[Git][security-tracker-team/security-tracker][master] 2 commits: bookworm/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Thu Feb 15 14:46:12 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
241f0ec9 by Moritz Muehlenhoff at 2024-02-15T15:43:52+01:00
bookworm/bullseye triage
- - - - -
3663f614 by Moritz Muehlenhoff at 2024-02-15T15:45:42+01:00
new squid issue
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -19,7 +19,10 @@ CVE-2024-25619 (Mastodon is a free, open-source social network server based on A
CVE-2024-25618 (Mastodon is a free, open-source social network server based on Activit ...)
- mastodon <itp> (bug #859741)
CVE-2024-25617 (Squid is an open source caching proxy for the Web supporting HTTP, HTT ...)
- TODO: check
+ - squid 6.5-1
+ NOTE: https://github.com/squid-cache/squid/security/advisories/GHSA-h5x6-w8mv-xfpr
+ NOTE: https://github.com/squid-cache/squid/commit/72a3bbd5e431597c3fdb56d752bc56b010ba3817 (SQUID_6_5)
+ NOTE: https://github.com/squid-cache/squid/pull/1536
CVE-2024-25559 (URL spoofing vulnerability exists in a-blog cms Ver.3.1.0 to Ver.3.1.8 ...)
NOT-FOR-US: a-blog cms
CVE-2024-24386 (An issue in VitalPBX v.3.2.4-5 allows an attacker to execute arbitrary ...)
@@ -713,6 +716,7 @@ CVE-2023-5679 (A bad interaction between DNS64 and serve-stale may cause `named`
NOTE: https://kb.isc.org/docs/cve-2023-5679
CVE-2023-6516 (To keep its cache database efficient, `named` running as a recursive r ...)
- bind9 1:9.19.21-1
+ [bookworm] - bind9 <not-affected> (Vulnerable code only in 9.16.y series)
[bullseye] - bind9 1:9.16.48-1
[buster] - bind9 <not-affected> (Vulnerable code only in 9.16.y series)
NOTE: https://kb.isc.org/docs/cve-2023-6516
@@ -121682,6 +121686,7 @@ CVE-2022-1950 (The Youzify WordPress plugin before 1.2.0 does not sanitise and e
NOT-FOR-US: WordPress plugin
CVE-2022-1949 (An access control bypass vulnerability found in 389-ds-base. That mish ...)
- 389-ds-base 2.3.1-1 (bug #1016446)
+ [bullseye] - 389-ds-base <ignored> (Minor issue, too intrusive to backport)
[buster] - 389-ds-base <ignored> (Too intrusive too backport)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2091781
NOTE: https://github.com/389ds/389-ds-base/issues/5170
=====================================
data/dsa-needed.txt
=====================================
@@ -24,6 +24,8 @@ engrampa (jmm)
--
frr
--
+gnutls28/oldstable
+--
gpac/oldstable
--
gtkwave
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9ae569735a3d593a677e3f0cb81600f4a74c64e6...3663f614ae179e6e2354e4e1fb55244233cb1fda
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9ae569735a3d593a677e3f0cb81600f4a74c64e6...3663f614ae179e6e2354e4e1fb55244233cb1fda
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240215/ae8dd501/attachment.htm>
More information about the debian-security-tracker-commits
mailing list