[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jun 20 09:12:11 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
7752f3af by security tracker role at 2023-06-20T08:11:59+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,19 @@
+CVE-2023-3325 (The CMS Commander plugin for WordPress is vulnerable to authorization ...)
+ TODO: check
+CVE-2023-3320 (The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site ...)
+ TODO: check
+CVE-2023-3315 (Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and ear ...)
+ TODO: check
+CVE-2023-35884 (Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in EventPri ...)
+ TODO: check
+CVE-2023-35882 (Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability i ...)
+ TODO: check
+CVE-2023-35878 (Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Vady ...)
+ TODO: check
+CVE-2023-32659 (SUBNET PowerSYSTEM Center versions 2020 U10 and prior contain a cross- ...)
+ TODO: check
+CVE-2023-29158 (SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable t ...)
+ TODO: check
CVE-2023-3318 (A vulnerability was found in SourceCodester Resort Management System 1 ...)
NOT-FOR-US: SourceCodester Resort Management System
CVE-2023-3317 [wifi: mt76: mt7921: Fix use-after-free in fw features query]
@@ -19169,26 +19185,26 @@ CVE-2023-26437 (Denial of service vulnerability in PowerDNS Recursor allows auth
NOTE: https://github.com/PowerDNS/pdns/commit/94fccab63457f8327add3a8e1e2b7876234e4989 (rec-4.6.6)
NOTE: https://github.com/PowerDNS/pdns/commit/5174c955a5c320849e6fe12471b7fce1c31ca2a8 (rec-4.7.5)
NOTE: https://github.com/PowerDNS/pdns/commit/cd279418d3b3151ab3b489e68bb5354138220e2f (rec-4.8.4)
-CVE-2023-26436
- RESERVED
-CVE-2023-26435
- RESERVED
-CVE-2023-26434
- RESERVED
-CVE-2023-26433
- RESERVED
-CVE-2023-26432
- RESERVED
-CVE-2023-26431
- RESERVED
+CVE-2023-26436 (Attackers with access to the "documentconverterws" API were able to in ...)
+ TODO: check
+CVE-2023-26435 (It was possible to call filesystem and network references using the lo ...)
+ TODO: check
+CVE-2023-26434 (When adding an external mail account, processing of POP3 "capabilities ...)
+ TODO: check
+CVE-2023-26433 (When adding an external mail account, processing of IMAP "capabilities ...)
+ TODO: check
+CVE-2023-26432 (When adding an external mail account, processing of SMTP "capabilities ...)
+ TODO: check
+CVE-2023-26431 (IPv4-mapped IPv6 addresses did not get recognized as "local" by the co ...)
+ TODO: check
CVE-2023-26430
RESERVED
-CVE-2023-26429
- RESERVED
-CVE-2023-26428
- RESERVED
-CVE-2023-26427
- RESERVED
+CVE-2023-26429 (Control characters were not removed when exporting user feedback conte ...)
+ TODO: check
+CVE-2023-26428 (Attackers can successfully request arbitrary snippet IDs, including E- ...)
+ TODO: check
+CVE-2023-26427 (Default permissions for a properties file were too permissive. Local s ...)
+ TODO: check
CVE-2023-26426 (Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are ...)
NOT-FOR-US: Adobe
CVE-2023-26425 (Adobe Acrobat Reader versions 23.001.20093 (and earlier) and 20.005.30 ...)
@@ -23066,7 +23082,7 @@ CVE-2023-25141 (Apache Sling JCR Base < 3.1.12 has a critical injection vulnerab
CVE-2023-25140 (A vulnerability has been identified in Parasolid V34.0 (All versions < ...)
NOT-FOR-US: Siemens
CVE-2023-3247 [GHSA-76gg-c692-v2mw: Missing error check and insufficient random bytes in HTTP Digest authentication for SOAP]
- {DSA-5425-1 DSA-5424-1}
+ {DSA-5425-1 DSA-5424-1 DLA-3458-1}
- php8.2 8.2.7-1
- php7.4 <removed>
- php7.3 <removed>
@@ -30103,6 +30119,7 @@ CVE-2023-0118
CVE-2022-4884 (Path-Traversal in MKP storing in Tribe29 Checkmk <=2.0.0p32 and <= 2.1 ...)
- check-mk <removed>
CVE-2022-4883 (A flaw was found in libXpm. When processing files with .Z or .gz exten ...)
+ {DLA-3459-1}
- libxpm 1:3.5.12-1.1
[bullseye] - libxpm 1:3.5.12-1.1~deb11u1
NOTE: https://www.openwall.com/lists/oss-security/2023/01/17/2
@@ -30153,11 +30170,13 @@ CVE-2022-48231 (In soter service, there is a possible missing permission check.
CVE-2022-48230 (There is a misinterpretation of input vulnerability in BiSheng-WNM FW ...)
NOT-FOR-US: Huawei
CVE-2022-46285 (A flaw was found in libXpm. This issue occurs when parsing a file with ...)
+ {DLA-3459-1}
- libxpm 1:3.5.12-1.1
[bullseye] - libxpm 1:3.5.12-1.1~deb11u1
NOTE: https://www.openwall.com/lists/oss-security/2023/01/17/2
NOTE: https://gitlab.freedesktop.org/xorg/lib/libxpm/-/commit/a3a7c6dcc3b629d765014816c566c63165c63ca8 (libXpm-3.5.15)
CVE-2022-44617 (A flaw was found in libXpm. When processing a file with width of 0 and ...)
+ {DLA-3459-1}
- libxpm 1:3.5.12-1.1
[bullseye] - libxpm 1:3.5.12-1.1~deb11u1
NOTE: https://www.openwall.com/lists/oss-security/2023/01/17/2
@@ -129857,6 +129876,7 @@ CVE-2021-41459 (There is a stack buffer overflow in MP4Box v1.0.1 at src/filters
NOTE: https://github.com/gpac/gpac/issues/1912
NOTE: Fixed by: https://github.com/gpac/gpac/commit/7d4538e104f2b3ff6a65a41394795654e6972339 (v2.0.0)
CVE-2021-41458 (In GPAC MP4Box v1.1.0, there is a stack buffer overflow at src/utils/e ...)
+ {DSA-5411-1}
- gpac 2.0.0+dfsg1-2
[bullseye] - gpac <no-dsa> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7752f3afdf951214131e7fc2fd1516e42d78f33f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7752f3afdf951214131e7fc2fd1516e42d78f33f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230620/c12537e3/attachment.htm>
More information about the debian-security-tracker-commits
mailing list