[Git][security-tracker-team/security-tracker][master] triage older issues

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Nov 4 08:08:57 GMT 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
aab07c9b by Moritz Muehlenhoff at 2024-11-04T09:08:47+01:00
triage older issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -25631,12 +25631,10 @@ CVE-2024-5964 (The Zenon Lite theme for WordPress is vulnerable to Stored Cross-
 CVE-2024-5726 (The Timeline Event History plugin for WordPress is vulnerable to PHP O ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-41184 (In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived th ...)
-	- keepalived <unfixed> (bug #1077370)
-	[bookworm] - keepalived <no-dsa> (Minor issue)
-	[bullseye] - keepalived <no-dsa> (Minor issue)
+	- keepalived <unfixed> (bug #1077370; unimportant)
 	NOTE: https://github.com/acassen/keepalived/commit/e78513fe0ce5d83c226ea2c0bd222f375c2438e7
 	NOTE: https://github.com/acassen/keepalived/issues/2447#issuecomment-2231329734
-	NOTE: An empty ipset name must be explicitly configured by the user
+	NOTE: An empty ipset name must be explicitly configured by the user, no practical security impact
 CVE-2024-40764 (Heap-based buffer overflow vulnerability in the SonicOS IPSec VPN allo ...)
 	NOT-FOR-US: SonicWall
 CVE-2024-40492 (Cross Site Scripting vulnerability in Heartbeat Chat v.15.2.1 allows a ...)
@@ -64516,7 +64514,7 @@ CVE-2024-2161 (Use of Hard-coded Credentials in Kiloview NDI allows un-authentic
 	NOT-FOR-US: Kiloview
 CVE-2024-29864 (Distrobox before 1.7.0.1 allows attackers to execute arbitrary code vi ...)
 	- distrobox 1.7.0.1-1
-	[bookworm] - distrobox <no-dsa> (Minor issue)
+	[bookworm] - distrobox <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/89luca89/distrobox/issues/1275
 	NOTE: Fixed by: https://github.com/89luca89/distrobox/commit/82a69f0a234e73e447d0ea8c8b3443b84fd31944 (1.7.0.1)
 CVE-2024-29862 (The Kerlink firewall in ChirpStack chirpstack-mqtt-forwarder before 4. ...)
@@ -104989,9 +104987,8 @@ CVE-2023-4520 (The FV Flowplayer Video Player plugin for WordPress is vulnerable
 	NOT-FOR-US: FV Flowplayer Video Player plugin for WordPress
 CVE-2023-4508 (A user able to control file input to Gerbv, between versions 2.4.0 and ...)
 	{DLA-3593-1}
-	- gerbv 2.10.0-1 (bug #1050560)
-	[bookworm] - gerbv <no-dsa> (Minor issue)
-	[bullseye] - gerbv <no-dsa> (Minor issue)
+	- gerbv 2.10.0-1 (bug #1050560; unimportant)
+	NOTE: Crash in CLI tool, no security impact
 	NOTE: https://github.com/gerbv/gerbv/issues/191
 	NOTE: https://github.com/gerbv/gerbv/pull/192
 	NOTE: https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a (v2.10.0-rc.1)
@@ -114348,7 +114345,7 @@ CVE-2023-31671 (PrestaShop postfinance <= 17.1.13 is vulnerable to SQL Injection
 	NOT-FOR-US: PrestaShop postfinance
 CVE-2023-2976 (Use of Java's default temporary directory for file creation in `FileBa ...)
 	- guava-libraries 32.0.1-1 (bug #1038979)
-	[bookworm] - guava-libraries <no-dsa> (Minor issue)
+	[bookworm] - guava-libraries <ignored> (Minor issue, mitigated by kernel tmp hardening)
 	[bullseye] - guava-libraries <no-dsa> (Minor issue)
 	[buster] - guava-libraries <no-dsa> (Minor issue)
 	NOTE: https://github.com/google/guava/releases/tag/v32.0.0
@@ -359474,7 +359471,7 @@ CVE-2020-8909
 	RESERVED
 CVE-2020-8908 (A temp directory creation vulnerability exists in all versions of Guav ...)
 	- guava-libraries 32.0.1-1 (bug #1038979)
-	[bookworm] - guava-libraries <no-dsa> (Minor issue)
+	[bookworm] - guava-libraries <ignored> (Minor issue, mitigated by kernel tmp hardening)
 	[bullseye] - guava-libraries <no-dsa> (Minor issue)
 	[buster] - guava-libraries <no-dsa> (Minor issue)
 	NOTE: https://github.com/google/guava/issues/4011



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aab07c9b203bb197542324fc21d27a528edec89f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aab07c9b203bb197542324fc21d27a528edec89f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241104/24183f4c/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list