[Git][security-tracker-team/security-tracker][master] bookworm/bullseye triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Thu Jun 27 16:44:50 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0ebcf4e1 by Moritz Muehlenhoff at 2024-06-27T17:43:28+02:00
bookworm/bullseye triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -105,9 +105,13 @@ CVE-2024-39241 (Cross Site Scripting (XSS) vulnerability in skycaiji 2.8 allows
NOT-FOR-US: skycaiji
CVE-2024-38950 (Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ...)
- libde265 <unfixed>
+ [bookworm] - libde265 <no-dsa> (Minor issue)
+ [bullseye] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/460
CVE-2024-38949 (Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attacker ...)
- libde265 <unfixed>
+ [bookworm] - libde265 <no-dsa> (Minor issue)
+ [bullseye] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/460
CVE-2024-38527 (ZenUML is JavaScript-based diagramming tool that requires no server, u ...)
NOT-FOR-US: ZenUML
@@ -276,6 +280,8 @@ CVE-2024-6299 (Lack of consideration of key expiry when validating signatures in
NOT-FOR-US: Conduit
CVE-2024-6257 (HashiCorp\u2019s go-getter library can be coerced into executing Git u ...)
- golang-github-hashicorp-go-getter <unfixed>
+ [bookworm] - golang-github-hashicorp-go-getter <no-dsa> (Minor issue)
+ [bullseye] - golang-github-hashicorp-go-getter <no-dsa> (Minor issue)
NOTE: https://discuss.hashicorp.com/t/hcsec-2024-13-hashicorp-go-getter-vulnerable-to-code-execution-on-git-update-via-git-config-manipulation/68081
CVE-2024-6238 (pgAdmin <= 8.8 has an installation Directory permission issue.Because ...)
- pgadmin4 <itp> (bug #834129)
@@ -640,6 +646,8 @@ CVE-2024-6160 (SQL Injection vulnerability in MegaBIP software allows attacker t
NOT-FOR-US: MegaBIP
CVE-2024-6104 (go-retryablehttp prior to 0.7.7 did not sanitize urls when writing the ...)
- golang-github-hashicorp-go-retryablehttp <unfixed>
+ [bookworm] - golang-github-hashicorp-go-retryablehttp <no-dsa> (Minor issue)
+ [bullseye] - golang-github-hashicorp-go-retryablehttp <no-dsa> (Minor issue)
CVE-2024-5862 (Improper Restriction of Excessive Authentication Attempts vulnerabilit ...)
NOT-FOR-US: Mia Technology Inc. Mia-Med Health Aplication
CVE-2024-5683 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
@@ -15656,9 +15664,13 @@ CVE-2024-30268 (Cacti provides an operational monitoring and fault management fr
NOTE: https://github.com/Cacti/cacti/commit/a38b9046e9772612fda847b46308f9391a49891e
CVE-2024-30259 (FastDDS is a C++ implementation of the DDS (Data Distribution Service) ...)
- fastdds 2.14.1+ds-1
+ [bookworm] - fastdds <no-dsa> (Minor issue)
+ [bullseye] - fastdds <no-dsa> (Minor issue)
NOTE: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
CVE-2024-30258 (FastDDS is a C++ implementation of the DDS (Data Distribution Service) ...)
- fastdds 2.14.1+ds-1
+ [bookworm] - fastdds <no-dsa> (Minor issue)
+ [bullseye] - fastdds <no-dsa> (Minor issue)
NOTE: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh
NOTE: https://github.com/eProsima/Fast-DDS/commit/65236f93e9c4ea3ff9a49fba4dfd9e43eb94037b
CVE-2024-29895 (Cacti provides an operational monitoring and fault management framewor ...)
@@ -66821,6 +66833,8 @@ CVE-2023-44487 (The HTTP/2 protocol allows a denial of service (server resource
- jetty9 9.4.53-1
- netty 1:4.1.48-8 (bug #1054234)
- dnsdist 1.8.2-2
+ [bookworm] - dnsdist <no-dsa> (Minor issue)
+ [bullseye] - dnsdist <no-dsa> (Minor issue)
[buster] - dnsdist <not-affected> (HTTP/2 support was added later)
- varnish <unfixed> (bug #1056156)
[bookworm] - varnish <ignored> (Minor issue, too intrusive to backport)
=====================================
data/dsa-needed.txt
=====================================
@@ -14,11 +14,6 @@ If needed, specify the release by adding a slash after the name of the source pa
--
cacti
--
-composer/oldstable (jmm)
- Regression update for #1073931
---
-dnsdist (jmm)
---
dnsmasq
--
frr
@@ -32,8 +27,8 @@ gpac/oldstable
--
h2o (jmm)
--
-libreswan (jmm)
- Maintainer prepared bookworm-security update, but needs work on bullseye-security backports
+libreswan
+ Waiting on feedback from maintainer, proposal to EOL Bullseye
--
linux (carnil)
Wait until more issues have piled up, though try to regulary rebase for point
@@ -45,6 +40,7 @@ nbconvert/oldstable
nodejs (aron)
--
opennds/stable
+ pinged maintainer, but no reply yet. should most probably be bumped to 10.x
--
php-cas/oldstable
--
@@ -61,11 +57,9 @@ python-aiohttp
--
python-asyncssh
--
-ring/oldstable
- might make sense to rebase to current version
+ring
--
ruby2.7/oldstable
- Utkarsh Gupta offered help in preparing updates
--
ruby-nokogiri/oldstable
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ebcf4e1fac473a2b3644d2510dd9f813c925583
--
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0ebcf4e1fac473a2b3644d2510dd9f813c925583
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240627/08c6c749/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list