[Git][security-tracker-team/security-tracker][master] bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Aug 20 13:20:24 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f0ac38f5 by Moritz Muehlenhoff at 2024-08-20T14:19:43+02:00
bookworm triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -98,6 +98,7 @@ CVE-2024-7592 (There is a LOW severity vulnerability affecting CPython, specific
- python3.13 <unfixed>
- python3.12 <unfixed>
- python3.11 <unfixed>
+ [bookworm] - python3.11 <no-dsa> (Minor issue)
- python3.9 <removed>
NOTE: https://github.com/python/cpython/pull/123075
NOTE: https://github.com/python/cpython/issues/123067
@@ -292,6 +293,7 @@ CVE-2024-7904 (A vulnerability was found in DedeBIZ 6.3.0. It has been rated as
NOT-FOR-US: DedeBIZ
CVE-2024-6221 (A vulnerability in corydolphin/flask-cors version 4.0.1 allows the `Ac ...)
- python-flask-cors <unfixed>
+ [bookworm] - python-flask-cors <no-dsa> (Minor issue)
NOTE: https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d
CVE-2024-43353 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
NOT-FOR-US: WordPress plugin
@@ -1565,6 +1567,7 @@ CVE-2023-43489 (Improper access control for some Intel(R) CIP software before ve
NOT-FOR-US: Intel
CVE-2023-42667 (Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cac ...)
- intel-microcode 3.20240813.1 (bug #1078742)
+ [bookworm] - intel-microcode <no-dsa> (Minor issue)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813
CVE-2023-40067 (Unchecked return value in firmware for some Intel(R) CSME may allow an ...)
@@ -362328,6 +362331,7 @@ CVE-2019-18861
RESERVED
CVE-2023-49288 (Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and ...)
- squid 6.1-1
+ [bookworm] - squid <ignored> (Vulnerable feature got removed upstream, workaround exists)
- squid3 <removed>
NOTE: https://github.com/squid-cache/squid/security/advisories/GHSA-rj5h-46j6-q2g5
NOTE: https://megamansec.github.io/Squid-Security-Audit/trace-uaf.html
=====================================
data/dsa-needed.txt
=====================================
@@ -26,7 +26,7 @@ cinder
dnsmasq
Lee Garrett showed interest to prepare an update for review
--
-dovecot
+dovecot (jmm)
Noah Meyerhans is preparing updates
--
frr
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0ac38f563938bf3ab77ab0bd66890625ea00b3e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f0ac38f563938bf3ab77ab0bd66890625ea00b3e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240820/3376f899/attachment.htm>
More information about the debian-security-tracker-commits
mailing list