[Git][security-tracker-team/security-tracker][master] trixie/bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Jan 20 11:29:31 GMT 2026
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ab935aa2 by Moritz Muehlenhoff at 2026-01-20T12:29:10+01:00
trixie/bookworm triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4,9 +4,10 @@ CVE-2026-23952
NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/1eefab41bc0ab1c6c2c1fd3e4a49e3ee1849751d (7.1.2-13)
NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick6/commit/0e4023775c8859d2b802e8b459a27b599ca8403a (6.9.13-38)
CVE-2026-23950 (node-tar,a Tar for Node.js, has a race condition vulnerability in vers ...)
- - node-tar <unfixed>
+ - node-tar <unfixed> (unimportant)
NOTE: https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
NOTE: https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6 (v7.5.4)
+ NOTE: Only an issue on case-insensitive filesystems, which are a very poor choice for a Nodejs deployment to begin with
CVE-2026-23949 (jaraco.context, an open-source software package that provides some use ...)
- jaraco.context <unfixed>
NOTE: https://github.com/jaraco/jaraco.context/security/advisories/GHSA-58pv-8j8x-9vj2
@@ -256,34 +257,42 @@ CVE-2025-11043 (An Improper Certificate Validation vulnerability in the OPC-UA c
NOT-FOR-US: ABB group
CVE-2026-23534 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3frr-mp8w-4599
CVE-2026-23533 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-32q9-m5qr-9j2v
CVE-2026-23532 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fq8c-87hj-7gvr
CVE-2026-23531 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xj5h-9cr5-23c5
CVE-2026-23530 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-r4hv-852m-fq7p
CVE-2026-23732 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7qxp-j2fj-c3pp
CVE-2026-23883 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qcrr-85qx-4p6x
CVE-2026-23884 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
- freerdp3 3.21.0+dfsg-1
+ [trixie] - freerdp3 <no-dsa> (Minor issue)
- freerdp2 <removed>
NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cfgj-vc84-f3pp
CVE-2026-23829 (Mailpit is an email testing tool and API for developers. Prior to vers ...)
@@ -249969,6 +249978,7 @@ CVE-2023-42119 (Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerabili
NOTE: Fixed by: https://git.exim.org/exim.git/commitdiff/f6b1f8e7d642f82d830a71b78699a4349e0158e1 (exim-4.96.2)
CVE-2023-42118 (Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. Th ...)
- libspf2 <unfixed> (bug #1053870)
+ [trixie] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
[bookworm] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
[bullseye] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
[buster] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab935aa2d03ee4164a25bd4401565b1325b98296
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab935aa2d03ee4164a25bd4401565b1325b98296
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260120/c613c760/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list