[Git][security-tracker-team/security-tracker][master] boomworm/bullseye triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Mar 4 18:07:56 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0cc8fdb0 by Moritz Muehlenhoff at 2024-03-04T19:07:23+01:00
boomworm/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -868,6 +868,8 @@ CVE-2024-24818 (EspoCRM is an Open Source Customer Relationship Management softw
 	NOT-FOR-US: EspoCRM
 CVE-2024-24246 (Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows attackers to  ...)
 	- qpdf 11.9.0-1
+	[bookworm] - qpdf <no-dsa> (Minor issue)
+	[bullseye] - qpdf <not-affected> (Vulnerable code not present)
 	[buster] - qpdf <not-affected> (Vulnerable code was introduced later)
 	NOTE: https://github.com/qpdf/qpdf/issues/1123
 	NOTE: https://github.com/qpdf/qpdf/commit/cb0f390cc1f98a8e82b27259f8f3cd5f162992eb (v11.9.0)
@@ -1446,6 +1448,8 @@ CVE-2023-6922 (The Under Construction / Maintenance Mode from Acurax plugin for
 	NOT-FOR-US: WordPress plugin
 CVE-2023-6917 (A vulnerability has been identified in the Performance Co-Pilot (PCP)  ...)
 	- pcp 6.2.0-1
+	[bookworm] - pcp <no-dsa> (Minor issue)
+	[bullseye] - pcp <no-dsa> (Minor issue)
 	NOTE: https://www.openwall.com/lists/oss-security/2024/02/28/1
 	NOTE: https://github.com/performancecopilot/pcp/pull/1873
 CVE-2023-52226 (Cross-Site Request Forgery (CSRF) vulnerability in Advanced Flamingo.T ...)
@@ -2577,7 +2581,7 @@ CVE-2024-26606 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/97830f3c3088638ff90b20dfba2eb4d487bf14d7 (6.8-rc3)
 CVE-2024-27456 (rack-cors (aka Rack CORS Middleware) 2.0.1 has 0666 permissions for th ...)
-	- ruby-rack-cors <unfixed> (bug #1064862)
+	- ruby-rack-cors <not-affected> (Only affects the upstream build, permissions are correct for the deb)
 	NOTE: https://github.com/cyu/rack-cors/issues/274
 CVE-2024-27455 (In the Bentley ALIM Web application, certain configuration settings ca ...)
 	NOT-FOR-US: Bentley
@@ -4167,12 +4171,14 @@ CVE-2024-22369 (Deserialization of Untrusted Data vulnerability in Apache Camel
 	NOT-FOR-US: Apache Camel
 CVE-2024-26328 (An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in h ...)
 	- qemu <unfixed>
+	[bookworm] - qemu <no-dsa> (Minor issue)
 	[bullseye] - qemu <not-affected> (Vulnerable code introduced later)
 	[buster] - qemu <not-affected> (Vulnerable code introduced later)
 	NOTE: Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/7c0fa8dff811b5648964630a1334c3bb97e1e1c6 (v7.0.0-rc0)
 	NOTE: https://lore.kernel.org/all/20240213055345-mutt-send-email-mst%40kernel.org
 CVE-2024-26327 (An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in h ...)
 	- qemu <unfixed>
+	[bookworm] - qemu <no-dsa> (Minor issue)
 	[bullseye] - qemu <not-affected> (Vulnerable code introduced later)
 	[buster] - qemu <not-affected> (Vulnerable code introduced later)
 	NOTE: Introduced by: https://gitlab.com/qemu-project/qemu/-/commit/7c0fa8dff811b5648964630a1334c3bb97e1e1c6 (v7.0.0-rc0)
@@ -7028,7 +7034,7 @@ CVE-2024-0953 (When a user scans a QR Code with the QR Code Scanner feature, the
 CVE-2024-0323 (Use of a Broken or Risky Cryptographic Algorithm vulnerability in B&R  ...)
 	NOT-FOR-US: B&R Industrial Automation Automation Runtime (SDM modules)
 CVE-2023-7216 (A path traversal vulnerability was found in the CPIO utility. This iss ...)
-	- cpio <unfixed>
+	NOTE: Disputed cpio issue, probably going to be rejected
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2249901
 	NOTE: Upstream considers it normal behavior:
 	NOTE: https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0cc8fdb048ba81319bc478250278b597e95c692d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0cc8fdb048ba81319bc478250278b597e95c692d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240304/159919c6/attachment.htm>


More information about the debian-security-tracker-commits mailing list