[Git][security-tracker-team/security-tracker][master] 5 commits: Track fixed version for CVE-2021-38371/exim4 via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Mar 17 08:10:18 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
68739287 by Salvatore Bonaccorso at 2023-03-17T09:09:41+01:00
Track fixed version for CVE-2021-38371/exim4 via unstable

- - - - -
b5e42675 by Salvatore Bonaccorso at 2023-03-17T09:09:43+01:00
Add CVE-2023-24278 as NFU

- - - - -
d58f7830 by Salvatore Bonaccorso at 2023-03-17T09:09:44+01:00
Update information for CVE-2022-38457 and CVE-2022-40133

- - - - -
e0021e06 by Salvatore Bonaccorso at 2023-03-17T09:09:46+01:00
Track fixed version for CVE-2020-25016/rust-rgb via unstable

- - - - -
b55d4864 by Salvatore Bonaccorso at 2023-03-17T09:09:47+01:00
Update information for CVE-2022-43995/sudo

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -11928,6 +11928,7 @@ CVE-2023-24279 (A cross-site scripting (XSS) vulnerability in Open Networking Fo
 	NOT-FOR-US: Open Networking Foundation ONOS
 CVE-2023-24278
 	RESERVED
+	NOT-FOR-US: Squidex
 CVE-2023-24277
 	RESERVED
 CVE-2023-24276 (TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a co ...)
@@ -32644,8 +32645,8 @@ CVE-2022-43997 (Incorrect access control in Aternity agent in Riverbed Aternity
 CVE-2022-43996 (The csaf_provider package before 0.8.2 allows XSS via a crafted CSAF d ...)
 	NOT-FOR-US: csaf_provider
 CVE-2022-43995 (Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains ...)
-	- sudo <unfixed> (unimportant)
-	NOTE: Fixed by: https://github.com/sudo-project/sudo/commit/bd209b9f16fcd1270c13db27ae3329c677d48050
+	- sudo 1.9.12p1-1 (unimportant)
+	NOTE: Fixed by: https://github.com/sudo-project/sudo/commit/bd209b9f16fcd1270c13db27ae3329c677d48050 (SUDO_1_9_12p1)
 	NOTE: Binary packages compiled with PAM support not enabling the plugins/sudoers/auth/passwd.c code
 CVE-2022-43994
 	RESERVED
@@ -44822,11 +44823,11 @@ CVE-2022-40139 (Improper validation of some components used by the rollback mech
 CVE-2022-40138 (An integer conversion error in Hermes bytecode generation, prior to co ...)
 	NOT-FOR-US: Facebook Hermes
 CVE-2022-40133 (A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf ...)
-	- linux <unfixed>
+	- linux 6.1.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
 CVE-2022-38457 (A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res ...)
-	- linux <unfixed>
+	- linux 6.1.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://bugzilla.openanolis.cn/show_bug.cgi?id=2074
 CVE-2022-38096 (A NULL pointer dereference vulnerability was found in vmwgfx driver in ...)
@@ -123091,7 +123092,7 @@ CVE-2021-38373 (In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is n
 CVE-2021-38372 (In KDE Trojita 0.7, man-in-the-middle attackers can create new folders ...)
 	- trojita <itp> (bug #795701)
 CVE-2021-38371 (The STARTTLS feature in Exim through 4.94.2 allows response injection  ...)
-	- exim4 <unfixed> (bug #992172)
+	- exim4 4.95~RC2-1 (bug #992172)
 	[bullseye] - exim4 <no-dsa> (Minor issue)
 	[buster] - exim4 <no-dsa> (Minor issue)
 	[stretch] - exim4 <postponed> (Minor issue, revisit when fixed upstream)
@@ -189377,7 +189378,7 @@ CVE-2020-24863 (A memory corruption vulnerability was found in the kernel functi
 CVE-2020-24862 (The catID parameter in Pharmacy Medical Store and Sale Point v1.0 has  ...)
 	NOT-FOR-US: Pharmacy Medical Store and Sale Point
 CVE-2020-25016 (A safety violation was discovered in the rgb crate before 0.8.20 for R ...)
-	- rust-rgb <unfixed> (bug #969213)
+	- rust-rgb 0.8.36-1 (bug #969213)
 	[bullseye] - rust-rgb <no-dsa> (Minor issue)
 	[buster] - rust-rgb <no-dsa> (Minor issue)
 	NOTE: https://rustsec.org/advisories/RUSTSEC-2020-0029.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/f6c41193d4b7bda16ec132f26a43e82407c068cc...b55d48649620832d1fb35d332fe14a7dbc4dbe7e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/f6c41193d4b7bda16ec132f26a43e82407c068cc...b55d48649620832d1fb35d332fe14a7dbc4dbe7e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230317/bb57d449/attachment.htm>


More information about the debian-security-tracker-commits mailing list