[Git][security-tracker-team/security-tracker][master] new quic-go issue
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Jan 12 13:53:22 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6b2ea7df by Moritz Muehlenhoff at 2024-01-12T14:52:20+01:00
new quic-go issue
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -404,7 +404,18 @@ CVE-2023-51123 (An issue discovered in D-Link dir815 v.1.01SSb08.bin allows a re
CVE-2023-51073 (An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to exe ...)
NOT-FOR-US: Buffalo
CVE-2023-49295 (quic-go is an implementation of the QUIC protocol (RFC 9000, RFC 9001, ...)
- TODO: check
+ - golang-github-lucas-clemente-quic-go <unfixed>
+ [bookworm] - golang-github-lucas-clemente-quic-go <no-dsa> (Minor issue)
+ [bullseye] - golang-github-lucas-clemente-quic-go <no-dsa> (Minor issue)
+ NOTE: https://github.com/quic-go/quic-go/security/advisories/GHSA-ppxx-5m9h-6vxf
+ NOTE: https://github.com/quic-go/quic-go/commit/17fc98c2d81dbe685c19702dc694a9d606ac56dc
+ NOTE: https://github.com/quic-go/quic-go/commit/21609ddfeff93668c7625a85eb09f1541fdad965
+ NOTE: https://github.com/quic-go/quic-go/commit/3a9c18bcd27a01c551ac9bf8bd2b4bded77c189a
+ NOTE: https://github.com/quic-go/quic-go/commit/554d543b50b917369fb1394cc5396d928166cf49
+ NOTE: https://github.com/quic-go/quic-go/commit/6cc3d58935426191296171a6c0d1ee965e10534e
+ NOTE: https://github.com/quic-go/quic-go/commit/9aaefe19fc3dc8c8917cc87e6128bb56d9e9e6cc
+ NOTE: https://github.com/quic-go/quic-go/commit/a0ffa757499913f7be69aa78f573a6aee3430ae4
+ NOTE: https://github.com/quic-go/quic-go/commit/d7aa627ebde91cf799ada2a07443faa9b1e5abb8
CVE-2023-45175 (IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user ...)
NOT-FOR-US: IBM
CVE-2023-45173 (IBM AIX 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user ...)
@@ -16255,9 +16266,9 @@ CVE-2023-45133 (Babel is a compiler for writingJavaScript. In `@babel/traverse`
{DSA-5528-1 DLA-3618-1}
- node-babel <removed>
- node-babel7 7.20.15+ds1+~cs214.269.168-5 (bug #1053880)
- NOTE: github.com: https://github.com/babel/babel/security/advisories/GHSA-67hx-6x53-jw92
- NOTE: github.com: https://github.com/babel/babel/pull/16033
- NOTE: github.com: https://github.com/babel/babel/commit/b13376b346946e3f62fc0848c1d2a23223314c82
+ NOTE: https://github.com/babel/babel/security/advisories/GHSA-67hx-6x53-jw92
+ NOTE: https://github.com/babel/babel/pull/16033
+ NOTE: https://github.com/babel/babel/commit/b13376b346946e3f62fc0848c1d2a23223314c82
CVE-2023-45106 (Cross-Site Request Forgery (CSRF) vulnerability in Fedor Urvanov, Aram ...)
NOT-FOR-US: WordPress plugin
CVE-2023-45103 (Cross-Site Request Forgery (CSRF) vulnerability in YAS Global Team Per ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b2ea7dfd0f2652b5d4a5ca2a100330db20c7bb3
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6b2ea7dfd0f2652b5d4a5ca2a100330db20c7bb3
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240112/bf85ec50/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list