Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
9fdae700 by Moritz Muehlenhoff at 2024-11-11T21:10:41+01:00
triage older issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -20644,7 +20644,7 @@ CVE-2024-7904 (A vulnerability was found in DedeBIZ
6.3.0. It has been rated as
NOT-FOR-US: DedeBIZ
CVE-2024-6221 (A vulnerability in corydolphin/flask-cors version 4.0.1 allows
the `Ac ...)
- python-flask-cors <unfixed> (bug #1081300)
- [bookworm] - python-flask-cors <no-dsa> (Minor issue)
+ [bookworm] - python-flask-cors <postponed> (Minor issue, revisit when
fixed upstream)
[bullseye] - python-flask-cors <postponed> (Minor issue)
NOTE: https://huntr.com/bounties/a42935fc-6f57-4818-bca4-3d528235df4d
NOTE: https://github.com/corydolphin/flask-cors/issues/337
@@ -32582,15 +32582,21 @@ CVE-2024-39001 (ag-grid-enterprise v31.3.2 was
discovered to contain a prototype
CVE-2024-39000 (adolph_dudu ratio-swiper v0.0.2 was discovered to contain a
prototype ...)
NOT-FOR-US: ratio-swiper Nodejs module
CVE-2024-38999 (jrburke requirejs v2.3.6 was discovered to contain a prototype
polluti ...)
- - requirejs <unfixed> (bug #1077543)
+ - requirejs 2.3.7+ds+~2.1.37-1 (bug #1077543)
[bookworm] - requirejs <no-dsa> (Minor issue)
[bullseye] - requirejs <no-dsa> (Minor issue)
NOTE: https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a
+ NOTE: https://github.com/requirejs/requirejs/issues/1854
+ NOTE: https://github.com/requirejs/requirejs/pull/1856
+ NOTE:
https://github.com/requirejs/requirejs/commit/6e8a234303deaf80ef619e66a2f5c6616bb7e6d9
(2.3.7)
CVE-2024-38998 (jrburke requirejs v2.3.6 was discovered to contain a prototype
polluti ...)
- - requirejs <unfixed> (bug #1077543)
+ - requirejs 2.3.7+ds+~2.1.37-1 (bug #1077543)
[bookworm] - requirejs <no-dsa> (Minor issue)
[bullseye] - requirejs <no-dsa> (Minor issue)
NOTE: https://gist.github.com/mestrtee/9acae342285bd2998fa09ebcb1e6d30a
+ NOTE: https://github.com/requirejs/requirejs/issues/1854
+ NOTE: https://github.com/requirejs/requirejs/pull/1856
+ NOTE:
https://github.com/requirejs/requirejs/commit/6e8a234303deaf80ef619e66a2f5c6616bb7e6d9
(2.3.7)
CVE-2024-38997 (adolph_dudu ratio-swiper v0.0.2 was discovered to contain a
prototype ...)
NOT-FOR-US: ratio-swiper Nodejs module
CVE-2024-38996 (ag-grid-community v31.3.2 and ag-grid-enterprise v31.3.2 were
discover ...)
@@ -117760,6 +117766,9 @@ CVE-2023-33460 (There's a memory leak in yajl 2.1.0
with use of yajl_tree_parse
[buster] - r-cran-jsonlite <postponed> (Minor issue; fix only after
newer releases got a fix)
- ruby-yajl <not-affected> (Vulnerable code not present; embeds
not-affected old yajl version)
NOTE: ruby-yajl embeds yajl version 1.0.12
(https://github.com/brianmario/yajl-ruby/blob/master/ext/yajl/api/yajl_version.h)
+ NOTE: r-cran-jsonlite: https://github.com/jeroen/jsonlite/issues/426
+ NOTE: r-cran-jsonlite: https://github.com/jeroen/jsonlite/pull/421
+ NOTE: r-cran-jsonlite:
https://github.com/jeroen/jsonlite/commit/e8965dfead9f270ff8d7bb3029e86dee866d407d
(v1.8.8)
CVE-2023-33457 (In Sogou Workflow v0.10.6, memcpy a negtive size in
URIParser::parse , ...)
NOT-FOR-US: Sogou Workflow
CVE-2023-33381 (A command injection vulnerability was found in the ping
functionality ...)
@@ -220522,6 +220531,8 @@ CVE-2022-24795 (yajl-ruby is a C binding to the YAJL
JSON parsing and generation
NOTE: https://github.com/lloyd/yajl/issues/239
NOTE: burp fix:
https://github.com/grke/burp/commit/5ce44cdf7018767b53a4c5466c62e4dc99d0bc93
NOTE: epics-base: https://github.com/epics-base/epics-base/issues/405
+ NOTE: r-cran-jsonlite: https://github.com/jeroen/jsonlite/issues/431
+ NOTE: r-cran-jsonlite:
https://github.com/jeroen/jsonlite/commit/e425ef9cb39500687d83654a565c8abd203ff8ba
(v1.8.8)
CVE-2022-24794 (Express OpenID Connect is an Express JS middleware
implementing sign o ...)
NOT-FOR-US: Express OpenID Connect
CVE-2022-24793 (PJSIP is a free and open source multimedia communication
library writt ...)
@@ -498798,6 +498809,8 @@ CVE-2017-16516 (In the yajl-ruby gem 1.3.0 for Ruby,
when a crafted JSON file is
NOTE:
https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce
NOTE: burp fix:
https://github.com/grke/burp/commit/5ce44cdf7018767b53a4c5466c62e4dc99d0bc93
NOTE: epics-base: https://github.com/epics-base/epics-base/issues/405
+ NOTE: r-cran-jsonlite: https://github.com/jeroen/jsonlite/issues/431
+ NOTE: r-cran-jsonlite:
https://github.com/jeroen/jsonlite/commit/ce9520f888c2339b48565fcc5ffecc85091e589e
(v1.8.8)
CVE-2017-16515
RESERVED
CVE-2017-16514 (Multiple persistent stored Cross-Site-Scripting (XSS)
vulnerabilities ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9fdae70095de147f68d3e795a7612aa4097835dd
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9fdae70095de147f68d3e795a7612aa4097835dd
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits