[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Oct 4 13:22:40 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f35d7aa3 by Moritz Muehlenhoff at 2023-10-04T14:21:50+02:00
bullseye/bookworm triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -248,6 +248,8 @@ CVE-2023-5345 (A use-after-free vulnerability in the Linux kernel's fs/smb/clien
NOTE: https://kernel.dance/#e6e43b8aa7cd3c3af686caf0c2e11819a886d705
CVE-2023-5344 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1 ...)
- vim <unfixed>
+ [bookworm] - vim <no-dsa> (Minor issue)
+ [bullseye] - vim <no-dsa> (Minor issue)
NOTE: https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04
NOTE: https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
CVE-2023-5334 (The WP Responsive header image slider plugin for WordPress is vulnerab ...)
@@ -457,8 +459,9 @@ CVE-2023-5112 (Os Commerce is currently susceptible to a Cross-Site Scripting (X
CVE-2023-5111 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...)
NOT-FOR-US: Os Commerce
CVE-2023-43907 (OptiPNG v0.7.7 was discovered to contain a global buffer overflow via ...)
- - optipng <unfixed>
+ - optipng <unfixed> (unimportant)
NOTE: https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
+ NOTE: Crash in CLI tool, no security impact
CVE-2023-43735 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...)
NOT-FOR-US: Os Commerce
CVE-2023-43734 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...)
@@ -561,6 +564,8 @@ CVE-2023-5201 (The OpenHook plugin for WordPress is vulnerable to Remote Code Ex
NOT-FOR-US: OpenHook plugin for WordPress
CVE-2023-44270 (An issue was discovered in PostCSS before 8.4.31. It affects linters u ...)
- node-postcss <unfixed> (bug #1053282)
+ [bookworm] - node-postcss <no-dsa> (Minor issue)
+ [bullseye] - node-postcss <no-dsa> (Minor issue)
NOTE: https://github.com/postcss/postcss/commit/58cc860b4c1707510c9cd1bc1fa30b423a9ad6c5 (8.4.31)
CVE-2023-43711 (Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) v ...)
NOT-FOR-US: Os Commerce
@@ -1475,6 +1480,8 @@ CVE-2023-43775 (Denial-of-service vulnerability in the web server of the Eaton S
NOT-FOR-US: Eaton
CVE-2023-43646 (get-func-name is a module to retrieve a function's name securely and c ...)
- node-get-func-name <unfixed> (bug #1053262)
+ [bookworm] - node-get-func-name <no-dsa> (Minor issue)
+ [bullseye] - node-get-func-name <no-dsa> (Minor issue)
NOTE: https://github.com/chaijs/get-func-name/security/advisories/GHSA-4q6p-r6v2-jvc5
NOTE: https://github.com/chaijs/get-func-name/commit/f934b228b5e2cb94d6c8576d3aac05493f667c69 (v2.0.1)
CVE-2023-43614 (Cross-site scripting vulnerability in Order Data Edit page of Welcart ...)
@@ -4042,8 +4049,8 @@ CVE-2023-40743 (** UNSUPPORTED WHEN ASSIGNED ** When integrating Apache Axis 1.x
NOTE: https://github.com/apache/axis-axis1-java/commit/7e66753427466590d6def0125e448d2791723210
CVE-2023-34322 [top-level shadow reference dropped too early for 64-bit PV guests]
- xen <unfixed>
- [bookworm] - xen <no-dsa> (Minor issue, fix along in future DSA or point release)
- [bullseye] - xen <no-dsa> (Minor issue, fix along in future DSA or point release)
+ [bookworm] - xen <postponed> (Minor issue, fix along in future DSA or point release)
+ [bullseye] - xen <postponed> (Minor issue, fix along in future DSA or point release)
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://xenbits.xen.org/xsa/advisory-438.html
CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
@@ -24821,6 +24828,8 @@ CVE-2023-29338 (Visual Studio Code Information Disclosure Vulnerability)
NOT-FOR-US: Microsoft
CVE-2023-29337 (NuGet Client Remote Code Execution Vulnerability)
- nuget <unfixed> (bug #1050835)
+ [bookworm] - nuget <no-dsa> (Minor issue)
+ [bullseye] - nuget <no-dsa> (Minor issue)
[buster] - nuget <postponed> (Can wait for next update)
NOTE: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337
CVE-2023-29336 (Win32k Elevation of Privilege Vulnerability)
@@ -62647,6 +62656,8 @@ CVE-2023-20588 (A division-by-zero error on some AMD processors can potentially
{DSA-5492-1 DSA-5480-1}
- linux 6.4.13-1
- xen <unfixed>
+ [bookworm] - xen <postponed> (Minor issue, fix along in future DSA or point release)
+ [bullseye] - xen <postponed> (Minor issue, fix along in future DSA or point release)
[buster] - xen <end-of-life> (DSA 4677-1)
NOTE: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html
NOTE: https://git.kernel.org/linus/77245f1c3c6495521f6a3af082696ee2f8ce3921
=====================================
data/dsa-needed.txt
=====================================
@@ -17,6 +17,8 @@ audiofile
--
cacti
--
+chromium (jmm)
+--
cinder/oldstable
--
gpac/oldstable (jmm)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f35d7aa3d93c21a88de45c605f4456a417d54bd5
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f35d7aa3d93c21a88de45c605f4456a417d54bd5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231004/403d34a1/attachment.htm>
More information about the debian-security-tracker-commits
mailing list