[Git][security-tracker-team/security-tracker][master] 5 commits: Triage CVE-2022-48623 in libcpanel-json-xs-perl for buster LTS.

Chris Lamb (@lamby) lamby at debian.org
Sun Feb 18 18:32:18 GMT 2024



Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ae4bf3c6 by Chris Lamb at 2024-02-18T18:28:49+00:00
Triage CVE-2022-48623 in libcpanel-json-xs-perl for buster LTS.

- - - - -
635b6321 by Chris Lamb at 2024-02-18T18:29:28+00:00
Triage CVE-2024-25189 in libjwt for buster LTS.

- - - - -
4de01d7f by Chris Lamb at 2024-02-18T18:30:10+00:00
Triage CVE-2023-6110 in python-openstackclient for buster LTS.

- - - - -
76530924 by Chris Lamb at 2024-02-18T18:30:27+00:00
Triage CVE-2023-51774 in ruby-json-jwt for buster LTS.

- - - - -
e09c0619 by Chris Lamb at 2024-02-18T18:31:34+00:00
data/dla-needed.txt: Triage bind9 for buster LTS (re. CVE-2023-4408, CVE-2023-50387, CVE-2023-50868, CVE-2023-5517 & CVE-2023-5679)

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -1206,6 +1206,7 @@ CVE-2023-41703 (User ID references at mentions in document comments were not cor
 CVE-2022-48623 (The Cpanel::JSON::XS package before 4.33 for Perl performs out-of-boun ...)
 	- libcpanel-json-xs-perl 4.35-1
 	[bullseye] - libcpanel-json-xs-perl <no-dsa> (Minor issue)
+	[buster] - libcpanel-json-xs-perl <no-dsa> (Minor issue)
 	NOTE: https://github.com/rurban/Cpanel-JSON-XS/issues/208
 	NOTE: Fixed by: https://github.com/rurban/Cpanel-JSON-XS/commit/41f32396eee9395a40f9ed80145c37622560de9b (4.33)
 CVE-2021-4437 (A vulnerability, which was classified as problematic, has been found i ...)
@@ -1227,6 +1228,7 @@ CVE-2023-6110 [deleting a non existing access rule deletes another existing acce
 	- python-openstackclient <unfixed>
 	[bookworm] - python-openstackclient <no-dsa> (Minor issue)
 	[bullseye] - python-openstackclient <no-dsa> (Minor issue)
+	[buster] - python-openstackclient <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2212960
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2209607
 	NOTE: https://review.opendev.org/888697
@@ -1675,6 +1677,7 @@ CVE-2024-25189 (libjwt 1.15.3 uses strcmp (which is not constant time) to verify
 	- libjwt <unfixed> (bug #1063534)
 	[bookworm] - libjwt <no-dsa> (Minor issue)
 	[bullseye] - libjwt <no-dsa> (Minor issue)
+	[buster] - libjwt <no-dsa> (Minor issue)
 	NOTE: https://github.com/P3ngu1nW/CVE_Request/blob/main/benmcollins%3Alibjwt.md
 	NOTE: https://github.com/benmcollins/libjwt/commit/f73bac57c5bece16ac24f1a70022aa34355fc1bf (v1.17.0)
 	NOTE: https://github.com/benmcollins/libjwt/commit/a5d61ef4f1b383876e0a78534383f38159471fd6 (v1.17.0)
@@ -9976,6 +9979,7 @@ CVE-2023-51774 (The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allow
 	- ruby-json-jwt <unfixed>
 	[bookworm] - ruby-json-jwt <postponed> (Revisit when addressed upstream)
 	[bullseye] - ruby-json-jwt <postponed> (Revisit when addressed upstream)
+	[buster] - ruby-json-jwt <postponed> (Revisit when addressed upstream)
 	NOTE: https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
 	NOTE: https://github.com/nov/json-jwt/issues/113
 CVE-2023-51773 (BACnet Stack before 1.3.2 has a decode function APDU buffer over-read  ...)


=====================================
data/dla-needed.txt
=====================================
@@ -34,6 +34,10 @@ atril
   NOTE: 20240121: Added by Front-Desk (apo)
   NOTE: 20240121: Decide whether it makes sense to disable comic feature or use libarchive instead.
 --
+bind9
+  NOTE: 20240218: Added by Front-Desk (lamby)
+  NOTE: 20240218: CVE-2023-4408 CVE-2023-50387 CVE-2023-50868 CVE-2023-5517 CVE-2023-5679 already fixed in bullseye. (lamby)
+--
 cacti (Sylvain Beucler)
   NOTE: 20230906: Added by Front-Desk (lamby)
   NOTE: 20231205: Triaging CVEs backlog (Beuc)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1ae90d779787424cfbe534a40be8ad12965c908a...e09c06199691c435c54fd6da97463ac574d4e0fb

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1ae90d779787424cfbe534a40be8ad12965c908a...e09c06199691c435c54fd6da97463ac574d4e0fb
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240218/958b02bb/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list