Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3602e8ab by Moritz Muehlenhoff at 2023-06-29T13:25:23+02:00
bookworm/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -121,7 +121,10 @@ CVE-2023-3327
        REJECTED
 CVE-2023-36464 (pypdf is an open source, pure-python PDF library. In affected 
versions ...)
        - pypdf <unfixed>
+       [bookworm] - pypdf <no-dsa> (Minor issue)
        - pypdf2 <unfixed>
+       [bookworm] - pypdf2 <no-dsa> (Minor issue)
+       [bullseye] - pypdf2 <no-dsa> (Minor issue)
        NOTE: https://github.com/py-pdf/pypdf/pull/969
        NOTE: https://github.com/py-pdf/pypdf/pull/1828
        NOTE: 
https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8
@@ -139,6 +142,8 @@ CVE-2023-3355 (A NULL pointer dereference flaw was found in 
the Linux kernel's d
        NOTE: 
https://git.kernel.org/linus/d839f0811a31322c087a859c2b181e2383daa7be (6.3-rc1)
 CVE-2023-3354 [VNC: improper I/O watch removal in TLS handshake can lead to 
remote unauthenticated denial of service]
        - qemu <unfixed>
+       [bookworm] - qemu <no-dsa> (Minor issue)
+       [bullseye] - qemu <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2216478
        TODO: check, no details in RHBZ#2216478 on upstream status
 CVE-2023-3432 (Server-Side Request Forgery (SSRF) in GitHub repository 
plantuml/plant ...)
@@ -18867,6 +18872,8 @@ CVE-2023-26966
        RESERVED
 CVE-2023-26965 (loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a 
heap-ba ...)
        - tiff 4.5.1~rc3-1
+       [bookworm] - tiff <no-dsa> (Minor issue)
+       [bullseye] - tiff <no-dsa> (Minor issue)
        NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/472
        NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/ec8ef90c1f573c9eb1f17d6a056aa0015f184acf
 (v4.5.1rc1)
 CVE-2023-26964 (An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream 
stacking occ ...)
@@ -23446,10 +23453,14 @@ CVE-2023-25436
        RESERVED
 CVE-2023-25435 (libtiff 4.5.0 is vulnerable to Buffer Overflow via 
extractContigSample ...)
        - tiff 4.5.1~rc3-1
+       [bookworm] - tiff <no-dsa> (Minor issue)
+       [bullseye] - tiff <no-dsa> (Minor issue)
        NOTE: https://gitlab.com/libtiff/libtiff/-/issues/518
        NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/69818e2f2d246e6631ac2a2da692c3706b849c38
 (v4.5.1rc1)
 CVE-2023-25434 (libtiff 4.5.0 is vulnerable to Buffer Overflow via 
extractContigSample ...)
        - tiff 4.5.1~rc3-1
+       [bookworm] - tiff <no-dsa> (Minor issue)
+       [bullseye] - tiff <no-dsa> (Minor issue)
        NOTE: https://gitlab.com/libtiff/libtiff/-/issues/519
        NOTE: 
https://gitlab.com/libtiff/libtiff/-/commit/69818e2f2d246e6631ac2a2da692c3706b849c38
 (v4.5.1rc1)
 CVE-2023-25433
@@ -130104,6 +130115,7 @@ CVE-2021-41804
        RESERVED
 CVE-2021-41803 (HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not 
properl ...)
        - consul <unfixed> (bug #1034841)
+       [bullseye] - consul <no-dsa> (Minor issue)
        [buster] - consul <not-affected> (Vulnerable Code not present)
        NOTE: 
https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627
        NOTE: 
https://github.com/hashicorp/consul/commit/34872682e44f6e7e6359c88bf9e333fa1002a99b
 (v1.11.9)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3602e8abefb17ee10f1f754326b2e265362e19d0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3602e8abefb17ee10f1f754326b2e265362e19d0
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to