c3f10ce98b0c914e5fc4114bd43042880c3c (5.0.25rc1) CVE-2022-35228 (SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve ...) @@ -47753,16 +47758,19 @@ CVE-2022-24920 CVE-2022-24919 (An authenticated user can create a link with reflected Javascript code ...) {DLA-2980-1} - zabbix 1:6.0.7+dfsg-2 + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-20680 NOTE: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe (5.0.21rc1) CVE-2022-24918 (An authenticated user can create a link with reflected Javascript code ...) - zabbix 1:6.0.7+dfsg-2 + [bullseye] - zabbix (Minor issue) [stretch] - zabbix (The vulnerable code was introduced later) NOTE: https://support.zabbix.com/browse/ZBX-20680 NOTE: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe (5.0.21rc1) CVE-2022-24917 (An authenticated user can create a link with reflected Javascript code ...) {DLA-2980-1} - zabbix 1:6.0.7+dfsg-2 + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-20680 NOTE: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe (5.0.21rc1) CVE-2022-24911 @@ -48391,6 +48399,7 @@ CVE-2022-24725 (Shescape is a shell escape package for JavaScript. An issue in v CVE-2022-24724 (cmark-gfm is GitHub's extended version of the C reference implementati ...) - cmark-gfm 0.29.0.gfm.3-3 (bug #1006756) - ghostwriter (bug #1006757) + [bullseye] - ghostwriter (Minor issue) - python-cmarkgfm 0.7.0-1 (bug #1006758) - ruby-commonmarker (bug #1006759) - r-cran-commonmark 1.8.0-1 (bug #1006760) @@ -49549,6 +49558,7 @@ CVE-2022-24350 CVE-2022-24349 (An authenticated user can create a link with reflected XSS payload for ...) {DLA-2980-1} - zabbix 1:6.0.7+dfsg-2 + [bullseye] - zabbix (Minor issue) NOTE: https://support.zabbix.com/browse/ZBX-20680 NOTE: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe (5.0.21rc1) CVE-2022-24348 (Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal ...) @@ -54285,10 +54295,12 @@ CVE-2022-23135 (There is a directory traversal vulnerability in some home gatewa CVE-2022-23134
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 90fa8546 by Moritz Muehlenhoff at 2022-10-05T12:27:29+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -3962,6 +3962,7 @@ CVE-2022-3223 (Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/d NOT-FOR-US: jgraph/drawio CVE-2022-3222 (Uncontrolled Recursion in GitHub repository gpac/gpac prior to 2.1.0-D ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://huntr.dev/bounties/b29c69fa-3eac-41e4-9d4f-d861aba18235/ NOTE: https://github.com/gpac/gpac/commit/4e7736d7ec7bf64026daa611da951993bb42fdaf @@ -6119,6 +6120,7 @@ CVE-2022-39836 RESERVED CVE-2022-39835 (An issue was discovered in Gajim through 1.4.7. The vulnerability allo ...) - gajim 1.5.0-1 + [bullseye] - gajim (Minor issue) NOTE: https://dev.gajim.org/gajim/gajim/-/commit/af02c6bd53fad4e0065951597bd7ec801c002067 (1.5.0) CVE-2022-39834 RESERVED @@ -40933,6 +40935,7 @@ CVE-2022-1036 (Able to create an account with long password leads to memory corr NOT-FOR-US: microweber CVE-2022-1035 (Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpa ...) - gpac (bug #1016443) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://huntr.dev/bounties/851942a4-1d64-4553-8fdc-9fccd167864b @@ -44986,6 +44989,7 @@ CVE-2022-21802 (The package grapesjs before 0.19.5 are vulnerable to Cross-site NOT-FOR-US: grapejs CVE-2022-21797 (The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary ...) - joblib (bug #1020820) + [bullseye] - joblib (Minor issue) NOTE: https://github.com/joblib/joblib/issues/1128 NOTE: https://github.com/joblib/joblib/pull/1321 NOTE: https://github.com/joblib/joblib/commit/b90f10efeb670a2cc877fb88ebb3f2019189e059 (1.2.0) @@ -58332,6 +58336,7 @@ CVE-2021-45832 (A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13. NOTE: Negligible security impact, malicous scientific data has more issues than a crash... CVE-2021-45831 (A Null Pointer Dereference vulnerability exitgs in GPAC 1.0.1 in MP4Bo ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/1990 @@ -134539,6 +134544,7 @@ CVE-2020-29261 CVE-2020-29260 (libvncclient v0.9.13 was discovered to contain a memory leak via the f ...) {DLA-3125-1} - libvncserver (bug #1019228) + [bullseye] - libvncserver (Minor issue) NOTE: https://github.com/LibVNC/libvncserver/commit/bef41f6ec4097a8ee094f90a1b34a708fbd757ec CVE-2020-29259 (Cross-site scripting (XSS) vulnerability in Online Examination System ...) NOT-FOR-US: Online Examination System = data/dsa-needed.txt = @@ -29,6 +29,8 @@ netatalk -- nodejs -- +openexr +-- php-horde-mime-viewer -- php-horde-turba View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/90fa85463e85b04807a7152399578c7f2f05c0c7 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/90fa85463e85b04807a7152399578c7f2f05c0c7 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 02d2c710 by Moritz Muehlenhoff at 2022-09-29T17:22:02+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1101,6 +1101,7 @@ CVE-2022-3288 RESERVED CVE-2022-3287 (When creating an OPERATOR user account on the BMC, the redfish plugin ...) - fwupd 1.8.5-1 + [bullseye] - fwupd (Minor issue) NOTE: https://github.com/fwupd/fwupd/commit/ea676855f2119e36d433fbd2ed604039f53b2091 (1.8.5) CVE-2022-3286 RESERVED @@ -7284,6 +7285,7 @@ CVE-2022-38752 (Using snakeYAML to parse untrusted YAML files may be vulnerable [bullseye] - snakeyaml (Minor issue) NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not public) + NOTE: Fixed in 1.32 CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...) - snakeyaml 1.31-1 [bullseye] - snakeyaml (Minor issue) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/02d2c710a1feaf9f571d639f7a246409430a0353 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/02d2c710a1feaf9f571d639f7a246409430a0353 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 25dfd340 by Moritz Muehlenhoff at 2022-09-27T14:16:42+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -548,9 +548,10 @@ CVE-2022-41338 CVE-2022-41337 RESERVED CVE-2022-3297 (Use After Free in GitHub repository vim/vim prior to 9.0.0579. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/1aa9ec92-0355-4710-bf85-5bce9effa01c NOTE: https://github.com/vim/vim/commit/0ff01835a40f549c5c4a550502f62a2ac9ac447c (v9.0.0579) + NOTE: Crash in CLI tool, no security impact CVE-2022-3296 (Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. ...) - vim NOTE: https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077 @@ -633,8 +634,8 @@ CVE-2022-3278 (NULL Pointer Dereference in GitHub repository vim/vim prior to 9. CVE-2022-3277 [unrestricted creation of security groups] RESERVED - neutron + [bullseye] - neutron (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2129193 - TODO: details missing on RH bugzilla entry CVE-2020-36604 (hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisoning in t ...) - node-hoek 9.0.3+~5.0.0+~4.0.0-1 [buster] - node-hoek (Vulnerable code not present) @@ -6382,16 +6383,18 @@ CVE-2022-38861 (The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to m NOTE: https://trac.mplayerhq.hu/ticket/2407 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/2622e7fbe3605a2f3b4f74900197fefeedc0d2e1 (r38402) CVE-2022-38860 (Certain The MPlayer Project products are vulnerable to Divide By Zero ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2402 NOTE: Duplicate of https://trac.mplayerhq.hu/ticket/2401 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/62fe0c63cf4fba91efd29bbc85309280e1a99a47 (r38389) + NOTE: Crash in CLI tool, no security impact CVE-2022-38859 RESERVED CVE-2022-38858 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2396 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/92e0d0b1a04dfdd4ac741e0d07005e3ece2c92ca (r38385) + NOTE: Crash in CLI tool, no security impact CVE-2022-38857 RESERVED CVE-2022-38856 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) @@ -27633,6 +27636,7 @@ CVE-2022-31034 (Argo CD is a declarative, GitOps continuous delivery tool for Ku NOT-FOR-US: Argo CD CVE-2022-31033 (The Mechanize library is used for automating interaction with websites ...) - ruby-mechanize 2.8.5-1 (bug #1014809) + [bullseye] - ruby-mechanize (Minor issue) NOTE: https://github.com/sparklemotion/mechanize/security/advisories/GHSA-64qm-hrgp-pgr9 NOTE: Prerequisite to clear credential headers when redirecting to cross site NOTE: https://github.com/sparklemotion/mechanize/commit/17e5381032c90caf240ac3d2e52b353f40c18d83 (v2.8.0) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/25dfd340d1e0e9597da9f9a3c267237e46007974 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/25dfd340d1e0e9597da9f9a3c267237e46007974 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 21fe653a by Moritz Mühlenhoff at 2022-09-23T14:32:37+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -52,6 +52,7 @@ CVE-2022-3266 RESERVED CVE-2022-41322 (In Kitty before 0.26.2, insufficient validation in the desktop notific ...) - kitty + [bullseye] - kitty (Minor issue) NOTE: https://github.com/kovidgoyal/kitty/commit/f05783e64d5fa62e1aed603e8d69aced5e49824f (v0.26.2) CVE-2022-41318 [Buffer Over Read in SSPI and SMB Authentication] RESERVED @@ -2777,6 +2778,7 @@ CVE-2022-40147 RESERVED CVE-2022-40146 (Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XM ...) - batik + [bullseye] - batik (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/09/22/3 NOTE: https://issues.apache.org/jira/browse/BATIK-1335 NOTE: http://svn.apache.org/viewvc?view=revision=1903910 @@ -5774,9 +5776,9 @@ CVE-2022-38863 (Certain The MPlayer Project products are vulnerable to Buffer Ov NOTE: Crash in CLI tool, no security impact CVE-2022-38862 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - mplayer + [bullseye] - mplayer (Minor issue) NOTE: https://trac.mplayerhq.hu/ticket/2400 NOTE: https://trac.mplayerhq.hu/ticket/2404 - TODO: check, unclear if fixed, upstream cannot reproduce CVE-2022-38861 (The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory ...) - mplayer NOTE: https://trac.mplayerhq.hu/ticket/2407 @@ -5799,9 +5801,10 @@ CVE-2022-38856 (Certain The MPlayer Project products are vulnerable to Buffer Ov NOTE: https://trac.mplayerhq.hu/ticket/2395 TODO: Fixed by other fixes, but not pin pointed upstream, try to isolate revision to fix issue CVE-2022-38855 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2392 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/2f6e69e59e2614acdde5505b049c48f80a3d0eb7 (r38384) + NOTE: Crash in CLI tool, no security impact CVE-2022-38854 RESERVED CVE-2022-38853 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) @@ -6518,6 +6521,7 @@ CVE-2022-38649 RESERVED CVE-2022-38648 (Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XM ...) - batik + [bullseye] - batik (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/09/22/4 NOTE: https://issues.apache.org/jira/browse/BATIK-1333 NOTE: http://svn.apache.org/viewvc?view=revision=1903625 @@ -7244,6 +7248,7 @@ CVE-2020-36592 RESERVED CVE-2022-38398 (Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XM ...) - batik + [bullseye] - batik (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/09/22/2 NOTE: https://issues.apache.org/jira/browse/BATIK-1331 NOTE: http://svn.apache.org/viewvc?view=revision=1903462 @@ -16174,6 +16179,7 @@ CVE-2022-35020 (Advancecomp v2.3 was discovered to contain a heap buffer overflo NOTE: Crash in CLI tool, no security impact CVE-2022-35019 (Advancecomp v2.3 was discovered to contain a segmentation fault. ...) - advancecomp (bug #1019592) + [bullseye] - advancecomp (Minor issue) [buster] - advancecomp (Minor issue) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md CVE-2022-35018 (Advancecomp v2.3 was discovered to contain a segmentation fault. ...) @@ -16787,6 +16793,7 @@ CVE-2022-2256 (A Stored Cross-site scripting (XSS) vulnerability was found in ke CVE-2022-2255 (A vulnerability was found in mod_wsgi. The X-Client-IP header is not r ...) {DLA-3111-1} - mod-wsgi 4.9.0-1.1 (bug #1016476) + [bullseye] - mod-wsgi (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2100563 NOTE: https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751 (4.9.3) NOTE: WSGITrustedProxies and vulnerable code introduced in https://github.com/GrahamDumpleton/mod_wsgi/commit/543fc33c23b4cb5e623d574b7efbf85c8dedb396 (4.4.10) @@ -27160,6 +27167,7 @@ CVE-2022-1796 (Use After Free in GitHub repository vim/vim prior to 8.2.4979. .. NOTE: Crash in CLI tool, no security impact CVE-2022-1795 (Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV. ...) - gpac (bug #1016443) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS)
