[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Sep 20 08:15:00 BST 2023
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
9c021404 by Moritz Muehlenhoff at 2023-09-20T09:13:55+02:00
bullseye/bookworm triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -156,6 +156,8 @@ CVE-2020-36766 (An issue was discovered in the Linux kernel before 5.8.6. driver
NOTE: https://git.kernel.org/linus/6c42227c3467549ddc65efe99c869021d2f4a570 (5.9-rc1)
CVE-2023-XXXX [cross-site scripting (XSS) vulnerability in handling of linkrefs in plain text messages]
- roundcube 1.6.3+dfsg-1 (bug #1052059)
+ [bookworm] - roundcube <no-dsa> (Minor issue)
+ [bullseye] - roundcube <no-dsa> (Minor issue)
NOTE: https://roundcube.net/news/2023/09/15/security-update-1.6.3-released
NOTE: Fixed by: https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b (1.6.3)
CVE-2023-5036 (Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos ...)
@@ -587,6 +589,8 @@ CVE-2023-41892 (Craft CMS is a platform for creating digital experiences. This i
NOT-FOR-US: Craft CMS
CVE-2023-41081 (The mod_jk component of Apache Tomcat Connectorsin some circumstances, ...)
- libapache-mod-jk 1:1.2.49-1 (bug #1051956)
+ [bookworm] - libapache-mod-jk <no-dsa> (Minor issue)
+ [bullseye] - libapache-mod-jk <no-dsa> (Minor issue)
NOTE: https://lists.apache.org/thread/rd1r26w7271jyqgzr4492tooyt583d8b
NOTE: http://www.openwall.com/lists/oss-security/2023/09/13/2
NOTE: https://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.49
@@ -683,6 +687,8 @@ CVE-2023-4813 (A flaw was found in glibc. In an uncommon situation, the gaih_ine
NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215 (glibc-2.36)
CVE-2023-4806 (A flaw was found in glibc. In an extremely rare situation, the getaddr ...)
- glibc 2.37-10
+ [bookworm] - glibc <no-dsa> (Minor issue)
+ [bullseye] - glibc <no-dsa> (Minor issue)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=30843
CVE-2023-4527 (A flaw was found in glibc. When the getaddrinfo function is called wit ...)
- glibc 2.37-9 (bug #1051958)
@@ -1968,6 +1974,8 @@ CVE-2023-2813 (All of the above Aapna WordPress theme through 1.3, Anand WordPre
CVE-2023-41164
{DLA-3558-1}
- python-django 3:3.2.21-1 (bug #1051226)
+ [bookworm] - python-django <postponed> (Minor issue, fix along in future update)
+ [bullseye] - python-django <postponed> (Minor issue, fix along in future update)
NOTE: https://www.openwall.com/lists/oss-security/2023/09/04/1
NOTE: https://www.djangoproject.com/weblog/2023/sep/04/security-releases/
NOTE: https://github.com/django/django/commit/3f41d6d62929dfe53eda8109b3b836f26645bdce (main)
@@ -7306,6 +7314,8 @@ CVE-2023-38410 (The issue was addressed with improved checks. This issue is fixe
NOT-FOR-US: Apple
CVE-2023-38285 (Trustwave ModSecurity 3.x before 3.0.10 has Inefficient Algorithmic Co ...)
- modsecurity 3.0.10-1 (bug #1042475)
+ [bookworm] - modsecurity <no-dsa> (Minor issue)
+ [bullseye] - modsecurity <no-dsa> (Minor issue)
NOTE: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-v3-dos-vulnerability-in-four-transformations-cve-2023-38285/
CVE-2023-38261 (The issue was addressed with improved memory handling. This issue is f ...)
NOT-FOR-US: Apple
=====================================
data/dsa-needed.txt
=====================================
@@ -33,6 +33,8 @@ lldpd (carnil)
nbconvert/oldstable
Guilhem Moulin proposed an update ready for review
--
+netatalk/oldstable (jmm)
+--
nodejs
maintainer proposed to follow the upstream 18.x LTS branch
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9c021404e462f119daeb92be61dc95566a140cdc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9c021404e462f119daeb92be61dc95566a140cdc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230920/3b804e1c/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list