[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Sun Apr 21 19:00:33 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
23a75858 by Moritz Muehlenhoff at 2024-04-21T19:59:55+02:00
bookworm/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -3098,6 +3098,8 @@ CVE-2024-3568 (The huggingface/transformers library is vulnerable to arbitrary c
NOT-FOR-US: huggingface/transformers
CVE-2024-3567 (A flaw was found in QEMU. An assertion failure was present in the upda ...)
- qemu <unfixed> (bug #1068822)
+ [bookworm] - qemu <no-dsa> (Minor issue)
+ [bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2274339
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/2273
CVE-2024-3566 (A command inject vulnerability allows an attacker to perform command i ...)
@@ -3519,6 +3521,8 @@ CVE-2024-26815 (In the Linux kernel, the following vulnerability has been resolv
NOTE: https://git.kernel.org/linus/343041b59b7810f9cdca371f445dd43b35c740b1 (6.9-rc1)
CVE-2024-3447
- qemu <unfixed> (bug #1068821)
+ [bookworm] - qemu <no-dsa> (Minor issue)
+ [bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/
NOTE: https://patchew.org/QEMU/20240409145524.27913-1-philmd@linaro.org/
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813
@@ -3680,6 +3684,8 @@ CVE-2024-3512 (The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for Wo
NOT-FOR-US: WordPress plugin
CVE-2024-3446 (A double free vulnerability was found in QEMU virtio devices (virtio-g ...)
- qemu <unfixed> (bug #1068820)
+ [bookworm] - qemu <no-dsa> (Minor issue)
+ [bullseye] - qemu <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2274211
NOTE: https://patchew.org/QEMU/20240409105537.18308-1-philmd@linaro.org/
CVE-2024-3281 (A vulnerability was discovered in the firmware builds after 8.0.2.3267 ...)
@@ -4442,6 +4448,8 @@ CVE-2024-31365 (Improper Neutralization of Input During Web Page Generation ('Cr
NOT-FOR-US: WordPress plugin
CVE-2024-31047 (An issue in Academy Software Foundation openexr v.3.2.3 and before all ...)
- openexr <unfixed> (bug #1068939)
+ [bookworm] - openexr <no-dsa> (Minor issue)
+ [bullseye] - openexr <no-dsa> (Minor issue)
NOTE: https://github.com/AcademySoftwareFoundation/openexr/issues/1680
NOTE: https://github.com/AcademySoftwareFoundation/openexr/pull/1681
NOTE: Fixed by: https://github.com/AcademySoftwareFoundation/openexr/commit/7aa89e1d09b09d9f5dbb96976ee083a331ab9d71
@@ -23398,27 +23406,39 @@ CVE-2023-52355 (An out-of-memory flaw was found in libtiff that could be trigger
NOTE: Issue fixed by providing a documentation update
CVE-2023-40551 (A flaw was found in the MZ binary format in Shim. An out-of-bounds rea ...)
- shim <unfixed> (bug #1061519)
+ [bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
+ [bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2259918
NOTE: https://github.com/rhboot/shim/commit/5a5147d1e19cf90ec280990c84061ac3f67ea1ab (15.8)
CVE-2023-40550 (An out-of-bounds read flaw was found in Shim when it tried to validate ...)
- shim <unfixed> (bug #1061519)
+ [bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
+ [bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2259915
NOTE: https://github.com/rhboot/shim/commit/93ce2552f3e9f71f888a672913bfc0eef255c56d (15.8)
NOTE: Followup: https://github.com/rhboot/shim/commit/e7f5fdf53ee68025f3ef2688e2f27ccb0082db83 (15.8)
CVE-2023-40549 (An out-of-bounds read flaw was found in Shim due to the lack of proper ...)
- shim <unfixed> (bug #1061519)
+ [bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
+ [bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241797
NOTE: https://github.com/rhboot/shim/commit/afdc5039de0a4a3a40162a32daa070f94a883f09 (15.8)
CVE-2023-40548 (A buffer overflow was found in Shim in the 32-bit system. The overflow ...)
- shim <unfixed> (bug #1061519)
+ [bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
+ [bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241782
NOTE: https://github.com/rhboot/shim/commit/96dccc255b16e9465dbee50b3cef6b3db74d11c8 (15.8)
CVE-2023-40547 (A remote code execution vulnerability was found in Shim. The Shim boot ...)
- shim <unfixed> (bug #1061519)
+ [bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
+ [bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2234589
NOTE: https://github.com/rhboot/shim/commit/0226b56513b2b8bd5fd281bce77c40c9bf07c66d (15.8)
CVE-2023-40546 (A flaw was found in Shim when an error happened while creating a new E ...)
- shim <unfixed> (bug #1061519)
+ [bookworm] - shim <no-dsa> (Minor issue, fix with a point release)
+ [bullseye] - shim <no-dsa> (Minor issue, fix with a point release)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2241796
NOTE: https://github.com/rhboot/shim/commit/66e6579dbf921152f647a0c16da1d3b2f40861ca (15.8)
NOTE: https://github.com/rhboot/shim/commit/dae82f6bd72cf600e5d48046ec674a441d0f49d7 (15.8)
@@ -40754,8 +40774,11 @@ CVE-2023-46847 (Squid is vulnerable to a Denial of Service, where a remote atta
NOTE: https://megamansec.github.io/Squid-Security-Audit/digest-overflow.html
CVE-2023-5824 (Squid is vulnerable to Denial of Service attack against HTTP and HTTPS ...)
- squid 6.5-1 (bug #1055249)
+ [bookworm] - squid <ignored> (Minor impact, too intrusive to backport to 5.x)
+ [bullseye] - squid <ignored> (Minor impact, too intrusive to backport to 5.x)
- squid3 <removed>
NOTE: https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
+ NOTE: https://megamansec.github.io/Squid-Security-Audit/cache-headers.html
CVE-2023-46846 (SQUID is vulnerable to HTTP request smuggling, caused by chunked decod ...)
{DSA-5637-1 DLA-3709-1}
- squid 6.5-1 (bug #1054537)
@@ -163039,6 +163062,7 @@ CVE-2022-24793 (PJSIP is a free and open source multimedia communication library
[stretch] - asterisk <not-affected> (Vulnerable code not present)
- pjproject <removed>
- ring 20230206.0~ds1-1 (bug #1014998)
+ [bookworm] - ring <no-dsa> (Minor issue)
NOTE: https://github.com/pjsip/pjproject/security/advisories/GHSA-p6g5-v97c-w5q4
NOTE: https://github.com/pjsip/pjproject/commit/9fae8f43accef8ea65d4a8ae9cdf297c46cfe29a
CVE-2022-24792 (PJSIP is a free and open source multimedia communication library writt ...)
=====================================
data/dsa-needed.txt
=====================================
@@ -11,6 +11,8 @@ To pick an issue, simply add your uid behind it.
If needed, specify the release by adding a slash after the name of the source package.
+--
+atril
--
cryptojs
--
@@ -50,6 +52,10 @@ nbconvert/oldstable
--
nodejs
--
+openjdk-11 (jmm)
+--
+openjdk-17 (jmm)
+--
opennds/stable
--
org-mode
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/23a758581b4a027f39193302381dc081b1ceb588
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/23a758581b4a027f39193302381dc081b1ceb588
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240421/252d8385/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list