[Git][security-tracker-team/security-tracker][master] 5 commits: Triage CVE-2024-22365 in pam for buster LTS.

Chris Lamb (@lamby) lamby at debian.org
Fri Jan 19 15:17:53 GMT 2024



Chris Lamb pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e9657309 by Chris Lamb at 2024-01-19T07:14:13-08:00
Triage CVE-2024-22365 in pam for buster LTS.

- - - - -
1c0a7782 by Chris Lamb at 2024-01-19T07:14:38-08:00
Triage CVE-2023-50658 in golang-github-dvsekhvalnov-jose2go for buster LTS.

- - - - -
eac2152c by Chris Lamb at 2024-01-19T07:15:01-08:00
Triage CVE-2024-22368 in libspreadsheet-parsexlsx-perl for buster LTS.

- - - - -
304bbdbe by Chris Lamb at 2024-01-19T07:15:37-08:00
Triage CVE-2024-23659 in spip for buster LTS.

- - - - -
27854d72 by Chris Lamb at 2024-01-19T07:17:24-08:00
data/dla-needed.txt: Triage qemu for buster LTS (CVE-2023-1544 & CVE-2023-3354)

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -237,6 +237,7 @@ CVE-2024-22365 [pam_namespace: protect_dir(): use O_DIRECTORY to prevent local D
 	- pam <unfixed> (bug #1061097)
 	[bookworm] - pam <no-dsa> (Minor issue)
 	[bullseye] - pam <no-dsa> (Minor issue)
+	[buster] - pam <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2024/01/18/3
 	NOTE: https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb (v1.6.0)
 CVE-2023-6596
@@ -1282,6 +1283,7 @@ CVE-2024-23659 (SPIP before 4.1.14 and 4.2.x before 4.2.8 allows XSS via the nam
 	- spip 4.1.15+dfsg-1
 	[bookworm] - spip <no-dsa> (Minor issue)
 	[bullseye] - spip <not-affected> (Vulnerable code not present)
+	[buster] - spip <not-affected> (Vulnerable code not present)
 	NOTE: https://git.spip.net/spip/bigup/commit/ada821c076d67d1147a195178223d0b4a6d8cecc
 	NOTE: https://git.spip.net/spip/bigup/commit/0757f015717cb72b84dba0e9a375ec71caddf1c2
 	NOTE: https://blog.spip.net/Mise-a-jour-de-maintenance-et-securite-sortie-de-SPIP-4-2-8-SPIP-4-1-14.html?lang=fr
@@ -2113,6 +2115,7 @@ CVE-2024-22368 (The Spreadsheet::ParseXLSX package before 0.28 for Perl can enco
 	- libspreadsheet-parsexlsx-perl 0.29-1
 	[bookworm] - libspreadsheet-parsexlsx-perl <no-dsa> (Minor issue; DoS, can be fixed in point release)
 	[bullseye] - libspreadsheet-parsexlsx-perl <no-dsa> (Minor issue; DoS, can be fixed in point release)
+	[buster] - libspreadsheet-parsexlsx-perl <no-dsa> (Minor issue)
 	NOTE: https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md
 	NOTE: Fixed by: https://github.com/MichaelDaum/spreadsheet-parsexlsx/commit/39b25b91fcb939a9c8ea807fdc80386c1ae5be0c (0.28)
 	NOTE: Minor rewrite followup: https://github.com/MichaelDaum/spreadsheet-parsexlsx/commit/47ff82d74fbd014b8ec3cab80fa4fd25db9e8242
@@ -4389,6 +4392,7 @@ CVE-2023-50658 (The jose2go component before 1.6.0 for Go allows attackers to ca
 	- golang-github-dvsekhvalnov-jose2go <unfixed> (bug #1059507)
 	[bookworm] - golang-github-dvsekhvalnov-jose2go <no-dsa> (Minor issue)
 	[bullseye] - golang-github-dvsekhvalnov-jose2go <no-dsa> (Minor issue)
+	[buster] - golang-github-dvsekhvalnov-jose2go <no-dsa> (Minor issue)
 	NOTE: https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317 (v1.6.0)
 CVE-2023-50339 (Stored cross-site scripting vulnerability exists in the User Managemen ...)
 	NOT-FOR-US: GROWI


=====================================
data/dla-needed.txt
=====================================
@@ -193,6 +193,10 @@ python-os-brick
   NOTE: 20230525: Added by Front-Desk (lamby)
   NOTE: 20230525: NB. CVE-2023-2088 filed against python-glance-store, python-os-brick, nova and cinder.
 --
+qemu
+  NOTE: 20240119: Added by Front-Desk (lamby)
+  NOTE: 20240119: CVE-2023-1544 and CVE-2023-3354 already fixed in bullseye via DSA or point releases; to be fixed or <ignored>. (lamby)
+--
 rails
   NOTE: 20220909: Re-added due to regression (abhijith)
   NOTE: 20220909: Regression on 2:5.2.2.1+dfsg-1+deb10u4 (abhijith)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9e815576af40189b41a25e9e45ac3397e994de86...27854d722fae2fa0488177670a66ab6c80b8b9c6

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9e815576af40189b41a25e9e45ac3397e994de86...27854d722fae2fa0488177670a66ab6c80b8b9c6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240119/4989bcbd/attachment.htm>


More information about the debian-security-tracker-commits mailing list