[Git][security-tracker-team/security-tracker][master] Update DLA-3909-1 to include the additionally fixed CVEs.

Tobias Frost (@tobi) tobi at debian.org
Sat Dec 7 16:31:25 GMT 2024



Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker


Commits:
61210e73 by Tobias Frost at 2024-12-07T17:30:39+01:00
Update DLA-3909-1 to include the additionally fixed CVEs.

Since the upload of 1:5.0.44+dfsg-1+deb11u1 information became available
that the uploaded version fixed the following vulnerabilties in addition
to the already communicated ones:

CVE-2024-22117

    When a URL is added to the map element, it is recorded in the database
    with sequential IDs. Upon adding a new URL, the system retrieves the
    last sysmapelementurlid value and increments it by one. However, an
    issue arises when a user manually changes the sysmapelementurlid value
    by adding sysmapelementurlid + 1. This action prevents others from
    adding URLs to the map element.

CVE-2024-36463

    The implementation of atob in "Zabbix JS" allows to create a string with
    arbitrary content and use it to access internal properties of objects.

CVE-2024-36467

    An authenticated user with API access (e.g.: user with default User
    role), more specifically a user with access to the user.update API
    endpoint is enough to be able to add themselves to any group (e.g.:
    Zabbix Administrators), except to groups that are disabled or having
    restricted GUI access.

- - - - -


1 changed file:

- data/DLA/list


Changes:

=====================================
data/DLA/list
=====================================
@@ -224,7 +224,7 @@
 	{CVE-2022-1304}
 	[bullseye] - e2fsprogs 1.46.2-2+deb11u1
 [03 Oct 2024] DLA-3909-1 zabbix - security update
-	{CVE-2022-23132 CVE-2022-23133 CVE-2022-24349 CVE-2022-24917 CVE-2022-24918 CVE-2022-24919 CVE-2022-35229 CVE-2022-35230 CVE-2022-43515 CVE-2023-29449 CVE-2023-29450 CVE-2023-29454 CVE-2023-29455 CVE-2023-29456 CVE-2023-29457 CVE-2023-29458 CVE-2023-32721 CVE-2023-32722 CVE-2023-32724 CVE-2023-32726 CVE-2023-32727 CVE-2024-22114 CVE-2024-22116 CVE-2024-22119 CVE-2024-22122 CVE-2024-22123 CVE-2024-36460 CVE-2024-36461}
+	{CVE-2022-23132 CVE-2022-23133 CVE-2022-24349 CVE-2022-24917 CVE-2022-24918 CVE-2022-24919 CVE-2022-35229 CVE-2022-35230 CVE-2022-43515 CVE-2023-29449 CVE-2023-29450 CVE-2023-29454 CVE-2023-29455 CVE-2023-29456 CVE-2023-29457 CVE-2023-29458 CVE-2023-32721 CVE-2023-32722 CVE-2023-32724 CVE-2023-32726 CVE-2023-32727 CVE-2024-22114 CVE-2024-22116 CVE-2024-22117 CVE-2024-22119 CVE-2024-22122 CVE-2024-22123 CVE-2024-36460 CVE-2024-36461 CVE-2024-36463 CVE-2024-36467}
 	[bullseye] - zabbix 1:5.0.44+dfsg-1+deb11u1
 [30 Sep 2024] DLA-3908-1 debian-security-support - update
 	[bullseye] - debian-security-support 1:11+2024.09.30



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61210e735e6c92881c2a75e3dc5545414f4f2f71

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61210e735e6c92881c2a75e3dc5545414f4f2f71
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241207/27085bbb/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list