Tobias Frost pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
2e69c720 by Tobias Frost at 2024-10-03T19:13:24+02:00
Reserve DLA-3909-1 for zabbix
- - - - -
3 changed files:
- data/CVE/list
- data/DLA/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -88448,7 +88448,6 @@ CVE-2023-32723 (Request to LDAP is sent before user
permissions are checked.)
CVE-2023-32722 (The zabbix/src/libs/zbxjson module is vulnerable to a buffer
overflow ...)
- zabbix 1:6.0.23+dfsg-1 (bug #1053877)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
[buster] - zabbix <not-affected> (vulnerable code introduced later)
NOTE: https://support.zabbix.com/browse/ZBX-23390
NOTE: fixed by
https://github.com/zabbix/zabbix/commit/5310e1e011dbb81397a3ab0d6586d597ff7e5599
(7.0.0alpha4)
@@ -88457,7 +88456,6 @@ CVE-2023-32721 (A stored XSS has been found in the
Zabbix web application in the
{DLA-3717-1}
- zabbix 1:6.0.23+dfsg-1 (bug #1053877)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-23389
NOTE: possible upstream fix (4.0.x)
https://github.com/zabbix/zabbix/commit/d05854bc0e638bbc0c2077ded09797648dba0911
CVE-2023-5535 (Use After Free in GitHub repository vim/vim prior to v9.0.2010.)
@@ -114761,7 +114759,6 @@ CVE-2023-29459 (The laola.redbull application through
5.1.9-R for Android expose
CVE-2023-29458 (Duktape is an 3rd-party embeddable JavaScript engine, with a
focus on ...)
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
[buster] - zabbix <not-affected> (vulnerable code introduced later)
NOTE: This appears to be bug in Zabbix's use of duktape, not an issue
in src:duktape per se
NOTE: https://support.zabbix.com/browse/ZBX-22989
@@ -114770,25 +114767,21 @@ CVE-2023-29457 (Reflected XSS attacks, occur when a
malicious script is reflecte
{DLA-3538-1}
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22988
CVE-2023-29456 (URL validation scheme receives input from a user and then
parses it to ...)
{DLA-3538-1}
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22987
CVE-2023-29455 (Reflected XSS attacks, also known as non-persistent attacks,
occur whe ...)
{DLA-3538-1}
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22986
CVE-2023-29454 (Stored or persistent cross-site scripting (XSS) is a type of
XSS where ...)
{DLA-3538-1}
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22985
CVE-2023-29453 (Templates do not properly consider backticks (`) as Javascript
string ...)
- zabbix 1:6.0.23+dfsg-1 (unimportant)
@@ -114811,14 +114804,12 @@ CVE-2023-29450 (JavaScript pre-processing can be
used by the attacker to gain ac
{DLA-3538-1}
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22588
NOTE: Patch for 5.0.32rc1:
https://github.com/zabbix/zabbix/commit/c3f1543e4
NOTE: Patch for 6.0.14rc2:
https://github.com/zabbix/zabbix/commit/76f6a80cb
CVE-2023-29449 (JavaScript preprocessing, webhooks and global scripts can
cause uncont ...)
- zabbix 1:6.0.23+dfsg-1 (bug #1055175)
[bookworm] - zabbix <no-dsa> (Minor issue)
- [bullseye] - zabbix <no-dsa> (Minor issue)
[buster] - zabbix <not-affected> (vulnerable code introduced later)
NOTE: https://support.zabbix.com/browse/ZBX-22589
NOTE: Upstream patch for 5.0.32:
https://github.com/zabbix/zabbix/commit/e90b8a3c62
@@ -155865,7 +155856,6 @@ CVE-2022-43516 (A Firewall Rule which allows all
incoming TCP connections to all
CVE-2022-43515 (Zabbix Frontend provides a feature that allows admins to
maintain the ...)
{DLA-3538-1}
- zabbix 1:6.0.13+dfsg-1 (bug #1026847)
- [bullseye] - zabbix <ignored> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-22050
NOTE: Fixed by:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/aa58889ba54b2350e211a5f315baabbaf7228045
(4.0.45rc1)
NOTE: Fixed by:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/50668e9d64af32cdc67a45082c556699ff86565e
(5.0.30rc1)
@@ -178606,14 +178596,12 @@ CVE-2022-35230 (An authenticated user can create a
link with reflected Javascrip
{DLA-3390-1}
[experimental] - zabbix 1:6.0.6+dfsg-1
- zabbix 1:6.0.7+dfsg-2 (bug #1014994)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-21305
NOTE: Fixed in:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/3b47a97676ee9ca4e16566f1931c456459108eae
(5.0.25rc1)
CVE-2022-35229 (An authenticated user can create a link with reflected
Javascript code ...)
{DLA-3390-1}
[experimental] - zabbix 1:6.0.6+dfsg-1
- zabbix 1:6.0.7+dfsg-2 (bug #1014992)
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-21306
NOTE: Fixed in:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/b546c3f10ce98b0c914e5fc4114bd43042880c3c
(5.0.25rc1)
CVE-2022-35228 (SAP BusinessObjects CMC allows an unauthenticated attacker to
retrieve ...)
