[Git][security-tracker-team/security-tracker][master] bugnums
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Jul 18 19:47:44 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
897de784 by Moritz Mühlenhoff at 2023-07-18T20:47:05+02:00
bugnums
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -124,7 +124,7 @@ CVE-2023-37769 (stress-test master commit e4c878 was discovered to contain a FPE
CVE-2023-37479 (Open Enclave is a hardware-agnostic open source library for developing ...)
NOT-FOR-US: Open Enclave
CVE-2023-37476 (OpenRefine is a free, open source tool for data processing. A carefull ...)
- - openrefine <unfixed>
+ - openrefine <unfixed> (bug #1041422)
NOTE: https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-m88m-crr9-jvqq
NOTE: https://github.com/OpenRefine/OpenRefine/commit/e9c1e65d58b47aec8cd676bd5c07d97b002f205e
CVE-2023-37475 (Hamba avro is a go lang encoder/decoder implementation of the avro cod ...)
@@ -318,7 +318,7 @@ CVE-2023-37793 (WAYOS FBM-291W 19.09.11V was discovered to contain a buffer over
CVE-2023-37472 (Knowage is an open source suite for business analytics. The applicatio ...)
NOT-FOR-US: Knowage
CVE-2023-37464 (OpenIDC/cjose is a C library implementing the Javascript Object Signin ...)
- - cjose <unfixed>
+ - cjose <unfixed> (bug #1041423)
NOTE: https://github.com/OpenIDC/cjose/security/advisories/GHSA-3rhg-3gf2-6xgj
NOTE: https://github.com/OpenIDC/cjose/commit/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e (v0.6.2.2)
CVE-2023-37462 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
@@ -885,19 +885,19 @@ CVE-2023-3019 [e1000e: heap use-after-free in e1000e_write_packet_to_guest()]
CVE-2023-3011 (The ARMember plugin for WordPress is vulnerable to Cross-Site Request ...)
NOT-FOR-US: ARMember plugin for WordPress
CVE-2023-37767 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1041421)
[bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2514
NOTE: https://github.com/gpac/gpac/commit/d414df635c773b21bbb3a9fbf17b101b1e8ea345
CVE-2023-37766 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1041421)
[bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2516
NOTE: https://github.com/gpac/gpac/commit/a64c60ef0983be6db8ab1e4a663e0ce83ff7bf2c
CVE-2023-37765 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1041421)
[bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2515
@@ -913,7 +913,7 @@ CVE-2023-37197 (A CWE-89: Improper Neutralization of Special Elements vulnerabil
CVE-2023-37196 (A CWE-89: Improper Neutralization of Special Elements vulnerability us ...)
NOT-FOR-US: Schneider Electric
CVE-2023-37174 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1041421)
[bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2505
@@ -1797,7 +1797,7 @@ CVE-2023-3529 (A vulnerability classified as problematic has been found in Rotem
CVE-2023-3528 (A vulnerability was found in ThinuTech ThinuCMS 1.5. It has been rated ...)
NOT-FOR-US: ThinuTech ThinuCMS
CVE-2023-3523 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1041421)
[bullseye] - gpac <ignored> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac/
@@ -2305,12 +2305,12 @@ CVE-2023-36812 (OpenTSDB is a open source, distributed, scalable Time Series Dat
CVE-2023-36144 (An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1. ...)
NOT-FOR-US: Intelbras
CVE-2023-35947 (Gradle is a build tool with a focus on build automation and support fo ...)
- - gradle <undetermined>
+ - gradle <unfixed> (bug #1041424)
NOTE: https://github.com/gradle/gradle/security/advisories/GHSA-84mw-qh6q-v842
NOTE: https://github.com/gradle/gradle/commit/1096b309520a8c315e3b6109a6526de4eabcb879 (v8.2.0-RC3)
NOTE: https://github.com/gradle/gradle/commit/2e5c34d57d0c0b7f0e8b039a192b91e5c8249d91 (v8.2.0-RC3)
CVE-2023-35946 (Gradle is a build tool with a focus on build automation and support fo ...)
- - gradle <undetermined>
+ - gradle <unfixed> (bug #1041424)
NOTE: https://github.com/gradle/gradle/security/advisories/GHSA-2h6c-rv6q-494v
NOTE: https://github.com/gradle/gradle/commit/859eae2b2acf751ae7db3c9ffefe275aa5da0d5d (v8.2.0-RC3)
NOTE: https://github.com/gradle/gradle/commit/b07e528feb3a5ffa66bdcc358549edd73e4c8a12 (v8.2.0-RC3)
@@ -2401,12 +2401,12 @@ CVE-2023-3479 (Cross-site Scripting (XSS) - Reflected in GitHub repository hesti
CVE-2023-3478 (A vulnerability classified as critical was found in IBOS OA 4.5.5. Aff ...)
NOT-FOR-US: IBOS OA
CVE-2023-37365 (Hnswlib 0.7.0 has a double free in init_index when the M argument is a ...)
- - hnswlib <unfixed>
+ - hnswlib <unfixed> (bug #1041426)
[bookworm] - hnswlib <no-dsa> (Minor issue)
[bullseye] - hnswlib <no-dsa> (Minor issue)
NOTE: https://github.com/nmslib/hnswlib/issues/467
CVE-2023-37360 (pacparser_find_proxy in Pacparser before 1.4.2 allows JavaScript injec ...)
- - pacparser <unfixed>
+ - pacparser <unfixed> (bug #1041425)
[bookworm] - pacparser <no-dsa> (Minor issue)
[bullseye] - pacparser <no-dsa> (Minor issue)
[buster] - pacparser <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/897de78450b62479a60a076f6bfe81b550bf4a14
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/897de78450b62479a60a076f6bfe81b550bf4a14
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230718/0aa75d7d/attachment.htm>
More information about the debian-security-tracker-commits
mailing list