[Git][security-tracker-team/security-tracker][master] bugnums
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Jan 30 18:03:21 GMT 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6e6d7b5b by Moritz Mühlenhoff at 2023-01-30T19:02:12+01:00
bugnums
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3120,7 +3120,7 @@ CVE-2023-23629 (Metabase is an open source data analytics platform. Affected ver
CVE-2023-23628 (Metabase is an open source data analytics platform. Affected versions ...)
NOT-FOR-US: Metabase
CVE-2023-23627 (Sanitize is an allowlist-based HTML and CSS sanitizer. Versions 5.0.0 ...)
- - ruby-sanitize <unfixed>
+ - ruby-sanitize <unfixed> (bug #1030047)
NOTE: https://github.com/rgrove/sanitize/security/advisories/GHSA-fw3g-2h3j-qmm7
NOTE: https://github.com/rgrove/sanitize/commit/ec14265e530dc3fe31ce2ef773594d3a97778d22 (v6.0.1)
CVE-2023-23626
@@ -5767,17 +5767,17 @@ CVE-2023-22797
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22797-possible-open-redirect-vulnerability-in-action-pack/82120
CVE-2023-22796
RESERVED
- - rails <unfixed>
+ - rails <unfixed> (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116
NOTE: https://github.com/rails/rails/commit/4b383e6936d7a72b5dc839f526c9a9aeb280acae (6-1-stable)
CVE-2023-22795
RESERVED
- - rails <unfixed>
+ - rails <unfixed> (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118
NOTE: https://github.com/rails/rails/commit/484fc9185db6c6a6a49ab458b11f9366da02bab2 (6-1-stable)
CVE-2023-22794
RESERVED
- - rails <unfixed>
+ - rails <unfixed> (bug #1030050)
[buster] - rails <not-affected> (Only affects 6.x and later)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117
NOTE: https://github.com/rails/rails/commit/048e9fc05e18c91838a44e60175e475de8b2aad5 (6-1-stable)
@@ -5785,7 +5785,7 @@ CVE-2023-22793
RESERVED
CVE-2023-22792
RESERVED
- - rails <unfixed>
+ - rails <unfixed> (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115
NOTE: https://github.com/rails/rails/commit/7a7f37f146aa977350cf914eba20a95ce371485f (6-1-stable)
CVE-2023-22791
@@ -7679,7 +7679,7 @@ CVE-2023-22335
CVE-2023-22333 (Cross-site scripting vulnerability in EasyMail 2.00.130 and earlier al ...)
NOT-FOR-US: EasyMail
CVE-2023-22332 (Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4. ...)
- - pgpool2 <unfixed>
+ - pgpool2 <unfixed> (bug #1030048)
NOTE: https://www.pgpool.net/mediawiki/index.php/Main_Page#News
CVE-2023-22324 (SQL injection vulnerability in the CONPROSYS HMI System (CHS) Ver.3.5. ...)
NOT-FOR-US: CONPROSYS
@@ -12056,7 +12056,7 @@ CVE-2022-47023
CVE-2022-47022
RESERVED
CVE-2022-47021 (A null pointer dereference issue was discovered in functions op_get_da ...)
- - opusfile <unfixed>
+ - opusfile <unfixed> (bug #1030049)
[bullseye] - opusfile <no-dsa> (Minor issue)
NOTE: https://github.com/xiph/opusfile/commit/0a4cd796df5b030cb866f3f4a5e41a4b92caddf5
NOTE: https://github.com/xiph/opusfile/issues/36
@@ -20541,7 +20541,7 @@ CVE-2022-44567 (A command injection vulnerability exists in Rocket.Chat-Desktop
NOT-FOR-US: Rocket.Chat-Desktop
CVE-2022-44566
RESERVED
- - rails <unfixed>
+ - rails <unfixed> (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2022-44566-possible-denial-of-service-vulnerability-in-activerecords-postgresql-adapter/82119
NOTE: https://github.com/rails/rails/commit/414eb337d142a9c61d7723ceb9b7c1ab30dff3ed (6-1-stable)
CVE-2022-44565 (An improper access validation vulnerability exists in airMAX AC <8. ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e6d7b5be47c07b7f2fea1f2dd65c01a08f5edad
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e6d7b5be47c07b7f2fea1f2dd65c01a08f5edad
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230130/032af9fe/attachment.htm>
More information about the debian-security-tracker-commits
mailing list