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b9ae6ff5 by Moritz Mühlenhoff at 2022-09-20T17:03:48+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -5240,20 +5240,23 @@ CVE-2022-38855 (Certain The MPlayer Project products are vulnerable to Buffer Ov CVE-2022-38854 RESERVED CVE-2022-38853 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2398 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/59792bad144c11b21b27171a93a36e3fbd21eb5e (r38380) NOTE: Followup: https://git.ffmpeg.org/gitweb/mplayer.git/commit/48ca1226397974bb2bc53de878411f88a80fe1f8 (r38392) + NOTE: Crash in CLI tool, no security impact CVE-2022-38852 RESERVED CVE-2022-38851 (Certain The MPlayer Project products are vulnerable to Out-of-bounds R ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2393 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/58db9292a414ebf13a2cacdb3ffa967fb9036935 (r38382) + NOTE: Crash in CLI tool, no security impact CVE-2022-38850 (The MPlayer Project mencoder SVN-r38374-13.0.1 is vulnerable to Divide ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2399 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/d19ea1ce173e95c31b0e8acbe471ea26c292be2b (r38390) + NOTE: Crash in CLI tool, no security impact CVE-2022-38849 RESERVED CVE-2022-38848 @@ -8585,6 +8588,7 @@ CVE-2022-37704 RESERVED CVE-2022-37703 (In Amanda 3.5.1, an information leak vulnerability was found in the ca ...) - amanda + [bullseye] - amanda (Minor issue) NOTE: https://github.com/MaherAzzouzi/CVE-2022-37703 CVE-2022-37702 RESERVED @@ -33634,6 +33638,7 @@ CVE-2022-1228 (The Opensea WordPress plugin before 1.0.3 does not sanitize and e NOT-FOR-US: WordPress plugin CVE-2022-1227 (A privilege escalation flaw was found in Podman. This flaw allows an a ...) - libpod 3.4.7+ds1-1 + [bullseye] - libpod (Minor issue) - golang-github-containers-psgo 1.7.1+ds1-1 [bullseye] - golang-github-containers-psgo (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2070368 @@ -36530,6 +36535,7 @@ CVE-2022-27650 (A flaw was found in crun where containers were incorrectly start NOTE: https://github.com/containers/crun/commit/b847d146d496c9d7beba166fd595488e85488562 (1.4.4) CVE-2022-27649 (A flaw was found in Podman, where containers were started incorrectly ...) - libpod 3.4.6+ds1-1 + [bullseye] - libpod (Minor issue) NOTE: https://github.com/containers/podman/releases/tag/v4.0.3 NOTE: https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0 (main) NOTE: https://github.com/containers/podman/commit/7b368768c2990b9781b2b6813e1c7f91c7e6cb13 (v4.0.3) @@ -41359,6 +41365,7 @@ CVE-2022-25871 (All versions of package querymen are vulnerable to Prototype Pol NOT-FOR-US: Node querymen CVE-2022-25869 (All versions of package angular are vulnerable to Cross-site Scripting ...) - angular.js + [bullseye] - angular.js (Minor issue) NOTE: https://security.snyk.io/vuln/SNYK-JS-ANGULAR-2949781 CVE-2022-25867 (The package io.socket:socket.io-client before 2.0.1 are vulnerable to ...) NOT-FOR-US: socket.io-client-java @@ -41414,6 +41421,7 @@ CVE-2022-25845 (The package com.alibaba:fastjson before 1.2.83 are vulnerable to NOT-FOR-US: com.alibaba:fastjson CVE-2022-25844 (The package angular after 1.7.0 are vulnerable to Regular Expression D ...) - angular.js (bug #1014779) + [bullseye] - angular.js (Minor issue) [stretch] - angular.js (Nodejs in stretch not covered by security support) NOTE: https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735 CVE-2022-25843 @@ -44956,6 +44964,7 @@ CVE-2022-24730 (Argo CD is a declarative, GitOps continuous delivery tool for Ku NOT-FOR-US: Argo CD CVE-2022-24729 (CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. ...) - ckeditor 4.19.0+dfsg-1 + [bullseye] - ckeditor (Minor issue) - ckeditor3 (bug #1015217) [bullseye] - ckeditor3 (Minor issue) [buster] - ckeditor3 (No longer supported in LTS) @@ -44963,6 +44972,7 @@ CVE-2022-24729 (CKEditor4 is an open source what-you-see-is-what-you-get HTML ed NOTE: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-f6rf-9m92-x2hh CVE-2022-24728 (CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. ...) -
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 719ca565 by Moritz Mühlenhoff at 2022-09-20T12:28:45+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -988,6 +988,7 @@ CVE-2022-3214 (Delta Industrial Automation's DIAEnergy, an industrial energy man NOT-FOR-US: Delta CVE-2022-3213 (A heap buffer overflow issue was found in ImageMagick. When an applica ...) - imagemagick + [bullseye] - imagemagick (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2126824 NOTE: https://github.com/ImageMagick/ImageMagick/commit/30ccf9a0da1f47161b5935a95be854fe84e6c2a2 NOTE: https://github.com/ImageMagick/ImageMagick6/commit/1aea203eb36409ce6903b9e41fe7cb70030e8750 @@ -1529,6 +1530,7 @@ CVE-2022-40469 RESERVED CVE-2022-40468 (Tinyproxy commit 84f203f and earlier does not process HTTP request lin ...) - tinyproxy + [bullseye] - tinyproxy (Minor issue) NOTE: https://github.com/tinyproxy/tinyproxy/issues/457 NOTE: https://github.com/tinyproxy/tinyproxy/commit/3764b8551463b900b5b4e3ec0cd9bb9182191cb7 CVE-2022-40467 @@ -5187,21 +5189,24 @@ CVE-2022-38868 CVE-2022-38867 RESERVED CVE-2022-38866 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2403#comment:2 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/373517da3bb5781726565eb3114a2697b13f00f2 (r38388) + NOTE: Crash in CLI tool, no security impact CVE-2022-38865 (Certain The MPlayer Project products are vulnerable to Divide By Zero ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2401 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/33d9295663c37a37216633d7e3f07e7155da6144 (r38386) + NOTE: Crash in CLI tool, no security impact CVE-2022-38864 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - mplayer NOTE: https://trac.mplayerhq.hu/ticket/2406 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/36546389ef9fb6b0e0540c5c3f212534c34b0e94 (r38391) CVE-2022-38863 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - - mplayer + - mplayer (unimportant) NOTE: https://trac.mplayerhq.hu/ticket/2405 NOTE: https://git.ffmpeg.org/gitweb/mplayer.git/commit/b5e745b4bfab2835103a060094fae3c6cc1ba17d (r38393) + NOTE: Crash in CLI tool, no security impact CVE-2022-38862 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...) - mplayer NOTE: https://trac.mplayerhq.hu/ticket/2400 @@ -10471,6 +10476,7 @@ CVE-2022-2567 (The Form Builder CP WordPress plugin before 1.2.32 does not sanit CVE-2022-2566 RESERVED - ffmpeg 7:5.1.1-1 + [bullseye] - ffmpeg (Minor issue, wait until it lands in 4.3.x) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2126833 NOTE: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=6f53f0d09ea4c9c7f7354f018a87ef840315207d (n5.1.1) CVE-2022-2565 (The Simple Payment Donations Subscriptions WordPress plugin befo ...) @@ -150230,6 +150236,7 @@ CVE-2020-22670 RESERVED CVE-2020-22669 (Modsecurity owasp-modsecurity-crs 3.2.0 (Paranoia level at PL1) has a ...) - modsecurity-crs + [bullseye] - modsecurity-crs (Minor issue) NOTE: https://github.com/coreruleset/coreruleset/pull/1793 NOTE: https://github.com/coreruleset/coreruleset/commit/1a6e9e097587cecc038f1a1a76fc067c7797bbcd (v3.3.1-rc1) NOTE: https://github.com/coreruleset/coreruleset/commit/909cab560b56f998faee88dd8a7aa9cf086d2d9f (v3.3.1-rc1) = data/dsa-needed.txt = @@ -60,3 +60,7 @@ sofia-sip sox patch needed for CVE-2021-40426, check with upstream -- +webkit2gtk +-- +wpewebkit +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/719ca565913246f9e1b5a0378c25297d8145e0c0 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/719ca565913246f9e1b5a0378c25297d8145e0c0 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 01392162 by Moritz Muehlenhoff at 2022-09-14T17:25:06+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -186,6 +186,7 @@ CVE-2022-3191 RESERVED CVE-2022-3190 (Infinite loop in the F5 Ethernet Trailer protocol dissector in Wiresha ...) - wireshark 3.6.8-1 + [bullseye] - wireshark (Minor issue) NOTE: https://gitlab.com/wireshark/wireshark/-/issues/18307 NOTE: https://www.wireshark.org/security/wnpa-sec-2022-06.html CVE-2022-3189 @@ -1482,6 +1483,7 @@ CVE-2022-40024 RESERVED CVE-2022-40023 (Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denia ...) - mako 1.2.2+ds1-1 + [bullseye] - mako (Minor issue) NOTE: https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c (rel_1_2_2) NOTE: https://github.com/sqlalchemy/mako/issues/366 CVE-2022-40022 @@ -3284,12 +3286,14 @@ CVE-2022-39178 RESERVED CVE-2022-39177 (BlueZ before 5.59 allows physically proximate attackers to cause a den ...) - bluez 5.61-1 + [bullseye] - bluez (Minor issue) NOTE: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b (5.59) NOTE: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=7a80d2096f1b7125085e21448112aa02f49f5e9a (5.59) NOTE: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4 (5.60) NOTE: https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1977968 CVE-2022-39176 (BlueZ before 5.59 allows physically proximate attackers to obtain sens ...) - bluez 5.61-1 + [bullseye] - bluez (Minor issue) NOTE: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b (5.59) NOTE: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=7a80d2096f1b7125085e21448112aa02f49f5e9a (5.59) NOTE: https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4 (5.60) @@ -4488,18 +4492,22 @@ CVE-2022-2994 RESERVED CVE-2022-38752 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...) - snakeyaml + [bullseye] - snakeyaml (Minor issue) NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47081 (not public) CVE-2022-38751 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...) - snakeyaml + [bullseye] - snakeyaml (Minor issue) NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47039 CVE-2022-38750 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...) - snakeyaml + [bullseye] - snakeyaml (Minor issue) NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47027 CVE-2022-38749 (Using snakeYAML to parse untrusted YAML files may be vulnerable to Den ...) - snakeyaml + [bullseye] - snakeyaml (Minor issue) NOTE: https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-for-many-open NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47024 CVE-2022-38748 @@ -4531,6 +4539,7 @@ CVE-2022-2990 (An incorrect handling of the supplementary groups in the Buildah NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2121453 CVE-2022-2989 (An incorrect handling of the supplementary groups in the Podman contai ...) - libpod (bug #1019591) + [bullseye] - libpod (Minor issue) NOTE: https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/ NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2121445 CVE-2022-2988 @@ -5143,6 +5152,7 @@ CVE-2022-38529 (tinyexr commit 0647fb3 was discovered to contain a heap-buffer o NOTE: https://github.com/syoyo/tinyexr/commit/82984a37d1dba67000a35b083b26df5e57a2bb72 CVE-2022-38528 (Open Asset Import Library (assimp) commit 3c253ca was discovered to co ...) - assimp + [bullseye] - assimp (Minor issue) NOTE: https://github.com/assimp/assimp/issues/4662 CVE-2022-38527 RESERVED @@ -6422,9 +6432,11 @@ CVE-2022-38154 RESERVED CVE-2022-38153 (An issue was discovered in wolfSSL before 5.5.0 (when --enable-session ...) - wolfssl + [bullseye] - wolfssl (Vulnerable code not present and session tickets not enabled)
