[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Dec 5 11:15:10 GMT 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
336fe7c2 by Moritz Muehlenhoff at 2023-12-05T12:14:40+01:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -57,11 +57,10 @@ CVE-2023-49284 (fish is a smart and user-friendly command line shell for macOS,
 CVE-2023-49280 (XWiki Change Request is an XWiki application allowing to request chang ...)
 	NOT-FOR-US: XWiki
 CVE-2023-49080 (The Jupyter Server provides the backend (i.e. the core services, APIs, ...)
-	- jupyter-server <unfixed> (bug #1057454)
-	[bookworm] - jupyter-server <no-dsa> (Minor issue)
-	[bullseye] - jupyter-server <no-dsa> (Minor issue)
+	- jupyter-server <unfixed> (unimportant; bug #1057454)
 	NOTE: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-h56g-gq9v-vc8r
 	NOTE: https://github.com/jupyter-server/jupyter_server/commit/0056c3aa52cbb28b263a7a609ae5f17618b36652 (v2.11.2)
+	NOTE: Path disclosure has no security impact as packaged in Debian
 CVE-2023-48698 (Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded st ...)
 	NOT-FOR-US: Azure RTOS USBX
 CVE-2023-48697 (Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded st ...)
@@ -129524,6 +129523,7 @@ CVE-2022-24688 (An issue was discovered in DSK DSKNet 2.16.136.0 and 2.17.136.5.
 	NOT-FOR-US: DSK DSKNet
 CVE-2022-24687 (HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, a ...)
 	- consul 1.9.17+dfsg2-1 (bug #1006487)
+	[bullseye] - consul <end-of-life> (EOL in Bullseye)
 	[buster] - consul <not-affected> (Vulnerable Code not present)
 	NOTE: https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/
 	NOTE: https://github.com/hashicorp/consul/commit/d35c6a97cbdff252f5238d6b52f49786f896566a (v1.9.15)
@@ -167120,6 +167120,7 @@ CVE-2021-37220 (MuPDF through 1.18.1 has an out-of-bounds write because the cach
 	NOTE: On Stretch, an earlier version of the code exits early instead of crashing.
 CVE-2021-37219 (HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows no ...)
 	- consul 1.8.7+dfsg1-6 (bug #1015218)
+	[bullseye] - consul <end-of-life> (EOL in Bullseye)
 	[buster] - consul <ignored> (Minor issue; intrusive to backport)
 	NOTE: https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024
 	NOTE: https://github.com/hashicorp/consul/commit/ccf8eb1947357434eb6e66303ddab79f4c9d4103



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/336fe7c2f133a9cf2c10cec3ac8c72934c413554

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/336fe7c2f133a9cf2c10cec3ac8c72934c413554
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231205/cbbd29a9/attachment.htm>


More information about the debian-security-tracker-commits mailing list