[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Fri Jan 26 14:23:05 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
bd6ce902 by Moritz Muehlenhoff at 2024-01-26T14:42:49+01:00
bookworm/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -111,6 +111,8 @@ CVE-2023-48126 (An issue in Luxe Beauty Clinic mini-app on Line v13.6.1 allows a
NOT-FOR-US: Luxe Beauty Clinic mini-app on Line
CVE-2024-0914
- opencryptoki <unfixed>
+ [bookworm] - opencryptoki <no-dsa> (Minor issue)
+ [bullseye] - opencryptoki <no-dsa> (Minor issue)
NOTE: https://github.com/opencryptoki/opencryptoki/issues/731
NOTE: https://github.com/opencryptoki/opencryptoki/pull/737
NOTE: https://github.com/opencryptoki/opencryptoki/commit/2ea019ee2b09f15724d808382d53baca03403288
@@ -227,11 +229,15 @@ CVE-2023-5675
NOT-FOR-US: Quarkus
CVE-2023-52356 (A segment fault (SEGV) flaw was found in libtiff that could be trigger ...)
- tiff <unfixed> (bug #1061524)
+ [bookworm] - tiff <no-dsa> (Minor issue)
+ [bullseye] - tiff <no-dsa> (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/622
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/546
NOTE: https://gitlab.com/libtiff/libtiff/-/commit/51558511bdbbcffdce534db21dbaf5d54b31638a
CVE-2023-52355 (An out-of-memory flaw was found in libtiff that could be triggered by ...)
- tiff <unfixed>
+ [bookworm] - tiff <no-dsa> (Minor issue)
+ [bullseye] - tiff <no-dsa> (Minor issue)
NOTE: https://gitlab.com/libtiff/libtiff/-/issues/621
NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/553
NOTE: https://gitlab.com/libtiff/libtiff/-/commit/335947359ce2dd3862cd9f7c49f92eba065dfed4
@@ -275,9 +281,12 @@ CVE-2024-23641 (SvelteKit is a web development kit. In SvelteKit 2, sending a GE
NOT-FOR-US: SvelteKit
CVE-2024-22725 (Orthanc versions before 1.12.2 are affected by a reflected cross-site ...)
- orthanc 1.12.2+dfsg-1
+ [bookworm] - orthanc <no-dsa> (Minor issue)
+ [bullseye] - orthanc <no-dsa> (Minor issue)
NOTE: https://orthanc.uclouvain.be/hg/orthanc/rev/505416b269a0
CVE-2024-22720 (Kanboard 1.2.34 is vulnerable to Html Injection in the group managemen ...)
- kanboard <unfixed>
+ [bookworm] - kanboard <no-dsa> (Minor issue)
NOTE: https://cupc4k3.medium.com/html-injection-vulnerability-in-kanboard-group-management-d9fe5154bb1b
CVE-2024-22651 (There is a command injection vulnerability in the ssdpcgi_main functio ...)
NOT-FOR-US: D-Link
@@ -316,22 +325,33 @@ CVE-2023-52039 (An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 al
CVE-2023-52038 (An issue discovered in TOTOLINK X6000R v9.4.0cu.852_B20230719 allows a ...)
NOT-FOR-US: TOTOLINK
CVE-2023-51890 (An infinite loop issue discovered in Mathtex 1.05 and before allows a ...)
- - mathtex <unfixed> (bug #1061520)
+ - mathtex <unfixed> (bug #1061520; unimportant)
+ NOTE: Hang in CLI tool, no security impact
NOTE: https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
CVE-2023-51889 (Stack Overflow vulnerability in the validate() function in Mathtex v.1 ...)
- mathtex <unfixed> (bug #1061520)
+ [bookworm] - mathtex <no-dsa> (Minor issue)
+ [bullseye] - mathtex <no-dsa> (Minor issue)
NOTE: https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
CVE-2023-51888 (Buffer Overflow vulnerability in the nomath() function in Mathtex v.1. ...)
- mathtex <unfixed> (bug #1061520)
+ [bookworm] - mathtex <no-dsa> (Minor issue)
+ [bullseye] - mathtex <no-dsa> (Minor issue)
NOTE: https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
CVE-2023-51887 (Command Injection vulnerability in Mathtex v.1.05 and before allows a ...)
- mathtex <unfixed> (bug #1061520)
+ [bookworm] - mathtex <no-dsa> (Minor issue)
+ [bullseye] - mathtex <no-dsa> (Minor issue)
NOTE: https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
CVE-2023-51886 (Buffer Overflow vulnerability in the main() function in Mathtex 1.05 a ...)
- mathtex <unfixed> (bug #1061520)
+ [bookworm] - mathtex <no-dsa> (Minor issue)
+ [bullseye] - mathtex <no-dsa> (Minor issue)
NOTE: https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
CVE-2023-51885 (Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a re ...)
