Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
82c81a47 by Moritz Muehlenhoff at 2026-02-05T13:07:53+01:00
trixie/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -803,6 +803,8 @@ CVE-2019-25260 (OXID eShop versions 6.x prior to 6.3.4 
contains a SQL injection
        NOT-FOR-US: OXID eShop
 CVE-2026-25541 (Bytes is a utility library for working with bytes. From 
version 1.2.1  ...)
        - rust-bytes 1.11.1-1
+       [trixie] - rust-bytes <no-dsa> (Minor issue)
+       [bookworm] - rust-bytes <no-dsa> (Minor issue)
        NOTE: https://rustsec.org/advisories/RUSTSEC-2026-0007.html
        NOTE: https://github.com/advisories/GHSA-434x-w66g-qw3r
        NOTE: Fixed by: 
https://github.com/tokio-rs/bytes/commit/d0293b0e35838123c51ca5dfdf468ecafee4398f
 (v1.11.1)
@@ -3079,9 +3081,10 @@ CVE-2026-24810 (Buffer Copy without Checking Size of 
Input ('Classic Buffer Over
 CVE-2026-24809 (An issue from the component luaG_runerror in 
dependencies/lua/src/ldeb ...)
        NOT-FOR-US: praydog/REFramework
 CVE-2026-24808 (Integer Overflow or Wraparound vulnerability in RawTherapee 
(rtengine  ...)
-       - rawtherapee 5.12-1
+       - rawtherapee 5.12-1 (unimportant)
        NOTE: https://github.com/RawTherapee/RawTherapee/pull/7359
        NOTE: Fixed by: 
https://github.com/RawTherapee/RawTherapee/commit/e86bc3f638f8db3ac7b2d1d12df6ee38155788e7
 (5.12-rc1)
+       NOTE: Crash in CLI tool, no security impact
 CVE-2026-24807 (Improper Verification of Cryptographic Signature vulnerability 
in liuy ...)
        NOT-FOR-US: liuyueyi quick-media
 CVE-2026-24806 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
@@ -3475,6 +3478,7 @@ CVE-2026-22796 (Issue summary: A type confusion 
vulnerability exists in the sign
        NOTE: Fixed by: 
https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
 (openssl-3.0.19)
 CVE-2026-XXXX [RUSTSEC-2026-0005: Potential use-after-free in oneshot when 
used asynchronously]
        - rust-oneshot <unfixed>
+       [trixie] - rust-oneshot <no-dsa> (Minor issue)
        NOTE: https://rustsec.org/advisories/RUSTSEC-2026-0005.html
        NOTE: https://github.com/faern/oneshot/issues/73
 CVE-2026-24686 (go-tuf is a Go implementation of The Update Framework (TUF). 
go-tuf's  ...)
@@ -4549,6 +4553,7 @@ CVE-2026-24138 (FOG is a free open-source 
cloning/imaging/rescue suite/inventory
        NOT-FOR-US: FOG
 CVE-2026-24137 (sigstore framework is a common go library shared across 
sigstore servi ...)
        - golang-github-sigstore-sigstore 1.10.4-1 (bug #1126553)
+       [trixie] - golang-github-sigstore-sigstore <no-dsa> (Minor issue)
        NOTE: 
https://github.com/sigstore/sigstore/security/advisories/GHSA-fcv2-xgw5-pqxf
        NOTE: Fixed by: 
https://github.com/sigstore/sigstore/commit/8ec410a2993ea78083aecf0e473a85453039496e
 (v1.10.4)
 CVE-2026-24132 (Orval generates type-safe JS clients (TypeScript) from any 
valid OpenA ...)
@@ -4735,10 +4740,12 @@ CVE-2024-11976 (The The BuddyPress plugin for WordPress 
is vulnerable to arbitra
        NOT-FOR-US: WordPress plugin
 CVE-2026-24117 (Rekor is a software supply chain transparency log. In versions 
1.4.3 a ...)
        - rekor 1.5.0-1 (bug #1126276)
+       [trixie] - rekor <no-dsa> (Minor issue)
        NOTE: 
https://github.com/sigstore/rekor/security/advisories/GHSA-4c4x-jm2x-pf9j
        NOTE: Fixed by: 
https://github.com/sigstore/rekor/commit/60ef2bceba192c5bf9327d003bceea8bf1f8275f
 (v1.5.0)
 CVE-2026-23831 (Rekor is a software supply chain transparency log. In versions 
1.4.3 a ...)
        - rekor 1.5.0-1 (bug #1126275)
+       [trixie] - rekor <no-dsa> (Minor issue)
        NOTE: 
https://github.com/sigstore/rekor/security/advisories/GHSA-273p-m2cw-6833
        NOTE: Fixed by: 
https://github.com/sigstore/rekor/commit/39bae3d192bce48ef4ef2cbd1788fb5770fee8cd
 (v1.5.0)
 CVE-2026-24390 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
@@ -4844,10 +4851,12 @@ CVE-2026-23996 (FastAPI Api Key provides a 
backend-agnostic library that provide
        NOT-FOR-US: FastAPI Api Key
 CVE-2026-23992 (go-tuf is a Go implementation of The Update Framework (TUF). 
