Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
41a11235 by security tracker role at 2023-03-13T08:10:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,69 @@
+CVE-2023-28158
+       RESERVED
+CVE-2023-28157
+       RESERVED
+CVE-2023-28156
+       RESERVED
+CVE-2023-28155
+       RESERVED
+CVE-2023-28154 (Webpack 5 before 5.76.0 does not avoid cross-realm object 
access. Impo ...)
+       TODO: check
+CVE-2023-1363 (A vulnerability, which was classified as problematic, was found 
in Sou ...)
+       TODO: check
+CVE-2023-1362 (Improper Restriction of Rendered UI Layers or Frames in GitHub 
reposit ...)
+       TODO: check
+CVE-2023-1361 (SQL Injection in GitHub repository unilogies/bumsys prior to 
v2.0.2. ...)
+       TODO: check
+CVE-2022-48392
+       RESERVED
+CVE-2022-48391
+       RESERVED
+CVE-2022-48390
+       RESERVED
+CVE-2022-48389
+       RESERVED
+CVE-2022-48388
+       RESERVED
+CVE-2022-48387
+       RESERVED
+CVE-2022-48386
+       RESERVED
+CVE-2022-48385
+       RESERVED
+CVE-2022-48384
+       RESERVED
+CVE-2022-48383
+       RESERVED
+CVE-2022-48382
+       RESERVED
+CVE-2022-48381
+       RESERVED
+CVE-2022-48380
+       RESERVED
+CVE-2022-48379
+       RESERVED
+CVE-2022-48378
+       RESERVED
+CVE-2022-48377
+       RESERVED
+CVE-2022-48376
+       RESERVED
+CVE-2022-48375
+       RESERVED
+CVE-2022-48374
+       RESERVED
+CVE-2022-48373
+       RESERVED
+CVE-2022-48372
+       RESERVED
+CVE-2022-48371
+       RESERVED
+CVE-2022-48370
+       RESERVED
+CVE-2022-48369
+       RESERVED
+CVE-2022-48368
+       RESERVED
 CVE-2023-1360 (A vulnerability was found in SourceCodester Employee Payslip 
Generator ...)
        NOT-FOR-US: SourceCodester Employee Payslip Generator with Sending Mail
 CVE-2023-1359 (A vulnerability has been found in SourceCodester Gadget Works 
Online O ...)
@@ -15285,14 +15351,17 @@ CVE-2023-22797 (An open redirect vulnerability is 
fixed in Rails 7.0.4.1 with th
        - rails <not-affected> (Only affects 7.x)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2023-22797-possible-open-redirect-vulnerability-in-action-pack/82120
 CVE-2023-22796 (A regular expression based DoS vulnerability in Active Support 
&lt;6.1 ...)
+       {DSA-5372-1}
        - rails <unfixed> (bug #1030050)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116
        NOTE: 
https://github.com/rails/rails/commit/4b383e6936d7a72b5dc839f526c9a9aeb280acae 
(6-1-stable)
 CVE-2023-22795 (A regular expression based DoS vulnerability in Action 
Dispatch &lt;6. ...)
+       {DSA-5372-1}
        - rails <unfixed> (bug #1030050)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118
        NOTE: 
https://github.com/rails/rails/commit/484fc9185db6c6a6a49ab458b11f9366da02bab2 
(6-1-stable)
 CVE-2023-22794 (A vulnerability in ActiveRecord &lt;6.0.6.1, v6.1.7.1 and 
v7.0.4.1 rel ...)
+       {DSA-5372-1}
        - rails <unfixed> (bug #1030050)
        [buster] - rails <not-affected> (Only affects 6.x and later)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117
@@ -15300,6 +15369,7 @@ CVE-2023-22794 (A vulnerability in ActiveRecord 
&lt;6.0.6.1, v6.1.7.1 and v7.0.4
 CVE-2023-22793
        RESERVED
 CVE-2023-22792 (A regular expression based DoS vulnerability in Action 
Dispatch &lt;6. ...)
