Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
c394357e by Moritz Muehlenhoff at 2024-08-09T07:43:21+02:00
bookworm/bullseye triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -76,6 +76,7 @@ CVE-2024-42001 (An improper authentication vulnerability 
affecting Vonets
        NOT-FOR-US: Vonets industrial wifi bridge relays and wifi bridge 
repeaters
 CVE-2024-41942 (JupyterHub is software that allows one to create a multi-user 
server f ...)
        - jupyterhub <unfixed>
+       [bookworm] - jupyterhub <no-dsa> (Minor issue)
        NOTE: 
https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-9x4q-3gxw-849f
        NOTE: 
https://github.com/jupyterhub/jupyterhub/commit/99e2720b0fc626cbeeca3c6337f917fdacfaa428
 (4.1.6)
        NOTE: 
https://github.com/jupyterhub/jupyterhub/commit/ff2db557a85b6980f90c3158634bf924063ab8ba
 (5.1.0)
@@ -903,36 +904,58 @@ CVE-2023-5000 (The Horizontal scrolling announcements 
plugin for WordPress is vu
        NOT-FOR-US: WordPress plugin
 CVE-2024-7547 (oFono SMS Decoder Stack-based Buffer Overflow Privilege 
Escalation Vul ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1087/
 CVE-2024-7546 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1086/
 CVE-2024-7545 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1085/
 CVE-2024-7544 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1084/
 CVE-2024-7543 (oFono SimToolKit Heap-based Buffer Overflow Privilege 
Escalation Vulne ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1083/
 CVE-2024-7542 (oFono AT CMGR Command Uninitialized Variable Information 
Disclosure Vu ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1082/
 CVE-2024-7541 (oFono AT CMT Command Uninitialized Variable Information 
Disclosure Vul ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1081/
 CVE-2024-7540 (oFono AT CMGL Command Uninitialized Variable Information 
Disclosure Vu ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1080/
 CVE-2024-7539 (oFono CUSD Stack-based Buffer Overflow Code Execution 
Vulnerability. T ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1079/
 CVE-2024-7538 (oFono CUSD AT Command Stack-based Buffer Overflow Code 
Execution Vulne ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1078/
 CVE-2024-7537 (oFono QMI SMS Handling Out-Of-Bounds Read Information 
Disclosure Vulne ...)
        - ofono <unfixed>
+       [bookworm] - ofono <postponed> (Revisit when/if fixed upstream)
+       [bullseye] - ofono <postponed> (Revisit when/if fixed upstream)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-24-1077/
 CVE-2024-7006 [NULL pointer dereference in tif_dirinfo.c]
        - tiff <unfixed>
@@ -1053,6 +1076,8 @@ CVE-2023-31355 (Improper restriction of write operations 
in SNP firmware could a
        NOT-FOR-US: AMD
 CVE-2024-7383 (A flaw was found in libnbd. The client did not always correctly 
verify ...)
        - libnbd 1.20.2-1
+       [bookworm] - libnbd <no-dsa> (Minor issue)
+       [bullseye] - libnbd <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2302865
        NOTE: 
https://lists.libguestfs.org/archives/list/guestfs%40lists.libguestfs.org/message/LHR3BW6RJ7K4BJBQIYV3GTZLSY27VZO2/
        NOTE: Fixed by: 
https://gitlab.com/nbdkit/libnbd/-/commit/87ef41b69929d5d293390ec36b1c10aba2c9a57a
 (v1.20.2)
@@ -32662,6 +32687,8 @@ CVE-2024-28627 (An issue in Flipsnack v.18/03/2024 
allows a local attacker to ob
 CVE-2024-28130 (An incorrect type conversion vulnerability exists in the 
DVPSSoftcopyV ...)
        {DLA-3847-1}
        - dcmtk 3.6.7-14 (bug #1070207)
+       [bookworm] - dcmtk <no-dsa> (Minor issue)
+       [bullseye] - dcmtk <no-dsa> (Minor issue)
        NOTE: 
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1957
        NOTE: https://support.dcmtk.org/redmine/issues/1120
        NOTE: 
https://github.com/DCMTK/dcmtk/commit/dc6a2446dc03c9db90f82ce17a597f2cd53776c5


=====================================
data/dsa-needed.txt
=====================================
@@ -66,9 +66,9 @@ php-horde-mime-viewer/oldstable
 --
 php-horde-turba/oldstable
 --
-postgresql-13/oldstable
+postgresql-13/oldstable (jmm)
 --
-postgresql-15/stable
+postgresql-15/stable (jmm)
 --
 pymatgen/stable
 --



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c394357e8887a252f1165f22ac27ebb4884cf881

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c394357e8887a252f1165f22ac27ebb4884cf881
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to