Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0cc8fdb0 by Moritz Muehlenhoff at 2024-03-04T19:07:23+01:00
boomworm/bullseye triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -868,6 +868,8 @@ CVE-2024-24818 (EspoCRM is an Open Source Customer 
Relationship Management softw
        NOT-FOR-US: EspoCRM
 CVE-2024-24246 (Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows 
attackers to  ...)
        - qpdf 11.9.0-1
+       [bookworm] - qpdf <no-dsa> (Minor issue)
+       [bullseye] - qpdf <not-affected> (Vulnerable code not present)
        [buster] - qpdf <not-affected> (Vulnerable code was introduced later)
        NOTE: https://github.com/qpdf/qpdf/issues/1123
        NOTE: 
https://github.com/qpdf/qpdf/commit/cb0f390cc1f98a8e82b27259f8f3cd5f162992eb 
(v11.9.0)
@@ -1446,6 +1448,8 @@ CVE-2023-6922 (The Under Construction / Maintenance Mode 
from Acurax plugin for
        NOT-FOR-US: WordPress plugin
 CVE-2023-6917 (A vulnerability has been identified in the Performance Co-Pilot 
(PCP)  ...)
        - pcp 6.2.0-1
+       [bookworm] - pcp <no-dsa> (Minor issue)
+       [bullseye] - pcp <no-dsa> (Minor issue)
        NOTE: https://www.openwall.com/lists/oss-security/2024/02/28/1
        NOTE: https://github.com/performancecopilot/pcp/pull/1873
 CVE-2023-52226 (Cross-Site Request Forgery (CSRF) vulnerability in Advanced 
Flamingo.T ...)
@@ -2577,7 +2581,7 @@ CVE-2024-26606 (In the Linux kernel, the following 
vulnerability has been resolv
        - linux 6.7.7-1
        NOTE: 
https://git.kernel.org/linus/97830f3c3088638ff90b20dfba2eb4d487bf14d7 (6.8-rc3)
 CVE-2024-27456 (rack-cors (aka Rack CORS Middleware) 2.0.1 has 0666 
permissions for th ...)
-       - ruby-rack-cors <unfixed> (bug #1064862)
+       - ruby-rack-cors <not-affected> (Only affects the upstream build, 
permissions are correct for the deb)
        NOTE: https://github.com/cyu/rack-cors/issues/274
 CVE-2024-27455 (In the Bentley ALIM Web application, certain configuration 
settings ca ...)
        NOT-FOR-US: Bentley
@@ -4167,12 +4171,14 @@ CVE-2024-22369 (Deserialization of Untrusted Data 
vulnerability in Apache Camel
        NOT-FOR-US: Apache Camel
 CVE-2024-26328 (An issue was discovered in QEMU 7.1.0 through 8.2.1. 
register_vfs in h ...)
        - qemu <unfixed>
+       [bookworm] - qemu <no-dsa> (Minor issue)
        [bullseye] - qemu <not-affected> (Vulnerable code introduced later)
        [buster] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: Introduced by: 
https://gitlab.com/qemu-project/qemu/-/commit/7c0fa8dff811b5648964630a1334c3bb97e1e1c6
 (v7.0.0-rc0)
        NOTE: 
https://lore.kernel.org/all/20240213055345-mutt-send-email-mst%40kernel.org
 CVE-2024-26327 (An issue was discovered in QEMU 7.1.0 through 8.2.1. 
register_vfs in h ...)
        - qemu <unfixed>
+       [bookworm] - qemu <no-dsa> (Minor issue)
        [bullseye] - qemu <not-affected> (Vulnerable code introduced later)
        [buster] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: Introduced by: 
https://gitlab.com/qemu-project/qemu/-/commit/7c0fa8dff811b5648964630a1334c3bb97e1e1c6
 (v7.0.0-rc0)
@@ -7028,7 +7034,7 @@ CVE-2024-0953 (When a user scans a QR Code with the QR 
Code Scanner feature, the
 CVE-2024-0323 (Use of a Broken or Risky Cryptographic Algorithm vulnerability 
in B&R  ...)
        NOT-FOR-US: B&R Industrial Automation Automation Runtime (SDM modules)
 CVE-2023-7216 (A path traversal vulnerability was found in the CPIO utility. 
This iss ...)
-       - cpio <unfixed>
+       NOTE: Disputed cpio issue, probably going to be rejected
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2249901
        NOTE: Upstream considers it normal behavior:
        NOTE: https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0cc8fdb048ba81319bc478250278b597e95c692d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0cc8fdb048ba81319bc478250278b597e95c692d
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to