[Git][security-tracker-team/security-tracker][master] triage for older issues
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Oct 29 14:10:20 GMT 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3c04f245 by Moritz Muehlenhoff at 2024-10-29T15:09:07+01:00
triage for older issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -66683,7 +66683,7 @@ CVE-2023-47415 (Cypress Solutions CTM-200 v2.7.1.5600 and below was discovered t
NOT-FOR-US: Cypress Solutions CTM-200
CVE-2024-2236 (A timing-based side-channel flaw was found in libgcrypt's RSA implemen ...)
- libgcrypt20 <unfixed> (bug #1065683)
- [bookworm] - libgcrypt20 <no-dsa> (Minor issue)
+ [bookworm] - libgcrypt20 <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - libgcrypt20 <no-dsa> (Minor issue)
[buster] - libgcrypt20 <postponed> (Minor issue; side-channel timing attack)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2268268
@@ -81918,7 +81918,7 @@ CVE-2023-50837 (Improper Neutralization of Special Elements used in an SQL Comma
NOT-FOR-US: WordPress plugin
CVE-2023-50572 (An issue in the component GroovyEngine.execute of jline-groovy v3.24.1 ...)
- jline3 <unfixed> (bug #1059726)
- [bookworm] - jline3 <no-dsa> (Minor issue)
+ [bookworm] - jline3 <ignored> (Minor issue)
[bullseye] - jline3 <no-dsa> (Minor issue)
- jline2 <not-affected> (Only affects 3.x)
- jline <not-affected> (Only affects 3.x)
@@ -114287,7 +114287,7 @@ CVE-2023-32310 (DataEase is an open source data visualization and analysis tool.
NOT-FOR-US: DataEase
CVE-2023-32181 (A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...)
- libeconf 0.5.2+dfsg1-1 (bug #1037333)
- [bookworm] - libeconf <no-dsa> (Minor issue)
+ [bookworm] - libeconf <ignored> (Minor issue, no reverse deps)
[bullseye] - libeconf <no-dsa> (Minor issue)
NOTE: https://github.com/openSUSE/libeconf/issues/178
NOTE: https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19 (v0.5.2)
@@ -139001,7 +139001,7 @@ CVE-2023-24181 (LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovere
NOT-FOR-US: LuCI openwrt
CVE-2023-24180 (Libelfin v0.3 was discovered to contain an integer overflow in the loa ...)
- libelfin <unfixed> (bug #1033741)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
NOTE: https://github.com/aclements/libelfin/issues/75
@@ -143941,7 +143941,7 @@ CVE-2023-22665 (There is insufficient checking of user queries in Apache Jena ve
NOTE: https://lists.apache.org/thread/s0dmpsxcwqs57l4qfs415klkgmhdxq7s
CVE-2023-22652 (A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...)
- libeconf 0.5.2+dfsg1-1 (bug #1037333)
- [bookworm] - libeconf <no-dsa> (Minor issue)
+ [bookworm] - libeconf <ignored> (Minor issue, no reverse deps)
[bullseye] - libeconf <no-dsa> (Minor issue)
NOTE: https://github.com/openSUSE/libeconf/issues/177
NOTE: https://github.com/openSUSE/libeconf/commit/8d086dfc69d4299e55e4844e3573b3a4cf420f19 (v0.5.2)
@@ -318266,7 +318266,7 @@ CVE-2020-24828
RESERVED
CVE-2020-24827 (A vulnerability in the dwarf::cursor::skip_form function of Libelfin v ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
@@ -318274,7 +318274,7 @@ CVE-2020-24827 (A vulnerability in the dwarf::cursor::skip_form function of Libe
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursorskip_form-at-dwarfcursorcc181
CVE-2020-24826 (A vulnerability in the elf::section::as_strtab function of Libelfin v0 ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
@@ -318282,7 +318282,7 @@ CVE-2020-24826 (A vulnerability in the elf::section::as_strtab function of Libel
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-elfsectionas_strtab-at-elfelfcc284
CVE-2020-24825 (A vulnerability in the line_table::line_table function of Libelfin v0. ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
@@ -318290,7 +318290,7 @@ CVE-2020-24825 (A vulnerability in the line_table::line_table function of Libelf
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-line_tableline_table-at-dwarflinecc104
CVE-2020-24824 (A global buffer overflow issue in the dwarf::line_table::line_table fu ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
@@ -318298,7 +318298,7 @@ CVE-2020-24824 (A global buffer overflow issue in the dwarf::line_table::line_ta
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#global-buffer-overflow-in-function-dwarfline_tableline_table-at-dwarflinecc107
CVE-2020-24823 (A vulnerability in the dwarf::to_string function of Libelfin v0.3 allo ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
@@ -318306,7 +318306,7 @@ CVE-2020-24823 (A vulnerability in the dwarf::to_string function of Libelfin v0.
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfto_string-at-dwarfvaluecc300
CVE-2020-24822 (A vulnerability in the dwarf::cursor::uleb function of Libelfin v0.3 a ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
@@ -318314,7 +318314,7 @@ CVE-2020-24822 (A vulnerability in the dwarf::cursor::uleb function of Libelfin
NOTE: https://github.com/xiaoxiongwang/function_bugs/tree/master/libelfin#segv-in-function-dwarfcursoruleb128-at-dwarfinternalhh154
CVE-2020-24821 (A vulnerability in the dwarf::cursor::skip_form function of Libelfin v ...)
- libelfin <unfixed> (bug #1014122)
- [bookworm] - libelfin <no-dsa> (Minor issue)
+ [bookworm] - libelfin <ignored> (Minor issue)
[bullseye] - libelfin <no-dsa> (Minor issue)
[buster] - libelfin <no-dsa> (Minor issue)
[stretch] - libelfin <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3c04f24512c7d42059339c73fbc59ec0da17546f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3c04f24512c7d42059339c73fbc59ec0da17546f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241029/e4e2f89a/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list