[Git][security-tracker-team/security-tracker][master] 3 commits: Triage chromium issues as EOL for bullseye

Emilio Pozuelo Monfort (@pochu) pochu at debian.org
Fri Oct 11 12:03:16 BST 2024



Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker


Commits:
450c4c57 by Emilio Pozuelo Monfort at 2024-10-11T13:03:00+02:00
Triage chromium issues as EOL for bullseye

- - - - -
574afb7c by Emilio Pozuelo Monfort at 2024-10-11T13:03:02+02:00
Triage golang-github-containers-buildah issues for bullseye

- - - - -
541069d4 by Emilio Pozuelo Monfort at 2024-10-11T13:03:04+02:00
Triage CVE-2024-45590/node-body-parser for bullseye

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -419,6 +419,7 @@ CVE-2024-9680 (An attacker was able to achieve code execution in the content pro
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-51/
 CVE-2024-9675 (A vulnerability was found in Buildah. Cache mounts do not properly val ...)
 	- golang-github-containers-buildah <unfixed>
+	[bullseye] - golang-github-containers-buildah <postponed> (Minor issue)
 	NOTE: https://phabricator.wikimedia.org/T376886
 CVE-2024-9671 (A vulnerability was found in 3Scale. There is no auth mechanism to see ...)
 	NOT-FOR-US: Red Hat 3scale
@@ -1011,9 +1012,11 @@ CVE-2024-28168 (Improper Restriction of XML External Entity Reference ('XXE') vu
 CVE-2024-9603 (Type Confusion in V8 in Google Chrome prior to 129.0.6668.100 allowed  ...)
 	{DSA-5787-1}
 	- chromium 129.0.6668.100-1
+	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2024-9602 (Type Confusion in V8 in Google Chrome prior to 129.0.6668.100 allowed  ...)
 	{DSA-5787-1}
 	- chromium 129.0.6668.100-1
+	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2024-9622 (A vulnerability was found in the resteasy-netty4 library arising from  ...)
 	NOT-FOR-US: resteasy-netty4
 CVE-2024-9621 (A vulnerability was found in Quarkus CXF. Passwords and other secrets  ...)
@@ -2146,6 +2149,7 @@ CVE-2024-XXXX [znuny zsa-2024-04]
 	NOTE: https://www.znuny.org/en/advisories/zsa-2024-04
 CVE-2024-9407 (A vulnerability exists in the bind-propagation option of the Dockerfil ...)
 	- golang-github-containers-buildah <unfixed>
+	[bullseye] - golang-github-containers-buildah <postponed> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2315887
 CVE-2024-9333 (Permissions bypass in M-Files Connector for Copilot before version 24. ...)
 	NOT-FOR-US: M-Files
@@ -6557,6 +6561,7 @@ CVE-2024-45591 (XWiki Platform is a generic wiki platform. The REST API exposes
 CVE-2024-45590 (body-parser is Node.js body parsing middleware. body-parser <1.20.3 is ...)
 	- node-body-parser 1.20.3+~1.19.5-1 (bug #1081657)
 	[bookworm] - node-body-parser <no-dsa> (Minor issue)
+	[bullseye] - node-body-parser <postponed> (Minor issue)
 	NOTE: https://github.com/expressjs/body-parser/security/advisories/GHSA-qwcr-r2fm-qrc7
 	NOTE: https://github.com/expressjs/body-parser/commit/b2695c4450f06ba3b0ccf48d872a229bb41c9bce (1.20.3)
 CVE-2024-45412 (Yeti bridges the gap between CTI and DFIR practitioners by providing a ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/8a451a99283db6009add6c1d54794bc45cd297f1...541069d451b8a9a0a83c32b46ef05d67e5081aec

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/8a451a99283db6009add6c1d54794bc45cd297f1...541069d451b8a9a0a83c32b46ef05d67e5081aec
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241011/af3c6943/attachment.htm>


More information about the debian-security-tracker-commits mailing list