[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Feb 20 10:38:41 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4f594031 by Moritz Muehlenhoff at 2024-02-20T10:51:04+01:00
bookworm/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -297,6 +297,8 @@ CVE-2023-50951 (IBM QRadar Suite 1.10.12.0 through 1.10.17.0 and IBM Cloud Pak f
NOT-FOR-US: IBM
CVE-2023-45918 (ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinf ...)
- ncurses 6.4+20230625-1
+ [bookworm] - ncurses <no-dsa> (Minor issue)
+ [bullseye] - ncurses <no-dsa> (Minor issue)
NOTE: https://lists.gnu.org/archive/html/bug-ncurses/2023-06/msg00005.html
NOTE: https://invisible-island.net/ncurses/NEWS.html#index-t20230615
NOTE: Fixed in ncurses-6.4-20230615 patchlevel
@@ -363,9 +365,14 @@ CVE-2024-0793
CVE-2024-25580 [QT KTX buffer overflow]
[experimental] - qt6-base 6.6.2+dfsg-1
- qt6-base <unfixed> (bug #1064052)
+ [bookworm] - qt6-base <no-dsa> (Minor issue)
- qtbase-opensource-src 5.15.10+dfsg-7 (bug #1064053)
+ [bookworm] - qtbase-opensource-src <no-dsa> (Minor issue)
+ [bullseye] - qtbase-opensource-src <no-dsa> (Minor issue)
[buster] - qtbase-opensource-src <not-affected> (Vulnerable code not present)
- qtbase-opensource-src-gles <unfixed> (bug #1064054)
+ [bookworm] - qtbase-opensource-src-gles <no-dsa> (Minor issue)
+ [bullseye] - qtbase-opensource-src-gles <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2264423
NOTE: https://code.qt.io/cgit/qt/qtbase.git/commit/?id=28ecb523ce8490bff38b251b3df703c72e057519
NOTE: https://code.qt.io/cgit/qt/qtbase.git/commit/?id=dec1863c7dc63e5788b0c6c061d36e856a6ae2b2 (v6.6.2)
@@ -1530,6 +1537,8 @@ CVE-2024-1454 (The use-after-free vulnerability was found in the AuthentIC drive
NOTE: Fixed by: https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9
CVE-2023-6681 (A vulnerability was found in JWCrypto. This flaw allows an attacker to ...)
- python-jwcrypto <unfixed>
+ [bookworm] - python-jwcrypto <no-dsa> (Minor issue)
+ [bullseye] - python-jwcrypto <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2260843
CVE-2023-6110 [deleting a non existing access rule deletes another existing access rule in it's scope]
- python-openstackclient <unfixed>
=====================================
data/dsa-needed.txt
=====================================
@@ -19,6 +19,8 @@ composer (seb)
--
cryptojs
--
+dav1d
+--
dnsdist (jmm)
--
frr
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4f594031caf98a253689a0d3ce5228221070eef2
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4f594031caf98a253689a0d3ce5228221070eef2
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240220/3c94aec2/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list