[Git][security-tracker-team/security-tracker][master] triage older issues
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Nov 20 20:11:20 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a44abfbd by Moritz Muehlenhoff at 2024-11-20T21:10:49+01:00
triage older issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3451,25 +3451,19 @@ CVE-2024-10314 (In Helix Core versions prior to 2024.2, an unauthenticated remot
CVE-2024-10179 (The Slickstream: Engagement and Conversions plugin for WordPress is vu ...)
NOT-FOR-US: WordPress plugin
CVE-2024-49395 (In mutt and neomutt, PGP encryption does not use the --hidden-recipien ...)
- - mutt <unfixed>
- [bookworm] - mutt <no-dsa> (Minor issue)
- [bullseye] - mutt <postponed> (Minor issue; upstream won't fix)
- - neomutt <unfixed>
- [bookworm] - neomutt <no-dsa> (Minor issue)
- [bullseye] - neomutt <postponed> (Minor issue, infoleak)
+ - mutt <unfixed> (unimportant)
+ - neomutt <unfixed> (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2325332
NOTE: https://gitlab.com/muttmua/mutt/-/issues/490
NOTE: Mutt project does not plan to address CVE-2024-49393, CVE-2024-49394, CVE-2024-49395
NOTE: cf. https://gitlab.com/muttmua/mutt/-/issues/490#note_2209448655 . Issues with documented
NOTE: through http://mutt.org/doc/manual/#crypt-protected-headers-read
NOTE: https://github.com/neomutt/neomutt/issues/4234
+ NOTE: These are longstanding limitations of PGP-encrypted mail and rather enhancements
+ NOTE: than actual vulnerabilities
CVE-2024-49394 (In mutt and neomutt the In-Reply-To email header field is not protecte ...)
- - mutt <unfixed>
- [bookworm] - mutt <no-dsa> (Minor issue)
- [bullseye] - mutt <postponed> (Minor issue; upstream won't fix)
- - neomutt 20241002+dfsg-1
- [bookworm] - neomutt <no-dsa> (Minor issue)
- [bullseye] - neomutt <postponed> (Minor issue)
+ - mutt <unfixed> (unimportant)
+ - neomutt 20241002+dfsg-1 (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2325330
NOTE: https://gitlab.com/muttmua/mutt/-/issues/490
NOTE: Mutt project does not plan to address CVE-2024-49393, CVE-2024-49394, CVE-2024-49395
@@ -3478,13 +3472,11 @@ CVE-2024-49394 (In mutt and neomutt the In-Reply-To email header field is not pr
NOTE: https://github.com/neomutt/neomutt/issues/4226
NOTE: Protected since: https://github.com/neomutt/neomutt/commit/13cfc6f98322eafdc30ecc4c15999d401950a1d9 (20241002)
NOTE: Reading protected value since: https://github.com/neomutt/neomutt/commit/ec02b141983c70ae7ebee0cdfba59e90a825f0cc (20241002)
+ NOTE: These are longstanding limitations of PGP-encrypted mail and rather enhancements
+ NOTE: than actual vulnerabilities
CVE-2024-49393 (In neomutt and mutt, the To and Cc email headers are not validated by ...)
- - mutt <unfixed>
- [bookworm] - mutt <no-dsa> (Minor issue)
- [bullseye] - mutt <postponed> (Minor issue; upstream won't fix)
- - neomutt 20241002+dfsg-1
- [bookworm] - neomutt <no-dsa> (Minor issue)
- [bullseye] - neomutt <postponed> (Minor issue)
+ - mutt <unfixed> (unimportant)
+ - neomutt 20241002+dfsg-1 (unimportant)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2325317
NOTE: https://gitlab.com/muttmua/mutt/-/issues/490
NOTE: Mutt project does not plan to address CVE-2024-49393, CVE-2024-49394, CVE-2024-49395
@@ -49882,13 +49874,13 @@ CVE-2024-36050 (Nix through 2.22.1 mishandles certain usage of hash caches, whic
NOTE: https://github.com/NixOS/ofborg/issues/68#issuecomment-2082789441
CVE-2024-36048 (QAbstractOAuth in Qt Network Authorization in Qt before 5.15.17, 6.x b ...)
