[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Apr 22 10:10:39 BST 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
cb445d82 by Moritz Muehlenhoff at 2024-04-22T11:02:14+02:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -54,12 +54,15 @@ CVE-2024-32460 [Low] OutOfBound Read in interleaved_decompress]
 	NOTE: https://www.freerdp.com/2024/04/17/2_11_6-release
 CVE-2024-32493 [SQL injection issue regarding Form IDs when cleaning up drafts]
 	- znuny 6.5.8-1
+	[bookworm] - znuny <no-dsa> (Non-free not supported)
 	NOTE: https://www.znuny.org/en/advisories/zsa-2024-03
 CVE-2024-32492 [Cross Site Scripting (XSS) in the Customer Portal Ticket View]
 	- znuny <not-affected> (Only affects Znuny from 7.0.1 up to including 7.0.16)
+	[bookworm] - znuny <no-dsa> (Non-free not supported)
 	NOTE: https://www.znuny.org/en/advisories/zsa-2024-02
 CVE-2024-32491 [Directory Traversal via File Upload]
 	- znuny 6.5.8-1
+	[bookworm] - znuny <no-dsa> (Non-free not supported)
 	NOTE: https://www.znuny.org/en/advisories/zsa-2024-01
 CVE-2024-4020 (A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified ...)
 	NOT-FOR-US: Tenda
@@ -3676,9 +3679,13 @@ CVE-2024-3210 (The Paid Membership Plugin, Ecommerce, User Registration Form, Lo
 	NOT-FOR-US: WordPress plugin
 CVE-2024-3120 (A stack-buffer overflow vulnerability exists in all versions of sngrep ...)
 	- sngrep 1.8.1-1 (bug #1068818)
+	[bookworm] - sngrep <no-dsa> (Minor issue)
+	[bullseye] - sngrep <no-dsa> (Minor issue)
 	NOTE: https://github.com/irontec/sngrep/commit/f3f8ed8ef38748e6d61044b39b0dabd7e37c6809 (v1.8.1)
 CVE-2024-3119 (A buffer overflow vulnerability exists in all versions of sngrep since ...)
 	- sngrep 1.8.1-1 (bug #1068818)
+	[bookworm] - sngrep <no-dsa> (Minor issue)
+	[bullseye] - sngrep <no-dsa> (Minor issue)
 	NOTE: https://github.com/irontec/sngrep/commit/dd5fec92730562af6f96891291cd4e102b80bfcc (v1.8.1)
 CVE-2024-3020 (The plugin is vulnerable to PHP Object Injection in versions up to and ...)
 	NOT-FOR-US: WordPress plugin
@@ -4530,6 +4537,7 @@ CVE-2024-2201 [Native Branch History Injection]
 	NOTE: https://xenbits.xen.org/xsa/advisory-456.html
 CVE-2024-31142 [x86: Incorrect logic for BTC/SRSO mitigations]
 	- xen <unfixed>
+	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-455.html
@@ -5055,6 +5063,7 @@ CVE-2024-22328 (IBM Maximo Application Suite 8.10 and 8.11 could allow a remote
 	NOT-FOR-US: IBM
 CVE-2024-XXXX [RUSTSEC-2024-0332: Degradation of service in h2 servers with CONTINUATION Flood]
 	- rust-h2 0.4.4-1
+	[bookworm] - rust-h2 <no-dsa> (Minor issue)
 	NOTE: https://rustsec.org/advisories/RUSTSEC-2024-0332.html
 	NOTE: https://github.com/advisories/GHSA-q6cp-qfwq-4gcv
 CVE-2024-3362 (A vulnerability was found in SourceCodester Online Library System 1.0  ...)
@@ -24250,6 +24259,7 @@ CVE-2020-36771 (CloudLinux CageFS 7.1.1-1 or below passes the authentication tok
 	NOT-FOR-US: CloudLinux CageFS
 CVE-2023-46842 [x86 HVM hypercalls may trigger Xen bug check]
 	- xen <unfixed>
+	[bookworm] - xen <postponed> (Minor issue, fix along in next DSA)
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	[buster] - xen <not-affected> (Vulnerable code not present)
 	NOTE: https://xenbits.xen.org/xsa/advisory-454.html
@@ -39975,6 +39985,8 @@ CVE-2023-46345 (Catdoc v0.95 was discovered to contain a NULL pointer dereferenc
 CVE-2023-46233 (crypto-js is a JavaScript library of crypto standards. Prior to versio ...)
 	{DLA-3669-1}
 	- cryptojs 3.1.2+dfsg-4 (bug #1055525)
+	[bookworm] - cryptojs <no-dsa> (Minor issue)
+	[bullseye] - cryptojs <no-dsa> (Minor issue)
 	NOTE: https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf
 	NOTE: https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a (4.2.0)
 CVE-2023-46232 (era-compiler-vyper is the EraVM Vyper compiler for zkSync Era, a layer ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -14,8 +14,6 @@ If needed, specify the release by adding a slash after the name of the source pa
 --
 atril
 --
-cryptojs
---
 dav1d
 --
 dnsdist (jmm)
@@ -71,7 +69,7 @@ python-asyncssh
 --
 redmine/stable
 --
-ring
+ring/oldstable
   might make sense to rebase to current version
 --
 ruby2.7/oldstable



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb445d829db44c592501aed8473cc3b35d1e76b7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cb445d829db44c592501aed8473cc3b35d1e76b7
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240422/a430b34c/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list