[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sat Feb 17 14:03:42 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
03264623 by Moritz Muehlenhoff at 2024-02-17T15:03:17+01:00
bookworm/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1377,6 +1377,8 @@ CVE-2024-21624 (nonebot2 is a cross-platform Python asynchronous chatbot framewo
 	NOT-FOR-US: nonebot2
 CVE-2024-21490 (This affects versions of the package angular from 1.3.0. A regular exp ...)
 	- angular.js <unfixed>
+	[bookworm] - angular.js <no-dsa> (Minor issue)
+	[bullseye] - angular.js <no-dsa> (Minor issue)
 	[buster] - angular.js <postponed> (Fix along with the next DLA)
 	NOTE: https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
 CVE-2024-1406 (A vulnerability was found in Linksys WRT54GL 4.30.18. It has been decl ...)
@@ -1654,6 +1656,8 @@ CVE-2024-25190 (l8w8jwt 2.2.1 uses memcmp (which is not constant time) to verify
 	NOT-FOR-US: l8w8jwt
 CVE-2024-25189 (libjwt 1.15.3 uses strcmp (which is not constant time) to verify authe ...)
 	- libjwt <unfixed> (bug #1063534)
+	[bookworm] - libjwt <no-dsa> (Minor issue)
+	[bullseye] - libjwt <no-dsa> (Minor issue)
 	NOTE: https://github.com/P3ngu1nW/CVE_Request/blob/main/benmcollins%3Alibjwt.md
 	NOTE: https://github.com/benmcollins/libjwt/commit/f73bac57c5bece16ac24f1a70022aa34355fc1bf (v1.17.0)
 	NOTE: https://github.com/benmcollins/libjwt/commit/a5d61ef4f1b383876e0a78534383f38159471fd6 (v1.17.0)
@@ -2773,6 +2777,8 @@ CVE-2024-23824 (mailcow is a dockerized email package, with multiple containers
 	NOT-FOR-US: mailcow
 CVE-2024-23635 (AntiSamy is a library for performing fast, configurable cleansing of H ...)
 	- libowasp-antisamy-java <unfixed> (bug #1062846)
+	[bookworm] - libowasp-antisamy-java <no-dsa> (Minor issue)
+	[bullseye] - libowasp-antisamy-java <no-dsa> (Minor issue)
 	NOTE: https://github.com/nahsra/antisamy/security/advisories/GHSA-2mrq-w8pv-5pvq
 CVE-2024-22851 (Directory Traversal Vulnerability in LiveConfig before v.2.5.2 allows  ...)
 	NOT-FOR-US: LiveConfig
@@ -3545,6 +3551,8 @@ CVE-2024-1030 (A vulnerability was found in Cogites eReserv 7.7.58. It has been
 	NOT-FOR-US: Cogites eReserv
 CVE-2024-1019 (ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypa ...)
 	- modsecurity 3.0.12-1
+	[bookworm] - modsecurity <no-dsa> (Minor issue)
+	[bullseye] - modsecurity <no-dsa> (Minor issue)
 	NOTE: https://owasp.org/www-project-modsecurity/tab_cves#cve-2024-1019-2024-01-30
 CVE-2024-0676 (Weak password requirement vulnerability   in Lamassu Bitcoin ATM Douro ...)
 	NOT-FOR-US: Lamassu Bitcoin ATM Douro machines
@@ -9947,6 +9955,8 @@ CVE-2023-51775 (The jose4j component before 0.9.4 for Java allows attackers to c
 	NOTE: https://bitbucket.org/b_c/jose4j/commits/1afaa1e174b3
 CVE-2023-51774 (The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypa ...)
 	- ruby-json-jwt <unfixed>
+	[bookworm] - ruby-json-jwt <postponed> (Revisit when addressed upstream)
+	[bullseye] - ruby-json-jwt <postponed> (Revisit when addressed upstream)
 	NOTE: https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
 	NOTE: https://github.com/nov/json-jwt/issues/113
 CVE-2023-51773 (BACnet Stack before 1.3.2 has a decode function APDU buffer over-read  ...)
@@ -30375,6 +30385,7 @@ CVE-2023-38802 (FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a
 	NOTE: https://github.com/FRRouting/frr/commit/46817adab03802355c3cce7b753c7a735bdcc5ae
 CVE-2023-38283 (In OpenBGPD before 8.1, incorrect handling of BGP update data (length  ...)
 	- openbgpd 8.1-1
+	[bookworm] - openbgpd <no-dsa> (Minor issue)
 	NOTE: https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/006_bgpd.patch.sig
 CVE-2023-34039 (Aria Operations for Networks contains an Authentication Bypass vulnera ...)
 	NOT-FOR-US: VMware


=====================================
data/dsa-needed.txt
=====================================
@@ -30,6 +30,8 @@ gtkwave
 --
 h2o (jmm)
 --
+imagemagick (jmm)
+--
 iwd (carnil)
 --
 libreswan (jmm)
@@ -48,7 +50,7 @@ opennds/stable
 --
 openvswitch
 --
-pdns-recursor
+pdns-recursor (jmm)
 --
 php-cas/oldstable
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/03264623db87c09c7203a74eb9b04447ac3a756c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/03264623db87c09c7203a74eb9b04447ac3a756c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240217/34db1de9/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list