- qtnetworkauth-everywhere-src 5.15.13-3 (bug #1071974)
- [bookworm] - qtnetworkauth-everywhere-src <no-dsa> (Minor issue)
+ [bookworm] - qtnetworkauth-everywhere-src <ignored> (Minor issue)
[bullseye] - qtnetworkauth-everywhere-src <no-dsa> (Minor issue)
[buster] - qtnetworkauth-everywhere-src <postponed> (Minor issue)
- - qt6-networkauth <unfixed> (bug #1071973)
- [bookworm] - qt6-networkauth <no-dsa> (Minor issue)
- NOTE: https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317
- NOTE: https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368
+ - qt6-networkauth 6.7.2-2 (bug #1071973)
+ [bookworm] - qt6-networkauth <ignored> (Minor issue)
+ NOTE: https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317 (security fix)
+ NOTE: https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368 (followup/finetuning)
CVE-2024-28064 (Kiteworks Totemomail 7.x and 8.x before 8.3.0 allows /responsiveUI/Env ...)
NOT-FOR-US: Kiteworks Totemomail
CVE-2024-28063 (Kiteworks Totemomail through 7.0.0 allows /responsiveUI/EnvelopeOpenSe ...)
@@ -95496,7 +95488,7 @@ CVE-2023-6070 (A server-side request forgery vulnerability in ESM prior to versi
CVE-2023-49091 (Cosmos provides users the ability self-host a home server by acting as ...)
NOT-FOR-US: Cosmos
CVE-2023-49090 (CarrierWave is a solution for file uploads for Rails, Sinatra and othe ...)
- - ruby-carrierwave <unfixed> (bug #1068150)
+ - ruby-carrierwave 3.0.7-1 (bug #1068150)
[bookworm] - ruby-carrierwave <no-dsa> (Minor issue)
[buster] - ruby-carrierwave <postponed> (Minor issue)
NOTE: https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-gxhx-g4fq-49hj
@@ -177195,7 +177187,7 @@ CVE-2020-36604 (hoek before 8.5.1 and 9.x before 9.0.3 allows prototype poisonin
NOTE: Fixed by: https://github.com/hapijs/hoek/commit/948baf98634a5c206875b67d11368f133034fa90 (v9.0.3)
CVE-2022-3276 (Command injection is possible in the puppetlabs-mysql module prior to ...)
- puppet-module-puppetlabs-mysql 15.0.0-1 (bug #1027154)
- [bookworm] - puppet-module-puppetlabs-mysql <no-dsa> (Minor issue)
+ [bookworm] - puppet-module-puppetlabs-mysql <ignored> (Minor issue)
[bullseye] - puppet-module-puppetlabs-mysql <no-dsa> (Minor issue)
[buster] - puppet-module-puppetlabs-mysql <no-dsa> (Minor issue)
NOTE: https://puppet.com/security/cve/CVE-2022-3276
@@ -518563,7 +518555,7 @@ CVE-2017-1000048 (the web framework using ljharb's qs module older than v6.3.2,
NOT-FOR-US: ljharb
CVE-2017-1000047 (rbenv (all current versions) is vulnerable to Directory Traversal in t ...)
- rbenv <unfixed> (bug #869702)
- [bookworm] - rbenv <no-dsa> (Minor issue)
+ [bookworm] - rbenv <ignored> (Minor issue)
[bullseye] - rbenv <no-dsa> (Minor issue)
[buster] - rbenv <no-dsa> (Minor issue)
[stretch] - rbenv <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a44abfbd742bc216a56297da42fa766a73c1b2e5
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a44abfbd742bc216a56297da42fa766a73c1b2e5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241120/7d41dca9/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list