Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
0cc8fdb0 by Moritz Muehlenhoff at 2024-03-04T19:07:23+01:00
boomworm/bullseye triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -868,6 +868,8 @@ CVE-2024-24818 (EspoCRM is an Open Source Customer
Relationship Management softw
NOT-FOR-US: EspoCRM
CVE-2024-24246 (Heap Buffer Overflow vulnerability in qpdf 11.9.0 allows
attackers to ...)
- qpdf 11.9.0-1
+ [bookworm] - qpdf <no-dsa> (Minor issue)
+ [bullseye] - qpdf <not-affected> (Vulnerable code not present)
[buster] - qpdf <not-affected> (Vulnerable code was introduced later)
NOTE: https://github.com/qpdf/qpdf/issues/1123
NOTE:
https://github.com/qpdf/qpdf/commit/cb0f390cc1f98a8e82b27259f8f3cd5f162992eb
(v11.9.0)
@@ -1446,6 +1448,8 @@ CVE-2023-6922 (The Under Construction / Maintenance Mode
from Acurax plugin for
NOT-FOR-US: WordPress plugin
CVE-2023-6917 (A vulnerability has been identified in the Performance Co-Pilot
(PCP) ...)
- pcp 6.2.0-1
+ [bookworm] - pcp <no-dsa> (Minor issue)
+ [bullseye] - pcp <no-dsa> (Minor issue)
NOTE: https://www.openwall.com/lists/oss-security/2024/02/28/1
NOTE: https://github.com/performancecopilot/pcp/pull/1873
CVE-2023-52226 (Cross-Site Request Forgery (CSRF) vulnerability in Advanced
Flamingo.T ...)
@@ -2577,7 +2581,7 @@ CVE-2024-26606 (In the Linux kernel, the following
vulnerability has been resolv
- linux 6.7.7-1
NOTE:
https://git.kernel.org/linus/97830f3c3088638ff90b20dfba2eb4d487bf14d7 (6.8-rc3)
CVE-2024-27456 (rack-cors (aka Rack CORS Middleware) 2.0.1 has 0666
permissions for th ...)
- - ruby-rack-cors <unfixed> (bug #1064862)
+ - ruby-rack-cors <not-affected> (Only affects the upstream build,
permissions are correct for the deb)
NOTE: https://github.com/cyu/rack-cors/issues/274
CVE-2024-27455 (In the Bentley ALIM Web application, certain configuration
settings ca ...)
NOT-FOR-US: Bentley
@@ -4167,12 +4171,14 @@ CVE-2024-22369 (Deserialization of Untrusted Data
vulnerability in Apache Camel
NOT-FOR-US: Apache Camel
CVE-2024-26328 (An issue was discovered in QEMU 7.1.0 through 8.2.1.
register_vfs in h ...)
- qemu <unfixed>
+ [bookworm] - qemu <no-dsa> (Minor issue)
[bullseye] - qemu <not-affected> (Vulnerable code introduced later)
[buster] - qemu <not-affected> (Vulnerable code introduced later)
NOTE: Introduced by:
https://gitlab.com/qemu-project/qemu/-/commit/7c0fa8dff811b5648964630a1334c3bb97e1e1c6
(v7.0.0-rc0)
NOTE:
https://lore.kernel.org/all/20240213055345-mutt-send-email-mst%40kernel.org
CVE-2024-26327 (An issue was discovered in QEMU 7.1.0 through 8.2.1.
register_vfs in h ...)
- qemu <unfixed>
+ [bookworm] - qemu <no-dsa> (Minor issue)
[bullseye] - qemu <not-affected> (Vulnerable code introduced later)
[buster] - qemu <not-affected> (Vulnerable code introduced later)
NOTE: Introduced by:
https://gitlab.com/qemu-project/qemu/-/commit/7c0fa8dff811b5648964630a1334c3bb97e1e1c6
(v7.0.0-rc0)
@@ -7028,7 +7034,7 @@ CVE-2024-0953 (When a user scans a QR Code with the QR
Code Scanner feature, the
CVE-2024-0323 (Use of a Broken or Risky Cryptographic Algorithm vulnerability
in B&R ...)
NOT-FOR-US: B&R Industrial Automation Automation Runtime (SDM modules)
CVE-2023-7216 (A path traversal vulnerability was found in the CPIO utility.
This iss ...)
- - cpio <unfixed>
+ NOTE: Disputed cpio issue, probably going to be rejected
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2249901
NOTE: Upstream considers it normal behavior:
NOTE: https://lists.gnu.org/archive/html/bug-cpio/2024-03/msg00000.html
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0cc8fdb048ba81319bc478250278b597e95c692d
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0cc8fdb048ba81319bc478250278b597e95c692d
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits