[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Sun Jul 16 14:15:54 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
cb137028 by Moritz Muehlenhoff at 2023-07-16T15:15:09+02:00
bullseye/bookworm triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -96,11 +96,13 @@ CVE-2023-38325 (The cryptography package before 41.0.2 for Python mishandles SSH
NOTE: Fixed by: https://github.com/pyca/cryptography/commit/1ca7adc97b76a9dfbd3d850628b613eb93b78fc3 (main)
NOTE: Fixed by: https://github.com/pyca/cryptography/commit/e190ef190525999d1f599cf8c3aef5cb7f3a8bc4 (41.0.2)
CVE-2023-38253 (An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str fun ...)
- - w3m <unfixed>
+ - w3m <unfixed> (unimportant)
NOTE: https://github.com/tats/w3m/issues/271
+ NOTE: Crash in CLI tool, no security impact
CVE-2023-38252 (An out-of-bounds read flaw was found in w3m, in the Strnew_size functi ...)
- - w3m <unfixed>
+ - w3m <unfixed> (unimportant)
NOTE: https://github.com/tats/w3m/issues/270
+ NOTE: Crash in CLI tool, no security impact
CVE-2023-37474 (Copyparty is a portable file server. Versions prior to 1.8.2 are subje ...)
NOT-FOR-US: copyparty
CVE-2023-37473 (zenstruck/collections is a set of helpers for iterating/paginating/fil ...)
@@ -619,22 +621,27 @@ CVE-2023-3023 (The WP EasyCart plugin for WordPress is vulnerable to time-based
NOT-FOR-US: WP EasyCart plugin for WordPress
CVE-2023-3019 [e1000e: heap use-after-free in e1000e_write_packet_to_guest()]
- qemu <unfixed> (bug #1041102)
+ [bookworm] - qemu <no-dsa> (Minor issue)
+ [bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=59243
NOTE: Proposed upstream patch: https://lists.nongnu.org/archive/html/qemu-devel/2023-05/msg08310.html
CVE-2023-3011 (The ARMember plugin for WordPress is vulnerable to Cross-Site Request ...)
NOT-FOR-US: ARMember plugin for WordPress
CVE-2023-37767 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- gpac <unfixed>
+ [bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2514
NOTE: https://github.com/gpac/gpac/commit/d414df635c773b21bbb3a9fbf17b101b1e8ea345
CVE-2023-37766 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- gpac <unfixed>
+ [bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2516
NOTE: https://github.com/gpac/gpac/commit/a64c60ef0983be6db8ab1e4a663e0ce83ff7bf2c
CVE-2023-37765 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- gpac <unfixed>
+ [bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2515
NOTE: https://github.com/gpac/gpac/commit/36e1b9900ff638576cb88636bbbe2116ed06dfdc
@@ -789,6 +796,7 @@ CVE-2023-36825 (Decidim is a participatory democracy framework, written in Ruby
NOT-FOR-US: Decidim
CVE-2023-36824 (Redis is an in-memory database that persists on disk. In Redit 7.0 pri ...)
- redis 5:7.0.12-1 (bug #1040879)
+ [bookworm] - redis <no-dsa> (Minor issue)
[bullseye] - redis <not-affected> (Vulnerable code introduced later)
[buster] - redis <not-affected> (Vulnerable code introduced later)
NOTE: https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3
=====================================
data/dsa-needed.txt
=====================================
@@ -18,8 +18,13 @@ cjose
--
cinder/oldstable
--
+frr
+ maintainer proposed to update to 8.4.4 for bookworm-stable, which might be a good idea
+--
iperf3 (aron)
--
+kanboard (jmm)
+--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
releases to more recent v5.10.y and 6.1.y versions
@@ -71,6 +76,10 @@ salt/oldstable
--
samba/oldstable
--
+sox
+ all issues unfixed upstream
+ for CVE-2023-34432, rest can be ignored
+--
wpewebkit
--
xrdp/oldstable
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb13702815ca326ed196f2d6df6a2e05d6539618
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb13702815ca326ed196f2d6df6a2e05d6539618
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230716/e0c669f3/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list