[Git][security-tracker-team/security-tracker][master] Reserve DSA-5845-1 for tomcat10

Markus Koschany (@apo) apo at debian.org
Fri Jan 17 16:08:58 GMT 2025



Markus Koschany pushed to branch master at Debian Security Tracker / security-tracker


Commits:
343d4e83 by Markus Koschany at 2025-01-17T17:08:20+01:00
Reserve DSA-5845-1 for tomcat10

- - - - -


2 changed files:

- data/CVE/list
- data/DSA/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -8255,7 +8255,6 @@ CVE-2024-56348 (In JetBrains TeamCity before 2024.12 improper access control all
 CVE-2024-56337 (Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apa ...)
 	{DLA-4017-1}
 	- tomcat10 10.1.34-1
-	[bookworm] - tomcat10 <no-dsa> (Minor issue)
 	- tomcat9 9.0.70-2
 	NOTE: Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
 	NOTE: https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp
@@ -8885,7 +8884,6 @@ CVE-2024-55496 (A vulnerability has been found in the 1000projects Bookstore Man
 	NOT-FOR-US: 1000projects Bookstore Management System PHP MySQL Project
 CVE-2024-54677 (Uncontrolled Resource Consumption vulnerability in the examples web ap ...)
 	- tomcat10 10.1.34-1
-	[bookworm] - tomcat10 <no-dsa> (Minor issue)
 	- tomcat9 9.0.70-2
 	[bullseye] - tomcat9 <ignored> (Minor issue)
 	NOTE: Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
@@ -8918,7 +8916,6 @@ CVE-2024-51479 (Next.js is a React framework for building full-stack web applica
 CVE-2024-50379 (Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during ...)
 	{DLA-4017-1}
 	- tomcat10 10.1.34-1
-	[bookworm] - tomcat10 <no-dsa> (Minor issue)
 	- tomcat9 9.0.70-2
 	NOTE: Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
 	NOTE: https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r
@@ -17510,7 +17507,6 @@ CVE-2024-52317 (Incorrect object re-cycling and re-use vulnerability in Apache T
 CVE-2024-52316 (Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is ...)
 	{DLA-4017-1}
 	- tomcat10 10.1.31-1
-	[bookworm] - tomcat10 <postponed> (Minor issue, fixed along in next DSA)
 	- tomcat9 9.0.70-2
 	NOTE: https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928
 	NOTE: https://github.com/apache/tomcat/commit/acc2f01395f895980f5d8a64573fcc1bade13369 (10.1.31)
@@ -52757,7 +52753,6 @@ CVE-2024-35227 (Discourse is an open-source discussion platform. Prior to versio
 CVE-2024-38286 (Allocation of Resources Without Limits or Throttling vulnerability in  ...)
 	{DLA-4017-1}
 	- tomcat10 10.1.25-1
-	[bookworm] - tomcat10 <postponed> (Minor issue, fixed along in next DSA)
 	- tomcat9 9.0.70-2
 	NOTE: https://lists.apache.org/thread/wms60cvbsz3fpbz9psxtfx8r41jl6d4s
 	NOTE: https://github.com/apache/tomcat/commit/3344c17cef094da4bb616f4186ed32039627b543 (10.1.25)
@@ -52765,7 +52760,6 @@ CVE-2024-38286 (Allocation of Resources Without Limits or Throttling vulnerabili
 	NOTE: Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
 CVE-2024-34750 (Improper Handling of Exceptional Conditions, Uncontrolled Resource Con ...)
 	- tomcat10 10.1.25-1
-	[bookworm] - tomcat10 <postponed> (Minor issue, fixed along in next DSA)
 	- tomcat9 9.0.70-2
 	[bullseye] - tomcat9 <postponed> (Minor issue, fixed along in next DSA)
 	NOTE: https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l


=====================================
data/DSA/list
=====================================
@@ -1,3 +1,6 @@
+[17 Jan 2025] DSA-5845-1 tomcat10 - security update
+	{CVE-2024-34750 CVE-2024-38286 CVE-2024-50379 CVE-2024-52316 CVE-2024-54677 CVE-2024-56337}
+	[bookworm] - tomcat10 10.1.34-0+deb12u1
 [16 Jan 2025] DSA-5843-2 rsync - regression update
 	[bookworm] - rsync 3.2.7-1+deb12u2
 [15 Jan 2025] DSA-5844-1 chromium - security update



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/343d4e831e3d5f01b0ae8a964332296247593555

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/343d4e831e3d5f01b0ae8a964332296247593555
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250117/e766a4e3/attachment.htm>


More information about the debian-security-tracker-commits mailing list