Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
e66cb2e0 by Moritz Muehlenhoff at 2024-07-28T23:08:47+02:00
more dnsjava issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -50072,6 +50072,9 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS
protocol (in RFC 4033, 4034, 4
[bookworm] - systemd 252.23-1~deb12u1
[bullseye] - systemd <no-dsa> (DNSSEC is disabled by default in
systemd-resolved; can be fixed via point release)
[buster] - systemd <no-dsa> (DNSSEC is disabled by default in
systemd-resolved; can be fixed via point release)
+ - dnsjava <unfixed>
+ [bookworm] - dnsjava <no-dsa> (Minor issue)
+ [bullseye] - dnsjava <no-dsa> (Minor issue)
NOTE: https://kb.isc.org/docs/cve-2023-50387
NOTE:
https://gitlab.isc.org/isc-projects/bind9/-/commit/c12608ca934c0433d280e65fe6c631013e200cfe
(v9.16.48)
NOTE:
https://gitlab.isc.org/isc-projects/bind9/-/commit/751b7cc4750ede6d8c5232751d60aad8ad84aa67
(v9.16.48)
@@ -50100,6 +50103,9 @@ CVE-2023-50387 (Certain DNSSEC aspects of the DNS
protocol (in RFC 4033, 4034, 4
NOTE:
https://github.com/systemd/systemd-stable/commit/7633d969f3422f9ad380a512987d398e54764817
(v252.23)
NOTE:
https://github.com/systemd/systemd-stable/commit/b43bcb51ebf9aea21b1e280e1872056994e3f53d
(v252.23)
NOTE: systemd: DNSSEC is default to off in systemd-resolved
+ NOTE: https://github.com/advisories/GHSA-crjg-w57m-rqqf
+ NOTE:
https://github.com/dnsjava/dnsjava/commit/07ac36a11578cc1bce0cd8ddf2fe568f062aee78
(v3.6.0)
+ NOTE:
https://github.com/dnsjava/dnsjava/commit/3ddc45ce8cdb5c2274e10b7401416f497694e1cf
(v3.6.0)
CVE-2023-50868 (The Closest Encloser Proof aspect of the DNS protocol (in RFC
5155 whe ...)
{DSA-5633-1 DSA-5626-1 DSA-5621-1 DSA-5620-1 DLA-3816-1 DLA-3736-1}
- bind9 1:9.19.21-1
@@ -50114,6 +50120,9 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of
the DNS protocol (in RFC 51
[bookworm] - systemd 252.23-1~deb12u1
[bullseye] - systemd <no-dsa> (DNSSEC is disabled by default in
systemd-resolved; can be fixed via point release)
[buster] - systemd <no-dsa> (DNSSEC is disabled by default in
systemd-resolved; can be fixed via point release)
+ - dnsjava <unfixed>
+ [bookworm] - dnsjava <no-dsa> (Minor issue)
+ [bullseye] - dnsjava <no-dsa> (Minor issue)
NOTE: https://kb.isc.org/docs/cve-2023-50868
NOTE:
https://downloads.isc.org/isc/bind9/9.16.48/patches/0005-CVE-2023-50387-CVE-2023-50868.patch
NOTE:
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
@@ -50143,6 +50152,8 @@ CVE-2023-50868 (The Closest Encloser Proof aspect of
the DNS protocol (in RFC 51
NOTE:
https://github.com/systemd/systemd-stable/commit/7633d969f3422f9ad380a512987d398e54764817
(v252.23)
NOTE:
https://github.com/systemd/systemd-stable/commit/b43bcb51ebf9aea21b1e280e1872056994e3f53d
(v252.23)
NOTE: systemd: DNSSEC is default to off in systemd-resolved
+ NOTE: https://github.com/advisories/GHSA-mmwx-rj87-vfgr
+ NOTE:
https://github.com/dnsjava/dnsjava/commit/711af79be3214f52daa5c846b95766dc0a075116
(v3.6.0)
CVE-2024-25914 (Cross-Site Request Forgery (CSRF) vulnerability in Photoboxone
SMTP Ma ...)
NOT-FOR-US: WordPress plugin
CVE-2024-25643 (The SAP Fiori app (My Overtime Request) - version 605, does
not perfor ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e66cb2e04beae99b034cbee4c044e94df0192af8
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e66cb2e04beae99b034cbee4c044e94df0192af8
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits