[Git][security-tracker-team/security-tracker][master] 5 commits: Triage CVE-2023-40458 in tinyxml for buster LTS.
Chris Lamb (@lamby)
lamby at debian.org
Thu Jan 18 21:51:52 GMT 2024
Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8f06dc33 by Chris Lamb at 2024-01-18T13:51:26-08:00
Triage CVE-2023-40458 in tinyxml for buster LTS.
- - - - -
992a34ad by Chris Lamb at 2024-01-18T13:51:28-08:00
Triage CVE-2023-26159 in node-follow-redirects for buster LTS.
- - - - -
ec9618ab by Chris Lamb at 2024-01-18T13:51:29-08:00
Triage CVE-2023-44483 in libxml-security-java for buster LTS.
- - - - -
38c90f2f by Chris Lamb at 2024-01-18T13:51:30-08:00
Triage CVE-2023-6395 in mock for buster LTS.
- - - - -
a2194454 by Chris Lamb at 2024-01-18T13:51:31-08:00
Triage CVE-2023-39326, CVE-2023-45285 & CVE-2023-45287 in golang-1.11 for buster LTS.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -688,6 +688,7 @@ CVE-2023-45229 (EDK2's Network Package is susceptible to an out-of-bounds read
NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
CVE-2023-6395 (The Mock software contains a vulnerability wherein an attacker could p ...)
- mock <removed>
+ [buster] - mock <not-affected> (Vulnerable code not present)
- templated-dictionary <itp> (bug #1025862)
NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/1
NOTE: Introduced in: https://github.com/rpm-software-management/mock/commit/426d973c2917a18303eea243bdf496ff6942bd27 (mock-1.4.14-1)
@@ -8475,6 +8476,7 @@ CVE-2023-39326 (A malicious HTTP sender can use chunk extensions to cause a rece
- golang-1.15 <removed>
[bullseye] - golang-1.15 <no-dsa> (Minor issue)
- golang-1.11 <removed>
+ [buster] - golang-1.11 <no-dsa> (Minor issue)
NOTE: https://go.dev/issue/64433
NOTE: https://github.com/golang/go/commit/ec8c526e4be720e94b98ca509e6364f0efaf28f7 (go1.21.5)
NOTE: https://github.com/golang/go/commit/6446af942e2e2b161c4ec1b60d9703a2b55dc4dd (go1.20.12)
@@ -8486,6 +8488,7 @@ CVE-2023-45285 (Using go get to fetch a module with the ".git" suffix may unexpe
- golang-1.15 <removed>
[bullseye] - golang-1.15 <no-dsa> (Minor issue)
- golang-1.11 <removed>
+ [buster] - golang-1.11 <no-dsa> (Minor issue)
NOTE: https://go.dev/issue/63845
NOTE: https://github.com/golang/go/commit/23c943e5296c6fa3a6f9433bd929306c4dbf2aa3 (go1.21.5)
NOTE: https://github.com/golang/go/commit/46bc33819ac86a9596b8059235842f0e0c7469bd (go1.20.12)
@@ -8552,6 +8555,7 @@ CVE-2023-45287 (Before Go 1.20, the RSA based TLS key exchanges used the math/bi
- golang-1.15 <removed>
[bullseye] - golang-1.15 <no-dsa> (Minor issue; intrusive backport)
- golang-1.11 <removed>
+ [buster] - golang-1.11 <no-dsa> (Minor issue)
NOTE: https://go.dev/issue/20654
NOTE: https://go.dev/cl/326012/26
NOTE: https://groups.google.com/g/golang-announce/c/QMK8IQALDvA
@@ -9783,6 +9787,7 @@ CVE-2023-40458 (Loop with Unreachable Exit Condition ('Infinite Loop') vulnerabi
- tinyxml <unfixed> (bug #1059315)
[bookworm] - tinyxml <no-dsa> (Minor issue)
[bullseye] - tinyxml <no-dsa> (Minor issue)
+ [buster] - tinyxml <no-dsa> (Minor issue)
NOTE: https://www.forescout.com/resources/sierra21-vulnerabilities
CVE-2023-3741 (An OS Command injection vulnerability in NEC Platforms DT900 and DT900 ...)
NOT-FOR-US: NEC
@@ -16114,6 +16119,7 @@ CVE-2023-44483 (All versions of Apache Santuario - XML Security for Java prior t
- libxml-security-java <unfixed> (bug #1059313)
[bookworm] - libxml-security-java <no-dsa> (Minor issue)
[bullseye] - libxml-security-java <no-dsa> (Minor issue)
+ [buster] - libxml-security-java <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2023/10/20/5
NOTE: https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55
NOTE: https://santuario.apache.org/secadv.data/CVE-2023-44483.txt.asc
@@ -54309,6 +54315,7 @@ CVE-2023-26159 (Versions of the package follow-redirects before 1.15.4 are vulne
- node-follow-redirects <unfixed> (bug #1059926)
[bookworm] - node-follow-redirects <no-dsa> (Minor issue)
[bullseye] - node-follow-redirects <no-dsa> (Minor issue)
+ [buster] - node-follow-redirects <no-dsa> (Minor issue)
NOTE: https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137
NOTE: https://github.com/follow-redirects/follow-redirects/issues/235
NOTE: https://github.com/follow-redirects/follow-redirects/pull/236
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/a65243caa1574534a2b980d8bb630278dc469449...a21944540a5d7fec171e24a47b3a1f9b9b673b09
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/a65243caa1574534a2b980d8bb630278dc469449...a21944540a5d7fec171e24a47b3a1f9b9b673b09
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240118/82662d13/attachment.htm>
More information about the debian-security-tracker-commits
mailing list