+       {DSA-5372-1}
        - rails <unfixed> (bug #1030050)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115
        NOTE: 
https://github.com/rails/rails/commit/7a7f37f146aa977350cf914eba20a95ce371485f 
(6-1-stable)
@@ -58203,10 +58273,10 @@ CVE-2022-34823 (Buffer overflow vulnerability in 
CLUSTERPRO X 5.0 for Windows an
        NOT-FOR-US: CLUSTERPRO and EXPRESSCLUSTER
 CVE-2022-34822 (Path traversal vulnerability in CLUSTERPRO X 5.0 for Windows 
and earli ...)
        NOT-FOR-US: CLUSTERPRO and EXPRESSCLUSTER
-CVE-2022-2259
-       RESERVED
-CVE-2022-2258
-       RESERVED
+CVE-2022-2259 (In affected versions of Octopus Deploy it is possible for a 
user to vi ...)
+       TODO: check
+CVE-2022-2258 (In affected versions of Octopus Deploy it is possible for a 
user to vi ...)
+       TODO: check
 CVE-2022-2257 (Out-of-bounds Read in GitHub repository vim/vim prior to 9.0. 
...)
        - vim 2:9.0.0135-1 (unimportant)
        NOTE: https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
@@ -78591,7 +78661,7 @@ CVE-2022-27778 (A use of incorrectly resolved name 
vulnerability fixed in 7.83.1
        NOTE: https://curl.se/docs/CVE-2022-27778.html
        NOTE: Fixed by: 
https://github.com/curl/curl/commit/8c7ee9083d0d719d0a77ab20d9cc2ae84eeea7f3 
(curl-7_83_1)
 CVE-2022-27777 (A XSS Vulnerability in Action View tag helpers &gt;= 5.2.0 and 
&lt; 5. ...)
-       {DLA-3093-1}
+       {DSA-5372-1 DLA-3093-1}
        - rails 2:6.1.6.1+dfsg-1 (bug #1016982)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2022-27777-possible-xss-vulnerability-in-action-view-tag-helpers/80534
        NOTE: Fixed by: 
https://github.com/rails/rails/commit/123f42a573f7fcbf391885c135ca809f21615180 
(v6.1.5.1)
@@ -90943,7 +91013,7 @@ CVE-2022-23839
 CVE-2022-23838
        RESERVED
 CVE-2022-23837 (In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no 
limit on the ...)
-       {DLA-2943-1}
+       {DLA-3360-1 DLA-2943-1}
        - ruby-sidekiq 6.4.1+dfsg-1 (bug #1004193)
        [bullseye] - ruby-sidekiq <no-dsa> (Minor issue)
        NOTE: 
https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956
 (v6.4.0)
@@ -91528,7 +91598,7 @@ CVE-2022-23634 (Puma is a Ruby/Rack web server built 
for parallelism. Prior to `
        NOTE: 
https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb 
(v5.6.3)
        NOTE: Related issue to CVE-2022-23633 for src:rails
 CVE-2022-23633 (Action Pack is a framework for handling and responding to web 
requests ...)
-       {DLA-3093-1}
+       {DSA-5372-1 DLA-3093-1}
        - rails 2:6.1.4.6+dfsg-1 (bug #1005389)
        NOTE: https://www.openwall.com/lists/oss-security/2022/02/11/5
        NOTE: Fixed by: 
https://github.com/rails/rails/commit/07d9600172a18b45791c89e95a642e13fc367545 
(v6.1.4.5)
@@ -95484,7 +95554,7 @@ CVE-2022-22579 (An information disclosure issue was 
addressed with improved stat
 CVE-2022-22578 (A logic issue was addressed with improved validation. This 
issue is fi ...)
        NOT-FOR-US: Apple
 CVE-2022-22577 (An XSS Vulnerability in Action Pack &gt;= 5.2.0 and &lt; 5.2.0 
that co ...)
-       {DLA-3093-1}
+       {DSA-5372-1 DLA-3093-1}
        - rails 2:6.1.6.1+dfsg-1 (bug #1011941)
        NOTE: 
https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533
        NOTE: 
https://github.com/rails/rails/commit/2b820a2a69fa50cffa74b4aedc57bf92ed6910ec 
(v6.1.5.1)
@@ -101057,7 +101127,7 @@ CVE-2021-44832 (Apache Log4j2 versions 2.0-beta7 
through 2.17.0 (excluding secur
 CVE-2022-21832
        RESERVED
 CVE-2022-21831 (A code injection vulnerability exists in the Active Storage 
&gt;= v5.2 ...)