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 39444394 by Moritz Muehlenhoff at 2022-09-12T15:57:12+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -364,6 +364,7 @@ CVE-2022-3173 RESERVED CVE-2022-40320 (cfg_tilde_expand in confuse.c in libConfuse 3.3 has a heap-based buffe ...) - libconfuse + [bullseye] - libconfuse (Minor issue) NOTE: https://github.com/libconfuse/libconfuse/issues/163 NOTE: Fixed by: https://github.com/libconfuse/libconfuse/commit/d73777c2c3566fb2647727bb56d9a2295b81669b CVE-2022-40319 @@ -553,6 +554,7 @@ CVE-2022-3168 RESERVED CVE-2019-25076 (The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.1 ...) - openvswitch + [bullseye] - openvswitch (Minor issue) NOTE: https://arxiv.org/abs/2011.09107 NOTE: https://sites.google.com/view/tuple-space-explosion NOTE: https://dl.acm.org/doi/10.1145/3359989.3365431 @@ -4043,6 +4045,7 @@ CVE-2022-2997 (Session Fixation in GitHub repository snipe/snipe-it prior to 6.0 - snipe-it (bug #1005172) CVE-2022-2996 (A flaw was found in the python-scciclient when making an HTTPS connect ...) - python-scciclient (bug #1018213) + [bullseye] - python-scciclient (Minor issue) NOTE: https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c (0.12) CVE-2022-2995 RESERVED @@ -11193,6 +11196,7 @@ CVE-2022-36110 (Netmaker makes networks with WireGuard. Prior to version 0.15.1, TODO: check CVE-2022-36109 (Moby is an open-source project created by Docker to enable software co ...) - docker.io + [bullseye] - docker.io (Minor issue) NOTE: https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4 NOTE: https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32 CVE-2022-36108 @@ -41481,6 +41485,7 @@ CVE-2022-0671 (A flaw was found in vscode-xml in versions prior to 0.19.0. Schem NOT-FOR-US: vscode-xml CVE-2022-0670 (A flaw was found in Openstack manilla owning a Ceph File system "share ...) - ceph 16.2.10+ds-1 (bug #1016069) + [bullseye] - ceph (Minor issue) [buster] - ceph (Minor issue) NOTE: https://ceph.io/en/news/blog/2022/v17-2-2-quincy-released/ NOTE: https://docs.ceph.com/en/latest/security/CVE-2022-0670/ @@ -43917,12 +43922,14 @@ CVE-2022-24578 (GPAC 1.0.1 is affected by a heap-based buffer overflow in SFS_Ad NOTE: https://github.com/gpac/gpac/commit/b5741da08e88e8dcc8da0a7669b92405b9862850 (v2.0.0) CVE-2022-24577 (GPAC 1.0.1 is affected by a NULL pointer dereference in gf_utf8_wcslen ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://huntr.dev/bounties/0758b3a2-8ff2-45fc-8543-7633d605d24e/ NOTE: https://github.com/gpac/gpac/commit/586e817dcd531bb3e75438390f1f753cfe6e940a (v2.0.0) CVE-2022-24576 (GPAC 1.0.1 is affected by Use After Free through MP4Box. ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2061 @@ -44663,6 +44670,7 @@ CVE-2022-24303 (Pillow before 9.0.1 allows attackers to delete files because spa CVE-2022-24302 (In Paramiko before 2.10.1, a race condition (between creation and chmo ...) {DLA-2959-1} - paramiko 2.10.3-1 (bug #1008012) + [bullseye] - paramiko (Minor issue) NOTE: https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e (2.10.1) CVE-2022-24296 (Use of a Broken or Risky Cryptographic Algorithm vulnerability in Air ...) NOT-FOR-US: Mitsubishi @@ -79262,10 +79270,12 @@ CVE-2021-37820 RESERVED CVE-2021-37819 (PDF Labs pdftk-java v3.2.3 was discovered to contain an infinite loop ...) - pdftk-java 3.3.2-1 - - pdftk + [bullseye] - pdftk-java (Minor issue) + - pdftk 2.02-5 NOTE: https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21 NOTE: https://gitlab.com/pdftk-java/pdftk/-/commit/75deacdf5c46fd4eefb310c784eb9dfdc7b9fdc9 (v3.3.0) NOTE: https://gitlab.com/pdftk-java/pdftk/-/commit/9b0cbb76c8434a8505f02ada02a94263dcae9247 (v3.3.0) + NOTE: Starting with 2.02-5 src:pdftk is just a transition package towards src:pdftk-java TODO: check impact on other sources embedding lowagie/text/pdf/PdfReader.java CVE-2021-37818 RESERVED = data/dsa-needed.txt = @@ -20,6 +20,8 @@
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: cacc85a3 by Moritz Muehlenhoff at 2022-09-09T11:49:27+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -17,9 +17,10 @@ CVE-2022-40300 RESERVED CVE-2022-40299 (In Singular before 4.3.1, a predictable /tmp pathname is used (e.g., b ...) [experimental] - singular 1:4.3.1-p1+ds-1 - - singular + - singular (unimportant) NOTE: https://github.com/Singular/Singular/commit/5f28fbf066626fa9c4a8f0e6408c0bb362fb386c (Release-4-3-1) NOTE: https://github.com/Singular/Singular/issues/1137 + NOTE: Neutralised by kernel hardening (fs.protected_symlinks = 1) CVE-2022-40298 RESERVED CVE-2022-40297 (UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be use ...) @@ -4926,9 +4927,10 @@ CVE-2022-2850 [SIGSEGV in sync_repl] NOTE: https://github.com/389ds/389-ds-base/commit/bd566957f85c889f13cd24f903c91c16c955acbd (389-ds-base-1.3.10) NOTE: Results from an incomplete fix for CVE-2021-3514 CVE-2022-2849 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) NOTE: https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e NOTE: https://github.com/vim/vim/commit/f6d39c31d2177549a986d170e192d8351bd571e2 (v9.0.0220) + NOTE: Crash in CLI tool, no security impact CVE-2022-2848 RESERVED CVE-2022-2847 (A vulnerability, which was classified as critical, has been found in S ...) @@ -4936,9 +4938,10 @@ CVE-2022-2847 (A vulnerability, which was classified as critical, has been found CVE-2022-2846 (A vulnerability classified as problematic was found in Calendar Event ...) NOT-FOR-US: WordPress plugin CVE-2022-2845 (Buffer Over-read in GitHub repository vim/vim prior to 9.0.0218. ...) - - vim 2:9.0.0229-1 + - vim 2:9.0.0229-1 (unimportant) NOTE: https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445 NOTE: https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c (v9.0.0218) + NOTE: Crash in CLI tool, no security impact CVE-2022-2844 (A vulnerability classified as problematic has been found in MotoPress ...) NOT-FOR-US: WordPress plugin CVE-2022-2843 (A vulnerability was found in MotoPress Timetable and Event Schedule. I ...) @@ -24497,6 +24500,7 @@ CVE-2022-1776 (The Popups, Welcome Bar, Optins and Lead Generation Plugin WordPr NOT-FOR-US: WordPress plugin CVE-2022-30976 (GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcsl ...) - gpac (bug #1016443) + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2179 @@ -43496,6 +43500,7 @@ CVE-2022-24576 (GPAC 1.0.1 is affected by Use After Free through MP4Box. ...) NOTE: https://github.com/gpac/gpac/commit/96699aabae042f8f55cf8a85fa5758e3db752bae (v2.0.0) CVE-2022-24575 (GPAC 1.0.1 is affected by a stack-based buffer overflow through MP4Box ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2058 @@ -63757,6 +63762,7 @@ CVE-2021-43178 REJECTED CVE-2021-43177 (As a result of an incomplete fix for CVE-2015-7225, in versions of dev ...) - ruby-devise-two-factor 4.0.2-1 (bug #1009636) + [bullseye] - ruby-devise-two-factor (Minor issue) NOTE: https://github.com/tinfoil/devise-two-factor/security/advisories/GHSA-jm35-h8q2-73mp NOTE: https://github.com/tinfoil/devise-two-factor/pull/108 NOTE: https://github.com/tinfoil/devise-two-factor/commit/64576bb9e7d29800c5f92bb86fb6ecff91ad6105 (v4.0.2) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cacc85a3dee80e45a3f10fb953e17cd59a396db1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cacc85a3dee80e45a3f10fb953e17cd59a396db1 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: aa62fa10 by Moritz Muehlenhoff at 2022-09-07T11:31:45+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -396,6 +396,7 @@ CVE-2022-3135 RESERVED CVE-2022-3134 (Use After Free in GitHub repository vim/vim prior to 9.0.0388. ...) - vim + [bullseye] - vim (Minor issue) NOTE: https://huntr.dev/bounties/6ec79e49-c7ab-4cd6-a517-e7934c2eb9dc NOTE: https://github.com/vim/vim/commit/ccfde4d028e891a41e3548323c3d47b06fb0b83e (v9.0.0389) CVE-2022-39959 @@ -684,9 +685,11 @@ CVE-2022-39833 RESERVED CVE-2022-39832 (An issue was discovered in PSPP 1.6.2. There is a heap-based buffer ov ...) - pspp + [bullseye] - pspp (Minor issue) NOTE: https://savannah.gnu.org/bugs/index.php?63000 CVE-2022-39831 (An issue was discovered in PSPP 1.6.2. There is a heap-based buffer ov ...) - pspp + [bullseye] - pspp (Minor issue) NOTE: https://savannah.gnu.org/bugs/?62977 CVE-2022-39830 (sign_pFwInfo in Samsung mTower through 0.3.0 has a missing check on th ...) NOT-FOR-US: Samsung mTower @@ -3904,6 +3907,7 @@ CVE-2022-38531 RESERVED CVE-2022-38530 (GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a sta ...) - gpac + [bullseye] - gpac (Minor issue) NOTE: https://github.com/gpac/gpac/issues/2216 NOTE: https://github.com/gpac/gpac/commit/4e56ad72ac1afb4e049a10f2d99e7512d7141f9d CVE-2022-38529 (tinyexr commit 0647fb3 was discovered to contain a heap-buffer overflo ...) @@ -10488,6 +10492,7 @@ CVE-2022-36060 CVE-2022-36059 RESERVED - node-matrix-js-sdk (bug #1018970) + [bullseye] - node-matrix-js-sdk (Minor issue) - thunderbird 1:102.2.1-1 [bullseye] - thunderbird (Only affects ESR102) [buster] - thunderbird (Only affects ESR102) @@ -39025,6 +39030,7 @@ CVE-2022-25324 (All versions of package bignum are vulnerable to Denial of Servi NOT-FOR-US: justmoon/node-bignum CVE-2022-25304 (All versions of package opcua; all versions of package asyncua are vul ...) - python-opcua + [bullseye] - python-opcua (Minor issue) NOTE: https://github.com/FreeOpcUa/python-opcua/issues/1466 NOTE: https://security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730 CVE-2022-25303 (The package whoogle-search before 0.7.2 are vulnerable to Cross-site S ...) @@ -42396,6 +42402,7 @@ CVE-2022-24758 (The Jupyter notebook is a web-based notebook environment for int NOTE: https://github.com/jupyter/notebook/commit/c219ce43c1ea25123fa70d264e7735bdf4585b1e (6.4.10) CVE-2022-24757 (The Jupyter Server provides the backend (i.e. the core services, APIs, ...) - jupyter-server 1.16.0-1 (bug #1008319) + [bullseye] - jupyter-server (Minor issue) NOTE: https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a (v1.15.4) NOTE: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr CVE-2022-24756 (Bareos is open source software for backup, archiving, and recovery of ...) @@ -177949,6 +177956,7 @@ CVE-2020-10735 - python3.11 - python3.10 - python3.9 + [bullseye] - python3.9 (Minor issue) - python3.7 NOTE: https://github.com/python/cpython/issues/95778 NOTE: https://github.com/python/cpython/pull/96499 = data/dsa-needed.txt = @@ -14,6 +14,8 @@ If needed, specify the release by adding a slash after the name of the source pa -- asterisk (apo) -- +commons-configuration +-- connman (carnil) -- freecad (aron) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aa62fa10b5423e05c629cb3b6b58652a0a91af0b -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aa62fa10b5423e05c629cb3b6b58652a0a91af0b You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 545f141d by Moritz Muehlenhoff at 2022-09-05T18:28:43+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2787,6 +2787,7 @@ CVE-2022-2963 CVE-2022-2962 RESERVED - qemu (bug #1018055) + [bullseye] - qemu (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2120631 NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1171 NOTE: https://lore.kernel.org/qemu-devel/20220821124343.1336880-1-zheyum...@gmail.com/ @@ -18886,6 +18887,7 @@ CVE-2022-32512 RESERVED CVE-2022-32511 (jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a s ...) - ruby-jmespath 1.6.1-1 (bug #1014807) + [bullseye] - ruby-jmespath (Minor issue) NOTE: https://github.com/jmespath/jmespath.rb/pull/55 NOTE: https://github.com/jmespath/jmespath.rb/commit/e8841280053a9d9a0c90f36223f926c8b9e4ec49 (v1.6.1) CVE-2022-32510 @@ -38544,6 +38546,7 @@ CVE-2019-25058 (An issue was discovered in USBGuard before 1.1.0. On systems wit {DLA-2979-1} [experimental] - usbguard 1.1.0+ds-1 - usbguard 1.1.0+ds-2 (bug #1008026) + [bullseye] - usbguard (Minor issue) NOTE: https://github.com/USBGuard/usbguard/issues/273 NOTE: https://github.com/USBGuard/usbguard/issues/403 NOTE: https://github.com/USBGuard/usbguard/pull/531 = data/dsa-needed.txt = @@ -46,6 +46,8 @@ rails rpki-client new 7.6 release required libretls, which isn't in Bullseye -- +ruby-image-processing +-- ruby-rack -- ruby-tzinfo View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/545f141d6f46325742e996ed14b9cd2331ab116f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/545f141d6f46325742e996ed14b9cd2331ab116f You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3fe0d32f by Moritz Muehlenhoff at 2022-09-05T16:59:40+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -4765,6 +4765,7 @@ CVE-2022-2735 - pcs 0.11.3-2 (bug #1018930) NOTE: https://www.openwall.com/lists/oss-security/2022/09/01/4 NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2116815 + NOTE: https://github.com/ClusterLabs/pcs/commit/de068e2066e377d1cc77edf25aed0198e4c77f7b CVE-2022-2734 (Improper Restriction of Rendered UI Layers or Frames in GitHub reposit ...) NOT-FOR-US: OpenEMR CVE-2022-2733 (Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/op ...) @@ -34918,24 +34919,28 @@ CVE-2022-27149 REJECTED CVE-2022-27148 (GPAC mp4box 1.1.0-DEV-rev1663-g881c6a94a-master is vulnerable to Integ ...) - gpac 2.0.0+dfsg1-2 - [buster] - gpac (EOL in buster LTS) + [bullseye] - gpac (Vulnerable code not present) + [buster] - gpac (Vulnerable code not present) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2067 NOTE: https://github.com/gpac/gpac/commit/0cd19f4db70615d707e0e6202933c2ea0c1d36df (v2.0.0) CVE-2022-27147 (GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a use-after-free v ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2109 NOTE: https://github.com/gpac/gpac/commit/9723dd0955894f2cb7be13b94cf7a47f2754b893 (v2.0.0) CVE-2022-27146 (GPAC mp4box 1.1.0-DEV-rev1759-geb2d1e6dd-has a heap-buffer-overflow vu ...) - gpac 2.0.0+dfsg1-2 - [buster] - gpac (EOL in buster LTS) + [bullseye] - gpac (Vulnerable code not present) + [buster] - gpac (Vulnerable code not present) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/issues/2120 NOTE: https://github.com/gpac/gpac/commit/f0a41d178a2dc5ac185506d9fa0b0a58356b16f7 (v2.0.0) CVE-2022-27145 (GPAC mp4box 1.1.0-DEV-rev1727-g8be34973d-master has a stack-overflow v ...) - gpac 2.0.0+dfsg1-2 + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) [stretch] - gpac (No longer supported in LTS) NOTE: https://github.com/gpac/gpac/commit/d7daa8aeb6df4b6c3ec102622e1599279310a19e (v2.0.0) = data/dsa-needed.txt = @@ -33,6 +33,8 @@ netatalk -- nodejs -- +pcs (jmm) +-- php-horde-mime-viewer -- php-horde-turba View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3fe0d32f5f72ecf42066838cdecbeec91194de30 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3fe0d32f5f72ecf42066838cdecbeec91194de30 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 16b896bb by Moritz Muehlenhoff at 2022-09-05T12:20:25+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -25478,6 +25478,7 @@ CVE-2022-28702 (Incorrect Default Permissions vulnerability in ABB e-Design allo NOT-FOR-US: ABB e-Design CVE-2022-1615 (In Samba, GnuTLS gnutls_rnd() can fail and give predictable random val ...) - samba + [bullseye] - samba (Minor issue) NOTE: https://bugzilla.samba.org/show_bug.cgi?id=15103 NOTE: https://gitlab.com/samba-team/samba/-/commit/9849e7440e30853c61a80ce1f11b7b244ed766fe (v4-17-stable) CVE-2022-1614 (The WP-EMail WordPress plugin before 2.69.0 prioritizes getting a visi ...) @@ -41751,12 +41752,14 @@ CVE-2022-24730 (Argo CD is a declarative, GitOps continuous delivery tool for Ku CVE-2022-24729 (CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. ...) - ckeditor 4.19.0+dfsg-1 - ckeditor3 (bug #1015217) + [bullseye] - ckeditor3 (Minor issue) [buster] - ckeditor3 (No longer supported in LTS) [stretch] - ckeditor3 (EOL'd for stretch) NOTE: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-f6rf-9m92-x2hh CVE-2022-24728 (CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. ...) - ckeditor 4.19.0+dfsg-1 - ckeditor3 (bug #1015217) + [bullseye] - ckeditor3 (Minor issue) [buster] - ckeditor3 (No longer supported in LTS) [stretch] - ckeditor3 (EOL'd for stretch) NOTE: https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89 @@ -55668,6 +55671,7 @@ CVE-2021-44739 (Acrobat Reader DC ActiveX Control versions 21.007.20099 (and ear NOT-FOR-US: Adobe CVE-2021-44545 (Improper input validation for some Intel(R) PROSet/Wireless WiFi and K ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html NOTE: Fixed upstream in 20220815 NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=63a87d2f1f7ea029e8d32ed03d972947a7bb60fd @@ -55697,6 +55701,7 @@ CVE-2021-23188 (Improper access control for some Intel(R) PROSet/Wireless WiFi a NOT-FOR-US: Intel CVE-2021-23168 (Out of bounds read for some Intel(R) PROSet/Wireless WiFi and Killer(T ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html NOTE: Fixed upstream in 20220815 NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=63a87d2f1f7ea029e8d32ed03d972947a7bb60fd @@ -56681,6 +56686,7 @@ CVE-2021-4036 RESERVED CVE-2021-37409 (Improper access control for some Intel(R) PROSet/Wireless WiFi and Kil ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html NOTE: Fixed upstream in 20220815 NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=63a87d2f1f7ea029e8d32ed03d972947a7bb60fd @@ -56708,6 +56714,7 @@ CVE-2021-26251 RESERVED CVE-2021-23223 (Improper initialization for some Intel(R) PROSet/Wireless WiFi and Kil ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html NOTE: Fixed upstream in 20220815 NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=63a87d2f1f7ea029e8d32ed03d972947a7bb60fd @@ -60384,6 +60391,7 @@ CVE-2022-21203 (Improper permissions in the SafeNet Sentinel driver for Intel(R) NOT-FOR-US: Intel CVE-2022-21181 (Improper input validation for some Intel(R) PROSet/Wireless WiFi and K ...) - firmware-nonfree + [bullseye] - firmware-nonfree (Non-free not supported) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html NOTE: Fixed upstream in 20220815 NOTE: https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=63a87d2f1f7ea029e8d32ed03d972947a7bb60fd @@ -69006,6 +69014,7 @@ CVE-2021-41165 (CKEditor4 is an open source WYSIWYG HTML editor. In affected ver [buster] - ckeditor (Minor issue) [stretch] - ckeditor (Minor issue) - ckeditor3 (bug #1015217) + [bullseye] - ckeditor3 (Minor issue) [buster] - ckeditor3 (No longer
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 7fa5035b by Moritz Muehlenhoff at 2022-09-02T09:07:16+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -3914,10 +3914,10 @@ CVE-2022-37772 CVE-2022-37771 RESERVED CVE-2022-37770 (libjpeg commit 281daa9 was discovered to contain a segmentation fault ...) - - libjpeg - [bullseye] - libjpeg (Minor issue) + - libjpeg (unimportant) NOTE: https://github.com/thorfdbg/libjpeg/issues/79 NOTE: https://github.com/thorfdbg/libjpeg/commit/281daa9ccee18742b83a77cd29bd2726b69b7977 + NOTE: Crash in CLI tool, no security impact CVE-2022-37769 (libjpeg commit 281daa9 was discovered to contain a segmentation fault ...) - libjpeg [bullseye] - libjpeg (Minor issue) @@ -5716,11 +5716,13 @@ CVE-2022-37049 (The component tcpprep in Tcpreplay v4.4.1 was discovered to cont NOTE: https://github.com/appneta/tcpreplay/issues/718 NOTE: Crash in CLI tool, no security impact CVE-2022-37048 (The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain ...) - - tcpreplay (bug #1018057) + - tcpreplay (unimportant; bug #1018057) NOTE: https://github.com/appneta/tcpreplay/issues/735 + NOTE: Crash in CLI tool, no security impact CVE-2022-37047 (The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain ...) - - tcpreplay (bug #1018057) + - tcpreplay (unimportant; bug #1018057) NOTE: https://github.com/appneta/tcpreplay/issues/734 + NOTE: Crash in CLI tool, no security impact CVE-2022-37046 RESERVED CVE-2022-37045 @@ -7963,11 +7965,13 @@ CVE-2022-36192 RESERVED CVE-2022-36191 (A heap-buffer-overflow had occurred in function gf_isom_dovi_config_ge ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2218 NOTE: https://github.com/gpac/gpac/commit/fef6242c69be4f7ba22b32578e4b62648a3d4ed3 CVE-2022-36190 (GPAC mp4box 2.1-DEV-revUNKNOWN-master has a use-after-free vulnerabili ...) - gpac + [bullseye] - gpac (Minor issue) [buster] - gpac (EOL in buster LTS) NOTE: https://github.com/gpac/gpac/issues/2220 NOTE: Fixed along with: https://github.com/gpac/gpac/issues/2218 @@ -10582,8 +10586,9 @@ CVE-2022-35168 (Due to improper input sanitization of XML input in SAP Business CVE-2022-35167 (Printix Cloud Print Management v1.3.1149.0 for Windows was discovered ...) NOT-FOR-US: Printix Cloud Print Management CVE-2022-35166 (libjpeg commit 842c7ba was discovered to contain an infinite loop via ...) - - libjpeg + - libjpeg (unimportant) NOTE: https://github.com/thorfdbg/libjpeg/issues/7 + NOTE: Hang in CLI tool, no security impact CVE-2022-35165 (An issue in AP4_SgpdAtom::AP4_SgpdAtom() of Bento4-1.6.0-639 allows at ...) NOT-FOR-US: Bento4 CVE-2022-35164 (LibreDWG v0.12.4.4608 commit f2dea29 was discovered to contain a ...) @@ -41297,6 +41302,7 @@ CVE-2022-21795 RESERVED CVE-2022-21233 (Improper isolation of shared resources in some Intel(R) Processors may ...) - intel-microcode 3.20220809.1 + [bullseye] - intel-microcode (Minor issue, only impacts SGX) NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20220809 CVE-2022-21128 (Insufficient control flow management in the Intel(R) Advisor software ...) @@ -43083,6 +43089,7 @@ CVE-2022-0368 (Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. ... NOTE: https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa (v8.2.4217) CVE-2022-0367 (A heap-based buffer overflow flaw was found in libmodbus in function m ...) - libmodbus + [bullseye] - libmodbus (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2045571 NOTE: https://github.com/stephane/libmodbus/issues/614 NOTE: Fixed by: https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6 (v3.1.7) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7fa5035b624ace13d3e469a2299b5e0acfea442c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7fa5035b624ace13d3e469a2299b5e0acfea442c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 93a402ef by Moritz Muehlenhoff at 2022-09-01T15:44:24+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -7076,23 +7076,26 @@ CVE-2022-2522 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to NOTE: https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22 NOTE: https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089 (v9.0.0061) CVE-2022-2521 (It was found in libtiff 4.4.0rc1 that there is an invalid pointer free ...) - - tiff + - tiff (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/422 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/378 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/8fe3735942ea1d90d8cef843b55b3efe8ab6feaf NOTE: https://gitlab.com/libtiff/libtiff/-/commit/bad48e90b410df32172006c7876da449ba62cdba + NOTE: Crash in CLI tool, no security impact CVE-2022-2520 (A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion f ...) - - tiff + - tiff (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/424 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/378 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/8fe3735942ea1d90d8cef843b55b3efe8ab6feaf NOTE: https://gitlab.com/libtiff/libtiff/-/commit/bad48e90b410df32172006c7876da449ba62cdba + NOTE: Crash in CLI tool, no security impact CVE-2022-2519 (There is a double free or corruption in rotateImage() at tiffcrop.c:88 ...) - - tiff + - tiff (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/423 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/378 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/8fe3735942ea1d90d8cef843b55b3efe8ab6feaf NOTE: https://gitlab.com/libtiff/libtiff/-/commit/bad48e90b410df32172006c7876da449ba62cdba + NOTE: Crash in CLI tool, no security impact CVE-2022-2518 RESERVED CVE-2022-2517 @@ -7756,7 +7759,8 @@ CVE-2022-36187 RESERVED CVE-2022-36186 (A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNK ...) - gpac - [buster] - gpac (EOL in buster LTS) + [bullseye] - gpac (Vulnerable code not present) + [buster] - gpac (Vulnerable code not present) NOTE: https://github.com/gpac/gpac/issues/2223 NOTE: https://github.com/gpac/gpac/commit/b43f9d1a4b4e33d08edaef6d313e6ce4bdf554d3 CVE-2022-36185 @@ -54042,6 +54046,7 @@ CVE-2021-44716 (net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows un - golang-1.8 - golang-1.7 - golang-golang-x-net 1:0.0+git20211209.491a49a+dfsg-1 + [bullseye] - golang-golang-x-net (Minor issue) - golang-golang-x-net-dev [stretch] - golang-golang-x-net-dev (Limited support in stretch) NOTE: https://github.com/golang/go/issues/50058 @@ -100469,6 +100474,7 @@ CVE-2021-28133 (Zoom through 5.5.4 sometimes allows attackers to read private in NOT-FOR-US: Zoom CVE-2021-3427 (The Deluge Web-UI is vulnerable to XSS through a crafted torrent file. ...) - deluge + [bullseye] - deluge (Minor issue) NOTE: https://dev.deluge-torrent.org/ticket/3459 NOTE: https://dev.deluge-torrent.org/changeset/8ece03677 NOTE: https://dev.deluge-torrent.org/changeset/a5503c0c606 = data/dsa-needed.txt = @@ -16,6 +16,8 @@ asterisk (apo) -- chromium -- +connman +-- freecad (aron) -- gdk-pixbuf (carnil) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93a402efa03e97dd44b9c75612815b4e025ae670 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/93a402efa03e97dd44b9c75612815b4e025ae670 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: fe2a6c9c by Moritz Muehlenhoff at 2022-08-30T10:30:39+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -614,9 +614,10 @@ CVE-2022-3018 CVE-2022-3017 (Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor ...) TODO: check CVE-2022-3016 (Use After Free in GitHub repository vim/vim prior to 9.0.0286. ...) - - vim + - vim (unimportant) NOTE: https://huntr.dev/bounties/260516c2-5c4a-4b7f-a01c-04b1aeeea371 NOTE: https://github.com/vim/vim/commit/6d24a51b94beb1991cddce221f90b455e2d50db7 (v9.0.0286) + NOTE: Crash in CLI toool, no security impact CVE-2022-3015 (A vulnerability, which was classified as problematic, has been found i ...) NOT-FOR-US: oretnom23 Fast Food Ordering System CVE-2022-3014 (A vulnerability classified as problematic was found in SourceCodester ...) @@ -1025,10 +1026,11 @@ CVE-2022-38668 (HTTP applications (servers) based on Crow through 1.0+4 may reve CVE-2022-38667 (HTTP applications (servers) based on Crow through 1.0+4 may allow a Us ...) NOT-FOR-US: CrowCpp CVE-2022-2953 (LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tool ...) - - tiff + - tiff (unimportant) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/414 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/8fe3735942ea1d90d8cef843b55b3efe8ab6feaf NOTE: https://gitlab.com/libtiff/libtiff/-/commit/bad48e90b410df32172006c7876da449ba62cdba + NOTE: Crash in CLI tool, no security impact CVE-2022-2952 RESERVED CVE-2022-2951 @@ -10434,32 +10436,38 @@ CVE-2022-35022 CVE-2022-35021 RESERVED CVE-2022-35020 (Advancecomp v2.3 was discovered to contain a heap buffer overflow via ...) - - advancecomp + - advancecomp (unimportant) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md + NOTE: Crash in CLI tool, no security impact TODO: check, unclear reporting to upstream CVE-2022-35019 (Advancecomp v2.3 was discovered to contain a segmentation fault. ...) - advancecomp NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md TODO: check, unclear reporting to upstream CVE-2022-35018 (Advancecomp v2.3 was discovered to contain a segmentation fault. ...) - - advancecomp + - advancecomp (unimportant) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md + NOTE: Crash in CLI tool, no security impact TODO: check, unclear reporting to upstream CVE-2022-35017 (Advancecomp v2.3 was discovered to contain a heap buffer overflow. ...) - - advancecomp + - advancecomp (unimportant) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md + NOTE: Crash in CLI tool, no security impact TODO: check, unclear reporting to upstream CVE-2022-35016 (Advancecomp v2.3 was discovered to contain a heap buffer overflow. ...) - - advancecomp + - advancecomp (unimportant) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md + NOTE: Crash in CLI tool, no security impact TODO: check, unclear reporting to upstream CVE-2022-35015 (Advancecomp v2.3 was discovered to contain a heap buffer overflow via ...) - - advancecomp + - advancecomp (unimportant) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md + NOTE: Crash in CLI tool, no security impact TODO: check, unclear reporting to upstream CVE-2022-35014 (Advancecomp v2.3 contains a segmentation fault. ...) - - advancecomp + - advancecomp (unimportant) NOTE: https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md + NOTE: Crash in CLI tool, no security impact TODO: check, unclear reporting to upstream CVE-2022-35013 (PNGDec commit 8abf6be was discovered to contain a FPE via SaveBMP at / ...) NOT-FOR-US: bitbank2/PNGdec @@ -85243,6 +85251,7 @@ CVE-2021-3575 (A heap-based buffer overflow was found in openjpeg in color.c:379 CVE-2021-3574 (A vulnerability was found in ImageMagick-7.0.11-5, where executing a c ...) [experimental] - imagemagick 8:6.9.12.20+dfsg1-1 - imagemagick + [bullseye] - imagemagick (Minor issue) NOTE: https://github.com/ImageMagick/ImageMagick/issues/3540 NOTE: https://github.com/ImageMagick/ImageMagick/commit/c6ad94fbb7b280f39c2fbbdc1c140e51b1b466e9 NOTE: https://github.com/ImageMagick/ImageMagick6/commit/cd7f9fb7751b0d59d5a74b12d971155caad5a792 View it on GitLab:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 3d0ad999 by Moritz Muehlenhoff at 2022-08-26T09:50:22+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -62563,18 +62563,22 @@ CVE-2022-20113 (In mPreference of DefaultUsbConfigurationPreferenceController.ja CVE-2022-20112 (In getAvailabilityStatus of PrivateDnsPreferenceController.java, there ...) NOT-FOR-US: Android CVE-2021-42523 (There are two Information Disclosure vulnerabilities in colord, and th ...) - - colord 1.4.6-1 + - colord 1.4.6-1 (unimportant) NOTE: https://github.com/hughsie/colord/issues/110 NOTE: https://github.com/hughsie/colord/commit/adf41f36cf7214d7d6fa8d528b74eba47c377405 (1.4.6) + NOTE: Memory leak in a system-local daemon, negligible security impact CVE-2021-42522 (There is a Information Disclosure vulnerability in anjuta/plugins/docu ...) - - anjuta + - anjuta (unimportant) NOTE: https://gitlab.gnome.org/Archive/anjuta/-/issues/12 + NOTE: Memory leak in GUI application, no security impact CVE-2021-42521 (There is a NULL pointer dereference vulnerability in VTK, and it lies ...) - vtk9 + [bullseye] - vtk9 (Minor issue) - vtk7 + [bullseye] - vtk7 (Minor issue) - vtk6 + [bullseye] - vtk6 (Minor issue) NOTE: https://gitlab.kitware.com/vtk/vtk/-/issues/17818 - TODO: check, potentially as well src:paraview, but needs to check impact CVE-2021-42520 RESERVED CVE-2021-42519 @@ -127621,6 +127625,7 @@ CVE-2020-28590 (An out-of-bounds read vulnerability exists in the Obj File Trian NOTE: Crash in enduser application, no security impact CVE-2020-28589 (An improper array index validation vulnerability exists in the LoadObj ...) - tinyobjloader (bug #1014776) + [bullseye] - tinyobjloader (Minor issue) NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212 CVE-2020-28588 (An information disclosure vulnerability exists in the /proc/pid/syscal ...) - linux 5.9.15-1 = data/dsa-needed.txt = @@ -51,3 +51,7 @@ sox -- thunderbird (jmm) -- +webkit2gtk +-- +wpewebkit +-- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d0ad999e218a3e65817af7df4effe54c638657c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d0ad999e218a3e65817af7df4effe54c638657c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 432d4ffb by Moritz Muehlenhoff at 2022-08-24T10:35:59+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1173,16 +1173,19 @@ CVE-2022-2835 CVE-2022-2834 RESERVED CVE-2022-2833 (Endless Infinite loop in Blender-thumnailing due to logical bugs. ...) - - blender 3.2.2+dfsg-1 + - blender 3.2.2+dfsg-1 (unimportant) NOTE: https://developer.blender.org/rB24a2b5cb1292f769dd86e314471443976d5e9512 NOTE: https://developer.blender.org/T99711 + NOTE: Hang in CLI tool, no security impact CVE-2022-2832 (When rendering with headless builds, show an error instead of crashing ...) - blender + [bullseye] - blender (Minor issue) NOTE: https://developer.blender.org/T99706 NOTE: https://developer.blender.org/D15463 NOTE: https://developer.blender.org/rB00dc7477022acdd969e4d709a235c0be819efa6c CVE-2022-2831 (A loaded (and valid) image can be crafted such that an out-of-bounds r ...) - blender 3.2.2+dfsg-1 + [bullseye] - blender (Minor issue) NOTE: https://developer.blender.org/T99705 NOTE: https://developer.blender.org/rB32df09b2416a6961704eca0fe73534c8c4e715b2 NOTE: https://developer.blender.org/rBb1329d7eaa52a11c73b75d19d20bd8f6d11ac535 @@ -2657,13 +2660,19 @@ CVE-2022-37771 RESERVED CVE-2022-37770 (libjpeg commit 281daa9 was discovered to contain a segmentation fault ...) - libjpeg + [bullseye] - libjpeg (Minor issue) NOTE: https://github.com/thorfdbg/libjpeg/issues/79 + NOTE: https://github.com/thorfdbg/libjpeg/commit/281daa9ccee18742b83a77cd29bd2726b69b7977 CVE-2022-37769 (libjpeg commit 281daa9 was discovered to contain a segmentation fault ...) - libjpeg + [bullseye] - libjpeg (Minor issue) NOTE: https://github.com/thorfdbg/libjpeg/issues/78 + NOTE: https://github.com/thorfdbg/libjpeg/commit/281daa9ccee18742b83a77cd29bd2726b69b7977 CVE-2022-37768 (libjpeg commit 281daa9 was discovered to contain an infinite loop via ...) - - libjpeg + - libjpeg (unimportant) NOTE: https://github.com/thorfdbg/libjpeg/issues/77 + NOTE: https://github.com/thorfdbg/libjpeg/commit/281daa9ccee18742b83a77cd29bd2726b69b7977 + NOTE: Hang in CLI tool, no security impact CVE-2022-37767 RESERVED CVE-2022-37766 @@ -3437,6 +3446,7 @@ CVE-2022-37429 RESERVED CVE-2022-37428 (PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when pro ...) - pdns-recursor + [bullseye] - pdns-recursor (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/08/23/1 NOTE: https://downloads.powerdns.com/patches/2022-02/ CVE-2022-37427 @@ -3554,10 +3564,11 @@ CVE-2022-2654 CVE-2022-2653 (With this vulnerability an attacker can read many sensitive files like ...) NOT-FOR-US: plankanban/planka CVE-2022-2652 (Depending on the way the format strings in the card label are crafted ...) - - v4l2loopback 0.12.7-1 (bug #1016685) + - v4l2loopback 0.12.7-1 (unimportant; bug #1016685) NOTE: https://huntr.dev/bounties/1b055da5-7a9e-4409-99d7-030280d242d5 NOTE: https://github.com/umlaeute/v4l2loopback/commit/e4cd225557486c420f6a34411f98c575effd43dd (main) NOTE: https://github.com/umlaeute/v4l2loopback/commit/64a216af4c09c9ba9326057d7e78994271827eff (v0.12.6) + NOTE: Negligible security impact CVE-2022-2651 (Authentication Bypass by Primary Weakness in GitHub repository bookwyr ...) NOT-FOR-US: BookWyrm CVE-2022-2650 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/432d4ffb335a8cec10a21f4c75890d617d122720 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/432d4ffb335a8cec10a21f4c75890d617d122720 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 5e95043f by Moritz Muehlenhoff at 2022-08-22T17:57:45+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -682,15 +682,18 @@ CVE-2022-2870 (A vulnerability was found in laravel 5.1 and classified as proble NOTE: Additional misreport for laravel, likely to be rejected CVE-2022-2869 (libtiff's tiffcrop tool has a uint32_t underflow which leads to out of ...) - tiff 4.4.0~rc1-1 + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/352 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/07d79fcac2ead271b60e32aeb80f7b4f3be9ac8c (v4.4.0rc1) CVE-2022-2868 (libtiff's tiffcrop utility has a improper input validation flaw that c ...) - tiff 4.4.0~rc1-1 + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/335 NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/294 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/07d79fcac2ead271b60e32aeb80f7b4f3be9ac8c (v4.4.0rc1) CVE-2022-2867 (libtiff's tiffcrop utility has a uint32_t underflow that can lead to o ...) - tiff 4.4.0~rc1-1 + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/350 NOTE: https://gitlab.com/libtiff/libtiff/-/issues/351 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/07d79fcac2ead271b60e32aeb80f7b4f3be9ac8c (v4.4.0rc1) @@ -6508,6 +6511,7 @@ CVE-2022-2448 CVE-2022-2447 RESERVED - keystone + [bullseye] - keystone (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2105419 CVE-2017-20143 (A vulnerability, which was classified as critical, has been found in I ...) NOT-FOR-US: Itech Movie Portal Script @@ -86691,6 +86695,7 @@ CVE-2021-32748 (Nextcloud Richdocuments in an open source self hosted online off CVE-2021-32747 (Icinga Web 2 is an open source monitoring web interface, framework, an ...) [experimental] - icingaweb2 2.8.3-1~exp1 - icingaweb2 2.8.4-1 (bug #991116) + [bullseye] - icingaweb2 (Minor issue) [buster] - icingaweb2 (Minor issue) [stretch] - icingaweb2 (Minor issue) NOTE: https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx @@ -86698,6 +86703,7 @@ CVE-2021-32747 (Icinga Web 2 is an open source monitoring web interface, framewo CVE-2021-32746 (Icinga Web 2 is an open source monitoring web interface, framework and ...) [experimental] - icingaweb2 2.8.3-1~exp1 - icingaweb2 2.8.4-1 (bug #991116) + [bullseye] - icingaweb2 (Minor issue) [buster] - icingaweb2 (Minor issue) [stretch] - icingaweb2 (Minor issue) NOTE: https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43 @@ -174030,6 +174036,7 @@ CVE-2020-10689 (A flaw was found in the Eclipse Che up to version 7.8.x, where i CVE-2020-10688 (A cross-site scripting (XSS) flaw was found in RESTEasy in versions be ...) - resteasy (bug #970328) - resteasy3.0 (bug #1015001) + [bullseye] - resteasy3.0 (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1814974 NOTE: https://github.com/quarkusio/quarkus/issues/7248 NOTE: https://issues.redhat.com/browse/RESTEASY-2519 (restricted) = data/dsa-needed.txt = @@ -18,6 +18,8 @@ freecad (aron) -- gdk-pixbuf (carnil) -- +libxslt +-- linux (carnil) Wait until more issues have piled up, though try to regulary rebase for point releases to more recent v5.10.y versions View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e95043fea4796f62114c98630e3266d1ac6e3ab -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e95043fea4796f62114c98630e3266d1ac6e3ab You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: b4819afe by Moritz Muehlenhoff at 2022-08-22T16:43:21+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -316,6 +316,7 @@ CVE-2022-38494 RESERVED CVE-2022-38493 (Rhonabwy 0.9.99 through 1.1.x before 1.1.7 doesn't check the RSA priva ...) - rhonabwy 1.1.7-1 + [bullseye] - rhonabwy (Vulnerable code not present) NOTE: https://github.com/babelouest/rhonabwy/commit/dd528b3aabd13863f855a68e76966e4e019fc399 CVE-2022-38492 RESERVED @@ -6423,28 +6424,36 @@ CVE-2022-36148 (fdkaac commit 53fe239 was discovered to contain a floating point CVE-2022-36147 RESERVED CVE-2022-36146 (SWFMill commit 53d7690 was discovered to contain a memory allocation i ...) - - swfmill + - swfmill (unimportant) NOTE: https://github.com/djcsdy/swfmill/issues/65 + NOTE: Crash in CLI tool, no security impact CVE-2022-36145 (SWFMill commit 53d7690 was discovered to contain a segmentation violat ...) - - swfmill + - swfmill (unimportant) NOTE: https://github.com/djcsdy/swfmill/issues/64 + NOTE: Crash in CLI tool, no security impact CVE-2022-36144 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...) - swfmill + [bullseye] - swfmill (Minor issue) NOTE: https://github.com/djcsdy/swfmill/issues/63 CVE-2022-36143 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...) - - swfmill + - swfmill (unimportant) NOTE: https://github.com/djcsdy/swfmill/issues/62 + NOTE: Crash in CLI tool, no security impact CVE-2022-36142 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...) - - swfmill + - swfmill (unimportant) NOTE: https://github.com/djcsdy/swfmill/issues/61 + NOTE: Crash in CLI tool, no security impact CVE-2022-36141 (SWFMill commit 53d7690 was discovered to contain a segmentation violat ...) - - swfmill + - swfmill (unimportant) NOTE: https://github.com/djcsdy/swfmill/issues/58 + NOTE: Crash in CLI tool, no security impact CVE-2022-36140 (SWFMill commit 53d7690 was discovered to contain a segmentation violat ...) - - swfmill + - swfmill (unimportant) NOTE: https://github.com/djcsdy/swfmill/issues/57 + NOTE: Crash in CLI tool, no security impact CVE-2022-36139 (SWFMill commit 53d7690 was discovered to contain a heap-buffer overflo ...) - swfmill + [bullseye] - swfmill (Minor issue) NOTE: https://github.com/djcsdy/swfmill/issues/56 CVE-2022-36138 RESERVED @@ -34931,6 +34940,7 @@ CVE-2022-25758 (All versions of package scss-tokenizer are vulnerable to Regular - node-scss-tokenizer (bug #885456) CVE-2022-25648 (The package git before 1.11.0 are vulnerable to Command Injection via ...) - ruby-git (bug #1009926) + [bullseye] - ruby-git (Minor issue) NOTE: https://github.com/ruby-git/ruby-git/pull/569 NOTE: Fixed by: https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159 (v1.11.0) NOTE: https://security.snyk.io/vuln/SNYK-RUBY-GIT-2421270 @@ -35647,6 +35657,7 @@ CVE-2022-0719 (Cross-site Scripting (XSS) - Reflected in GitHub repository micro CVE-2022-0718 RESERVED - python-oslo.utils 4.10.1-1 + [bullseye] - python-oslo.utils (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2056850 NOTE: https://bugs.launchpad.net/oslo.utils/+bug/1949623 NOTE: Fixed by: https://opendev.org/openstack/oslo.utils/commit/6e17ae1f7959c64dfd20a5f67edf422e702426aa (4.12.1) @@ -57174,6 +57185,7 @@ CVE-2021-43557 (The uri-block plugin in Apache APISIX before 2.10.2 uses $reques CVE-2021-3941 (In ImfChromaticities.cpp routine RGBtoXYZ(), there are some division o ...) [experimental] - openexr 3.1.3-1 - openexr 3.1.5-2 (bug #1014828) + [bullseye] - openexr (Minor issue) [stretch] - openexr (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2019789 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39084 @@ -57361,6 +57373,7 @@ CVE-2021-3934 (ohmyzsh is vulnerable to Improper Neutralization of Special Eleme CVE-2021-3933 (An integer overflow could occur when OpenEXR processes a crafted file ...) [experimental] - openexr 3.1.3-1 - openexr 3.1.5-2 (bug #1014828) + [bullseye] - openexr (Minor issue) [stretch] - openexr (Vulnerable code not present) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2019783 NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=38912 =
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: e3673978 by Moritz Mühlenhoff at 2022-08-19T23:11:47+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1893,10 +1893,10 @@ CVE-2022-37783 CVE-2022-37782 RESERVED CVE-2022-37781 (fdkaac v1.0.3 was discovered to contain a heap buffer overflow via __i ...) - - fdkaac (bug #1017754) - [bullseye] - fdkaac (Minor issue; contrib not supported) + - fdkaac (unimportant; bug #1017754) NOTE: https://github.com/nu774/fdkaac/issues/54 NOTE: https://github.com/nu774/fdkaac/commit/ecddb7d63306e01d137d65bbbe7b78c1e779943c + NOTE: Crash in CLI tool, no security impact CVE-2022-37780 RESERVED CVE-2022-37779 @@ -3698,9 +3698,10 @@ CVE-2022-37051 CVE-2022-37050 RESERVED CVE-2022-37049 (The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a ...) - - tcpreplay + - tcpreplay (unimportant) NOTE: https://github.com/appneta/tcpreplay/issues/736 NOTE: https://github.com/appneta/tcpreplay/issues/718 + NOTE: Crash in CLI tool, no security impact CVE-2022-37048 (The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain ...) - tcpreplay NOTE: https://github.com/appneta/tcpreplay/issues/735 @@ -6017,10 +6018,10 @@ CVE-2022-36150 (tifig v0.2.2 was discovered to contain a heap-buffer overflow vi CVE-2022-36149 (tifig v0.2.2 was discovered to contain a heap-use-after-free via temIn ...) NOT-FOR-US: tifig CVE-2022-36148 (fdkaac commit 53fe239 was discovered to contain a floating point excep ...) - - fdkaac (bug #1017751) - [bullseye] - fdkaac (Minor issue; contrib not supported) + - fdkaac (unimportant; bug #1017751) NOTE: https://github.com/nu774/fdkaac/issues/52 NOTE: https://github.com/nu774/fdkaac/commit/4ec1422bd951a137225ffa4052da120e2ab0a0f4 (v1.0.3) + NOTE: Crash in CLI tool, no security impact CVE-2022-36147 RESERVED CVE-2022-36146 (SWFMill commit 53d7690 was discovered to contain a memory allocation i ...) @@ -130606,7 +130607,7 @@ CVE-2020-27788 (An out-of-bounds read access vulnerability was discovered in UPX NOTE: https://github.com/upx/upx/issues/332 NOTE: https://github.com/upx/upx/commit/1bb93d4fce9f1d764ba57bf5ac154af515b3fc83 (v3.96) CVE-2020-27787 (A Segmentaation fault was found in UPX in invert_pt_dynamic() function ...) - - upx-ucl 3.96-1 (unimportant) + - upx-ucl 3.96-1 NOTE: https://github.com/upx/upx/issues/333 NOTE: https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d (v3.96) CVE-2020-27786 (A flaw was found in the Linux kernels implementation of MIDI, w ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3673978a90232026b4d5c18a53c88c41bc072a5 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e3673978a90232026b4d5c18a53c88c41bc072a5 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 9a8af819 by Moritz Muehlenhoff at 2022-08-12T09:33:58+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -2805,6 +2805,7 @@ CVE-2022-2590 NOTE: https://www.openwall.com/lists/oss-security/2022/08/08/1 CVE-2022-2589 (Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/ ...) - fava (bug #1016971) + [bullseye] - fava (Minor issue) NOTE: https://huntr.dev/bounties/8705800d-cf2f-433d-9c3e-dbef6a3f7e08/ NOTE: https://github.com/beancount/fava/commit/68bbb6e39319deb35ab9f18d0b6aa9fa70472539 (v1.22.3) CVE-2022-37037 @@ -4273,6 +4274,7 @@ CVE-2022-33963 RESERVED CVE-2022-2523 (Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/ ...) - fava (bug #1016971) + [bullseye] - fava (Minor issue) NOTE: https://huntr.dev/bounties/2a1802d8-1c2e-4919-96a7-d4dcf7ffcf8f NOTE: https://github.com/beancount/fava/commit/dccfb6a2f4567f35ce2e9a78e24f92ebf946bc9b (v1.22.2) CVE-2022-36381 @@ -4410,6 +4412,7 @@ CVE-2022-2515 RESERVED CVE-2022-2514 (The time and filter parameters in Fava prior to v1.22 are vulnerable t ...) - fava (bug #1016971) + [bullseye] - fava (Minor issue) NOTE: https://huntr.dev/bounties/dbf77139-4384-4dc5-9994-45a5e0747429 NOTE: https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711 (v1.22) CVE-2022-2513 @@ -20658,16 +20661,19 @@ CVE-2022-30324 (HashiCorp Nomad and Nomad Enterprise version 0.2.0 up to 1.3.0 w - nomad (In Debian Nomad doesn't bundle go-getter, but build depends a shared deb) CVE-2022-30323 (go-getter up to 1.5.11 and 2.0.2 panicked when processing password-pro ...) - golang-github-hashicorp-go-getter (bug #1011741) + [bullseye] - golang-github-hashicorp-go-getter (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930 NOTE: https://github.com/hashicorp/go-getter/pull/359 NOTE: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45 (v1.6.0) CVE-2022-30322 (go-getter up to 1.5.11 and 2.0.2 allowed asymmetric resource exhaustio ...) - golang-github-hashicorp-go-getter (bug #1011741) + [bullseye] - golang-github-hashicorp-go-getter (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930 NOTE: https://github.com/hashicorp/go-getter/pull/359 NOTE: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45 (v1.6.0) CVE-2022-30321 (go-getter up to 1.5.11 and 2.0.2 allowed arbitrary host access via go- ...) - golang-github-hashicorp-go-getter (bug #1011741) + [bullseye] - golang-github-hashicorp-go-getter (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930 NOTE: https://github.com/hashicorp/go-getter/pull/359 NOTE: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45 (v1.6.0) @@ -30647,6 +30653,7 @@ CVE-2022-26946 RESERVED CVE-2022-26945 (go-getter up to 1.5.11 and 2.0.2 allowed protocol switching, endless r ...) - golang-github-hashicorp-go-getter (bug #1011741) + [bullseye] - golang-github-hashicorp-go-getter (Minor issue) NOTE: https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930 NOTE: https://github.com/hashicorp/go-getter/pull/359 NOTE: https://github.com/hashicorp/go-getter/commit/a2ebce998f8d4105bd4b78d6c99a12803ad97a45 (v1.6.0) @@ -64579,6 +64586,7 @@ CVE-2021-41040 (In Eclipse Wakaama, ever since its inception until 2021-01-14, t NOT-FOR-US: Eclipse Wakaama CVE-2021-41039 (In versions 1.6 to 2.0.11 of Eclipse Mosquitto, an MQTT v5 client conn ...) - mosquitto (bug #1001028) + [bullseye] - mosquitto (Minor issue) [buster] - mosquitto (Vulnerable code introduced later) [stretch] - mosquitto (Vulnerable code introduced later) NOTE: https://bugs.eclipse.org/bugs/show_bug.cgi?id=575314 @@ -80991,6 +80999,7 @@ CVE-2021-34435 (In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension al NOT-FOR-US: Eclipse Theia CVE-2021-34434 (In Eclipse Mosquitto versions 2.0 to 2.0.11, when using the dynamic se ...) - mosquitto (bug #993400) + [bullseye] - mosquitto (Minor issue) [buster] - mosquitto (Vulnerable code introduced later) [stretch] - mosquitto (Vulnerable code introduced later) NOTE: https://bugs.eclipse.org/bugs/show_bug.cgi?id=575324 @@
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 1fb5242a by Moritz Muehlenhoff at 2022-08-12T00:16:58+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -6836,6 +6836,7 @@ CVE-2022-2348 CVE-2022-2347 [Unchecked Download Size and Direction in U-Boot USB DFU] RESERVED - u-boot (bug #1014959) + [bullseye] - u-boot (Minor issue) NOTE: https://www.openwall.com/lists/oss-security/2022/07/08/2 CVE-2022-35399 REJECTED @@ -19437,10 +19438,12 @@ CVE-2022-30700 (An incorrect permission assignment vulnerability in Trend Micro NOT-FOR-US: Trend Micro CVE-2022-30699 (NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable ...) - unbound (bug #1016493) + [bullseye] - unbound (Minor issue) NOTE: https://www.nlnetlabs.nl/downloads/unbound/CVE-2022-30698_CVE-2022-30699.txt NOTE: https://github.com/NLnetLabs/unbound/commit/f6753a0f1018133df552347a199e0362fc1dac68 (release-1.16.2) CVE-2022-30698 (NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable t ...) - unbound (bug #1016493) + [bullseye] - unbound (Minor issue) NOTE: https://www.nlnetlabs.nl/downloads/unbound/CVE-2022-30698_CVE-2022-30699.txt NOTE: https://github.com/NLnetLabs/unbound/commit/f6753a0f1018133df552347a199e0362fc1dac68 (release-1.16.2) CVE-2022-30697 (Local privilege escalation due to insecure folder permissions. The fol ...) @@ -63241,6 +63244,7 @@ CVE-2021-41557 (Sofico Miles RIA 2020.2 Build 127964T is affected by Stored Cros NOT-FOR-US: Sofico CVE-2021-41556 (sqclass.cpp in Squirrel through 2.2.5 and 3.x through 3.1 allows an ou ...) - squirrel3 (bug #1016212) + [bullseye] - squirrel3 (Minor issue) NOTE: https://github.com/albertodemichelis/squirrel/commit/23a0620658714b996d20da3d4dd1a0dcf9b0bd98 (v3.2) NOTE: https://blog.sonarsource.com/squirrel-vm-sandbox-escape/ CVE-2021-41555 (** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a ...) = data/dsa-needed.txt = @@ -48,6 +48,8 @@ ruby-tzinfo -- salt -- +sofia-sip +-- sox patch needed for CVE-2021-40426, check with upstream -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1fb5242a2a2dc6cbc150a31fd145fb0a8b212c18 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1fb5242a2a2dc6cbc150a31fd145fb0a8b212c18 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 95d31930 by Moritz Muehlenhoff at 2022-08-11T23:41:25+02:00 bullseye triage - - - - - 2 changed files: - data/CVE/list - data/dsa-needed.txt Changes: = data/CVE/list = @@ -1653,8 +1653,11 @@ CVE-2022-37452 (Exim before 4.95 has a heap-based buffer overflow for the alias NOTE: https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743 (exim-4.95-RC0) CVE-2022-37451 (Exim before 4.96 has an invalid free in pam_converse in auths/call_pam ...) - exim4 4.95-4 + [bullseye] - exim4 (Vulnerable code not present) + [buster] - exim4 (Vulnerable code not present) NOTE: https://github.com/ivd38/exim_invalid_free NOTE: https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42 (exim-4.96-RC0) + NOTE: Introduced in https://github.com/Exim/exim/commit/1e30b0199daf7a7a882458251a3dc10d45d4c7d1 (exim-4.95-RC0) CVE-2022-37450 (Go Ethereum (aka geth) through 1.10.21 allows attackers to increase re ...) - golang-github-go-ethereum (bug #890541) CVE-2022-37449 @@ -1915,6 +1918,7 @@ CVE-2022-37395 RESERVED CVE-2022-37394 (An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 2 ...) - nova (bug #1016980) + [bullseye] - nova (Minor issue) NOTE: https://bugs.launchpad.net/ossa/+bug/1981813 NOTE: https://review.opendev.org/c/openstack/nova/+/849985 NOTE: https://review.opendev.org/c/openstack/nova/+/850003 @@ -2113,6 +2117,7 @@ CVE-2022-2625 [extension scripts replace objects not owned by the extension] {DLA-3072-1} - postgresql-14 14.5-1 - postgresql-13 + [bullseye] - postgresql-13 (Minor issue, fix along in next update) - postgresql-11 NOTE: https://www.postgresql.org/support/security/CVE-2022-2625/ CVE-2022-2624 @@ -2808,6 +2813,7 @@ CVE-2022-37036 RESERVED CVE-2022-37035 (An issue was discovered in bgpd in FRRouting (FRR) 8.3. In bgp_notify_ ...) - frr (bug #1016978) + [bullseye] - frr (Minor issue) NOTE: https://github.com/FRRouting/frr/issues/11698 CVE-2022-37034 RESERVED @@ -5732,6 +5738,7 @@ CVE-2022-35864 (This vulnerability allows remote attackers to disclose sensitive NOT-FOR-US: BMC Track-It! CVE-2022-2414 (Access to external entities when parsing XML documents can lead to XML ...) - dogtag-pki (bug #1014957) + [bullseye] - dogtag-pki (Minor issue) NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2104676 NOTE: https://github.com/dogtagpki/pki/pull/4021 NOTE: https://github.com/dogtagpki/pki/commit/4e893243d72ad766558c10c907841f5f9c047055 @@ -6746,6 +6753,7 @@ CVE-2022-35415 RESERVED CVE-2022-35414 (softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized r ...) - qemu (bug #1014958) + [bullseye] - qemu (Minor issue) NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1065 NOTE: https://github.com/qemu/qemu/commit/418ade7849ce7641c0f7333718caf5091a02fd4c NOTE: https://sick.codes/sick-2022-113 @@ -7880,9 +7888,10 @@ CVE-2022-34929 CVE-2022-34928 (JFinal CMS v5.1.0 was discovered to contain a SQL injection vulnerabil ...) NOT-FOR-US: JFinal CMS CVE-2022-34927 (MilkyTracker v1.03.00 was discovered to contain a stack overflow via t ...) - - milkytracker (bug #1016578) + - milkytracker (unimportant; bug #1016578) NOTE: https://github.com/milkytracker/MilkyTracker/commit/3a5474f9102cbdc10fbd9e7b1b2c8d3f3f45d91b NOTE: https://github.com/milkytracker/MilkyTracker/issues/275 + NOTE: Crash in GUI tool, no security impact CVE-2022-34926 RESERVED CVE-2022-34925 @@ -8468,6 +8477,7 @@ CVE-2022-34750 (An issue was discovered in MediaWiki through 1.38.1. The lemma l NOT-FOR-US: MediaWiki extension WikiBase CVE-2022-34749 (In mistune through 2.0.2, support of inline markup is implemented by u ...) - mistune 2.0.3-1 (bug #1016089) + [bullseye] - mistune (Minor issue) NOTE: https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2 (v2.0.3) CVE-2022-34748 (A vulnerability has been identified in Simcenter Femap (All versions & ...) NOT-FOR-US: Siemens @@ -9063,6 +9073,7 @@ CVE-2022-34527 (D-Link DSL-3782 v1.03 and below was discovered to contain a comm NOT-FOR-US: D-Link CVE-2022-34526 (A stack overflow was discovered in the _TIFFVGetField function of Tiff ...) - tiff 4.4.0-4 + [bullseye] - tiff (Minor issue) NOTE: https://gitlab.com/libtiff/libtiff/-/issues/433 NOTE: https://gitlab.com/libtiff/libtiff/-/commit/275735d0354e39c0ac1dc3c0db2120d6f31d1990 CVE-2022-34525 @@ -25712,6 +25723,7 @@ CVE-2022-1228 (The
