[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Nov 26 08:12:20 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fdd039f4 by security tracker role at 2023-11-26T08:12:07+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -475,7 +475,7 @@ CVE-2023-6213 (Memory safety bugs present in Firefox 119. Some of these bugs sho
 	- firefox 120.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6213
 CVE-2023-6212 (Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thun ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -489,7 +489,7 @@ CVE-2023-6210 (When an https: web page created a pop-up from a "javascript:" URL
 	- firefox 120.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-49/#CVE-2023-6210
 CVE-2023-6209 (Relative URLs starting with three slashes were incorrectly parsed, and ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -497,7 +497,7 @@ CVE-2023-6209 (Relative URLs starting with three slashes were incorrectly parsed
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6209
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6209
 CVE-2023-6208 (When using X11, text selected by the page using the Selection API was  ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -505,7 +505,7 @@ CVE-2023-6208 (When using X11, text selected by the page using the Selection API
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6208
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6208
 CVE-2023-6207 (Ownership mismanagement led to a use-after-free in ReadableByteStreams ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -513,7 +513,7 @@ CVE-2023-6207 (Ownership mismanagement led to a use-after-free in ReadableByteSt
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6207
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6207
 CVE-2023-6206 (The black fade animation when exiting fullscreen is roughly the length ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -521,7 +521,7 @@ CVE-2023-6206 (The black fade animation when exiting fullscreen is roughly the l
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6206
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6206
 CVE-2023-6205 (It was possible to cause the use of a MessagePort after it had already ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -529,7 +529,7 @@ CVE-2023-6205 (It was possible to cause the use of a MessagePort after it had al
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6205
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6205
 CVE-2023-6204 (On some systems\u2014depending on the graphics settings and drivers\u2 ...)
-	{DSA-5561-1 DLA-3661-1}
+	{DSA-5566-1 DSA-5561-1 DLA-3661-1}
 	- firefox 120.0-1
 	- firefox-esr 115.5.0esr-1
 	- thunderbird 1:115.5.0-1
@@ -63957,6 +63957,7 @@ CVE-2022-46176 (Cargo is a Rust package manager. The Rust Security Response WG w
 	NOTE: https://www.openwall.com/lists/oss-security/2023/01/10/3
 	NOTE: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
 CVE-2022-46175 (JSON5 is an extension to the popular JSON file format that aims to be  ...)
+	{DLA-3665-1}
 	- node-json5 2.2.3+dfsg-1 (bug #1027145)
 	[bullseye] - node-json5 2.1.3-2+deb11u1
 	NOTE: https://github.com/json5/json5/security/advisories/GHSA-9c47-m6qq-7p4h



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fdd039f445dd0968e752931421b8e2968327704e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fdd039f445dd0968e752931421b8e2968327704e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231126/aefcb842/attachment.htm>


More information about the debian-security-tracker-commits mailing list