[Git][security-tracker-team/security-tracker][master] bugnums

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri Nov 3 19:30:10 GMT 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e6d56fea by Moritz Muehlenhoff at 2023-11-03T20:29:20+01:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -284,24 +284,24 @@ CVE-2023-5358 (Improper access control in Report log filters feature in Devoluti
 CVE-2023-4452 (A vulnerability has been identified in the EDR-810, EDR-G902, and EDR- ...)
 	NOT-FOR-US: Moxa
 CVE-2023-46931 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow  ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1055298)
 	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2664
 	NOTE: https://github.com/gpac/gpac/commit/671976fccc971b3dff8d3dcf6ebd600472ca64bf
 CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1055298)
 	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2666
 	NOTE: https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8
 CVE-2023-46928 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1055298)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2661
 	NOTE: https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1
 CVE-2023-46927 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow  ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1055298)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2657
 	NOTE: https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817
@@ -2008,7 +2008,7 @@ CVE-2023-46603 (In International Color Consortium DemoIccMAX 79ecb74, there is a
 CVE-2023-46602 (In International Color Consortium DemoIccMAX 79ecb74, there is a stack ...)
 	NOT-FOR-US: International Color Consortium DemoIccMAX
 CVE-2023-46332 (WebAssembly wabt 1.0.33 contains an Out-of-Bound Memory Write in DataS ...)
-	- wabt <unfixed>
+	- wabt <unfixed> (bug #1055299)
 	NOTE: https://github.com/WebAssembly/wabt/issues/2311
 CVE-2023-46331 (WebAssembly wabt 1.0.33 has an Out-of-Bound Memory Read in in DataSegm ...)
 	- wabt <unfixed> (unimportant)
@@ -7783,7 +7783,7 @@ CVE-2023-38255 (A potential attacker with or without (cookie theft) access to th
 CVE-2023-37611 (Cross Site Scripting (XSS) vulnerability in Neos CMS 8.3.3 allows a re ...)
 	NOT-FOR-US: Neos CMS
 CVE-2023-4237 (A flaw was found in the Ansible Automation Platform. When creating a n ...)
-	- ansible <unfixed>
+	- ansible <unfixed> (bug #1055300)
 	[buster] - ansible <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2229979
 CVE-2023-42754 (A NULL pointer dereference flaw was found in the Linux kernel ipv4 sta ...)
@@ -10963,7 +10963,7 @@ CVE-2023-40170 (jupyter-server is the backend for Jupyter web applications. Impr
 	NOTE: https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-64x5-55rw-9974
 	NOTE: https://github.com/jupyter-server/jupyter_server/commit/87a4927272819f0b1cae1afa4c8c86ee2da002fd (v2.7.2)
 CVE-2023-39810 (An issue in the CPIO command of Busybox v1.33.2 allows attackers to ex ...)
-	- busybox <unfixed>
+	- busybox <unfixed> (bug #1055307)
 	[bookworm] - busybox <no-dsa> (Minor issue)
 	[bullseye] - busybox <no-dsa> (Minor issue)
 	[buster] - busybox <no-dsa> (Minor issue)
@@ -20097,7 +20097,7 @@ CVE-2023-3295 (The Unlimited Elements For Elementor (Free Widgets, Addons, Templ
 	NOT-FOR-US: WordPress plugin
 CVE-2023-35790 (An issue was discovered in dec_patch_dictionary.cc in libjxl before 0. ...)
 	[experimental] - jpeg-xl 0.8.2-1
-	- jpeg-xl <unfixed>
+	- jpeg-xl <unfixed> (bug #1055306)
 	[bookworm] - jpeg-xl <no-dsa> (Minor issue)
 	NOTE: https://github.com/libjxl/libjxl/pull/2551
 	NOTE: https://github.com/libjxl/libjxl/commit/d4e67a644d8babe7cb68de122d8b5ccb2ad8f226
@@ -154102,27 +154102,27 @@ CVE-2021-40268
 CVE-2021-40267
 	RESERVED
 CVE-2021-40266 (FreeImage before 1.18.0, ReadPalette function in PluginTIFF.cpp is vul ...)
-	- freeimage <unfixed>
+	- freeimage <unfixed> (bug #1055305)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/334/
 CVE-2021-40265 (A heap overflow bug exists FreeImage before 1.18.0 via ofLoad function ...)
-	- freeimage <unfixed>
+	- freeimage <unfixed> (bug #1055304)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/337/
 CVE-2021-40264 (NULL pointer dereference vulnerability in FreeImage before 1.18.0 via  ...)
-	- freeimage <unfixed>
+	- freeimage <unfixed> (bug #1055303)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/335/
 CVE-2021-40263 (A heap overflow vulnerability in FreeImage 1.18.0 via the ofLoad funct ...)
-	- freeimage <unfixed>
+	- freeimage <unfixed> (bug #1055302)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/336/
 CVE-2021-40262 (A stack exhaustion issue was discovered in FreeImage before 1.18.0 via ...)
-	- freeimage <unfixed>
+	- freeimage <unfixed> (bug #1055301)
 	[bookworm] - freeimage <no-dsa> (Minor issue)
 	[bullseye] - freeimage <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/freeimage/bugs/338/



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6d56fea1e7391833267e9c16138ef6143076dc1

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e6d56fea1e7391833267e9c16138ef6143076dc1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231103/297e063f/attachment.htm>


More information about the debian-security-tracker-commits mailing list