[Git][security-tracker-team/security-tracker][master] bugnums
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Nov 3 19:30:10 GMT 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
e6d56fea by Moritz Muehlenhoff at 2023-11-03T20:29:20+01:00
bugnums
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -284,24 +284,24 @@ CVE-2023-5358 (Improper access control in Report log filters feature in Devoluti
CVE-2023-4452 (A vulnerability has been identified in the EDR-810, EDR-G902, and EDR- ...)
NOT-FOR-US: Moxa
CVE-2023-46931 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1055298)
[bullseye] - gpac <no-dsa> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2664
NOTE: https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf
CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1055298)
[bullseye] - gpac <no-dsa> (Minor issue)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2666
NOTE: https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8
CVE-2023-46928 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1055298)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2661
NOTE: https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1
CVE-2023-46927 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow ...)
- - gpac <unfixed>
+ - gpac <unfixed> (bug #1055298)
[buster] - gpac <end-of-life> (EOL in buster LTS)
NOTE: https://github.com/gpac/gpac/issues/2657
NOTE: https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817
@@ -2008,7 +2008,7 @@ CVE-2023-46603 (In International Color Consortium DemoIccMAX 79ecb74, there is a
CVE-2023-46602 (In International Color Consortium DemoIccMAX 79ecb74, there is a stack ...)
NOT-FOR-US: International Color Consortium DemoIccMAX
CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataS ...)
- - wabt <unfixed>
+ - wabt <unfixed> (bug #1055299)
NOTE: https://github.com/WebAssembly/wabt/issues/2311
CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegm ...)
- wabt <unfixed> (unimportant)
@@ -7783,7 +7783,7 @@ CVE-2023-38255 (A potential attacker with or without (cookie theft) access to th
CVE-2023-37611 (Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a re ...)
NOT-FOR-US: Neos CMS
CVE-2023-4237 (A flaw was found in the Ansible Automation Platform. When creating a n ...)
- - ansible <unfixed>
+ - ansible <unfixed> (bug #1055300)
[buster] - ansible <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2229979
CVE-2023-42754 (A NULL pointer dereference flaw was found in the Linux kernel ipv4 sta ...)
@@ -10963,7 +10963,7 @@ CVE-2023-40170 (jupyter-server is the backend for Jupyter web applications. Impr
NOTE: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-64x5-55rw-9974
NOTE: https://github.com/jupyter-server/jupyter_server/commit/87a4927272819f0b1cae1afa4c8c86ee2da002fd (v2.7.2)
CVE-2023-39810 (An issue in the CPIO command of Busybox v1.33.2 allows attackers to ex ...)
- - busybox <unfixed>
+ - busybox <unfixed> (bug #1055307)
[bookworm] - busybox <no-dsa> (Minor issue)
[bullseye] - busybox <no-dsa> (Minor issue)
[buster] - busybox <no-dsa> (Minor issue)
@@ -20097,7 +20097,7 @@ CVE-2023-3295 (The Unlimited Elements For Elementor (Free Widgets, Addons, Templ
NOT-FOR-US: WordPress plugin
CVE-2023-35790 (An issue was discovered in dec_patch_dictionary.cc in libjxl before 0. ...)
[experimental] - jpeg-xl 0.8.2-1
- - jpeg-xl <unfixed>
+ - jpeg-xl <unfixed> (bug #1055306)
[bookworm] - jpeg-xl <no-dsa> (Minor issue)
NOTE: https://github.com/libjxl/libjxl/pull/2551
NOTE: https://github.com/libjxl/libjxl/commit/d4e67a644d8babe7cb68de122d8b5ccb2ad8f226
@@ -154102,27 +154102,27 @@ CVE-2021-40268
CVE-2021-40267
RESERVED
CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vul ...)
- - freeimage <unfixed>
+ - freeimage <unfixed> (bug #1055305)
[bookworm] - freeimage <no-dsa> (Minor issue)
[bullseye] - freeimage <no-dsa> (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/334/
CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...)
- - freeimage <unfixed>
+ - freeimage <unfixed> (bug #1055304)
[bookworm] - freeimage <no-dsa> (Minor issue)
[bullseye] - freeimage <no-dsa> (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/337/
CVE-2021-40264 (NULL pointer dereference vulnerability in FreeImage before 1.18.0 via ...)
- - freeimage <unfixed>
+ - freeimage <unfixed> (bug #1055303)
[bookworm] - freeimage <no-dsa> (Minor issue)
[bullseye] - freeimage <no-dsa> (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/335/
CVE-2021-40263 (A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad funct ...)
- - freeimage <unfixed>
+ - freeimage <unfixed> (bug #1055302)
[bookworm] - freeimage <no-dsa> (Minor issue)
[bullseye] - freeimage <no-dsa> (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/336/
CVE-2021-40262 (A stack exhaustion issue was discovered in FreeImage before 1.18.0 via ...)
- - freeimage <unfixed>
+ - freeimage <unfixed> (bug #1055301)
[bookworm] - freeimage <no-dsa> (Minor issue)
[bullseye] - freeimage <no-dsa> (Minor issue)
NOTE: https://sourceforge.net/p/freeimage/bugs/338/
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6d56fea1e7391833267e9c16138ef6143076dc1
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6d56fea1e7391833267e9c16138ef6143076dc1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231103/297e063f/attachment.htm>
More information about the debian-security-tracker-commits
mailing list