Starting  ...)
        - golang-github-theupdateframework-go-tuf <unfixed> (bug #1126271)
+       [trixie] - golang-github-theupdateframework-go-tuf <no-dsa> (Minor 
issue)
        NOTE: 
https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-fphv-w9fq-2525
        NOTE: Fixed by: 
https://github.com/theupdateframework/go-tuf/commit/b38d91fdbc69dfe31fe9230d97dafe527ea854a0
 (v2.3.1)
 CVE-2026-23991 (go-tuf is a Go implementation of The Update Framework (TUF). 
Starting  ...)
        - golang-github-theupdateframework-go-tuf <unfixed> (bug #1126269)
+       [trixie] - golang-github-theupdateframework-go-tuf <no-dsa> (Minor 
issue)
        NOTE: 
https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-846p-jg2w-w324
        NOTE: Fixed by: 
https://github.com/theupdateframework/go-tuf/commit/73345ab6b0eb7e59d525dac17a428f043074cef6
 (v2.3.1)
 CVE-2026-23990 (The Flux Operator is a Kubernetes CRD controller that manages 
the life ...)
@@ -6480,6 +6489,7 @@ CVE-2026-23949 (jaraco.context, an open-source software 
package that provides so
        [trixie] - jaraco.context <no-dsa> (Minor issue)
        [bookworm] - jaraco.context <not-affected> (Vulnerable code not present)
        - setuptools <unfixed> (bug #1126729)
+       [trixie] - setuptools <no-dsa> (Minor issue)
        [bookworm] - setuptools <not-affected> (Vulnerable code not present, 
bundled jaraco.context too old)
        [bullseye] - setuptools <not-affected> (Vulnerable code not present, 
bundled jaraco.context too old)
        NOTE: 
https://github.com/jaraco/jaraco.context/security/advisories/GHSA-58pv-8j8x-9vj2
@@ -37696,6 +37706,8 @@ CVE-2023-7320 (The WooCommerce plugin for WordPress is 
vulnerable to Sensitive I
        NOT-FOR-US: WordPress plugin
 CVE-2025-62727 (Starlette is a lightweight ASGI framework/toolkit. Starting in 
version ...)
        - starlette 0.50.0-1 (bug #1119662)
+       [trixie] - starlette <no-dsa> (Minor issue)
+       [bookworm] - starlette <no-dsa> (Minor issue)
        [bullseye] - starlette <postponed> (minor issue; DoS)
        NOTE: 
https://github.com/Kludex/starlette/security/advisories/GHSA-7f5h-v6xp-fcq8
        NOTE: Fixed by: 
https://github.com/Kludex/starlette/commit/4ea6e22b489ec388d6004cfbca52dd5b147127c5
 (0.49.1)
@@ -77657,6 +77669,8 @@ CVE-2024-9453 (A vulnerability was found in Red Hat 
OpenShift Jenkins. The beare
        NOT-FOR-US: Red Hat OpenShift Jenkins
 CVE-2026-23553 (In the context switch logic Xen attempts to skip an IBPB in 
the case o ...)
        - xen <unfixed>
+       [trixie] - xen <postponed> (Minor issue, fix along with next Xen update)
+       [bookworm] - xen <postponed> (Minor issue, fix along with next Xen 
update)
        [bullseye] - xen <end-of-life> (EOLed in Bullseye)
        NOTE: https://xenbits.xen.org/xsa/advisory-479.html
 CVE-2025-58151 [varstored: TOCTOU issues with mapped guest memory]
@@ -77664,6 +77678,8 @@ CVE-2025-58151 [varstored: TOCTOU issues with mapped 
guest memory]
        NOTE: https://xenbits.xen.org/xsa/advisory-478.html
 CVE-2025-58150 (Shadow mode tracing code uses a set of per-CPU variables to 
avoid cumb ...)
        - xen <unfixed>
+       [trixie] - xen <postponed> (Minor issue, fix along with next Xen update)
+       [bookworm] - xen <postponed> (Minor issue, fix along with next Xen 
update)
        [bullseye] - xen <end-of-life> (EOLed in Bullseye)
        NOTE: https://xenbits.xen.org/xsa/advisory-477.html
 CVE-2025-58149 (When passing through PCI devices, the detach logic in libxl 
won't remo ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -77,7 +77,7 @@ ruby-saml/oldstable
 --
 runc
 --
-shaarli
+shaarli (jmm)
   Maintainer proposed update for trixie-security, open questions about bookworm
 --
 smb4k/oldstable



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/82c81a47f929fad7265339e416ba76101e0a9e14

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/82c81a47f929fad7265339e416ba76101e0a9e14
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to