-       {DLA-3093-1}
+       {DSA-5372-1 DLA-3093-1}
        - rails 2:6.1.4.7+dfsg-1 (bug #1011940)
        NOTE: https://github.com/advisories/GHSA-w749-p3v6-hccq
        NOTE: 
https://github.com/rails/rails/commit/b0b5eaf477c907819ead1808d09bfaae3eb4cc54 
(v6.1.4.7)
@@ -102138,6 +102208,7 @@ CVE-2021-44530 (An injection vulnerability exists in 
a third-party library used
 CVE-2021-44529 (A code injection vulnerability in the Ivanti EPM Cloud 
Services Applia ...)
        NOT-FOR-US: Ivanti
 CVE-2021-44528 (A open redirect vulnerability exists in Action Pack &gt;= 
6.0.0 that c ...)
+       {DSA-5372-1}
        - rails 2:6.1.4.6+dfsg-1 (bug #1001817)
        [buster] - rails <not-affected> (Vulnerable code introduced later)
        [stretch] - rails <not-affected> (Vulnerable code introduced later)
@@ -127082,6 +127153,7 @@ CVE-2021-3640 (A flaw use-after-free in function 
sco_sock_sendmsg() of the Linux
        [bullseye] - linux 5.10.84-1
        NOTE: https://www.openwall.com/lists/oss-security/2021/07/22/1
 CVE-2021-3639 (A flaw was found in mod_auth_mellon where it does not sanitize 
logout  ...)
+       {DLA-3359-1}
        - libapache2-mod-auth-mellon 0.18.0-1 (bug #991730)
        [bullseye] - libapache2-mod-auth-mellon 0.17.0-1+deb11u1
        [stretch] - libapache2-mod-auth-mellon <no-dsa> (Minor issue)
@@ -143139,7 +143211,7 @@ CVE-2021-30152 (An issue was discovered in MediaWiki 
before 1.31.13 and 1.32.x t
        NOTE: https://phabricator.wikimedia.org/T270713
        NOTE: 
https://lists.wikimedia.org/pipermail/wikitech-l/2021-April/094418.html
 CVE-2021-30151 (Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the 
queue n ...)
-       {DLA-2943-1}
+       {DLA-3360-1 DLA-2943-1}
        - ruby-sidekiq 6.3.1+dfsg-1 (bug #987354)
        [bullseye] - ruby-sidekiq <no-dsa> (Minor issue)
        NOTE: https://github.com/mperham/sidekiq/issues/4852
@@ -160805,6 +160877,7 @@ CVE-2021-22944 (A vulnerability found in UniFi 
Protect application V1.18.1 and e
 CVE-2021-22943 (A vulnerability found in UniFi Protect application V1.18.1 and 
earlier ...)
        NOT-FOR-US: UniFi Protect application
 CVE-2021-22942 (A possible open redirect vulnerability in the Host 
Authorization middl ...)
+       {DSA-5372-1}
        [experimental] - rails 2:6.1.4.1+dfsg-1
        - rails 2:6.1.4.1+dfsg-3 (bug #992586)
        [buster] - rails <not-affected> (Vulnerable code not present)
@@ -270805,6 +270878,7 @@ CVE-2019-13040
 CVE-2019-13039
        RESERVED
 CVE-2019-13038 (mod_auth_mellon through 0.14.2 has an Open Redirect via the 
login?Retu ...)
+       {DLA-3359-1}
        - libapache2-mod-auth-mellon 0.15.0-1 (low; bug #931265)
        [stretch] - libapache2-mod-auth-mellon <no-dsa> (Minor issue)
        [jessie] - libapache2-mod-auth-mellon <ignored> (Open Redirect 
protection not implemented yet)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41a1123565dd0e74f49817e29b3207949fdafc45

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/41a1123565dd0e74f49817e29b3207949fdafc45
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to