[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Sat Jul 22 19:21:10 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8e9b0974 by Moritz Muehlenhoff at 2023-07-22T20:20:45+02:00
bookworm/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -2810,11 +2810,15 @@ CVE-2023-36144 (An authentication bypass in Intelbras Switch SG 2404 MR in firmw
NOT-FOR-US: Intelbras
CVE-2023-35947 (Gradle is a build tool with a focus on build automation and support fo ...)
- gradle <unfixed> (bug #1041424)
+ [bookworm] - gradle <no-dsa> (Minor issue)
+ [bullseye] - gradle <no-dsa> (Minor issue)
NOTE: https://github.com/gradle/gradle/security/advisories/GHSA-84mw-qh6q-v842
NOTE: https://github.com/gradle/gradle/commit/1096b309520a8c315e3b6109a6526de4eabcb879 (v8.2.0-RC3)
NOTE: https://github.com/gradle/gradle/commit/2e5c34d57d0c0b7f0e8b039a192b91e5c8249d91 (v8.2.0-RC3)
CVE-2023-35946 (Gradle is a build tool with a focus on build automation and support fo ...)
- gradle <unfixed> (bug #1041424)
+ [bookworm] - gradle <no-dsa> (Minor issue)
+ [bullseye] - gradle <no-dsa> (Minor issue)
NOTE: https://github.com/gradle/gradle/security/advisories/GHSA-2h6c-rv6q-494v
NOTE: https://github.com/gradle/gradle/commit/859eae2b2acf751ae7db3c9ffefe275aa5da0d5d (v8.2.0-RC3)
NOTE: https://github.com/gradle/gradle/commit/b07e528feb3a5ffa66bdcc358549edd73e4c8a12 (v8.2.0-RC3)
@@ -3275,10 +3279,14 @@ CVE-2023-3354 (A flaw was found in the QEMU built-in VNC server. When a client c
NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2023-07/msg01014.html
CVE-2023-3432 (Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plant ...)
- plantuml <unfixed> (bug #1040000)
+ [bookworm] - plantuml <no-dsa> (Minor issue)
+ [bullseye] - plantuml <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51/
NOTE: https://github.com/plantuml/plantuml/commit/b32500bb61ae617bb312496d6d832e4be8190797 (v1.2023.9)
CVE-2023-3431 (Improper Access Control in GitHub repository plantuml/plantuml prior t ...)
- plantuml <unfixed> (bug #1039999)
+ [bookworm] - plantuml <no-dsa> (Minor issue)
+ [bullseye] - plantuml <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c/
NOTE: https://github.com/plantuml/plantuml/commit/fbe7fa3b25b4c887d83927cffb1009ec6cb8ab1e (v1.2023.9)
CVE-2023-3405 (Unchecked parameter value in M-Files Server in versions before 23.6.12 ...)
@@ -18042,6 +18050,8 @@ CVE-2023-1387 (Grafana is an open-source platform for monitoring and observabili
CVE-2023-1386 [9pfs: SUID/SGID bits not dropped on file write]
RESERVED
- qemu <unfixed>
+ [bookworm] - qemu <no-dsa> (Minor issue)
+ [bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://github.com/v9fs/linux/issues/29
CVE-2023-1385 (Improper JPAKE implementation allows offline PIN brute-forcing due to ...)
NOT-FOR-US: Amazon Fire TV Stick 3rd gen and Insignia TV with FireOS
@@ -96035,6 +96045,8 @@ CVE-2022-26838
RESERVED
CVE-2022-1231 (XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantu ...)
- plantuml <unfixed> (bug #1039989)
+ [bookworm] - plantuml <no-dsa> (Minor issue)
+ [bullseye] - plantuml <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/27db9509-6cd3-4148-8d70-5942f3837604/
NOTE: https://github.com/plantuml/plantuml/commit/c9137be051ce98b3e3e27f65f54ec7d9f8886903 (v1.2022.4)
CVE-2022-1230 (This vulnerability allows local attackers to execute arbitrary code on ...)
=====================================
data/dsa-needed.txt
=====================================
@@ -40,8 +40,12 @@ nodejs
nova/oldstable
--
openjdk-11/oldstable (jmm)
+ needs asmtools backport in bullseye
--
openjdk-17 (jmm)
+ needs testng7 backports
+--
+orthanc (jmm)
--
php-cas/oldstable
--
@@ -77,7 +81,8 @@ ruby-tzinfo/oldstable
--
salt/oldstable
--
-samba/oldstable
+samba (jmm)
+ oldstable likely to be EOLed partly
--
sox
all issues unfixed upstream
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8e9b09747bdde2652d3536e1d4e4df8b8de22de4
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8e9b09747bdde2652d3536e1d4e4df8b8de22de4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230722/56eabc9f/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list