Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3213b35b by Moritz Muehlenhoff at 2024-09-15T12:21:29+02:00
bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -40,6 +40,7 @@ CVE-2024-8797 (The WP Booking System \u2013 Booking Calendar 
plugin for WordPres
        NOT-FOR-US: WordPress plugin
 CVE-2024-8775 (A flaw was found in Ansible, where sensitive information stored 
in Ans ...)
        - ansible-core <unfixed>
+       [bookworm] - ansible-core <no-dsa> (Minor issue)
        - ansible 5.4.0-1
        NOTE: ansible-core was split off from src:ansible with 4.6.0-1 in 
experimental/5.4.0-1 in sid
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2312119
@@ -1468,9 +1469,11 @@ CVE-2024-8601 (This vulnerability exists in TechExcel 
Back Office Software versi
        NOT-FOR-US: TechExcel Back Office Software
 CVE-2024-8373 (Improper sanitization of the value of the [srcset] attribute in 
<sourc ...)
        - angular.js <unfixed>
+       [bookworm] - angular.js <no-dsa> (Minor issue)
        NOTE: 
https://codepen.io/herodevs/full/bGPQgMp/8da9ce87e99403ee13a295c305ebfa0b
 CVE-2024-8372 (Improper sanitization of the value of the '[srcset]' attribute 
in Angu ...)
        - angular.js <unfixed>
+       [bookworm] - angular.js <no-dsa> (Minor issue)
        NOTE: 
https://codepen.io/herodevs/full/xxoQRNL/0072e627abe03e9cda373bc75b4c1017
 CVE-2024-8042 (Rapid7 Insight Platform versions between November 2019 and 
August 14,  ...)
        NOT-FOR-US: Rapid7 Insight Platform
@@ -3702,11 +3705,13 @@ CVE-2024-5991 (In function MatchDomainName(), input 
param str is treated as a NU
        NOTE: https://github.com/wolfSSL/wolfssl/pull/7604
 CVE-2024-5814 (A malicious TLS1.2 server can force a TLS1.3 client with 
downgrade cap ...)
        - wolfssl <unfixed> (bug #1081791)
+       [bookworm] - wolfssl <no-dsa> (Minor issue)
        NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
        NOTE: https://github.com/wolfSSL/wolfssl/pull/7619
        NOTE: https://tches.iacr.org/index.php/TCHES/article/view/11259
 CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error 
attack v ...)
        - wolfssl <unfixed> (bug #1081790)
+       [bookworm] - wolfssl <no-dsa> (Minor issue)
        NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
        NOTE: https://github.com/wolfSSL/wolfssl/pull/7416
 CVE-2024-4872 (The product does not validate any query towards persistent 
data, resul ...)
@@ -14259,6 +14264,7 @@ CVE-2024-6540 (Improper filtering of fields when using 
the export function in th
 CVE-2024-6345 (A vulnerability in the package_index module of pypa/setuptools 
version ...)
        {DLA-3876-1}
        - setuptools 70.3.0-2
+       [bookworm] - setuptools <no-dsa> (Minor issue)
        NOTE: https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5
        NOTE: Fixed by merge: 
https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0
 (v70.0.0)
 CVE-2024-6289 (The WPS Hide Login WordPress plugin before 1.9.16.4 does not 
prevent r ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -35,7 +35,7 @@ nodejs (aron)
 opennds
   pinged maintainer, but no reply yet. should most probably be bumped to 10.x
 --
-php-twig
+php-twig (jmm)
   Maintainer prepared an update and is acked for upload
 --
 python-aiohttp
@@ -44,6 +44,8 @@ python-reportlab
 --
 ring
 --
+ruby-saml
+--
 setuptools
 --
 smarty3



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3213b35b1caf88cc040af84acd3d3ed8b1194572

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3213b35b1caf88cc040af84acd3d3ed8b1194572
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to