[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Jul 10 16:25:32 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
10e64aab by Moritz Muehlenhoff at 2023-07-10T17:25:16+02:00
bullseye/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -382,6 +382,8 @@ CVE-2023-35939 (GLPI is a free asset and IT management software package. Startin
 	NOTE: Only supported behind an authenticated HTTP zone
 CVE-2023-35936 (Pandoc is a Haskell library for converting from one markup format to a ...)
 	- pandoc <unfixed>
+	[bookworm] - pandoc <no-dsa> (Minor issue)
+	[bullseye] - pandoc <no-dsa> (Minor issue)
 	NOTE: https://github.com/jgm/pandoc/security/advisories/GHSA-xj5q-fv23-575g
 	NOTE: https://github.com/jgm/pandoc/commit/5e381e3878b5da87ee7542f7e51c3c1a7fd84b89 (3.1.4)
 CVE-2023-3515 (Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4.)
@@ -487,6 +489,8 @@ CVE-2023-34150 (** UNSUPPORTED WHEN ASSIGNED **Use of TikaEncodingDetector in Ap
 	NOT-FOR-US: Apache Any23
 CVE-2023-3255 [VNC: infinite loop in inflate_buffer() leads to denial of service]
 	- qemu <unfixed>
+	[bookworm] - qemu <no-dsa> (Minor issue)
+	[bullseye] - qemu <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2218486
 	NOTE: Proposed patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg00596.html
 CVE-2023-37212 (Memory safety bugs present in Firefox 114. Some of these bugs showed e ...)
@@ -786,9 +790,13 @@ CVE-2023-3478 (A vulnerability classified as critical was found in IBOS OA 4.5.5
 	NOT-FOR-US: IBOS OA
 CVE-2023-37365 (Hnswlib 0.7.0 has a double free in init_index when the M argument is a ...)
 	- hnswlib <unfixed>
+	[bookworm] - hnswlib <no-dsa> (Minor issue)
+	[bullseye] - hnswlib <no-dsa> (Minor issue)
 	NOTE: https://github.com/nmslib/hnswlib/issues/467
 CVE-2023-37360 (pacparser_find_proxy in Pacparser before 1.4.2 allows JavaScript injec ...)
 	- pacparser <unfixed>
+	[bookworm] - pacparser <no-dsa> (Minor issue)
+	[bullseye] - pacparser <no-dsa> (Minor issue)
 	NOTE: https://github.com/manugarg/pacparser/security/advisories/GHSA-62q6-v997-f7v9
 	NOTE: https://github.com/manugarg/pacparser/commit/0bf0636de624996fe202b51eec8a58abd774269e (v1.4.2)
 CVE-2023-37307 (In MISP before 2.4.172, title_for_layout is not properly sanitized in  ...)
@@ -24654,6 +24662,7 @@ CVE-2023-25400
 	RESERVED
 CVE-2023-25399 (A refcounting issue which leads to potential memory leak was discovere ...)
 	- scipy 1.10.0-2
+	[bullseye] - scipy <no-dsa> (Minor issue)
 	NOTE: https://github.com/scipy/scipy/issues/16235
 	NOTE: https://github.com/scipy/scipy/pull/16397
 	NOTE: Fixed by: https://github.com/scipy/scipy/commit/9b6521198c4f31d3f9cb525e581bea8e3e77f0a2 (v1.10.0rc1)
@@ -105049,10 +105058,14 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL JSON parsing and generation
 	[buster] - ruby-yajl <no-dsa> (Minor issue)
 	[stretch] - ruby-yajl <no-dsa> (Minor issue)
 	- yajl 2.1.0-4 (bug #1040036)
+	[bookworm] - yajl <no-dsa> (Minor issue)
+	[bullseye] - yajl <no-dsa> (Minor issue)
 	- burp <unfixed> (bug #1040146)
 	- crun <unfixed> (bug #1040147)
 	- epics-base <unfixed> (bug #1040159)
 	- r-cran-jsonlite <unfixed> (bug #1040161)
+	[bookworm] - r-cran-jsonlite <no-dsa> (Minor issue)
+	[bullseye] - r-cran-jsonlite <no-dsa> (Minor issue)
 	- xqilla <unfixed> (bug #1040164)
 	[bullseye] - xqilla <no-dsa> (Minor issue)
 	NOTE: https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm
@@ -382798,10 +382811,14 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is
 	[stretch] - ruby-yajl <no-dsa> (Minor issue)
 	[jessie] - ruby-yajl <no-dsa> (Minor issue)
 	- yajl 2.1.0-4 (bug #1040036)
+	[bookworm] - yajl <no-dsa> (Minor issue)
+	[bullseye] - yajl <no-dsa> (Minor issue)
 	- burp <unfixed> (bug #1040146)
 	- crun <unfixed> (bug #1040147)
 	- epics-base <unfixed> (bug #1040159)
 	- r-cran-jsonlite <unfixed> (bug #1040161)
+	[bookworm] - r-cran-jsonlite <no-dsa> (Minor issue)
+	[bullseye] - r-cran-jsonlite <no-dsa> (Minor issue)
 	- xqilla <unfixed> (bug #1040164)
 	[bullseye] - xqilla <no-dsa> (Minor issue)
 	NOTE: https://github.com/brianmario/yajl-ruby/issues/176



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10e64aabadd2744bb59ee1f8be5f869c5c5022d8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/10e64aabadd2744bb59ee1f8be5f869c5c5022d8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230710/373d3d4b/attachment.htm>


More information about the debian-security-tracker-commits mailing list