- mathtex <unfixed> (bug #1061520)
+ [bookworm] - mathtex <no-dsa> (Minor issue)
+ [bullseye] - mathtex <no-dsa> (Minor issue)
NOTE: https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/
CVE-2023-51702 (Since version 5.2.0, when using deferrable mode with the path of a Kub ...)
- airflow <itp> (bug #819700)
@@ -775,9 +795,11 @@ CVE-2024-23675 (In Splunk Enterprise versions below 9.0.8 and 9.1.3, Splunk app
CVE-2024-23345 (Nautobot is a Network Source of Truth and Network Automation Platform ...)
NOT-FOR-US: Nautobot
CVE-2024-23342 (The `ecdsa` PyPI package is a pure Python implementation of ECC (Ellip ...)
- - python-ecdsa <unfixed>
+ - python-ecdsa <unfixed> (unimportant)
NOTE: https://github.com/tlsfuzzer/python-ecdsa/security/advisories/GHSA-wj6h-64fc-37mp
NOTE: https://minerva.crocs.fi.muni.cz/
+ NOTE: Side channel attacks not covered by their security policy:
+ NOTE: https://github.com/tlsfuzzer/python-ecdsa/blob/master/SECURITY.md
CVE-2024-23340 (@hono/node-server is an adapter that allows users to run Hono applicat ...)
NOT-FOR-US: Hono
CVE-2024-23339 (hoolock is a suite of lightweight utilities designed to maintain a sma ...)
@@ -927,6 +949,8 @@ CVE-2024-23750 (MetaGPT through 0.6.4 allows the QaEngineer role to execute arbi
NOT-FOR-US: MetaGPTLlamaIndex
CVE-2024-23744 (An issue was discovered in Mbed TLS 3.5.1. There is persistent handsha ...)
- mbedtls <unfixed>
+ [bookworm] - mbedtls <no-dsa> (Minor issue)
+ [bullseye] - mbedtls <no-dsa> (Minor issue)
NOTE: https://github.com/Mbed-TLS/mbedtls/issues/8694
NOTE: https://github.com/Mbed-TLS/mbedtls/pull/8595
CVE-2024-22113 (Open redirect vulnerability in Access analysis CGI An-Analyzer release ...)
@@ -953,6 +977,8 @@ CVE-2023-52354 (chasquid before 1.13 allows SMTP smuggling because LF-terminated
NOTE: https://blitiri.com.ar/p/chasquid/relnotes/#113-2023-12-24
CVE-2023-52353 (An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_sess ...)
- mbedtls <unfixed>
+ [bookworm] - mbedtls <no-dsa> (Minor issue)
+ [bullseye] - mbedtls <no-dsa> (Minor issue)
NOTE: https://github.com/Mbed-TLS/mbedtls/issues/8654
CVE-2023-47352 (Technicolor TC8715D devices have predictable default WPA2 security pas ...)
NOT-FOR-US: Technicolor
@@ -1286,6 +1312,7 @@ CVE-2023-32337 (IBM Maximo Spatial Asset Management 8.10 is vulnerable to server
NOT-FOR-US: IBM
CVE-2024-0690 [possible information leak in tasks that ignore ANSIBLE_NO_LOG configuration]
- ansible-core <unfixed> (bug #1061156)
+ [bookworm] - ansible-core <no-dsa> (Minor issue)
- ansible 5.4.0-1
[bullseye] - ansible <no-dsa> (Minor issue)
NOTE: ansible-core was split off from src:ansible with 4.6.0-1 in experimental/5.4.0-1 in sid
@@ -61510,6 +61537,8 @@ CVE-2023-0438 (Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/mo
NOT-FOR-US: Modoboa
CVE-2023-0437 (When calling bson_utf8_validateon some inputs a loop with an exit cond ...)
- mongo-c-driver 1.25.0-1
+ [bookworm] - mongo-c-driver <no-dsa> (Minor issue)
+ [bullseye] - mongo-c-driver <no-dsa> (Minor issue)
[buster] - mongo-c-driver <ignored> (Minor issue)
NOTE: https://jira.mongodb.org/browse/CDRIVER-4747
CVE-2023-0436 (The affected versions of MongoDB Atlas Kubernetes Operator may print s ...)
=====================================
data/dsa-needed.txt
=====================================
@@ -37,6 +37,7 @@ nbconvert/oldstable
Guilhem Moulin proposed an update ready for review
--
openjdk-17 (jmm)
+ latest release needs backport of jtreg7 for bookworm
--
php-cas/oldstable
--
@@ -89,6 +90,8 @@ squid (apo)
--
varnish
--
+zabbix
+--
zbar (carnil)
Prepared update but needs some additional testing before the release
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bd6ce902fa291fdf1f91df60c2c26ba72b8c2722
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bd6ce902fa291fdf1f91df60c2c26ba72b8c2722
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240126/c7d9410a/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list