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: bd2b3e45 by Moritz Muehlenhoff at 2022-08-02T09:55:31+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -26225,6 +26225,7 @@ CVE-2022-27651 (A flaw was found in buildah where containers were incorrectly st NOTE: https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h CVE-2022-27650 (A flaw was found in crun where containers were incorrectly started wit ...) - crun (bug #1009881) + [bullseye] - crun (Minor issue) NOTE: https://github.com/containers/crun/commit/b847d146d496c9d7beba166fd595488e85488562 (1.4.4) CVE-2022-27649 (A flaw was found in Podman, where containers were started incorrectly ...) - libpod 3.4.6+ds1-1 @@ -59805,6 +59806,7 @@ CVE-2021-41946 (In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scri NOT-FOR-US: FiberHome VDSL2 Modem CVE-2021-41945 (Encode OSS httpx 0.23.0 is affected by improper input validation ...) - httpx 0.23.0-1 (bug #1010336) + [bullseye] - httpx (Minor issue) NOTE: https://gist.github.com/lebr0nli/4edb76bbd3b5ff993cf44f2fbce5e571 NOTE: https://github.com/encode/httpx/discussions/1831 NOTE: https://github.com/encode/httpx/issues/2184 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bd2b3e4521734ecde25ac7ed428a4d34872b3e8c -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bd2b3e4521734ecde25ac7ed428a4d34872b3e8c You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 85dd0c17 by Moritz Muehlenhoff at 2021-08-08T19:59:10+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -162,6 +162,8 @@ CVE-2021-38156 RESERVED CVE-2021-38155 (OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1 ...) - keystone + [bullseye] - keystone (Minor issue) + [buster] - keystone (Minor issue) [stretch] - keystone (Keystone not supported in stretch) NOTE: https://launchpad.net/bugs/1688137 CVE-2021-38165 (Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, whic ...) @@ -336,6 +338,8 @@ CVE-2021-38085 RESERVED CVE-2021-38084 (An issue was discovered in the POP3 component of Courier Mail Server b ...) - courier (bug #989375) + [bullseye] - courier (Minor issue) + [buster] - courier (Minor issue) NOTE: https://sourceforge.net/p/courier/mailman/courier-imap/thread/cone.1382574216.483027.8082.1000%40monster.email-scan.com/#msg3183 NOTE: https://sourceforge.net/p/courier/mailman/message/37329216/ NOTE: https://sourceforge.net/p/courier/courier-libs.git/ci/97ed62b17a2616c758d09105b5a14dd1038cff6f/ (1.1.5) @@ -2667,6 +2671,8 @@ CVE-2021-3655 (A vulnerability was found in the Linux kernel in versions before CVE-2021-3654 [novnc allows open redirection] RESERVED - nova (bug #991441) + [bullseye] - nova (Minor issue) + [buster] - nova (Minor issue) NOTE: https://bugs.launchpad.net/nova/+bug/1927677 CVE-2021-26263 RESERVED @@ -3182,6 +3188,7 @@ CVE-2021-36774 RESERVED CVE-2021-36773 (uBlock Origin before 1.36.2 and nMatrix before 4.4.9 support an arbitr ...) - ublock-origin (bug #991386) + [bullseye] - ublock-origin (Minor issue) [buster] - ublock-origin (Minor issue) [stretch] - ublock-origin (Minor issue) - umatrix (bug #991344) @@ -3196,6 +3203,7 @@ CVE-2021-36770 CVE-2021-36769 (A reordering issue exists in Telegram before 7.8.1 for Android, Telegr ...) [experimental] - telegram-desktop 2.9.0+ds-1 - telegram-desktop (bug #991493) + [bullseye] - telegram-desktop (Minor issue) [buster] - telegram-desktop (Minor issue) NOTE: https://mtpsym.github.io/ CVE-2021-36768 @@ -4390,7 +4398,9 @@ CVE-2021-36222 (ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center CVE-2021-36221 (Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that c ...) - golang-1.16 1.16.7-1 - golang-1.15 (bug #991961) + [bullseye] - golang-1.15 (Minor issue) - golang-1.11 + [buster] - golang-1.11 (Minor issue) - golang-1.8 - golang-1.7 NOTE: https://github.com/golang/go/issues/46866 @@ -6416,6 +6426,8 @@ CVE-2021-35369 CVE-2021-35368 [CRS Request Body Bypass] RESERVED - modsecurity-crs (bug #992000) + [bullseye] - modsecurity-crs (Minor issue) + [buster] - modsecurity-crs (Minor issue) NOTE: https://coreruleset.org/20210630/cve-2021-35368-crs-request-body-bypass/ CVE-2021-35367 RESERVED @@ -8857,6 +8869,8 @@ CVE-2021-3584 CVE-2021-3583 [Template Injection through yaml multi-line strings with ansible facts used in template] RESERVED - ansible + [bullseye] - ansible (Minor issue) + [buster] - ansible (Minor issue) - ansible-base NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1968412 NOTE: https://github.com/ansible/ansible/commit/4c8c40fd3d4a58defdc80e7d22aa8d26b731353e.patch @@ -12799,6 +12813,8 @@ CVE-2021-32610 (In Archive_Tar before 1.4.14, symlinks can refer to targets outs {DLA-2721-1} - drupal7 - php-pear (bug #991541) + [bullseye] - php-pear (Minor issue) + [buster] - php-pear (Minor issue) NOTE: https://www.drupal.org/sa-core-2021-004 NOTE: https://pear.php.net/package/Archive_Tar/download/1.4.14/ NOTE: https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f61ca26bf7d4 (1.4.14) @@ -12913,6 +12929,7 @@ CVE-2021-32575 (HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge NOTE: https://discuss.hashicorp.com/t/hcsec-2021-14-nomad-bridge-networking-mode-allows-arp-spoofing-from-other-bridged-tasks-on-same-node/24296 CVE-2021-32574 (HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy prox ...) - consul (bug #991719) + [bullseye] - consul (Minor issue) [buster] - consul (Only affects 1.3.0 and later) NOTE: https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856 NOTE:
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: a9e39c4a by Moritz Muehlenhoff at 2021-08-05T09:47:29+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -590,10 +590,14 @@ CVE-2021-37835 CVE-2021-37834 RESERVED CVE-2021-37833 (A reflected cross-site scripting (XSS) vulnerability exists in multipl ...) - - hoteldruid + - hoteldruid (bug #991910) + [bullseye] - hoteldruid (Minor issue) + [buster] - hoteldruid (Minor issue) NOTE: https://github.com/dievus/CVE-2021-37833 CVE-2021-37832 (A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid w ...) - - hoteldruid + - hoteldruid (bug #991910) + [bullseye] - hoteldruid (Minor issue) + [buster] - hoteldruid (Minor issue) NOTE: https://github.com/dievus/CVE-2021-37832 CVE-2021-37831 RESERVED @@ -767,9 +771,11 @@ CVE-2021-37747 RESERVED CVE-2021-37746 (textview_uri_security_check in textview.c in Claws Mail before 3.18.0, ...) - claws-mail (bug #991722) + [bullseye] - claws-mail (Minor issue) [buster] - claws-mail (Minor issue) [stretch] - claws-mail (Minor issue) - sylpheed (bug #991723) + [bullseye] - sylpheed (Minor issue) [buster] - sylpheed (Minor issue) [stretch] - sylpheed (Minor issue) NOTE: https://git.claws-mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431 @@ -68139,11 +68145,13 @@ CVE-2020-22285 RESERVED CVE-2020-22284 (A buffer overflow vulnerability in the zepif_linkoutput() function of ...) - lwip (bug #991646) + [bullseye] - lwip (Minor issue) [buster] - lwip (Minor issue) NOTE: https://savannah.nongnu.org/bugs/index.php?58554 NOTE: https://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=8363c24e45a32728e385cfc2c3c36d88a8a9e70b CVE-2020-22283 (A buffer overflow vulnerability in the icmp6_send_response_with_addrs_ ...) - lwip (bug #991645) + [bullseye] - lwip (Minor issue) [buster] - lwip (Minor issue) NOTE: https://savannah.nongnu.org/bugs/index.php?58553 NOTE: Pre-requisite: http://git.savannah.nongnu.org/cgit/lwip.git/commit/?id=d843e47a1d65451bd7f7aaa5017b408bd108be88 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a9e39c4a1a84134a68675ff41a1fab8a59f14be2 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a9e39c4a1a84134a68675ff41a1fab8a59f14be2 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
[Git][security-tracker-team/security-tracker][master] bullseye triage
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker Commits: 23afa7e7 by Moritz Muehlenhoff at 2021-07-29T20:48:08+02:00 bullseye triage - - - - - 1 changed file: - data/CVE/list Changes: = data/CVE/list = @@ -1323,6 +1323,9 @@ CVE-2021-23184 RESERVED CVE-2021-36980 (Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-f ...) - openvswitch (bug #991308) + [bullseye] - openvswitch (Minor issue) + [buster] - openvswitch (Vulnerable code not present, introduced in 2.11) + [stretch] - openvswitch (Vulnerable code not present, introduced in 2.11) NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851 NOTE: https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml NOTE: https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f @@ -1330,6 +1333,8 @@ CVE-2021-36980 (Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-a NOTE: https://github.com/openvswitch/ovs/commit/6d67310f4d2524b466b98f05ebccc1add1e8cf35 NOTE: https://github.com/openvswitch/ovs/commit/7774deede443e8b9102299efc869a52b65b2 NOTE: https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575 + NOTE: https://github.com/openvswitch/ovs/commit/9926637a80d0d243dbf9c49761046895e9d1a8e2 + NOTE: Introduced in: https://github.com/openvswitch/ovs/commit/418a7a84245f5fbe589dd1267463fc9ba27a1dd6 CVE-2021-36979 (Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (cal ...) NOT-FOR-US: Unicorn Engine CVE-2021-36978 (QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer ...) @@ -1829,6 +1834,8 @@ CVE-2021-36768 CVE-2021-3652 [CRYPT password hash with asterisk allows any bind attempt to succeed] RESERVED - 389-ds-base (bug #991405) + [bullseye] - 389-ds-base (Minor issue) + [buster] - 389-ds-base (Minor issue) NOTE: https://github.com/389ds/389-ds-base/issues/4817 NOTE: https://github.com/389ds/389-ds-base/commit/aeb90eb0c41fc48541d983f323c627b2e6c328c7 (master) NOTE: https://github.com/389ds/389-ds-base/commit/c1926dfc6591b55c4d33f9944de4d7ebe077e964 (1.4.4.x) @@ -6466,6 +6473,7 @@ CVE-2021-3605 [Heap buffer overflow in the rleUncompress function] NOTE: not to be confused with CVE-2020-11760 whose fix is similar but applied around 10 lines above, in the other branch of the 'if' CVE-2021-3603 (PHPMailer 6.4.1 and earlier contain a vulnerability that can result in ...) - libphp-phpmailer + [bullseye] - libphp-phpmailer (Minor issue) [buster] - libphp-phpmailer (Minor issue) [stretch] - libphp-phpmailer (Minor issue, fix along with next DLA) NOTE: https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ @@ -10603,6 +10611,9 @@ CVE-2021-3551 RESERVED - dogtag-pki NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1959971 + NOTE: https://github.com/dogtagpki/pki/commit/0c2f3b84499584bb6029f5ba3988ed3cb081e548 + NOTE: https://github.com/dogtagpki/pki/commit/b01cd8cc7d3e391e69ed2c8161f7e15fa84553e6 + NOTE: https://github.com/dogtagpki/pki/commit/5b09fcaff11d33010469e695ef365a91c91674b5 CVE-2021-3550 (A DLL search path vulnerability was reported in Lenovo PCManager, prio ...) NOT-FOR-US: Microsoft CVE-2021-32925 (admin/user_import.php in Chamilo 1.11.14 reads XML data without disabl ...) @@ -19324,6 +19335,7 @@ CVE-2021-29500 (bubble fireworks is an open source java package relating to Spri NOT-FOR-US: bubble fireworks CVE-2021-29499 (SIF is an open source implementation of the Singularity Container Imag ...) - golang-github-sylabs-sif + [bullseye] - golang-github-sylabs-sif (Minor issue) NOTE: https://github.com/sylabs/sif/security/advisories/GHSA-4gh8-x3vv-phhg CVE-2021-29498 RESERVED View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/23afa7e7a112170cb24598e9d97b3510d83e5701 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/23afa7e7a112170cb24598e9d97b3510d83e5701 You're receiving this email because of your account on salsa.debian.org. ___ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits