[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Sep 12 11:24:10 BST 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
71322725 by Moritz Muehlenhoff at 2023-09-12T12:23:42+02:00
bookworm/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -412,6 +412,7 @@ CVE-2023-41327 (WireMock is a tool for mocking HTTP services. WireMock can be co
 	NOT-FOR-US: WireMock
 CVE-2023-41053 (Redis is an in-memory database that persists on disk. Redis does not c ...)
 	- redis 5:7.0.13-1 (bug #1051512)
+	[bookworm] - redis <no-dsa> (Minor issue)
 	[bullseye] - redis <not-affected> (Vulnerable code introduced later)
 	[buster] - redis <not-affected> (Vulnerable code introduced later)
 	NOTE: Introduced after: https://github.com/redis/redis/commit/55c81f2cd3da82f9f570000875e006b9046ddef3 (7.0-rc1)
@@ -2029,6 +2030,7 @@ CVE-2023-41363 (In Cerebrate 1.14, a vulnerability in UserSettingsController all
 	NOT-FOR-US: Cerebrate
 CVE-2023-41361 (An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not ...)
 	- frr <unfixed>
+	[bookworm] - frr 8.4.4-1.1~deb12u1
 	[bullseye] - frr <not-affected> (The vulnerable code was introduced later)
 	NOTE: https://github.com/FRRouting/frr/pull/14241
 	NOTE: Fixed by: https://github.com/FRRouting/frr/commit/b4d09af9194d20a7f9f16995a062f5d8e3d32840
@@ -2036,6 +2038,7 @@ CVE-2023-41361 (An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c do
 	NOTE: Fixed by: https://github.com/FRRouting/frr/commit/73ad93a83f18564bb7bff4659872f7ec1a64b05e
 CVE-2023-41360 (An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet. ...)
 	- frr 8.4.4-1.1
+	[bookworm] - frr 8.4.4-1.1~deb12u1
 	[bullseye] - frr <not-affected> (The vulnerable code was introduced later)
 	NOTE: https://github.com/FRRouting/frr/pull/14245
 	NOTE: Fixed by: https://github.com/FRRouting/frr/commit/9b855a692e68e0d16467e190b466b4ecb6853702
@@ -2111,6 +2114,8 @@ CVE-2023-4569 (A memory leak flaw was found in nft_set_catchall_flush in net/net
 	NOTE: https://git.kernel.org/linus/90e5b3462efa37b8bba82d7c4e63683856e188af (6.5-rc7)
 CVE-2023-4567
 	- ansible <unfixed> (bug #1051725)
+	[bookworm] - ansible <no-dsa> (Minor issue)
+	[bullseye] - ansible <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2235369
 CVE-2023-4563 [Use-after-free in nft_verdict_dump due to a race between set GC and transaction]
 	- linux 6.4.13-1


=====================================
data/dsa-needed.txt
=====================================
@@ -11,6 +11,9 @@ To pick an issue, simply add your uid behind it.
 
 If needed, specify the release by adding a slash after the name of the source package.
 
+--
+audiofile
+  unfixed upstream
 --
 cacti
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/713227254a14be52444e3dc7ed2fec2d0dc9cd53

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/713227254a14be52444e3dc7ed2fec2d0dc9cd53
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230912/386ba1e3/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list