@@ -208734,12 +208722,10 @@ CVE-2022-24920
CVE-2022-24919 (An authenticated user can create a link with reflected
Javascript code ...)
{DLA-3390-1 DLA-2980-1}
- zabbix 1:6.0.7+dfsg-2
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-20680
NOTE:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
(5.0.21rc1)
CVE-2022-24918 (An authenticated user can create a link with reflected
Javascript code ...)
- zabbix 1:6.0.7+dfsg-2
- [bullseye] - zabbix <no-dsa> (Minor issue)
[buster] - zabbix <not-affected> (The vulnerable code was introduced
later)
[stretch] - zabbix <not-affected> (The vulnerable code was introduced
later)
NOTE: https://support.zabbix.com/browse/ZBX-20680
@@ -208747,7 +208733,6 @@ CVE-2022-24918 (An authenticated user can create a
link with reflected Javascrip
CVE-2022-24917 (An authenticated user can create a link with reflected
Javascript code ...)
{DLA-3390-1 DLA-2980-1}
- zabbix 1:6.0.7+dfsg-2
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-20680
NOTE:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
(5.0.21rc1)
CVE-2022-24911
@@ -210580,7 +210565,6 @@ CVE-2022-24350 (An issue was discovered in IhisiSmm
in Insyde InsydeH2O with ker
CVE-2022-24349 (An authenticated user can create a link with reflected XSS
payload for ...)
{DLA-3390-1 DLA-2980-1}
- zabbix 1:6.0.7+dfsg-2
- [bullseye] - zabbix <no-dsa> (Minor issue)
NOTE: https://support.zabbix.com/browse/ZBX-20680
NOTE:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/ff70e709719e4e9f25f5d187637fd53fd61c8bbe
(5.0.21rc1)
CVE-2022-24348 (Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory
traversal ...)
@@ -215451,7 +215435,6 @@ CVE-2022-23134 (After the initial setup process, some
steps of setup.php file ar
NOTE: 4.0 and 5.0 are not affected:
https://support.zabbix.com/browse/ZBX-20384?focusedCommentId=648239&page=com.atlassian.jira.plugin.system.issuetabpanels%3Acomment-tabpanel#comment-648239
CVE-2022-23133 (An authenticated user can create a hosts group from the
configuration ...)
- zabbix 1:6.0.7+dfsg-2
- [bullseye] - zabbix <no-dsa> (Minor issue)
[buster] - zabbix <not-affected> (Vulnerable code introduced later, and
reverted with the fix)
[stretch] - zabbix <not-affected> (Vulnerable code introduced later,
and reverted with the fix)
NOTE: https://support.zabbix.com/browse/ZBX-20388
@@ -215459,7 +215442,6 @@ CVE-2022-23133 (An authenticated user can create a
hosts group from the configur
NOTE: Introduced by:
https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/f3654d0173ea244a2319a093f7c4e27ad9086dc3
(4.4.0alpha3)
CVE-2022-23132 (During Zabbix installation from RPM, DAC_OVERRIDE SELinux
capability i ...)
- zabbix 1:6.0.7+dfsg-2
- [bullseye] - zabbix <no-dsa> (Minor issue)
[buster] - zabbix <not-affected> (Not using RPM or DAC_OVERRIDE in
Debian installs)
[stretch] - zabbix <not-affected> (Not using RPM or DAC_OVERRIDE in
Debian installs, zbx_ipc_service_init_env() not present)
NOTE: https://support.zabbix.com/browse/ZBX-20341
=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[03 Oct 2024] DLA-3909-1 zabbix - security update
+ {CVE-2022-23132 CVE-2022-23133 CVE-2022-24349 CVE-2022-24917
CVE-2022-24918 CVE-2022-24919 CVE-2022-35229 CVE-2022-35230 CVE-2022-43515
CVE-2023-29449 CVE-2023-29450 CVE-2023-29454 CVE-2023-29455 CVE-2023-29456
CVE-2023-29457 CVE-2023-29458 CVE-2023-32721 CVE-2023-32722 CVE-2023-32724
CVE-2023-32726 CVE-2023-32727 CVE-2024-22114 CVE-2024-22116 CVE-2024-22119
CVE-2024-22122 CVE-2024-22123 CVE-2024-36460 CVE-2024-36461}
+ [bullseye] - zabbix 1:5.0.44+dfsg-1+deb11u1
[30 Sep 2024] DLA-3908-1 debian-security-support - update
[bullseye] - debian-security-support 1:11+2024.09.30
[30 Sep 2024] DLA-3907-1 sqlite3 - security update
=====================================
data/dla-needed.txt
=====================================
@@ -271,8 +271,3 @@ upx-ucl
webkit2gtk
NOTE: 20240926: Added by Front-Desk (lamby)
--
-zabbix (tobi)
- NOTE: 20240126: Added by oldstable Security Team (jmm)
- NOTE: 20240815: sync fixes from bookworm and buster
- NOTE: 20240815: A bookworm DSA is planned for 8 new CVEs (Beuc/front-desk)
---
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2e69c72068bd2d66044601df0d5be18d9a408666
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2e69c72068bd2d66044601df0d5be18d9a408666
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits