[Git][security-tracker-team/security-tracker][master] trixie/bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Tue Jan 20 11:29:31 GMT 2026



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ab935aa2 by Moritz Muehlenhoff at 2026-01-20T12:29:10+01:00
trixie/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -4,9 +4,10 @@ CVE-2026-23952
 	NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/1eefab41bc0ab1c6c2c1fd3e4a49e3ee1849751d (7.1.2-13)
 	NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick6/commit/0e4023775c8859d2b802e8b459a27b599ca8403a (6.9.13-38)
 CVE-2026-23950 (node-tar,a Tar for Node.js, has a race condition vulnerability in vers ...)
-	- node-tar <unfixed>
+	- node-tar <unfixed> (unimportant)
 	NOTE: https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
 	NOTE: https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6 (v7.5.4)
+	NOTE: Only an issue on case-insensitive filesystems, which are a very poor choice for a Nodejs deployment to begin with
 CVE-2026-23949 (jaraco.context, an open-source software package that provides some use ...)
 	- jaraco.context <unfixed>
 	NOTE: https://github.com/jaraco/jaraco.context/security/advisories/GHSA-58pv-8j8x-9vj2
@@ -256,34 +257,42 @@ CVE-2025-11043 (An Improper Certificate Validation vulnerability in the OPC-UA c
 	NOT-FOR-US: ABB group
 CVE-2026-23534 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-3frr-mp8w-4599
 CVE-2026-23533 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-32q9-m5qr-9j2v
 CVE-2026-23532 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fq8c-87hj-7gvr
 CVE-2026-23531 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xj5h-9cr5-23c5
 CVE-2026-23530 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-r4hv-852m-fq7p
 CVE-2026-23732 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7qxp-j2fj-c3pp
 CVE-2026-23883 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qcrr-85qx-4p6x
 CVE-2026-23884 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
 	- freerdp3 3.21.0+dfsg-1
+	[trixie] - freerdp3 <no-dsa> (Minor issue)
 	- freerdp2 <removed>
 	NOTE: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cfgj-vc84-f3pp
 CVE-2026-23829 (Mailpit is an email testing tool and API for developers. Prior to vers ...)
@@ -249969,6 +249978,7 @@ CVE-2023-42119 (Exim dnsdb Out-Of-Bounds Read Information Disclosure Vulnerabili
 	NOTE: Fixed by: https://git.exim.org/exim.git/commitdiff/f6b1f8e7d642f82d830a71b78699a4349e0158e1 (exim-4.96.2)
 CVE-2023-42118 (Exim libspf2 Integer Underflow Remote Code Execution Vulnerability. Th ...)
 	- libspf2 <unfixed> (bug #1053870)
+	[trixie] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
 	[bookworm] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
 	[bullseye] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)
 	[buster] - libspf2 <postponed> (Revisit once upstream and ZDI status is clarfied)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab935aa2d03ee4164a25bd4401565b1325b98296

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ab935aa2d03ee4164a25bd4401565b1325b98296
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260120/c613c760/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list